US Patent No: 7,948,988

Number of patents in Portfolio can not be more than 2000

Device, system and method for analysis of fragments in a fragment train

ALSO PUBLISHED AS: 20080127342

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Fragment trains in a communication network are analyzed. A fragment train includes fragments in the same fragment train and associated with the same target system. One or more fragment reassembly policies are identified out of several fragment reassembly policies, where the fragment reassembly policy corresponds to a target system associated with fragments in a fragment train. The data in the fragments in the fragment train are provided in an order indicated by the fragment reassembly policy. The fragment reassembly policy can include determining the order responsive to an offset and a more fragments indication in the fragments, and/or indicating an order specific to overlapped fragments such as comprehensively overlapped fragments.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
CISCO TECHNOLOGY, INC.SAN JOSE, CA10863

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Novak, Judy Hollis Marriottsville, MD 6 48
Roesch, Martin Frederick Eldersburg, MD 8 51
Sturges, Steven Ellicott City, MD 8 58

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (12)
5,404,488 Realtime data feed engine for updating an application with the most currently received data from multiple data feeds 114 1993
5,901,307 Processor having a selectively configurable branch prediction unit that can access a branch prediction utilizing bits derived from a plurality of sources 33 1996
5,999,937 System and method for converting data between data sets 83 1997
6,684,332 Method and system for the exchange of digitally signed objects over an insecure network 23 1998
2004/0010,684 METHOD AND SYSTEM FOR THE EXCHANGE OF DIGITALLY SIGNED OBJECTS OVER AN INSECURE NETWORK 34 1998
6,199,181 Method and system for maintaining restricted operating environments for application programs or operating systems 176 1998
6,754,826 Data processing system and method including a network access connector for limiting access to the network 37 1999
6,993,706 Method, apparatus, and program for a state machine framework 45 2002
2005/0076,066 Method, system, and program for retaining versions of files 71 2003
2005/0108,393 Host-based network intrusion detection systems 31 2003
2006/0174,337 System, method and program product to identify additional firewall rules that may be needed 42 2005
2006/0294,588 System, method and program for identifying and preventing malicious intrusions 40 2005
 
CISCO TECHNOLOGY, INC. (11)
6,324,656 System and method for rules-driven multi-phase network vulnerability assessment 261 1998
6,415,321 Domain mapping method and system 119 1998
6,499,107 Method and system for adaptive network security using intelligent packet analysis 263 1998
6,487,666 Intrusion detection signature analysis using regular expressions and logical operators 260 1999
7,054,930 System and method for propagating filters 43 2000
2003/0212,910 Method and system for reducing the false alarm rate of network intrusion detection systems 25 2003
7,350,077 802.11 using a compressed reassociation exchange to facilitate fast handoff 85 2003
7,305,708 Methods and systems for intrusion detection 37 2004
7,313,695 Systems and methods for dynamic threat assessment 25 2004
7,317,693 Systems and methods for determining the network topology of a network 48 2004
2007/0195,797 Network device that determines application-level network latency by monitoring option values in a transport layer message 23 2006
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (10)
5,430,842 Insertion of network data checksums by a network adapter 69 1992
6,393,474 Dynamic policy management apparatus and method using active network devices 162 1998
6,320,848 Methods of altering dynamic decision trees 34 1999
7,134,141 System and method for host and network based intrusion detection and response 79 2001
6,999,998 Shared memory coupling of network infrastructure devices 32 2001
2003/0083,847 User interface for presenting data for an intrusion protection system 27 2001
2003/0101,353 Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto 59 2001
6,983,323 Multi-level packet screening with dynamically selected filtering criteria 36 2002
2004/0064,726 Vulnerability management and tracking system (VMTS) 40 2002
2005/0172,019 Network management 28 2005
 
MCAFEE, INC. (8)
6,343,362 System and method providing custom attack simulation language for testing networks 47 1999
6,789,202 Method and apparatus for providing a policy-driven intrusion detection system 142 1999
7,315,801 Network security modeling system and method 83 2000
6,851,061 System and method for intrusion detection data collection using a network protocol stack multiplexor 64 2000
7,096,503 Network-based risk-assessment tool for remotely detecting local computer vulnerabilities 54 2001
6,546,493 System, method and computer program product for risk assessment scanning based on detected anomalous events 143 2001
7,152,105 System and method for network vulnerability detection and reporting 110 2002
2003/0009,699 Method and apparatus for detecting intrusions on a computer system 110 2002
 
FUJITSU LIMITED (5)
5,963,942 Pattern search apparatus and method 72 1996
5,995,963 Apparatus and method of multi-string matching based on sparse state transition list 102 1997
2005/0210,098 Storage management system and method 5 2004
2005/0210,098 Storage management system and method 5 2004
2005/0210,098 Storage management system and method 5 2004
 
MICROSOFT CORPORATION (4)
6,766,320 Search engine with natural language-based robust parsing for user query and relevance feedback learning 235 2000
7,644,275 Pass-thru for client authentication 28 2003
2004/0210,756 Pass-thru for client authentication 54 2003
2004/0268,358 Network load balancing with host status information 125 2003
 
