Patents by Inventor Philip Kwan

Philip Kwan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7647635
    Abstract: A system and method for resolving an identity includes a security console, which displays security information regarding a secure network. The security information includes at least a first identity used to access the secure network. An operator selects the first identity, and the security console sends it to a resolver. The resolver connects with an identity server to find an access session record with an identity matching the first identity. A second identity is extracted from this record, and the resolver returns a result that includes the second identity. The security console displays the second identity; The first identity can be a user identity of a user, where the second identity is corresponding host identity, or vise versa. In this manner, an efficient interface to security information is provided to an operator, where the operator may resolve a user/host identity to a host/user identity interactively.
    Type: Grant
    Filed: November 2, 2006
    Date of Patent: January 12, 2010
    Assignee: A10 Networks, Inc.
    Inventors: Lee Chen, John Chiong, Philip Kwan
  • Publication number: 20090307773
    Abstract: A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an identification of the port on the ARP reply was received. These data packets are then transmitted to an ARP collector which stores the ARP reply and port information. The ARP collector then uses this stored information, and analyzes future data packets relative to the stored information to detect occurrences of ARP spoofing. The ARP collector further provides for generating alerts and taking security actions when ARP reply spoofing is detected.
    Type: Application
    Filed: June 4, 2009
    Publication date: December 10, 2009
    Applicant: Foundry Networks, Inc.
    Inventor: Philip Kwan
  • Publication number: 20090265785
    Abstract: A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an identification of the port on the ARP reply was received. These data packets are then transmitted to an ARP collector which stores the ARP reply and port information. The ARP collector then uses this stored information, and analyzes future data packets relative to the stored information to detect occurrences of ARP spoofing. The ARP collector further provides for generating alerts and taking security actions when ARP reply spoofing is detected.
    Type: Application
    Filed: June 4, 2009
    Publication date: October 22, 2009
    Applicant: Foundry Networks, Inc.
    Inventor: Philip Kwan
  • Publication number: 20090260083
    Abstract: A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datalink (layer 2) level, and to use the information derived from such analysis to block access through a port where a host device is using a false, or spoofed, source IP address in transmitted data packets. Further, the system and method provide for validating initially learned source IP addresses, and for determining whether the number of unsuccessful attempts to validate new source IP addresses exceeds a threshold level, and where the number does exceed the threshold number the system and method can provide for operation in a possible attack mode.
    Type: Application
    Filed: February 25, 2009
    Publication date: October 15, 2009
    Applicant: Foundry Networks, Inc.
    Inventors: Ronald W. Szeto, Nitin Jain, Ravindran Suresh, Philip Kwan
  • Publication number: 20090254973
    Abstract: A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datalink (layer 2) level, and to use the information derived from such analysis to block access through a port where a host device is using a false, or spoofed, source IP address in transmitted data packets.
    Type: Application
    Filed: February 25, 2009
    Publication date: October 8, 2009
    Applicant: Foundry Networks, Inc.
    Inventor: Philip Kwan
  • Patent number: 7562390
    Abstract: A system and method that provides for copying ARP replies, and generating data packets which include the ARP reply, and other information such as an identification of the port on the ARP reply was received. These data packets are then transmitted to an ARP collector which stores the ARP reply and port information. The ARP collector then uses this stored information, and analyzes future data packets relative to the stored information to detect occurrences of ARP spoofing. The ARP collector further provides for generating alerts and taking security actions when ARP reply spoofing is detected.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: July 14, 2009
    Assignee: Foundry Networks, Inc.
    Inventor: Philip Kwan
  • Patent number: 7523485
    Abstract: A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datalink (layer 2) level, and to use the information derived from such analysis to block access through a port where a host device is using a false, or spoofed, source IP address in transmitted data packets.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: April 21, 2009
    Assignee: Foundry Networks, Inc.
    Inventor: Philip Kwan
  • Patent number: 7516487
    Abstract: A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datalink (layer 2) level, and to use the information derived from such analysis to block access through a port where a host device is using a false, or spoofed, source IP address in transmitted data packets. Further, the system and method provide for validating initially learned source IP addresses, and for determining whether the number of unsuccessful attempts to validate new source IP addresses exceeds a threshold level, and where the number does exceed the threshold number the system and method can provide for operation in a possible attack mode.
    Type: Grant
    Filed: May 20, 2004
    Date of Patent: April 7, 2009
    Assignee: Foundry Networks, Inc.
    Inventors: Ronald W. Szeto, Nitin Jain, Ravindran Suresh, Philip Kwan
  • Publication number: 20080109887
    Abstract: A system and method for resolving an identity includes a security console, which displays security information regarding a secure network. The security information includes at least a first identity used to access the secure network. An operator selects the first identity, and the security console sends it to a resolver. The resolver connects with an identity server to find an access session record with an identity matching the first identity. A second identity is extracted from this record, and the resolver returns a result that includes the second identity. The security console displays the second identity; The first identity can be a user identity of a user, where the second identity is corresponding host identity, or vise versa. In this manner, an efficient interface to security information is provided to an operator, where the operator may resolve a user/host identity to a host/user identity interactively.
    Type: Application
    Filed: November 2, 2006
    Publication date: May 8, 2008
    Applicant: A10 Networks, Inc.
    Inventors: Lee Chen, John Chiong, Philip Kwan
  • Publication number: 20050055570
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical (MAC) address authentication of a user device being attached to the network, such as a user device being attached to a port of a network access device. The second level includes authentication of the user of the user device, such as user authentication in accordance with the IEEE 802.1x standard. The third level includes dynamic assignment of a user policy to the port based on the identity of the user, wherein the user policy is used to selectively control access to the port. The user policy may identify or include an access control list (ACL) or MAC address filter. Also, the user policy is not dynamically assigned if insufficient system resources are available to do so. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Inventors: Philip Kwan, Chi-Jui Ho
  • Publication number: 20050025125
    Abstract: A system, method and apparatus for providing multiple access modes in a data communications network includes a network access device having a plurality of input ports, a plurality of output ports, and a switching fabric for routing data received on the plurality of input ports to at least one of the plurality of output ports. Control logic within the network access device is adapted to determine whether a user device coupled to one of the plurality of input ports supports a user authentication protocol used by a host network. If the user authentication protocol is not supported, then the input port to which the network access device is coupled is placed in a semi-authorized access state that limits access to a pre-configured network accessible via the host network.
    Type: Application
    Filed: August 1, 2003
    Publication date: February 3, 2005
    Inventor: Philip Kwan
  • Publication number: 20040255154
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical MAC address authentication of a device being attached to the network, such as a device being attached to a port of a network switch. The second level includes authentication of the user of the device, such as user authentication in accordance with the 802.1x standard. The third level includes dynamic assignment of the port to a particular VLAN based on the identity of the user. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Application
    Filed: June 11, 2003
    Publication date: December 16, 2004
    Applicant: Foundry Networks, Inc.
    Inventors: Philip Kwan, Chi-Jui Ho