Patents by Inventor Luis Valente

Luis Valente has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8074256
    Abstract: A policy developer studio comprising: a meta-policy core of network objects, a policy developer graphical user interface (GUI) tool for providing a front end to a policy language, an output in XML, a compiled output for a policy engine, and an output in human readable form is provided.
    Type: Grant
    Filed: July 13, 2007
    Date of Patent: December 6, 2011
    Assignee: McAfee, Inc.
    Inventors: Luis Valente, John R. Guzik, Derek P. Pearcy
  • Publication number: 20100257576
    Abstract: A policy developer studio comprising: a meta-policy core of network objects, a policy developer graphical user interface (GUI) tool for providing a front end to a policy language, an output in XML, a compiled output for a policy engine, and an output in human readable form is provided.
    Type: Application
    Filed: July 13, 2007
    Publication date: October 7, 2010
    Inventors: LUIS VALENTE, John R. Guzik, Derek P. Pearcy
  • Patent number: 7631188
    Abstract: The invention provides a method and system for secure data transfer and dynamic definition of trustworthiness of various entities by multiple parties in a hierarchy tree or graph structure. The invention uses digital certificates. Each party in the business hierarchy can control and define various trust information including trustworthiness and delegation authority for the entities it deals with. The ability of a party to redefine or add trust information is controlled by the parties with which it has a relationship that are above it in the hierarchy. Trust vectors and delegation vectors are used to store this information. Each party can add trusted third parties to a security object without compromising the integrity of security objects already issued. A sequence of security objects including digital certificates can be modified without compromising the original digital certificates in those security objects.
    Type: Grant
    Filed: October 11, 2005
    Date of Patent: December 8, 2009
    Assignee: TVWorks, LLC
    Inventor: Luis Valente
  • Patent number: 7246370
    Abstract: A policy developer studio comprising: a meta-policy core of network objects, a policy developer graphical user interface (GUI) tool for providing a front end to a policy language, an output in XML, a compiled output for a policy engine, and an output in human readable form is provided.
    Type: Grant
    Filed: March 21, 2002
    Date of Patent: July 17, 2007
    Assignee: Security, Inc.
    Inventors: Luis Valente, John R. Guzik, Derek P. Pearcy
  • Patent number: 7143439
    Abstract: A method and apparatus uses a proprietary algorithm for organizing network security policy rules in a way that minimizes the number of rules considered when determining the set of rules applicable to a given protocol event.
    Type: Grant
    Filed: June 8, 2001
    Date of Patent: November 28, 2006
    Assignee: Security, Inc.
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Bob Shaw, Luis Valente
  • Patent number: 7047288
    Abstract: A system and method for generating a human readable, e.g. English language, description of a formal specification of network security policy that allows non-technical staff within a user's organization to comprehend the policy. The description is simple enough to be understood, yet captures salient details of the policy.
    Type: Grant
    Filed: June 8, 2001
    Date of Patent: May 16, 2006
    Assignee: Securify, Inc.
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Bob Shaw, Luis Valente
  • Publication number: 20060069913
    Abstract: The invention provides a method and system for secure data transfer and dynamic definition of trustworthiness of various entities by multiple parties in a hierarchy tree or graph structure. The invention uses digital certificates. Each party in the business hierarchy can control and define various trust information including trustworthiness and delegation authority for the entities it deals with. The ability of a party to redefine or add trust information is controlled by the parties with which it has a relationship that are above it in the hierarchy. Trust vectors and delegation vectors are used to store this information. Each party can add trusted third parties to a security object without compromising the integrity of security objects already issued. A sequence of security objects including digital certificates can be modified without compromising the original digital certificates in those security objects.
    Type: Application
    Filed: October 11, 2005
    Publication date: March 30, 2006
    Inventor: Luis Valente
  • Patent number: 6871284
    Abstract: A method and apparatus ascertain which credential and which condition both from a network security policy best describe, respectively, information about initiator and target principals involved in an interaction, and tests performed on a state of an associated protocol event.
