Real-time user awareness for a computer network

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 8127353
APP PUB NO 20080276319A1
SERIAL NO

12149196

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A computer system, device, computer software, and/or method performed by a computer system, is provided for determining a user name likely to be associated with an attack, a configuration, or a vulnerability. First data is obtained which associates user names with individual IP addresses onto which the user names were logged in. Second data is obtained which associates attacks, configurations, or vulnerabilities with individual IP addresses on which the attacks occurred or on which the configurations or vulnerabilities exist. The user names from the first data are associated with the attacks, configurations or vulnerabilities from the second data based on having the same IP address during a log-in. An individual user name is indicated as being associated with attacks which occurred while the individual user name was logged in or with configurations or vulnerabilities for an IP address onto which the user logs in.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
CISCO TECHNOLOGY, INC.SAN JOSE, CA14262

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Rittermann, Brian Ellicott City, US 1 26

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (6)
2002/0087,716 System and method for transmitting customized multi priority services on a single or multiple links over data link layer frames 114 2000
2002/0165,707 Methods and apparatus for storing and processing natural language text data as a sequence of fixed length integers 91 2001
2002/0066,034 Distributed network security deception system 200 2001
2003/0126,472 Automated computer vulnerability resolution system 154 2002
2004/0093,582 Method for allowing a computer to be used as an information kiosk while locked 54 2003
2009/0028,147 Segmenting data packets for over-network transmission at adjustable fragment boundary 28 2008
 
Zeno Security Corporation (1)
2005/0005,169 System for real-time network-based vulnerability assessment of a host/device via real-time tracking, vulnerability assessment of services and a method thereof 72 2004
 
TREND MICRO INCORPORATED (3)
7076803 Integrated intrusion detection services 89 2002
6983323 Multi-level packet screening with dynamically selected filtering criteria 45 2002
2008/0168,561 HOST INTRUSION PREVENTION SERVER 37 2007
 
MISSION FOUNDSTONE, INC. (1)
7257630 System and method for network vulnerability detection and reporting 141 2003
 
CA, INC. (1)
5796942 Method and apparatus for automated network-wide surveillance and security breach intervention 354 1996
 
BULL HN INFORMATION SYSTEMS INC. (1)
5497463 Ally mechanism for interconnecting non-distributed computing environment (DCE) and DCE systems to operate in a network system 253 1992
 
GENERAL DYNAMICS FIDELIS CYBER SECURITY SOLUTIONS, INC. (1)
7467202 High-performance network content analysis platform 132 2003
 
HITACHI, LTD. (2)
5604910 Method of and vector processor for searching text for key words based on candidate character strings obtained from the text using parallel processing 53 1990
4985863 Document storage and retrieval system 206 1990
 
VIRGINIA COMMONWEALTH UNIVERSITY (1)
6334121 Usage pattern based user authenticator 108 1999
 
BAAN DEVELOPMENT, B.V. - 50% (1)
5987473 Interactive configuration via network 54 1997
 
NETWORK SECURITY SYSTEMS, INC. (1)
2001/0034,847 Internet/network security method and system for checking security of a client from a remote facility 171 2001
 
AKAMAI TECHNOLOGIES, INC. (1)
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 87 2009
 
ORACLE INTERNATIONAL CORPORATION (1)
2002/0112,185 Intrusion threat detection 157 2001
 
APPLE INC. (1)
6477648 Trusted workstation in a networked client/server computing system 139 1997
 
MCAFEE, LLC (11)
6343362 System and method providing custom attack simulation language for testing networks 64 1999
6789202 Method and apparatus for providing a policy-driven intrusion detection system 185 1999
7315801 Network security modeling system and method 108 2000
6851061 System and method for intrusion detection data collection using a network protocol stack multiplexor 92 2000
7096503 Network-based risk-assessment tool for remotely detecting local computer vulnerabilities 75 2001
6546493 System, method and computer program product for risk assessment scanning based on detected anomalous events 173 2001
7152105 System and method for network vulnerability detection and reporting 153 2002
2003/0009,699 Method and apparatus for detecting intrusions on a computer system 127 2002
2005/0015,623 System and method for security information normalization 46 2004
7519954 System and method of operating system identification 35 2004
2007/0271,371 Attributes of captured objects in a capture system 70 2006
 
