This application is related to U.S. patent application Ser. No. 09/419,350, entitled “PASSWORD PROTECTION FOR HIGH RELIABILITY COMPUTER SYSTEMS”, filed on even date herewith in the names of the same inventors and commonly assigned herewith.
Number | Name | Date | Kind |
---|---|---|---|
4823256 | Bishop et al. | Apr 1989 | A |
5003595 | Collins et al. | Mar 1991 | A |
5163147 | Orita | Nov 1992 | A |
5193204 | Qureshi et al. | Mar 1993 | A |
5204966 | Wittenberg et al. | Apr 1993 | A |
5241594 | Kung | Aug 1993 | A |
5241599 | Bellovin et al. | Aug 1993 | A |
5305448 | Insalaco et al. | Apr 1994 | A |
5311595 | Bjerrum et al. | May 1994 | A |
5351136 | Wu et al. | Sep 1994 | A |
5421006 | Jablon et al. | May 1995 | A |
5421012 | Khoyi et al. | May 1995 | A |
5440635 | Bellovin et al. | Aug 1995 | A |
5452448 | Sakuraba et al. | Sep 1995 | A |
5463733 | Forman et al. | Oct 1995 | A |
5535411 | Speed et al. | Jul 1996 | A |
5584023 | Hsu | Dec 1996 | A |
5596759 | Miller et al. | Jan 1997 | A |
5655077 | Jones et al. | Aug 1997 | A |
5671354 | Ito et al. | Sep 1997 | A |
5680461 | McManis | Oct 1997 | A |
5684950 | Dare et al. | Nov 1997 | A |
5708780 | Levergood et al. | Jan 1998 | A |
5742830 | Elko et al. | Apr 1998 | A |
5778365 | Nishiyama | Jul 1998 | A |
5793763 | Mayes et al. | Aug 1998 | A |
5835727 | Wong et al. | Nov 1998 | A |
5845070 | Ikudome | Dec 1998 | A |
5898780 | Liu et al. | Apr 1999 | A |
5925099 | Futral et al. | Jul 1999 | A |
5941964 | Young et al. | Aug 1999 | A |
5944824 | He | Aug 1999 | A |
5961586 | Pedersen | Oct 1999 | A |
5987232 | Tabuki | Nov 1999 | A |
5991810 | Shapiro et al. | Nov 1999 | A |
6006334 | Nguyen et al. | Dec 1999 | A |
6011910 | Chau et al. | Jan 2000 | A |
6018770 | Little et al. | Jan 2000 | A |
6021496 | Dutcher et al. | Feb 2000 | A |
6044155 | Thomlinson et al. | Mar 2000 | A |
6047376 | Hosoe | Apr 2000 | A |
6092196 | Reiche | Jul 2000 | A |
6141687 | Blair | Oct 2000 | A |
6161139 | Win et al. | Dec 2000 | A |
6321334 | Jerger et al. | Nov 2001 | B1 |
20020026604 | Bissett et al. | Feb 2002 | A1 |
Number | Date | Country |
---|---|---|
9953408 | Oct 1999 | WO |
Entry |
---|
“Multipath Controls”, Sep. 1, 1984, IBM Technical Disclosure Bulletin, Sep. 1984, US, vol. 27, Issue 4B, pp. 2589 2591.* |
“Access Control Product Information”, Ascend Communications, Inc., 4 pages. |
Bellovin, Steven M., “Problem Areas for the IP Security Protocols”, Jul. 22-25, 1996, Proceedings of the Sixth Usenix UNIX Security Symposium, San Jose, CA. |
Cisco User Control Point, pp. 1-4, printed from http://www.cisco.com/warp.public/728/ucp/ucp ds.htm om Sep. 10, 1998. |
IPSec Network Security, pp. 1-69, printed from http://www.cisco.com/univercd/cc/td/doc/products/software/ios113ed/113t/113t 3/ipsec. |
Krawczyk, Hugo, “SKEME: A Versatile Secure Key Exchange Mechanism for Internet”, 1996, IEEE, Proceedings of the 1996 Symposium on Network and Distributed Systems Security. |
Patel, B., et al., “Securing L2TP using IPSEC”, May 1998, PPPEXT Working Group, pp. 1-10, printed from http://www.masinter.net/˜12tp/ftp/draft-ietf-pppext-12tp-security-02.txt. on Sep. 21, 1998. |
“Remote Access Network Security”, Ascend Communications, Inc., printed from http://www.ascend.com/1103.html, on Jul. 24, 1998, pp. 1-8. |
Rigney, et al., “Remote Authentication Dial In User Service (RADIUS)”, Network Working Group, RFC 2138, Apr. 1997, pp. 1-57. |
Carrel, D. et al. The TACACS+Protocol, Version 1.78, Cisco Systems, Inc., printed from ftp://ftp-eng.cisco.com/gdweber/tac-rfc.1.78.txt on Oct. 23, 2000. |