    Type: Grant
    Filed: June 14, 2001
    Date of Patent: March 22, 2005
    Assignee: Securify, Inc.
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Bob Shaw, Luis Valente
  • Publication number: 20040015579
    Abstract: A method and apparatus for a network monitor internals mechanism, which serves to translate packet data into multiple concurrent streams of encoded network event data, to contribute to enterprise management, reporting, and global mechanisms for aggregating monitors at a centralized aggregation point, and to facilitate rate limiting techniques because such monitors are not in control (i.e. cannot back pressure flow) is provided.
    Type: Application
    Filed: June 2, 2003
    Publication date: January 22, 2004
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Luis Valente, Harry Richardson
  • Publication number: 20030110192
    Abstract: A policy developer studio comprising: a meta-policy core of network objects, a policy developer graphical user interface (GUI) tool for providing a front end to a policy language, an output in XML, a compiled output for a policy engine, and an output in human readable form is provided.
    Type: Application
    Filed: March 21, 2002
    Publication date: June 12, 2003
    Inventors: Luis Valente, John R. Guzik, Derek P. Pearcy
  • Publication number: 20030061506
    Abstract: A network security policy monitoring system and method for performing network and security assessments based on system-wide policy. Real network traffic is analyzed to identify abnormal traffic patterns, system vulnerabilities, and incorrect configuration of computer systems on a network, by listening on a network, logging events, and taking action.
    Type: Application
    Filed: June 14, 2001
    Publication date: March 27, 2003
    Inventors: Geoffrey Cooper, Bob Shaw, Luis Valente, Kieran G. Sherlock
  • Patent number: 6513116
    Abstract: The invention provides an improved method and system for security information acquisition. A relatively small amount of nonvolatile storage at the client consumer electronic device is used to obtain a chain of trusted root certificates, thus providing each client consumer electronic device with a trustable technique for access to secure communication. The trusted root certificates are provided by one or more TSIPs (trusted security information providers), and are chained together so that a current root certificate can be obtained by the client consumer electronic device, even using an expired root certificate. The client consumer electronic device uses a current root certificate to obtain a SIO (security information object) from the TSIP. The SIO includes information regarding at least one trusted entity, such as a one or more trusted entity certificates, and other trust information.
    Type: Grant
    Filed: September 29, 1998
    Date of Patent: January 28, 2003
    Assignee: Liberate Technologies
    Inventor: Luis Valente
  • Publication number: 20020093527
    Abstract: A user interface for a network security policy monitoring system and method that performs network and security assessments based on system-wide policy, whereby real network traffic is analyzed to identify abnormalities, vulnerabilities, and incorrect configurations by listening on a network, logging events, and taking action.
    Type: Application
    Filed: April 5, 2001
    Publication date: July 18, 2002
    Inventors: Kieran G. Sherlock, Geoffrey Cooper, Luis Valente, Jose Amador, Paul Wang, Robert A. Shaw, Kevin Cornwall
  • Publication number: 20020091942
    Abstract: A system and method for generating a human readable, e.g. English language, description of a formal specification of network security policy that allows non-technical staff within a user's organization to comprehend the policy. The description is simple enough to be understood, yet captures salient details of the policy.
    Type: Application
    Filed: June 8, 2001
    Publication date: July 11, 2002
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Bob Shaw, Luis Valente
  • Publication number: 20020069200
    Abstract: A method and apparatus uses a proprietary algorithm for organizing network security policy rules in a way that minimizes the number of rules considered when determining the set of rules applicable to a given protocol event.
    Type: Application
    Filed: June 8, 2001
    Publication date: June 6, 2002
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Bob Shaw, Luis Valente
  • Publication number: 20020053033
    Abstract: A method and apparatus ascertain which credential and which condition both from a network security policy best describe, respectively, information about initiator and target principals involved in an interaction, and tests performed on a state of an associated protocol event.
    Type: Application
    Filed: June 14, 2001
    Publication date: May 2, 2002
    Inventors: Geoffrey Cooper, Kieran G. Sherlock, Bob Shaw, Luis Valente