AVAYA INC. (1)
2009/0041,020 CLOCK MANAGEMENT BETWEEN TWO ENDPOINTS 22 2007
 
SOORIYA NETWORKS, INC. (1)
2002/0083,344 Integrated intelligent inter/intra networking device 108 2001
 
LOCKHEED MARTIN CORPORATION (1)
2004/0172,234 Hardware accelerator personality compiler 76 2003
 
BELL TELEPHONE LABORATORIES, INCORPORATED (1)
4550436 Parallel text matching methods and apparatus 114 1983
 
SPYDER NAVIGATIONS L.L.C. (1)
2005/0268,332 Extensions to filter on IPv6 header 32 2004
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (12)
5404488 Realtime data feed engine for updating an application with the most currently received data from multiple data feeds 143 1993
5901307 Processor having a selectively configurable branch prediction unit that can access a branch prediction utilizing bits derived from a plurality of sources 38 1996
5999937 System and method for converting data between data sets 107 1997
6684332 Method and system for the exchange of digitally signed objects over an insecure network 30 1998
2004/0010,684 METHOD AND SYSTEM FOR THE EXCHANGE OF DIGITALLY SIGNED OBJECTS OVER AN INSECURE NETWORK 43 1998
6199181 Method and system for maintaining restricted operating environments for application programs or operating systems 204 1998
6754826 Data processing system and method including a network access connector for limiting access to the network 43 1999
6993706 Method, apparatus, and program for a state machine framework 51 2002
2005/0076,066 Method, system, and program for retaining versions of files 84 2003
2005/0108,393 Host-based network intrusion detection systems 43 2003
2006/0174,337 System, method and program product to identify additional firewall rules that may be needed 59 2005
2006/0294,588 System, method and program for identifying and preventing malicious intrusions 52 2005
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (6)
6393474 Dynamic policy management apparatus and method using active network devices 184 1998
6320848 Methods of altering dynamic decision trees 39 1999
7134141 System and method for host and network based intrusion detection and response 101 2001
2003/0083,847 User interface for presenting data for an intrusion protection system 37 2001
2003/0101,353 Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto 72 2001
2004/0064,726 Vulnerability management and tracking system (VMTS) 63 2002
 
AT&T IPM CORP. (1)
5459841 Finite state machine with minimized vector processing 34 1993
 
BLUE COAT SYSTEMS, INC. (1)
2007/0192,863 SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS 250 2006
 
EXTREME NETWORKS, INC. (1)
2003/0217,283 Method and system for encrypted network management and intrusion detection 60 2002
 
LUCENT TECHNOLOGIES INC. (1)
6678824 Application usage time limiter 73 1999
 
BELLSOUTH INTELLECTUAL PROPERTY CORPORATION (1)
7113789 Method and system for tracking facilities related information 38 2001
 
CISCO TECHNOLOGY, INC. (12)
6324656 System and method for rules-driven multi-phase network vulnerability assessment 309 1998
6415321 Domain mapping method and system 153 1998
6499107 Method and system for adaptive network security using intelligent packet analysis 323 1998
6487666 Intrusion detection signature analysis using regular expressions and logical operators 377 1999
7054930 System and method for propagating filters 73 2000
6816973 Method and system for adaptive network security using intelligent packet analysis 109 2002
2003/0212,910 Method and system for reducing the false alarm rate of network intrusion detection systems 33 2003
7350077 802.11 using a compressed reassociation exchange to facilitate fast handoff 114 2003
7305708 Methods and systems for intrusion detection 46 2004
7313695 Systems and methods for dynamic threat assessment 31 2004
7317693 Systems and methods for determining the network topology of a network 74 2004
2007/0195,797 Network device that determines application-level network latency by monitoring option values in a transport layer message 45 2006
 
