Patents by Inventor Gary S. Miliefsky

Gary S. Miliefsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180107831
    Abstract: A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure computing session during which sensitive data gathering activities are performed using any of those data gathering devices. The functional library, when incorporated within a personal computing device, creates a secure personal computing device on which to execute application programs such as mobile banking applications. The secure functional library acquires exclusive access to one or more of a predetermined plurality of the data gathering devices on behalf of a calling secure software application. Exclusive access is achieved by gaining access to each of the predetermined set and then locking that access throughout either the entire computing session, or at least until the execution of sensitive data gathering activities being performed during that computing session have been completed.
    Type: Application
    Filed: December 7, 2017
    Publication date: April 19, 2018
    Applicant: Netshield Corporation
    Inventors: GARY S. MILIEFSKY, KEN LICHTENBERGER, CHRISTOPHER P. GAUTHIER
  • Patent number: 9942269
    Abstract: A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device. Next, providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device. Next, providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device. Next, monitoring status of each available hardware device interface and data traffic across each available hardware device interface.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: April 10, 2018
    Assignee: NETSHIELD Corportation
    Inventor: Gary S. Miliefsky
  • Patent number: 9911006
    Abstract: A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure computing session during which sensitive data gathering activities are performed using any of those data gathering devices. The functional library, when incorporated within a personal computing device, creates a secure personal computing device on which to execute application programs such as mobile banking applications. The secure functional library acquires exclusive access to one or more of a predetermined plurality of the data gathering devices on behalf of a calling secure software application. Exclusive access is achieved by gaining access to each of the predetermined set and then locking that access throughout either the entire computing session, or at least until the execution of sensitive data gathering activities being performed during that computing session have been completed.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: March 6, 2018
    Assignee: NETSHIELD Corportation
    Inventors: Gary S. Miliefsky, Ken Lichtenberger, Christopher P. Gauthier
  • Publication number: 20170324775
    Abstract: A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device. Next, providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device. Next, providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device. Next, monitoring status of each available hardware device interface and data traffic across each available hardware device interface.
    Type: Application
    Filed: May 23, 2014
    Publication date: November 9, 2017
    Applicant: SnoopWall, LLC
    Inventor: GARY S. MILIEFSKY
  • Publication number: 20170250998
    Abstract: Methods and systems are described for the detection of malicious host systems in real time using techniques that are computationally efficient, and that minimize delays or interruptions to the flow of network transmissions. The methods and systems include using a Bloom filter to efficiently determine that a host name requested by a user device is not on a list of known malicious hosts. However, because the Bloom filter may also ambiguously determine that the requested host name may be on the list of host names for which communication is prohibited, an SQL table storing the list of prohibited host names is referenced to resolve any ambiguous determinations of the Bloom filter.
    Type: Application
    Filed: January 19, 2017
    Publication date: August 31, 2017
    Applicant: SnoopWall, Inc.
    Inventors: Gary S. Miliefsky, Ken Lichtenberger
  • Publication number: 20160203326
    Abstract: A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure computing session during which sensitive data gathering activities are performed using any of those data gathering devices. The functional library, when incorporated within a personal computing device, creates a secure personal computing device on which to execute application programs such as mobile banking applications. The secure functional library acquires exclusive access to one or more of a predetermined plurality of the data gathering devices on behalf of a calling secure software application. Exclusive access is achieved by gaining access to each of the predetermined set and then locking that access throughout either the entire computing session, or at least until the execution of sensitive data gathering activities being performed during that computing session have been completed.
    Type: Application
    Filed: December 7, 2015
    Publication date: July 14, 2016
    Applicant: SnoopWall, LLC
    Inventors: GARY S. MILIEFSKY, KEN LICHTENBERGER, CHRISTOPHER P. GAUTHIER
  • Patent number: 9208349
    Abstract: A functional library can secure data gathering devices of a personal computing device on behalf of a secure application program to provide a more secure computing session during which sensitive data gathering activities are performed using any of those data gathering devices. The functional library, when incorporated within a personal computing device, creates a secure personal computing device on which to execute application programs such as mobile banking applications. The secure functional library acquires exclusive access to one or more of a predetermined plurality of the data gathering devices on behalf of a calling secure software application. Exclusive access is achieved by gaining access to each of the predetermined set and then locking that access throughout either the entire computing session, or at least until the execution of sensitive data gathering activities being performed during that computing session have been completed.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: December 8, 2015
    Assignee: SnoopWall, Inc.
    Inventors: Gary S. Miliefsky, Ken Lichtenberger, Christopher P. Gauthier
  • Publication number: 20140359768
    Abstract: A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device. Next, providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device. Next, providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device. Next, monitoring status of each available hardware device interface and data traffic across each available hardware device interface.
    Type: Application
    Filed: May 23, 2014
    Publication date: December 4, 2014
    Applicant: SNOOPWALL LLC
    Inventor: GARY S. MILIEFSKY
  • Publication number: 20140143864
    Abstract: A computer implemented method for detecting, alerting and blocking data leakage, eavesdropping and spyware in one or more networked computing devices includes providing a graphical user interface (GUI) and displaying all available hardware device interfaces in each networked computing device. Next, providing a turn-on switch and a turn-off switch for each displayed hardware device interface in each networked computing device. Next, providing a turn-all-on switch and a turn-all-off switch for all displayed hardware device interfaces in each networked computing device. Next, monitoring status of each available hardware device interface and data traffic across each available hardware device interface.
    Type: Application
    Filed: May 29, 2013
    Publication date: May 22, 2014
    Applicant: SNOOPWALL LLC
    Inventor: GARY S. MILIEFSKY
  • Publication number: 20100043066
    Abstract: Embodiments of the present invention include a computer method of controlling access to a computer-based network comprising: (i) receiving an indication of an attempt to gain access to a computer-based network; (ii) applying a respective network access control policy to determine whether to allow the attempt to gain access to the computer-based network at each of multiple security layers; and (iii) allowing or blocking the attempt to gain access through the security layer to the computer-based network based on the application of the respective network access control policy at each security layer. Other embodiments include a computer method of controlling access to a computer-based network comprising: (a) scanning a host computer for viruses; (b) temporarily disabling a firewall of the host computer during an audit; and (c) shutting down high risk services running on the host computer.
    Type: Application
    Filed: May 20, 2009
    Publication date: February 18, 2010
    Inventor: Gary S. Miliefsky
  • Publication number: 20090199298
    Abstract: The inventive device includes a dashboard or graphical user interface (GUI), a security access control (AUTH) and secure communications sub-system (SEC-COMM), network and asset discover and mapping system (NAADAMS), an asset management engine (AME), vulnerability assessment engine (CVE-DISCOVERY), vulnerability remediation engine (CVE-REMEDY), a reporting system (REPORTS), a subscription, updates and licensing system (SULS), a countermeasure communications system (COUNTERMEASURE-COMM), a logging system (LOGS), a database integration engine (DBIE), a scheduling and configuration engine (SCHED-CONFIG), a wireless and mobile devices/asset detection and management engine (WIRELESS-MOBILE), a notification engine (NOTIFY), a regulatory compliance reviewing and reporting system (REG-COMPLY), client-side (KVM-CLIENT) integration with KVM over IP or similar network management equipment, authentication-services (KVM-AUTH) integration with KVM over IP or similar network management equipment and server-side (KVM-SERVER)
    Type: Application
    Filed: June 26, 2008
    Publication date: August 6, 2009
    Inventor: Gary S. Miliefsky