TRIPWIRE, INC. (3)
7,073,198 Method and system for detecting a vulnerability in a network 75 2000
6,957,348 Interoperability of vulnerability and intrusion detection systems 75 2001
7,181,769 Network security system having a device profiler communicatively coupled to a traffic monitor 63 2003
 
ETELEMETRY, INC. (2)
7,133,916 Asset tracker for identifying user of current internet protocol addresses within an organization's communications network 34 2003
2007/0288,579 NETWORK ASSET TRACKER FOR IDENTIFYING USERS OF NETWORKED COMPUTERS 37 2006
 
GOOGLE INC. (2)
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 47 2000
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 47 2000
 
HITACHI, LTD. (2)
5,604,910 Method of and vector processor for searching text for key words based on candidate character strings obtained from the text using parallel processing 35 1990
4,985,863 Document storage and retrieval system 171 1990
 
INTEL CORPORATION (2)
6,587,876 Grouping targets of management policies 155 1999
7,174,566 Integrated network intrusion detection 67 2002
 
NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC. (2)
5,919,257 Networked workstation intrusion detection system 318 1997
6,539,381 System and method for synchronizing database information 132 1999
 
SRI INTERNATIONAL (2)
6,321,338 Network surveillance 402 1998
2004/0179,477 Method and apparatus for processing network packets 38 2004
 
SYMANTEC CORPORATION (2)
7,032,114 System and method for using signatures to detect computer intrusions 96 2000
7,065,657 Extensible intrusion detection system 66 2000
 
TREND MICRO INCORPORATED (2)
7,076,803 Integrated intrusion detection services 65 2002
2008/0168,561 HOST INTRUSION PREVENTION SERVER 26 2007
 
AIRDEFENSE, INC. (1)
2003/0217,283 Method and system for encrypted network management and intrusion detection 43 2002
 
AKAMAI TECHNOLOGIES, INC. (1)
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 26 2009
 
ALCATEL-LUCENT CANADA INC. (1)
5,917,821 Look-up engine for packet-based network 177 1996
 
APPLE INC. (1)
6,477,648 Trusted workstation in a networked client/server computing system 122 1997
 
ARBOR NETWORKS, INC. (1)
7,596,807 Method and system for reducing scope of self-propagating attack code in network 18 2003
 
AT&T IPM CORP. (1)
5,459,841 Finite state machine with minimized vector processing 29 1993
 
AVAYA INC. (1)
2009/0041,020 CLOCK MANAGEMENT BETWEEN TWO ENDPOINTS 16 2007
 
Baan Development, B.V. (1)
5,987,473 Interactive configuration via network 44 1997
 
Bell Telephone Laboratories, Incorporated (1)
4,550,436 Parallel text matching methods and apparatus 95 1983
 
BELLSOUTH INTELLECTUAL PROPERTY CORPORATION (1)
7,113,789 Method and system for tracking facilities related information 31 2001
 
BLUE COAT SYSTEMS, INC. (1)
2007/0192,863 SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS 112 2006
 
Bull HN Information Systems Inc. (1)
5,497,463 Ally mechanism for interconnecting non-distributed computing environment (DCE) and DCE systems to operate in a network system 205 1992
 
CA, INC. (1)
5,796,942 Method and apparatus for automated network-wide surveillance and security breach intervention 307 1996
 
CHECK POINT SOFTWARE TECHNOLOGIES, INC. (1)
2005/0273,857 System and Methodology for Intrusion Detection and Prevention 42 2005
 
CIENA CORPORATION (1)
7,310,688 Relative addressing for network elements 45 2000
 
CITRIX SYSTEMS, INC. (1)
6,141,686 Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control 397 1998
 
COMPUTER ASSOCIATES THINK, INC. (1)
2005/0273,673 Systems and methods for minimizing security logs 20 2005
 
Covelight Systems, Inc. (1)
2005/0188,079 Methods, systems and computer program products for monitoring usage of a server application 48 2004
 
GENERAL DYNAMICS GOVERNMENT SYSTEMS CORPORATION (1)
6,711,127 System for intrusion detection and vulnerability analysis in a telecommunications signaling network 123 1998
 
GLOBALFOUNDRIES INC. (1)
5,870,554 Server selection method where a client selects a server according to address, operating system and found frame for remote booting 53 1996
 
HIGH TOWER SOFTWARE, INC. (1)
2004/0193,943 Multiparameter network fault detection system using probabilistic and aggregation analysis 62 2004
 
INSIDE SECURE (1)
6,678,734 Method for intercepting network packets in a computing device 84 1999
 
INTELLECTUAL VENTURES I LLC (1)
6,590,885 IP-flow characterization in a wireless point to multi-point (PTMP) transmission system 186 1999
 
INTELLECTUAL VENTURES I LLC (1)
2005/0268,331 Extension to the firewall configuration protocols and features 34 2004
 
