Patents by Inventor Yueh-Zen Chen

Yueh-Zen Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230388349
    Abstract: Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement. A method for policy enforcement is provided. The method includes receiving a host information profile report from a client device, and enforcing a security policy for network access based on the host information profile report. The host information profile report includes device profile information associated with the client device.
    Type: Application
    Filed: March 2, 2023
    Publication date: November 30, 2023
    Inventors: Siu-Wang Leung, Song Wang, Yueh-Zen Chen
  • Patent number: 11632396
    Abstract: Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement. A method for policy enforcement is provided. The method includes receiving a host information profile report from a client device, and enforcing a security policy for network access based on the host information profile report. The host information profile report includes device profile information associated with the client device.
    Type: Grant
    Filed: August 10, 2018
    Date of Patent: April 18, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Siu-Wang Leung, Song Wang, Yueh-Zen Chen
  • Publication number: 20180352004
    Abstract: Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement. A method for policy enforcement is provided. The method includes receiving a host information profile report from a client device, and enforcing a security policy for network access based on the host information profile report. The host information profile report includes device profile information associated with the client device.
    Type: Application
    Filed: August 10, 2018
    Publication date: December 6, 2018
    Inventors: Siu-Wang Leung, Song Wang, Yueh-Zen Chen
  • Patent number: 10075472
    Abstract: Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement. A method for policy enforcement is provided. The method includes receiving a host information profile report from a client device, and enforcing a security policy for network access based on the host information profile report. The host information profile report includes device profile information associated with the client device.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: September 11, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Siu-Wang Leung, Song Wang, Yueh-Zen Chen
  • Patent number: 9455958
    Abstract: Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections.
    Type: Grant
    Filed: February 26, 2016
    Date of Patent: September 27, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Martin Walter, Nicholas Campagna, Yueh-Zen Chen, Monty Sher Gill
  • Publication number: 20160261563
    Abstract: Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections.
    Type: Application
    Filed: February 26, 2016
    Publication date: September 8, 2016
    Inventors: Martin Walter, Nicholas Campagna, Yueh-Zen Chen, Monty Sher Gill
  • Patent number: 9413723
    Abstract: Techniques for configuring and managing remote security devices are disclosed. In some embodiments, configuring and managing remote security devices includes receiving a registration request for a remote security device at a device for configuring and managing a plurality of remote security devices; verifying the registration request to determine that the remote security device is an authorized remote security device for an external network; and sending a response identifying one or more security gateways to the remote security device, in which the remote security device is automatically configured to connect to each of the one or more security gateways using a distinct Layer 3 protocol tunnel (e.g., a virtual private network (VPN)).
    Type: Grant
    Filed: September 24, 2014
    Date of Patent: August 9, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yueh-Zen Chen, Wilson Xu, Monty Sher Gill
  • Patent number: 9306911
    Abstract: Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: April 5, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Martin Walter, Nicholas Campagna, Yueh-Zen Chen, Monty Sher Gill
  • Publication number: 20150200969
    Abstract: Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement. A method for policy enforcement is provided. The method includes receiving a host information profile report from a client device, and enforcing a security policy for network access based on the host information profile report. The host information profile report includes device profile information associated with the client device.
    Type: Application
    Filed: January 20, 2015
    Publication date: July 16, 2015
    Inventors: Siu-Wang Leung, Song Wang, Yueh-Zen Chen
  • Publication number: 20150195252
    Abstract: Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections.
    Type: Application
    Filed: January 13, 2015
    Publication date: July 9, 2015
    Inventors: Martin Walter, Nicholas Campagna, Yueh-Zen Chen, Monty Sher Gill
  • Publication number: 20150106909
    Abstract: Techniques for configuring and managing remote security devices are disclosed. In some embodiments, configuring and managing remote security devices includes receiving a registration request for a remote security device at a device for configuring and managing a plurality of remote security devices; verifying the registration request to determine that the remote security device is an authorized remote security device for an external network; and sending a response identifying one or more security gateways to the remote security device, in which the remote security device is automatically configured to connect to each of the one or more security gateways using a distinct Layer 3 protocol tunnel (e.g., a virtual private network (VPN)).
    Type: Application
    Filed: September 24, 2014
    Publication date: April 16, 2015
    Inventors: Yueh-Zen Chen, Wilson Xu, Monty Sher Gill
  • Patent number: 8973088
    Abstract: Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement. A method for policy enforcement is provided. The method includes receiving a host information profile report from a client device, and enforcing a security policy for network access based on the host information profile report. The host information profile report includes device profile information associated with the client device.
    Type: Grant
    Filed: May 24, 2011
    Date of Patent: March 3, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Siu-Wang Leung, Song Wang, Yueh-Zen Chen
  • Patent number: 8966260
    Abstract: Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes generating a public/private key pair and a certificate signing request at a satellite device; automatically communicating the certificate signing request to a portal over a public, untrusted network to authenticate the satellite device using a serial number associated with the satellite device, in which the certificate signing request and the serial number are verified by the portal; and receiving a certificate from the portal for using to establish VPN connections and configuration information for the satellite device, in which the certificate includes a credential signed by a trusted certificate authority, and the configuration information includes gateway configuration information identifying a plurality of gateways to which the satellite device is configured to connect using VPN connections.
    Type: Grant
    Filed: January 30, 2013
    Date of Patent: February 24, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Martin Walter, Nicholas Campagna, Yueh-Zen Chen, Monty S. Gill
  • Patent number: 8938777
    Abstract: Using geographical information in policy enforcement is disclosed. A request for a resource is received from a device. A policy to be applied to the request is determined based at least in part on geographical information associated with an IP address. The policy is enforced. The IP address may be either a source IP address or a destination IP address.
    Type: Grant
    Filed: September 23, 2013
    Date of Patent: January 20, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Anupam Bharali, Ravi Ithal, Yueh-Zen Chen
  • Patent number: 8875223
    Abstract: Techniques for configuring and managing remote security devices are disclosed. In some embodiments, configuring and managing remote security devices includes receiving a registration request for a remote security device at a device for configuring and managing a plurality of remote security devices; verifying the registration request to determine that the remote security device is an authorized remote security device for an external network; and sending a response identifying one or more security gateways to the remote security device, in which the remote security device is automatically configured to connect to each of the one or more security gateways using a distinct Layer 3 protocol tunnel (e.g., a virtual private network (VPN)).
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: October 28, 2014
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yueh-Zen Chen, Wilson Xu, Monty Sher Gill
  • Patent number: 8566900
    Abstract: Using geographical information in policy enforcement is disclosed. A policy is determined based on geographical information associated with an IP address. A policy is enforced based at least in part on the geographical information. The IP address may be either a source IP address or a destination IP address. In some cases network traffic is monitored to determine the IP address.
    Type: Grant
    Filed: May 23, 2011
    Date of Patent: October 22, 2013
    Assignee: Palo Alto Networks, Inc.
    Inventors: Anupam Bharali, Ravi Ithal, Yueh-Zen Chen