Patents Assigned to Check Point Software Technologies, Inc.
  • Patent number: 8769268
    Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: July 1, 2014
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Artiom Morozov, Dzmitry Konanka
  • Patent number: 8515081
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: August 20, 2013
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Dean Brettle, Yair Zadik
  • Publication number: 20130003978
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Application
    Filed: July 19, 2012
    Publication date: January 3, 2013
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.
    Inventors: Dean Brettle, Yair Zadik
  • Patent number: 8281114
    Abstract: A security system with methodology for defending against security breaches of peripheral devices is described. In one embodiment, for example, a method is described for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprises steps of: when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer; detecting detachment of the device from the computer; updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device.
    Type: Grant
    Filed: December 23, 2003
    Date of Patent: October 2, 2012
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Gene Linetsky
  • Patent number: 8230223
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: July 24, 2012
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Dean Brettle, Yair Zadik
  • Patent number: 8200818
    Abstract: A computing environment with methods for monitoring access to an open network such as the Internet, is described. The system includes one or more client computers, each operating applications (e.g., Netscape Navigator or Microsoft Internet Explorer) requiring access to an open network, such as a WAN or the Internet, and a router or other equipment that serves a routing function (e.g., a cable modem) for the client computers. A centralized security enforcement module on the router maintains access rules for the client computers and verifies the existence and proper operation of a client-based security module on each client computer. The router-side security module periodically sends out a router challenge via Internet broadcast to the local computers on the network. If the client-side security module is installed and properly operating, the client-side security module responds to the router challenge. The responses received by the router-side security module are maintained in a table.
    Type: Grant
    Filed: August 30, 2001
    Date of Patent: June 12, 2012
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Gregor Paul Freund, Keith Allan Haycock, Conrad Kamaha'o Herrmann
  • Patent number: 8136155
    Abstract: A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a particular application to invoke a particular system service; identifying the particular application that is attempting to invoke the particular system service; and based on identity of the particular application and on the rules indicating which system services a given application can invoke, blocking the attempt when the rules indicate that the particular application cannot invoke the particular system service.
    Type: Grant
    Filed: September 12, 2003
    Date of Patent: March 13, 2012
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Gregor P. Freund
  • Patent number: 8136149
    Abstract: A security system with methodology providing verified secured individual end points is described.
    Type: Grant
    Filed: March 29, 2005
    Date of Patent: March 13, 2012
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Gregor Paul Freund
  • Patent number: 8074277
    Abstract: System and methodology for intrusion detection and prevention is described. In one embodiment, for example, a method is described for detecting and preventing network intrusion, the method comprises steps of: defining intrusion descriptions specifying exploits that may be attempted by malicious network traffic, the intrusion descriptions indicating specific applications that may be targeted by individual exploits; for a particular application participating in network communication, deriving a subset of the intrusion descriptions specifically applicable to that particular application; using the subset of the intrusion descriptions specifically applicable to that application, monitoring network traffic destined for the particular application for detecting an attempted network intrusion; and if a network intrusion is detected, blocking network traffic destined for the particular application determined to comprise an exploit.
    Type: Grant
    Filed: March 29, 2005
    Date of Patent: December 6, 2011
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Gregor Paul Freund
  • Patent number: 7885180
    Abstract: Address Resolution Protocol (ARP) request mirroring can provide a mechanism for synchronizing link-layer adjacency information among network elements. This application can be useful, for example, for internet protocol (IP) routing network elements in a high-availability configuration.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: February 8, 2011
    Assignee: Check Point Software Technologies Inc.
    Inventors: Raveendra Chamarajanagar, Peter Hunt, Scott Kimble, Tuyen Nguyen
  • Patent number: 7788726
    Abstract: A system providing a secure lockbox methodology for protecting sensitive information is described. In one embodiment, the methodology includes steps of receiving input of sensitive information from a user; computing a data shadow of the sensitive information for storage in a repository; based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and blocking any detected attempt to transmit the sensitive information that is not authorized by the user.
    Type: Grant
    Filed: October 15, 2003
    Date of Patent: August 31, 2010
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Steven L. Teixeira
  • Patent number: 7769862
    Abstract: A method and apparatus is directed towards managing fail-over in a network. At least one back-up device is configured to process traffic if a fail-over condition occurs. The back-up device includes a physical interface. A logical interface X associated with the physical interface is monitored to determine if the fail-over condition has occurred. If it is determined that the fail-over condition has occurred on interface X, then the back-up device processes traffic for another logical interface Y, associated with the physical interface. Accordingly, logical interface Y may be unmonitored. According to one embodiment, if it is determined that the fail-over condition has occurred, the back-up device processes traffic for every logical interface associated with the physical interface.
