Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2001-08-10
2008-07-29
Moise, Emmanuel L (Department: 2137)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
Reexamination Certificate
active
07406713
ABSTRACT:
Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit through which an entity, such as law enforcement, can communicate with an entity attempting an unauthorized access attempt unbeknownst to the entity attempting the unauthorized access attempt. This allows, for example, the detection and identification of the entity attempting the unauthorized access attempt.
REFERENCES:
patent: 5550551 (1996-08-01), Alesio
patent: 5694335 (1997-12-01), Hollenberg
patent: 5796952 (1998-08-01), Davis et al.
patent: 5825283 (1998-10-01), Camhi
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5969433 (1999-10-01), Maggiora et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6363489 (2002-03-01), Comay et al.
patent: 6405318 (2002-06-01), Rowland
patent: 6519703 (2003-02-01), Joyce
patent: 6735702 (2004-05-01), Yavtkar et al.
patent: 6738909 (2004-05-01), Cheng et al.
patent: 6748540 (2004-06-01), Canestaro et al.
patent: 6886102 (2005-04-01), Lyle
patent: 6981146 (2005-12-01), Sheymov
patent: 6990591 (2006-01-01), Pearson
patent: 2002/0023227 (2002-02-01), Sheymov et al.
patent: WO 00/42742 (2000-07-01), None
patent: WO 01/84270 (2001-11-01), None
patent: WO 01/95590 (2001-12-01), None
PCT (PCT/US01/41654) International Search Report date of mailing Jul. 10, 2002.
Dahlia Malkhi, et al.; “Secure Execution of Java Applets Using a Remote Playground”; AT&T Labs Research, Florham Park, NJ; 1988 IEEE; pp. 40-51.
John Pescatore; “Secure Use of the World Wide Web: Keeping Browsers and Servers From Getting Snared”; Trusted Information System; ISBN# 0-7803-3277-6; pp. 36-39.
RSA Security; “Are Passwords Really Free? A Closer Look at the Hidden Costs of Password Security”; pp. 1-8.
White G. B. et al. “Cooperating Security Managers: A Peer-Based Intrusion Detection System” IEEENetwork, IEEE Inc. New York, US, vol. 10, No. 1, 1996, pp. 20-23, XP000580083, pp. 20-23.
Talpade R., Kim G., Khurana S.: “NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection” Proceedings IEEE International Symposium On Computers And Communications, Jul. 6-8, 1999, pp. 442-451.
Sheymov Victor I
Turner Roger B
Invicta Networks, Inc.
Moise Emmanuel L
Popham Jeffrey D
Roberts Mlotkowski Safran & Cole P.C.
LandOfFree
Systems and methods for distributed network protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for distributed network protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for distributed network protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3966750