Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2008-10-21
2011-11-01
Chen, Shin-Hon (Department: 2431)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000, C726S025000, C713S340000
Reexamination Certificate
active
08051480
ABSTRACT:
The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of networks. The invention can provide security for many types of network interfaces on a mobile device, including: Bluetooth, WiFi, cellular networks, USB, SMS, infrared, and near-field communication. Data is gathered at multiple points in a given processing pathway and linked by a protocol tracking component in order to analyze each protocol present in the data after an appropriate amount of processing by the mobile device. Protocol analysis components are utilized dynamically to analyze data and are re-used between multiple data pathways so as to be able to support an arbitrary number of network data pathways on a mobile device without requiring substantial overhead.
REFERENCES:
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6959184 (2005-10-01), Byers et al.
patent: 7096368 (2006-08-01), Kouznetsov
patent: 7237264 (2007-06-01), Graham et al.
patent: 7376969 (2008-05-01), Njemanze et al.
patent: 7386297 (2008-06-01), An
patent: 7392543 (2008-06-01), Szor
patent: 7634800 (2009-12-01), Ide et al.
patent: 7774637 (2010-08-01), Beddoe et al.
patent: 2001/0044339 (2001-11-01), Cordero et al.
patent: 2002/0183060 (2002-12-01), Ko et al.
patent: 2003/0028803 (2003-02-01), Bunker, et al.
patent: 2003/0079145 (2003-04-01), Kouznetsov et al.
patent: 2005/0138395 (2005-06-01), Benco et al.
patent: 2005/0237970 (2005-10-01), Inoue
patent: 2005/0254654 (2005-11-01), Rockwell et al.
patent: 2005/0278777 (2005-12-01), Loza
patent: 2006/0130145 (2006-06-01), Choi et al.
patent: 2006/0150238 (2006-07-01), D'Agostino
patent: 2006/0179485 (2006-08-01), Longsine et al.
patent: 2006/0294582 (2006-12-01), Linsley-Hood et al.
patent: 2007/0214504 (2007-09-01), Milani Comparetti et al.
patent: 2007/0220608 (2007-09-01), Lahti et al.
patent: 2007/0240218 (2007-10-01), Tuvell et al.
patent: 2007/0240221 (2007-10-01), Tuvell et al.
patent: 2007/0240222 (2007-10-01), Tuvell et al.
patent: 2007/0293263 (2007-12-01), Eslambolchi et al.
patent: 2008/0047007 (2008-02-01), Satkunanathan et al.
patent: 2008/0072329 (2008-03-01), Herschaft
patent: 2008/0086773 (2008-04-01), Tuvell et al.
patent: 2008/0086776 (2008-04-01), Tuvell et al.
patent: 2008/0127336 (2008-05-01), Sun et al.
patent: 2008/0134281 (2008-06-01), Shinde et al.
patent: 2008/0172746 (2008-07-01), Lotter et al.
patent: 2008/0196104 (2008-08-01), Tuvell et al.
patent: 2008/0276111 (2008-11-01), Jacoby et al.
patent: 2009/0199298 (2009-08-01), Miliefsky
patent: 2010/0064341 (2010-03-01), Aldera
patent: 2010/0154032 (2010-06-01), Ollmann
patent: 2010/0313270 (2010-12-01), Kim et al.
patent: 2010/0332593 (2010-12-01), Barash et al.
patent: WO2005101789 (2005-10-01), None
U.S. Appl. No. 12/255,635. Prosecution history available via USPTO IFW (including Office Action dated Mar. 24, 2011 and references cited.).
U.S. Appl. No. 12/255,632. Prosecution history available via USPTO IFW (including Office Action dated Apr. 13, 2011 and references cited.).
U.S. Appl. No. 12/255,626. Prosecution history available via USPTO IFW (including Office Action dated Feb. 1, 2011 and references cited.).
U.S. Appl. No. 12/255,621. Prosecution history available via USPTO IFW (including Office Action dated Apr. 13, 2011 and references cited.).
McAfee, Internet Archive, Way Back Machine, available at <http://web.archive.org/web/20080517102505/www.mcafeesecure.com/us/technology-intro.jsp>, retrieved Feb. 23, 2011, 2 pages.
Qualys, “Executive Dashbard,” Internet Archive, Way Back Machine, available at <http://web.archive.org/web/20080507161417/ www.qualys.com/products/screens/?screen=Executive+Dashboard>, retrieved Feb. 23, 2011, 1 page.
Qualys, “Vulnerability Management,” Internet Archive, Way Back Machine, available at <http://web.archive.org/web/20080611095201/www.qualys.com/solutions/vulnerability—management> retrieved Feb. 24, 2011, 1 page.
Teh, Joe, “Norton 360 Version 3.0 Review,” Mar. 9, 2009, available at <http://techielobang.com/blog/2009/03/09
orton-360-version-30-review/> retrieved Feb. 23, 2011, 12 pages.
Windows Update, Internet Archive, Way Back Machine, available at <http://web.archive.org/web/20071022193017/ http://en.wikipedia.org/wiki/Windows—Update> retrieved Feb. 23, 2011, 3 pages.
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, of the Declaration for PCTUS2009/061370 mailed on Dec. 14, 2009.
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, of the Declaration for PCTUS2009/061372 mailed on Mar. 24, 2010.
“Dashwire: Manage Your Cell Phone on the Web”, News Blog, Jessica Dolcourt, Oct. 29, 2007 5:00 AM PCT pp. 1-3.
MobileWipe web page, pp. 1-4.
“Real world Computing” Jun. 16, 2008 (PC Pro) pp. 1-2.
“PhoneBak PDA Phone Anti-theft software for your PDA phone”, 2007 Bak2u Pte (Singapore), pp. 1-3.
“PhoneBak PDA: Mobile Phone Theft Recovery Software”, 2007 Westin Tech.
“F-Secure Mobile Security for S60 User's Guide”, pp. 1-34.
“Kaspersky Mobile Security”, 1997-2007 Kaspersky Lab.
Berry Locator web page 2007.
U.S. Appl. No. 12/372,719. Prosecution history available via USPTO IFW.
U.S. Appl. No. 12/868,669. Prosecution history available via USPTO IFW.
U.S. Appl. No. 12/621,431. Prosecution history available via USPTO IFW.
U.S. Appl. No. 12/868,672. Prosecution history available via USPTO IFW.
U.S. Appl. No. 12/868,676. Prosecution history available via USPTO IFW.
U.S. Appl. No. 12/876,018. Prosecution history available via USPTO IFW.
U.S. Appl. No. 13/160,382. Prosecution history available via USPTO IFW.
U.S. Appl. No. 13/162,477. Prosecution history available via USPTO IFW.
U.S. Appl. No. 113/160,447. Prosecution history available via USPTO IFW.
Wikipedia Java Virtual Machine.
Wikipedia Firefox Browser.
Stay Secure by grafio http://widgets.opera.com/widget/4495/.
Symantec Endpoint Security, data sheet and product screen shot http://www.symantec.com/business/products/family.jsp?familyid=endpointsecurity.
Symantec Mobile Security Suite for Windows Mobile, data sheet and product screen shots http://www.symantec.com/business/products/sysreq.jsp?pcid=2241&pvid=mobile—security—suite—1.
Symantec Norton Smartphone security http://www.symantec.com
orton/smartphone-security.
TippingPoint Security Management System http://www.tippingpoint.com/products—sms.html.
Chen Shin-Hon
Dergosits & Noah LLP
Lookout, Inc.
LandOfFree
System and method for monitoring and analyzing multiple... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for monitoring and analyzing multiple..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for monitoring and analyzing multiple... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4294213