System security approaches using state tables

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C726S024000

Reexamination Certificate

active

10868753

ABSTRACT:
A method and system that ensures system security is disclosed. Specifically, the method and system formulate a finite automaton that corresponds to a number of patterns. Then, as data units are put through the finite automaton, suspected data units are identified. The suspected data units are the ones containing content that collectively matches one or more of the aforementioned patterns. To identify the suspected data units, the dependency relationships among various states in the finite automaton that have been compressed are relied upon. Depending on the result of identifying the suspected data units, different actions are performed.

REFERENCES:
patent: 5319776 (1994-06-01), Hile
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5623600 (1997-04-01), Ji
patent: 5978801 (1999-11-01), Yuasa
patent: 2002/0073330 (2002-06-01), Chandnani
patent: 2003/0123447 (2003-07-01), Smith
patent: 2005/0278781 (2005-12-01), Zhao et al.
patent: 2005/0278783 (2005-12-01), Chien et al.
patent: 2 307 529 (2001-09-01), None
patent: WO 2004/079571 (2004-09-01), None
Security for real-time MPEG compressed video in distributed multimedia applications; Spanos, G.A.; Maples, T.B.; Computers and Communications, 1996., Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Mar. 27-29, 1996 pp. 72-78.
Robust encryption for secure image transmission over wireless channels Nanjunda, C.; Haleem, M.A.; Chandramouli, R.; Communications, 2005. ICC 2005. 2005 IEEE International Conference on vol. 2, May 16-20, 2005 pp. 1287-1291 vol. 2.
Performance analysis of audio streaming in secure wireless access network Vaidya, B.; JongWoo Kin; Jae-Young Pyun; JongAn Park; SeungJo Han; Computer and Information Science, 2005. Fourth Annual ACIS International Conference on 2005 pp. 556-561.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System security approaches using state tables does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System security approaches using state tables, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System security approaches using state tables will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3793019

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.