Patents Assigned to Check Point Software Technologies, Inc.
-
Patent number: 8769268Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.Type: GrantFiled: July 20, 2007Date of Patent: July 1, 2014Assignee: Check Point Software Technologies, Inc.Inventors: Artiom Morozov, Dzmitry Konanka
-
Patent number: 8515081Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: GrantFiled: July 19, 2012Date of Patent: August 20, 2013Assignee: Check Point Software Technologies, Inc.Inventors: Dean Brettle, Yair Zadik
-
Publication number: 20130003978Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: ApplicationFiled: July 19, 2012Publication date: January 3, 2013Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.Inventors: Dean Brettle, Yair Zadik
-
Patent number: 8281114Abstract: A security system with methodology for defending against security breaches of peripheral devices is described. In one embodiment, for example, a method is described for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprises steps of: when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer; detecting detachment of the device from the computer; updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device.Type: GrantFiled: December 23, 2003Date of Patent: October 2, 2012Assignee: Check Point Software Technologies, Inc.Inventor: Gene Linetsky
-
Patent number: 8230223Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: GrantFiled: September 13, 2010Date of Patent: July 24, 2012Assignee: Check Point Software Technologies, Inc.Inventors: Dean Brettle, Yair Zadik
-
Patent number: 8200818Abstract: A computing environment with methods for monitoring access to an open network such as the Internet, is described. The system includes one or more client computers, each operating applications (e.g., Netscape Navigator or Microsoft Internet Explorer) requiring access to an open network, such as a WAN or the Internet, and a router or other equipment that serves a routing function (e.g., a cable modem) for the client computers. A centralized security enforcement module on the router maintains access rules for the client computers and verifies the existence and proper operation of a client-based security module on each client computer. The router-side security module periodically sends out a router challenge via Internet broadcast to the local computers on the network. If the client-side security module is installed and properly operating, the client-side security module responds to the router challenge. The responses received by the router-side security module are maintained in a table.Type: GrantFiled: August 30, 2001Date of Patent: June 12, 2012Assignee: Check Point Software Technologies, Inc.Inventors: Gregor Paul Freund, Keith Allan Haycock, Conrad Kamaha'o Herrmann
-
Patent number: 8136155Abstract: A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a particular application to invoke a particular system service; identifying the particular application that is attempting to invoke the particular system service; and based on identity of the particular application and on the rules indicating which system services a given application can invoke, blocking the attempt when the rules indicate that the particular application cannot invoke the particular system service.Type: GrantFiled: September 12, 2003Date of Patent: March 13, 2012Assignee: Check Point Software Technologies, Inc.Inventor: Gregor P. Freund
-
Patent number: 8136149Abstract: A security system with methodology providing verified secured individual end points is described.Type: GrantFiled: March 29, 2005Date of Patent: March 13, 2012Assignee: Check Point Software Technologies, Inc.Inventor: Gregor Paul Freund
-
Patent number: 8074277Abstract: System and methodology for intrusion detection and prevention is described. In one embodiment, for example, a method is described for detecting and preventing network intrusion, the method comprises steps of: defining intrusion descriptions specifying exploits that may be attempted by malicious network traffic, the intrusion descriptions indicating specific applications that may be targeted by individual exploits; for a particular application participating in network communication, deriving a subset of the intrusion descriptions specifically applicable to that particular application; using the subset of the intrusion descriptions specifically applicable to that application, monitoring network traffic destined for the particular application for detecting an attempted network intrusion; and if a network intrusion is detected, blocking network traffic destined for the particular application determined to comprise an exploit.Type: GrantFiled: March 29, 2005Date of Patent: December 6, 2011Assignee: Check Point Software Technologies, Inc.Inventor: Gregor Paul Freund
-
Patent number: 7885180Abstract: Address Resolution Protocol (ARP) request mirroring can provide a mechanism for synchronizing link-layer adjacency information among network elements. This application can be useful, for example, for internet protocol (IP) routing network elements in a high-availability configuration.Type: GrantFiled: December 15, 2006Date of Patent: February 8, 2011Assignee: Check Point Software Technologies Inc.Inventors: Raveendra Chamarajanagar, Peter Hunt, Scott Kimble, Tuyen Nguyen
-
Patent number: 7788726Abstract: A system providing a secure lockbox methodology for protecting sensitive information is described. In one embodiment, the methodology includes steps of receiving input of sensitive information from a user; computing a data shadow of the sensitive information for storage in a repository; based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and blocking any detected attempt to transmit the sensitive information that is not authorized by the user.Type: GrantFiled: October 15, 2003Date of Patent: August 31, 2010Assignee: Check Point Software Technologies, Inc.Inventor: Steven L. Teixeira
