Systems and methods for distributed network protection

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07406713

ABSTRACT:
Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit through which an entity, such as law enforcement, can communicate with an entity attempting an unauthorized access attempt unbeknownst to the entity attempting the unauthorized access attempt. This allows, for example, the detection and identification of the entity attempting the unauthorized access attempt.

REFERENCES:
patent: 5550551 (1996-08-01), Alesio
patent: 5694335 (1997-12-01), Hollenberg
patent: 5796952 (1998-08-01), Davis et al.
patent: 5825283 (1998-10-01), Camhi
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5969433 (1999-10-01), Maggiora et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6363489 (2002-03-01), Comay et al.
patent: 6405318 (2002-06-01), Rowland
patent: 6519703 (2003-02-01), Joyce
patent: 6735702 (2004-05-01), Yavtkar et al.
patent: 6738909 (2004-05-01), Cheng et al.
patent: 6748540 (2004-06-01), Canestaro et al.
patent: 6886102 (2005-04-01), Lyle
patent: 6981146 (2005-12-01), Sheymov
patent: 6990591 (2006-01-01), Pearson
patent: 2002/0023227 (2002-02-01), Sheymov et al.
patent: WO 00/42742 (2000-07-01), None
patent: WO 01/84270 (2001-11-01), None
patent: WO 01/95590 (2001-12-01), None
PCT (PCT/US01/41654) International Search Report date of mailing Jul. 10, 2002.
Dahlia Malkhi, et al.; “Secure Execution of Java Applets Using a Remote Playground”; AT&T Labs Research, Florham Park, NJ; 1988 IEEE; pp. 40-51.
John Pescatore; “Secure Use of the World Wide Web: Keeping Browsers and Servers From Getting Snared”; Trusted Information System; ISBN# 0-7803-3277-6; pp. 36-39.
RSA Security; “Are Passwords Really Free? A Closer Look at the Hidden Costs of Password Security”; pp. 1-8.
White G. B. et al. “Cooperating Security Managers: A Peer-Based Intrusion Detection System” IEEENetwork, IEEE Inc. New York, US, vol. 10, No. 1, 1996, pp. 20-23, XP000580083, pp. 20-23.
Talpade R., Kim G., Khurana S.: “NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection” Proceedings IEEE International Symposium On Computers And Communications, Jul. 6-8, 1999, pp. 442-451.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for distributed network protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for distributed network protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for distributed network protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3966750

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.