INVENSYS SYSTEMS, INC. (1)
2007/0027,913 System and method for retrieving information from a supervisory control manufacturing/production database 34 2005
 
IPOLICY NETWORKS PRIVATE LTD. (1)
7,058,821 System and method for detection of intrusion attacks on packets transmitted on a network 43 2002
 
KABUSHIKIGAISHA TEAMGIA (1)
2003/0140,250 Method and system of monitoring vulnerabilities 90 2002
 
LOCKHEED MARTIN CORPORATION (1)
2004/0172,234 Hardware accelerator personality compiler 44 2003
 
LUCENT TECHNOLOGIES INC. (1)
6,678,824 Application usage time limiter 56 1999
 
LUCID SECURITY CORPORATION (1)
2004/0073,800 Adaptive intrusion detection system 40 2003
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
5,495,409 Constructing method of finite-state machine performing transitions according to a partial type of success function and a failure function 29 1994
 
MATSUSHITA ELECTRIC WORKS, LTD. (1)
4,912,748 Infrared intrusion detector with a plurality of infrared ray detecting elements 57 1988
 
MISSION FOUNDSTONE, INC. (1)
7,257,630 System and method for network vulnerability detection and reporting 83 2003
 
MORGAN STANLEY & CO., INCORPORATED (1)
5,193,192 Vectorized LR parsing of computer programs 44 1990
 
MOTOROLA, INC. (1)
5,222,081 Method of performing an autobaud function using a state flow machine 42 1991
 
NETWORK SECURITY SYSTEMS, INC. (1)
2001/0034,847 Internet/network security method and system for checking security of a client from a remote facility 127 2001
 
NEXUS NABOT RESEARCH L.L.C. (1)
2005/0160,095 System, method and computer program product for guaranteeing electronic transactions 34 2005
 
ORACLE INTERNATIONAL CORPORATION (1)
2002/0112,185 Intrusion threat detection 131 2001
 
PROOFPOINT, INC. (1)
6,772,196 Electronic mail filtering system and methods 164 2000
 
RIVERBED TECHNOLOGY, INC. (1)
7,363,656 Event detection/anomaly correlation heuristics 45 2003
 
SENSORY NETWORKS, INC. (1)
2005/0114,700 Integrated circuit apparatus and method for high throughput signature based network applications 55 2003
 
SITKA SPRUCE SECURITY LLC (1)
6,002,427 Security system with proximity sensing for an electronic device 174 1997
 
SOORIYA NETWORKS, INC. (1)
2002/0083,344 Integrated intelligent inter/intra networking device 93 2001
 
SPONTANEOUS NETWORKS, INC. (1)
2002/0035,639 Systems and methods for a packet director 59 2001
 
SPYDER NAVIGATIONS L.L.C. (1)
2005/0268,332 Extensions to filter on IPv6 header 27 2004
 
SurfControl, Inc. (1)
6,219,786 Method and system for monitoring and controlling network access 202 1998
 
SYTEX, INC. (1)
2004/0221,176 Methodology, system and computer readable medium for rating computer system vulnerabilities 45 2003
 
Tenable Network Security, Inc. (1)
2005/0229,255 System and method for scanning a network 50 2004
 
The United States of America as represented by the Secretary of the Navy (1)
4,857,912 Intelligent security assessment system 282 1988
 
Uro Denshi Kogyo Kabushiki Kaisha (1)
4,570,157 Infrared intrusion alarm system capable of preventing false signals 39 1983
 
VERIZON PATENT AND LICENSING INC. (1)
5,666,293 Downloading operating system software through a broadcast channel 563 1995
 
VIRGINIA COMMONWEALTH UNIVERSITY (1)
6,334,121 Usage pattern based user authenticator 88 1999
 
WYSE TECHNOLOGY INC. (1)
2003/0229,726 Default device configuration system and method for thin devices 23 2003
 
ZENO SECURITY CORPORATION (1)
2005/0005,169 System for real-time network-based vulnerability assessment of a host/device via real-time tracking, vulnerability assessment of services and a method thereof 37 2004
 
Other [Check patent profile for assignment information] (5)
2002/0087,716 System and method for transmitting customized multi priority services on a single or multiple links over data link layer frames 81 2000
2002/0165,707 Methods and apparatus for storing and processing natural language text data as a sequence of fixed length integers 62 2001
2002/0066,034 Distributed network security deception system 130 2001
2004/0093,582 Method for allowing a computer to be used as an information kiosk while locked 40 2003
2009/0028,147 Segmenting data packets for over-network transmission at adjustable fragment boundary 22 2008

Patent Citation Ranking

Forward Cite Landscape

  • No Forward Cites to Display

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
3.5 Year Payment $1600.00 $800.00 $400.00 Nov 24, 2014
7.5 Year Payment $3600.00 $1800.00 $900.00 Nov 24, 2018
11.5 Year Payment $7400.00 $3700.00 $1850.00 Nov 24, 2022
Fee Large entity fee small entity fee micro entity fee
Surcharge - 3.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00