CHECK POINT SOFTWARE TECHNOLOGIES INC. (1)
2005/0273,857 System and Methodology for Intrusion Detection and Prevention 58 2005
 
GLOBALFOUNDRIES INC. (1)
5870554 Server selection method where a client selects a server according to address, operating system and found frame for remote booting 60 1996
 
LUCID SECURITY CORPORATION (1)
2004/0073,800 Adaptive intrusion detection system 67 2003
 
FUJITSU LIMITED (5)
5963942 Pattern search apparatus and method 81 1996
5995963 Apparatus and method of multi-string matching based on sparse state transition list 121 1997
2005/0210,098 Storage management system and method 6 2004
2005/0210,098 Storage management system and method 6 2004
2005/0210,098 Storage management system and method 6 2004
 
MOTOROLA, INC. (1)
5222081 Method of performing an autobaud function using a state flow machine 47 1991
 
HIGH TOWER SOFTWARE, INC. (1)
2004/0193,943 Multiparameter network fault detection system using probabilistic and aggregation analysis 87 2004
 
INVENSYS SYSTEMS, INC. (1)
2007/0027,913 System and method for retrieving information from a supervisory control manufacturing/production database 40 2005
 
INTEL CORPORATION (2)
6587876 Grouping targets of management policies 175 1999
7174566 Integrated network intrusion detection 93 2002
 
INSIDE SECURE (1)
6678734 Method for intercepting network packets in a computing device 102 1999
 
The United States of America as represented by the Secretary of the Navy (1)
4857912 Intelligent security assessment system 361 1988
 
SYMANTEC CORPORATION (2)
7032114 System and method for using signatures to detect computer intrusions 119 2000
7065657 Extensible intrusion detection system 97 2000
 
Covelight Systems, Inc. (1)
2005/0188,079 Methods, systems and computer program products for monitoring usage of a server application 81 2004
 
JSB SOFTWARE TECHNOLOGIES PLC (1)
6219786 Method and system for monitoring and controlling network access 268 1998
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
6999998 Shared memory coupling of network infrastructure devices 38 2001
2005/0172,019 Network management 34 2005
 
SRI INTERNATIONAL (2)
6321338 Network surveillance 496 1998
2004/0179,477 Method and apparatus for processing network packets 51 2004
 
TECH MAHINDRA LTD. (1)
7058821 System and method for detection of intrusion attacks on packets transmitted on a network 62 2002
 
CHEMTRON RESEARCH LLC (1)
2005/0160,095 System, method and computer program product for guaranteeing electronic transactions 43 2005
 
FORCEPOINT LLC (1)
2007/0162,463 SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES 28 2007
 
ARBOR NETWORKS, INC. (1)
7596807 Method and system for reducing scope of self-propagating attack code in network 35 2003
 
SITKA SPRUCE SECURITY LLC (1)
6002427 Security system with proximity sensing for an electronic device 222 1997
 
TRIPWIRE, INC. (3)
7073198 Method and system for detecting a vulnerability in a network 105 2000
6957348 Interoperability of vulnerability and intrusion detection systems 112 2001
7181769 Network security system having a device profiler communicatively coupled to a traffic monitor 125 2003
 
TENABLE NETWORK SECURITY, INC. (1)
2005/0229,255 System and method for scanning a network 77 2004
 
Sytex, Inc. (1)
2004/0221,176 Methodology, system and computer readable medium for rating computer system vulnerabilities 65 2003
 
RIVERBED TECHNOLOGY, INC. (1)
7363656 Event detection/anomaly correlation heuristics 64 2003
 
INTELLECTUAL VENTURES I LLC (2)
6590885 IP-flow characterization in a wireless point to multi-point (PTMP) transmission system 222 1999
2005/0268,331 Extension to the firewall configuration protocols and features 44 2004
 
