Patents by Inventor Geoffrey Howard Cooper

Geoffrey Howard Cooper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130268994
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Application
    Filed: April 10, 2012
    Publication date: October 10, 2013
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Publication number: 20120216271
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Application
    Filed: February 23, 2011
    Publication date: August 23, 2012
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Patent number: 8190734
    Abstract: A system and method for implementing network monitoring with a unified IPv4+IPv6 address type. IPv4 network traffic and IPv6 network traffic are captured. IPv4 and IPv6 address patterns read from the captured network traffic are then encoded into a unified IPv4+IPv6 address space using a data type encoding.
    Type: Grant
    Filed: May 21, 2009
    Date of Patent: May 29, 2012
    Assignee: McAfee, Inc.
    Inventor: Geoffrey Howard Cooper
  • Publication number: 20100067390
    Abstract: A system and method of discovering network entities. Network traffic is monitored, wherein monitoring includes finding network entities in the network traffic. If the network entities are network assets, the system determines if the network entities are critical network assets. If the network entities are network users, the system classifies the network users automatically into user groups. The network traffic is then displayed as a function of the critical network assets and the user groups.
    Type: Application
    Filed: May 21, 2009
    Publication date: March 18, 2010
    Inventors: Luis Filipe Pereira Valente, Derek Patton Pearcy, Geoffrey Howard Cooper, Kieran Gerard Sherlock
  • Publication number: 20090292805
    Abstract: A system and method for implementing network monitoring with a unified IPv4+IPv6 address type. IPv4 network traffic and IPv6 network traffic are captured. IPv4 and IPv6 address patterns read from the captured network traffic are then encoded into a unified IPv4+IPv6 address space using a data type encoding.
    Type: Application
    Filed: May 21, 2009
    Publication date: November 26, 2009
    Inventor: Geoffrey Howard Cooper
  • Patent number: 7478422
    Abstract: The invention is a declarative language system and comprises a language as a tool for expressing network security policy in a formalized way. It allows the specification of security policy across a wide variety of networking layers and protocols. Using the language, a security administrator assigns a disposition to each and every network event that can occur in a data communications network. The event's disposition determines whether the event is allowed (i.e. conforms to the specified policy) or disallowed and what action, if any, should be taken by a system monitor in response to that event. Possible actions include, for example, logging the information into a database, notifying a human operator, and disrupting the offending network traffic.
    Type: Grant
    Filed: June 15, 2004
    Date of Patent: January 13, 2009
    Assignee: Securify, Inc.
    Inventors: Luis Filipe Pereira Valente, Geoffrey Howard Cooper, Robert Allen Shaw, Kieran Gerard Sherlock
  • Publication number: 20080109870
    Abstract: User names and user groups serve as the basis of a formal policy in a network. A passive monitor examines network traffic in near real time and indicates: which network traffic is flowing on the network as before; which users or user groups were logged into workstations initiating this network traffic; and which of this traffic conforms to the formal policy definition. In one embodiment of the invention, users and user groups are determined by querying Microsoft® Active Directory and Microsoft® Windows servers, to determine who is logged onto the Microsoft® network. Other sources of identity information are also possible.
    Type: Application
    Filed: September 12, 2007
    Publication date: May 8, 2008
    Inventors: Kieran Gerard Sherlock, Geoffrey Howard Cooper, John Richard Guzik, Derek Patton Pearcy, Luis Filipe Pereira Valente
  • Publication number: 20040250112
    Abstract: The invention is a declarative language system and comprises a language as a tool for expressing network security policy in a formalized way. It allows the specification of security policy across a wide variety of networking layers and protocols. Using the language, a security administrator assigns a disposition to each and every network event that can occur in a data communications network. The event's disposition determines whether the event is allowed (i.e. conforms to the specified policy) or disallowed and what action, if any, should be taken by a system monitor in response to that event. Possible actions include, for example, logging the information into a database, notifying a human operator, and disrupting the offending network traffic.
    Type: Application
    Filed: June 15, 2004
    Publication date: December 9, 2004
    Inventors: Luis Filipe Pereira Valente, Geoffrey Howard Cooper, Robert Allen Shaw, Kieran Gerard Sherlock
  • Patent number: 6779120
    Abstract: The invention is a declarative language system and comprises a language as a tool for expressing network security policy in a formalized way. It allows the specification of security policy across a wide variety of networking layers and protocols. Using the language, a security administrator assigns a disposition to each and every network event that can occur in a data communications network. The event's disposition determines whether the event is allowed (i.e. conforms to the specified policy) or disallowed and what action, if any, should be taken by a system monitor in response to that event. Possible actions include, for example, logging the information into a database, notifying a human operator, and disrupting the offending network traffic.
    Type: Grant
    Filed: January 7, 2000
    Date of Patent: August 17, 2004
    Assignee: Securify, Inc.
    Inventors: Luis Filipe Pereira Valente, Geoffrey Howard Cooper, Robert Allen Shaw, Kieran Gerard Sherlock