System, apparatuses, methods, and computer-readable media...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C726S003000

Reexamination Certificate

active

07552323

ABSTRACT:
Methods, systems and computer-readable data storage media for authentication and/or access authorization in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources, authorized user, and/or source information are stored in a database at a network portal along with access policy rules that can be device and/or user dependent. A source node can construct a packet header including a user identifier indicating the user originating the request, and/or a source identifier indicating the hardware from which the request is originated. At least one of these identifiers are included with a synchronization packet for transmission to a destination node. An appliance or firewall in the communications network receives, authenticates, and determines whether resource access is authorized before releasing the packet to its intended destination.

REFERENCES:
patent: 5216675 (1993-06-01), Melliar-Smith et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5802178 (1998-09-01), Holden et al.
patent: 5872847 (1999-02-01), Boyle et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6317831 (2001-11-01), King
patent: 6363489 (2002-03-01), Comay et al.
patent: 6370648 (2002-04-01), Diep
patent: 6408391 (2002-06-01), Huff et al.
patent: 6493342 (2002-12-01), Breslow et al.
patent: 6671273 (2003-12-01), Beck
patent: 6772334 (2004-08-01), Glawitsch
patent: 6980658 (2005-12-01), Rezaiifar et al.
patent: 7134022 (2006-11-01), Flyntz
patent: 2001/0023482 (2001-09-01), Wray
patent: 2001/0054159 (2001-12-01), Hoshino
patent: 2002/0029337 (2002-03-01), Sudia et al.
patent: 2002/0078202 (2002-06-01), Ando et al.
patent: 2002/0078354 (2002-06-01), Sandhu et al.
patent: 2002/0083343 (2002-06-01), Crosbie et al.
patent: 2002/0087882 (2002-07-01), Schneier et al.
patent: 2002/0101332 (2002-08-01), Talmadge et al.
patent: 2002/0103916 (2002-08-01), Chen et al.
patent: 2002/0107953 (2002-08-01), Ontiveros et al.
patent: 2002/0112185 (2002-08-01), Hodges
patent: 2002/0129264 (2002-09-01), Rowland et al.
patent: 2002/0133586 (2002-09-01), Shanklin et al.
patent: 2002/0133698 (2002-09-01), Wank
patent: 2002/0133721 (2002-09-01), Adjaoute
patent: 2002/0136407 (2002-09-01), Denning et al.
patent: 2003/0076794 (2003-04-01), Kawasaki et al.
patent: 2004/0215771 (2004-10-01), Hayes
patent: 2004/0233915 (2004-11-01), Lin
patent: 2286534 (2001-04-01), None
patent: WO 02/061510 (2002-08-01), None
International Search Report Dated Apr. 29, 2004, from Corresponding International Application No. PCT/US03/36713, Filed Nov. 17, 2003.
Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke, “TCP/IP Tutorial And Technical Overview,” Online, Aug. 2001, IBM Internet XP002276979, retrieved from the Internet, URL: www.ibm.com/readbooks, retrieved on May 21, 2003, p. I-p. XVIII, p. 665-p. 780.
Hunt, R., “Internet/Intranet FirewallSecurity-Policy, Architecture And Transaction Services,” Computer Communications, Butterworths & Co. Publishers Ltd., GB, vol. 21, No. 13, Sep. 1, 1998, pp. 1107-1123, XP004146571 ISSN: 0140-3664, p. 111, right-hand column, p. 1113, right-hand column, figures 2-4.
Barham, et als., “Techniques for Lightweight Concealment and Authentication in IP Networks,” Intel Research Berkeley, Jul. 2002, pp. 1-12, IRB-TR-02-009, Intel Corp., U.S.A.
Phifer, “Cost-Effective Remote End Point Protection: Against Trojans, Spyware, and Other Pests,” PestPatrol White Paper, Sep. 1, 2002, pp. 1-11.
Sungard, “Welcome to the Info Security Performance Model,” SunGard Assessment Tool, Sep. 1, 2002, pp. 1-2.
Westbridge, “XML Web Services Security—Going Production,” Westbridge White Paper, Sep. 1, 2002, pp. 1-7.
Top Layer, “Stopping Attacks: The Importance of Denial of Service (DoS) Security Appliances,” Top Layer White Paper, pp. 1-13.
Internet Security, “Complete Desktop Protection for The Enterprise,” ISS Technical White Paper, Sep. 1, 2002, pp. Cover, 1-6.
Internet Security, “Web Application Proetction: Using Existing Protection Solutions,” ISS Technical White Paper, Jul. 1, 2002, pp. Cover, 1-6.
Top Layer, “Preventing Cyber Attacks and Costly Network Degradation,” Top Layer Webcast, May 30, 2002, pp. 1-13 (slides); pp. 1-15-(transcript).
Okena, “A Primer on Preventing Attcks at the Host—Okena, Inc.—Hurwitz Report,” Hurwitz Analyst White Paper, Feb. 1, 2002, pp. 1-11.
Blue Lance, “Protecting Computer-Managed Assets: Building a Secure Infrastructure for Business,” Larstan Business Reports, Jan. 1, 2002, pp. 1-10.
Okena, “Technology Best Practices for Intrusion Prevention,” Okena Analyst White Paper, Jan. 1, 2002, pp. 1-3.
Computel, “Distributed Denial of Service Attacks,” Network Security White Papers, Dec. 6, 2000, pp. 1-6.
Leithauser, “Fire Guardian,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-2.
Lockstep, “WebAgain—Automatic Web Site Repair,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-4.
Kobelt, NetSentron, KnowledgeStorm Solution Detail Report, 2002, pp. 1-3.
Internet Security, “RealSecure® SiteProtector for Enterprise Protection,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.
Internet Security, “BlackICE PC Protection,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.
Internet Security, “System Scanner®,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.
Internet Security, “Internet Scanner™,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-6.
Dynamics, “WebInspect™ (Web Application Security Assessment),” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System, apparatuses, methods, and computer-readable media... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System, apparatuses, methods, and computer-readable media..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System, apparatuses, methods, and computer-readable media... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4144770

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.