MICROSOFT TECHNOLOGY LICENSING, LLC (5)
6766320 Search engine with natural language-based robust parsing for user query and relevance feedback learning 353 2000
7644275 Pass-thru for client authentication 45 2003
2004/0210,756 Pass-thru for client authentication 92 2003
2004/0268,358 Network load balancing with host status information 167 2003
2007/0058,631 Distributed network management 50 2005
 
SPONTANEOUS NETWORKS, INC. (1)
2002/0035,639 Systems and methods for a packet director 76 2001
 
GOOGLE TECHNOLOGY HOLDINGS LLC (2)
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 101 2000
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 101 2000
 
KABUSHIKIGAISHA TEAMGIA (1)
2003/0140,250 Method and system of monitoring vulnerabilities 116 2002
 
URO DENSHI KOGYO KABUSHIKI KAISHA (1)
4570157 Infrared intrusion alarm system capable of preventing false signals 44 1983
 
VERIZON PATENT AND LICENSING INC. (1)
5666293 Downloading operating system software through a broadcast channel 727 1995
 
WYSE TECHNOLOGY INC. (1)
2003/0229,726 Default device configuration system and method for thin devices 28 2003
 
ALCATEL-LUCENT CANADA INC. (1)
5917821 Look-up engine for packet-based network 218 1996
 
ALCATEL LUCENT (1)
2009/0182,864 Method and apparatus for fingerprinting systems and operating systems in a network 17 2008
 
CIENA CORPORATION (1)
7310688 Relative addressing for network elements 54 2000
 
Sensory Networks, Inc. (1)
2005/0114,700 Integrated circuit apparatus and method for high throughput signature based network applications 81 2003
 
COMPUTER ASSOCIATES THINK, INC. (1)
2005/0273,673 Systems and methods for minimizing security logs 28 2005
 
PROOFPOINT, INC. (1)
6772196 Electronic mail filtering system and methods 228 2000
 
GENERAL DYNAMICS GOVERNMENT SYSTEMS CORPORATION (1)
6711127 System for intrusion detection and vulnerability analysis in a telecommunications signaling network 159 1998
 
RPX CORPORATION (3)
5193192 Vectorized LR parsing of computer programs 51 1990
5919257 Networked workstation intrusion detection system 377 1997
6539381 System and method for synchronizing database information 205 1999
 
AGILENT TECHNOLOGIES, INC. (1)
5430842 Insertion of network data checksums by a network adapter 74 1992
 
CITRIX SYSTEMS, INC. (1)
6141686 Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control 546 1998
 
MATSUSHITA ELECTRIC WORKS, LTD. (1)
4912748 Infrared intrusion detector with a plurality of infrared ray detecting elements 65 1988
 
SnoopWall, Inc. (1)
* 7346922 Proactive network security system to protect against hackers 82 2004
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
5495409 Constructing method of finite-state machine performing transitions according to a partial type of success function and a failure function 35 1994
 
eTelemetry (2)
7133916 Asset tracker for identifying user of current internet protocol addresses within an organization's communications network 49 2003
2007/0288,579 NETWORK ASSET TRACKER FOR IDENTIFYING USERS OF NETWORKED COMPUTERS 51 2006
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
CORE SDI, INC. (1)
* 8365289 System and method for providing network penetration testing 0 2008
 
CISCO TECHNOLOGY, INC. (6)
9055094 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 0 2012
9110905 System and method for assigning network blocks to sensors 0 2013
9135432 System and method for real time data awareness 1 2013
9602525 Classification of malware generated domain names 0 2015
9450975 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 0 2015
9584535 System and method for real time data awareness 0 2015
 
FAIR ISAAC CORPORATION (2)
* 9531738 Cyber security adaptive analytics threat monitoring system and method 0 2015
* 2016/0014,147 CYBER SECURITY ADAPTIVE ANALYTICS THREAT MONITORING SYSTEM AND METHOD 0 2015
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
7.5 Year Payment $3600.00 $1800.00 $900.00 Aug 28, 2019
11.5 Year Payment $7400.00 $3700.00 $1850.00 Aug 28, 2023
Fee Large entity fee small entity fee micro entity fee
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00