I
wrote the patent application, “Method and
apparatus for monitoring data packets in a packet-switched network",
based on knowledge that I've learnt in cellular telephony and protocols. I
hadn't worked in security or firewall business. I wrote it as a defense way to
alien, who threaten to get my documents from my PC. Btw, my documents were not
sensitive, but I didn't like hackers.
If you're concerned about a protocol, just open the protocol spec. The spec
described message headers and a section for data. They are pretty similar to
me.
--------
Regarding the patent application “Method and apparatus for monitoring data
packets in a packet-switched network" at uspto.gov, I had designed the unattending mode to close communications
to my computer as I walked away, because aliens and Chinese threatened to steal
all things in my computer while I was away from my PC. The unattended mode
could be triggered by stand by/screen saver mode in a computer. Only on-going
selected tasks are allowed in this mode for a predetermined time. Seriously I'd
like my computer stop communicating completely with the current stand by mode.
[my kind of firewall was not implemented to monitor.]
For example, only things like ongoing incoming ftp [get] could allow while
you're away, other applications like outgoing email or outgoing ftp [put] must
be stopped or unallowed.
--------
My design was only on paper. I did not have a chance to complete it. It is free
for implementation as it was published before 2002 [check the date of the
provisional patent appl'n], and I dropped the patent application.
--------
Unattended mode tasks were only useful if you could monitor your system during
this time. Otherwise it's better to shut it down in dormant mode. I noticed
iPad kept beeping or active while it was closed. This was not good to me.
>>> I've uploaded documents at https://www.linkedin.com/in/TVinhNguyen/
under ViSys section.
-----------
I used Norton security software once, it gave options to block protocols.
However I need something to figure out what protocol an application using. For
example, I wanted to know what protocol a web application using - I blocked all
protocols except http port 8080, the web application failed to work? Norton did
not report which ports the web app was trying to use? Btw, it was www.vietfun.com, a
web chat, which used another protocol.
* There are many applications currently, but they never said which protocols or
ports that they're using. I don't want to open all ports for hackers coming.
* Norton security was kind of slow down my PC. My kind of firewall would be
easily implemented [except database part] using PLEX-C by Ericsson's AXE.
------------
The terminology "originating" meant outgoing packets of your system.
"Terminating" meant incoming packets to your system. These were
telephony terms.
------------
I had abandoned this patent application, thus it's free for implementation.
Why?
* I couldn't find critical components to control incoming and outgoing packets
in/out of a computer system.
* I couldn't find a venture capitalist to support development of this firewall
application.
* Btw, at that time USA was promoting Home Land Security, but nobody was
interested. This firewall was kind of security.
* I did contact firewall provider companies including Microsoft, but there was
no interest in this application. No response from any of them.
-> I abandoned the final patent application process. Why should I spend more
money to patent attorney, if it was of no use?
Notes: the patent attorney said that patent applications in USA, USPTO, would
cover 30% of market. It's expensive for a patent application, and you'd need a
patent attorney.
--------
I wrote this patent application as a defense way to aliens coming to my house
and ask me for ideas or implementation. Patent application would turn all of
their requests as a stupid way. Anyways I found writing white paper is a better
way, i.e. don't waste money on patent applications.
No comments:
Post a Comment