Patents Assigned to Zone Labs, Inc.
  • Publication number: 20050138433
    Abstract: A security system with methodology for defending against security breaches of peripheral devices is described. In one embodiment, for example, a method is described for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprises steps of: when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer; detecting detachment of the device from the computer; updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Applicant: ZONE LABS, INC.
    Inventor: Gene Linetsky
  • Publication number: 20050005145
    Abstract: A system providing a secure lockbox methodology for protecting sensitive information is described. In one embodiment, the methodology includes steps of receiving input of sensitive information from a user; computing a data shadow of the sensitive information for storage in a repository; based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and blocking any detected attempt to transmit the sensitive information that is not authorized by the user.
    Type: Application
    Filed: October 15, 2003
    Publication date: January 6, 2005
    Applicant: ZONE LABS, INC.
    Inventor: Steven Teixeira
  • Publication number: 20040199763
    Abstract: A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a particular application to invoke a particular system service; identifying the particular application that is attempting to invoke the particular system service; and based on identity of the particular application and on the rules indicating which system services a given application can invoke, blocking the attempt when the rules indicate that the particular application cannot invoke the particular system service.
    Type: Application
    Filed: September 12, 2003
    Publication date: October 7, 2004
    Applicant: ZONE LABS, INC.
    Inventor: Gregor P. Freund
  • Publication number: 20040167984
    Abstract: A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specifying a policy required for access to the service; detecting a request for access to the service from a client; attempting authentication of the client based on credentials presented by the client; if the client is authenticated based on the credentials, determining whether the client is in compliance with the policy based, at least in part, on attributes of the client; and if the client is determined to be in compliance with the policy, providing access to the service.
    Type: Application
    Filed: March 17, 2004
    Publication date: August 26, 2004
    Applicant: ZONE LABS, INC.
    Inventor: Conrad K. Herrmann
  • Publication number: 20040107360
    Abstract: A system and methodology for policy enforcement during authentication of a client device for access to a network is described. A first authentication module establishes a session with a client device requesting network access for collecting information from the client device and determining whether to authenticate the client device for access to the network based, at least in part, upon the collected information. A second authentication module participates in the session with the client device for supplemental authentication of the client device for access to the network. The supplemental authentication of the client device is based, at least in part, upon the collected information and a policy required as a condition for network access.
    Type: Application
    Filed: March 13, 2003
    Publication date: June 3, 2004
    Applicant: ZONE LABS, INC.
    Inventors: Conrad K. Herrmann, Sinduja Murari
  • Publication number: 20040098599
    Abstract: A security system with methodology for computing a machine independent unique identifier for an executable file across different machines is described. In response to a request to uniquely identify an executable file that has been installed on a given machine, portions of the executable file modified as a result of installation of the executable file on the given machine are identified. A machine independent unique identifier is determined by performing a calculation on the executable file. The calculation is performed by excluding at least the identified portions of the executable file modified as a result of installation of the executable file on the given machine.
    Type: Application
    Filed: May 9, 2003
    Publication date: May 20, 2004
    Applicant: ZONE LABS, INC.
    Inventor: Joseph Bentley
  • Publication number: 20040078591
    Abstract: A system providing methods for indirect access control is described. When an attempt to access a network by a first application is detected, a determination is made as to whether at least one other application is attempting indirect network access through the first application. If at least one other application is determined to be attempting indirect network access, each such other application is evaluated to determine if it is approved for network access. If each such other application is approved for network access, access to the network is permitted. Otherwise, access to the network is denied.
    Type: Application
    Filed: May 8, 2003
    Publication date: April 22, 2004
    Applicant: ZONE LABS, INC.
    Inventors: Steven L. Teixeira, Christopher Carr
  • Publication number: 20040019807
    Abstract: A system and methodology for providing community-based security policies is described. In one embodiment in a system comprising a plurality of devices connected to a network, a security module is provided for establishing security settings for regulating network access at these devices. Information is collected from at least some the devices about the security settings established on such devices and consensus security settings are generated based upon the collected information. In response to a request for network access at a particular device, determining whether or not to permit network access is based, at least in part, upon the consensus security settings.
    Type: Application
    Filed: May 14, 2003
    Publication date: January 29, 2004
    Applicant: ZONE LABS, INC.
    Inventor: Gregor P. Freund
  • Publication number: 20030177389
    Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.
    Type: Application
    Filed: May 31, 2002
    Publication date: September 18, 2003
    Applicant: Zone Labs, Inc.
    Inventors: Anthony Albert, Kyle N. Kawamura, Keith A. Haycock, Conrad K. Herrmann
  • Publication number: 20030055994
    Abstract: A system providing methods for anti-virus cooperative enforcement is described. In response to a request from a device for access to protected resources, such as a network or protected data, a determination is made as to whether an anti-virus policy applies to the request for access made by the device. If an anti-virus policy is applicable, information pertaining to virus protection available on the device is collected. The virus protection information that is collected is evaluated to determine whether the device is in compliance with the anti-virus policy. If the device is determined to be in compliance with the anti-virus policy, the device is allowed to access the protected resources.
    Type: Application
    Filed: July 9, 2002
    Publication date: March 20, 2003
    Applicant: Zone Labs, Inc.
    Inventors: Conrad K. Herrmann, Kaveh Baharestan, Joseph E. Bentley, Jess A. Leroy
  • Patent number: 5987611
    Abstract: A computing environment with methods for monitoring access to an open network, such as a WAN or the Internet, is described. The system includes one or more clients, each operating applications or processes (e.g., Netscape Navigator.TM. or Microsoft Internet Explorer.TM. browser software) requiring Internet (or other open network) access (e.g., an Internet connection to one or more Web servers). Client-based monitoring and filtering of access is provided in conjunction with a centralized enforcement supervisor. The supervisor maintains access rules for the client-based filtering and verifies the existence and proper operation of the client-based filter application. Access rules which can be defined can specify criteria such as total time a user can be connected to the Internet (e.g., per day, week, month, or the like), time a user can interactively use the Internet (e.g.
    Type: Grant
    Filed: May 6, 1997
    Date of Patent: November 16, 1999
    Assignee: Zone Labs, Inc.
    Inventor: Gregor Freund