    Type: Grant
    Filed: December 19, 2003
    Date of Patent: August 3, 2010
    Assignee: Check Point Software Technologies Inc.
    Inventors: Ravi I. Singh, Tuyen Nguyen
  • Patent number: 7725737
    Abstract: System and methodology providing a secure workspace environment is described. In one embodiment, for example, in a computer system, a method is described for creating a secured workspace within an existing operating system for allowing users to run applications in a secured manner, the method comprises steps of: creating a policy for configuring the secured workspace, the policy specifying how information created during operation of the applications may be accessed; hooking particular functions of the operating system in order to obtain control over the information created during operation of the applications; during operation of the applications, encrypting the information to prevent unauthorized access; in response to a request for access to the information, determining whether the request complies with the policy; and if the request complies with the policy, satisfying the request by providing access to a decrypted copy of the information.
    Type: Grant
    Filed: October 14, 2005
    Date of Patent: May 25, 2010
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Dzmitry Konanka, Andrei Liahuski
  • Publication number: 20100024036
    Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.
    Type: Application
    Filed: July 20, 2007
    Publication date: January 28, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.
    Inventors: Artiom Morozov, Dzmitry Konanka
  • Patent number: 7647492
    Abstract: The invention is directed towards routing a packet using both IPSec and common routing protocols within dynamic network topologies in a VPN. The routing of IPSec packets employs Open System Interconnection (OSI) layer three information. In one embodiment, a tree mechanism is used for looking up layer three information that may be associated with a protected subnetwork. When a packet is identified as being associated with a protected subnetwork, the packet may be encrypted and encapsulated, including the original destination and source IP address header information within another packet employing the IP Encapsulating Security Payload (ESP) protocol. New source and destination IP addresses are provided for the new packet using IP addresses associated with an entry gateway and an exit gateway to the VPN. The new packet may then be routed through the VPN using traditional routing protocols.
    Type: Grant
    Filed: September 15, 2004
    Date of Patent: January 12, 2010
    Assignee: Check Point Software Technologies Inc.
    Inventors: James D. Asnis, Teemu S. Lehtonen, Olev Kartau
  • Patent number: 7627896
    Abstract: A security system providing methodology for cooperative enforcement of security policies during SSL sessions is described. In one embodiment, for example, a method is described for controlling SSL (Secure Sockets Layer) communication, the method comprises steps of: defining rules indicating conditions under which a machine is permitted to participate in an SSL session; trapping an attempt by a particular application running on the machine to participate in an SSL session, by intercepting the particular application's attempt to provide authentication; determining whether the machine complies with the rules; allowing the attempt to succeed when the machine complies with the rules; and otherwise blocking the attempt when the machine does not comply with the rules.
    Type: Grant
    Filed: April 25, 2005
    Date of Patent: December 1, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Conrad K. Herrmann
  • Patent number: 7590684
    Abstract: A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specifying a policy required for access to the service; detecting a request for access to the service from a client; attempting authentication of the client based on credentials presented by the client; if the client is authenticated based on the credentials, determining whether the client is in compliance with the policy based, at least in part, on attributes of the client; and if the client is determined to be in compliance with the policy, providing access to the service.
    Type: Grant
    Filed: March 17, 2004
    Date of Patent: September 15, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Conrad K. Herrmann
  • Patent number: 7546629
    Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: June 9, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Anthony Albert, Kyle Kawamura, Keith Haycock, Conrad Herrmann
  • Patent number: 7540013
    Abstract: A system and methodology for protecting new computers by applying a preconfigured security update policy is described. In one embodiment, for example, a method is described for controlling connections to a computer upon its initial deployment, the method comprises steps of: upon initial deployment of the computer, applying a preconfigured security policy that establishes a restricted zone of preapproved hosts that the computer may connect to upon its initial deployment; receiving a request for a connection from the computer to a particular host; based on the preconfigured security policy, determining whether the particular host is within the restricted zone of preapproved hosts; and blocking the connection if the particular host is not within the restricted zone of preapproved hosts.
    Type: Grant
    Filed: August 2, 2004
    Date of Patent: May 26, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Gregor P. Freund
  • Patent number: 7360097
    Abstract: A system providing methodology for securing interfaces of executable files is described. In one embodiment, for example, a method is described for securing a program comprised of a plurality of interoperable components, the method comprises steps of: extracting information about a function of a first component of the program that is callable by at least one other component of the program; securing the extracted information; in response to an attempt by a second component of the program to invoke the function of the first component, validating authenticity of the second component; and if the second component is validated, providing access to the function of the first component using the secured extracted information.
    Type: Grant
    Filed: September 21, 2004
    Date of Patent: April 15, 2008
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Arthur Rothstein