Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2007-05-08
2007-05-08
Jung, David (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000
Reexamination Certificate
active
10868753
ABSTRACT:
A method and system that ensures system security is disclosed. Specifically, the method and system formulate a finite automaton that corresponds to a number of patterns. Then, as data units are put through the finite automaton, suspected data units are identified. The suspected data units are the ones containing content that collectively matches one or more of the aforementioned patterns. To identify the suspected data units, the dependency relationships among various states in the finite automaton that have been compressed are relied upon. Depending on the result of identifying the suspected data units, different actions are performed.
REFERENCES:
patent: 5319776 (1994-06-01), Hile
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5623600 (1997-04-01), Ji
patent: 5978801 (1999-11-01), Yuasa
patent: 2002/0073330 (2002-06-01), Chandnani
patent: 2003/0123447 (2003-07-01), Smith
patent: 2005/0278781 (2005-12-01), Zhao et al.
patent: 2005/0278783 (2005-12-01), Chien et al.
patent: 2 307 529 (2001-09-01), None
patent: WO 2004/079571 (2004-09-01), None
Security for real-time MPEG compressed video in distributed multimedia applications; Spanos, G.A.; Maples, T.B.; Computers and Communications, 1996., Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Mar. 27-29, 1996 pp. 72-78.
Robust encryption for secure image transmission over wireless channels Nanjunda, C.; Haleem, M.A.; Chandramouli, R.; Communications, 2005. ICC 2005. 2005 IEEE International Conference on vol. 2, May 16-20, 2005 pp. 1287-1291 vol. 2.
Performance analysis of audio streaming in secure wireless access network Vaidya, B.; JongWoo Kin; Jae-Young Pyun; JongAn Park; SeungJo Han; Computer and Information Science, 2005. Fourth Annual ACIS International Conference on 2005 pp. 556-561.
Chien Shih-Wei
Zhao Shi-Ming
Hsu Winston
Jung David
Lionic Corporation
LandOfFree
System security approaches using state tables does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System security approaches using state tables, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System security approaches using state tables will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3793019