-
Patent number: 7769862Abstract: A method and apparatus is directed towards managing fail-over in a network. At least one back-up device is configured to process traffic if a fail-over condition occurs. The back-up device includes a physical interface. A logical interface X associated with the physical interface is monitored to determine if the fail-over condition has occurred. If it is determined that the fail-over condition has occurred on interface X, then the back-up device processes traffic for another logical interface Y, associated with the physical interface. Accordingly, logical interface Y may be unmonitored. According to one embodiment, if it is determined that the fail-over condition has occurred, the back-up device processes traffic for every logical interface associated with the physical interface.Type: GrantFiled: December 19, 2003Date of Patent: August 3, 2010Assignee: Check Point Software Technologies Inc.Inventors: Ravi I. Singh, Tuyen Nguyen
-
Patent number: 7725737Abstract: System and methodology providing a secure workspace environment is described. In one embodiment, for example, in a computer system, a method is described for creating a secured workspace within an existing operating system for allowing users to run applications in a secured manner, the method comprises steps of: creating a policy for configuring the secured workspace, the policy specifying how information created during operation of the applications may be accessed; hooking particular functions of the operating system in order to obtain control over the information created during operation of the applications; during operation of the applications, encrypting the information to prevent unauthorized access; in response to a request for access to the information, determining whether the request complies with the policy; and if the request complies with the policy, satisfying the request by providing access to a decrypted copy of the information.Type: GrantFiled: October 14, 2005Date of Patent: May 25, 2010Assignee: Check Point Software Technologies, Inc.Inventors: Dzmitry Konanka, Andrei Liahuski
-
Publication number: 20100024036Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.Type: ApplicationFiled: July 20, 2007Publication date: January 28, 2010Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.Inventors: Artiom Morozov, Dzmitry Konanka
-
Patent number: 7647492Abstract: The invention is directed towards routing a packet using both IPSec and common routing protocols within dynamic network topologies in a VPN. The routing of IPSec packets employs Open System Interconnection (OSI) layer three information. In one embodiment, a tree mechanism is used for looking up layer three information that may be associated with a protected subnetwork. When a packet is identified as being associated with a protected subnetwork, the packet may be encrypted and encapsulated, including the original destination and source IP address header information within another packet employing the IP Encapsulating Security Payload (ESP) protocol. New source and destination IP addresses are provided for the new packet using IP addresses associated with an entry gateway and an exit gateway to the VPN. The new packet may then be routed through the VPN using traditional routing protocols.Type: GrantFiled: September 15, 2004Date of Patent: January 12, 2010Assignee: Check Point Software Technologies Inc.Inventors: James D. Asnis, Teemu S. Lehtonen, Olev Kartau
-
Patent number: 7627896Abstract: A security system providing methodology for cooperative enforcement of security policies during SSL sessions is described. In one embodiment, for example, a method is described for controlling SSL (Secure Sockets Layer) communication, the method comprises steps of: defining rules indicating conditions under which a machine is permitted to participate in an SSL session; trapping an attempt by a particular application running on the machine to participate in an SSL session, by intercepting the particular application's attempt to provide authentication; determining whether the machine complies with the rules; allowing the attempt to succeed when the machine complies with the rules; and otherwise blocking the attempt when the machine does not comply with the rules.Type: GrantFiled: April 25, 2005Date of Patent: December 1, 2009Assignee: Check Point Software Technologies, Inc.Inventor: Conrad K. Herrmann
-
Patent number: 7590684Abstract: A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specifying a policy required for access to the service; detecting a request for access to the service from a client; attempting authentication of the client based on credentials presented by the client; if the client is authenticated based on the credentials, determining whether the client is in compliance with the policy based, at least in part, on attributes of the client; and if the client is determined to be in compliance with the policy, providing access to the service.Type: GrantFiled: March 17, 2004Date of Patent: September 15, 2009Assignee: Check Point Software Technologies, Inc.Inventor: Conrad K. Herrmann
-
Patent number: 7546629Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.Type: GrantFiled: May 31, 2002Date of Patent: June 9, 2009Assignee: Check Point Software Technologies, Inc.Inventors: Anthony Albert, Kyle Kawamura, Keith Haycock, Conrad Herrmann
-
Patent number: 7540013Abstract: A system and methodology for protecting new computers by applying a preconfigured security update policy is described. In one embodiment, for example, a method is described for controlling connections to a computer upon its initial deployment, the method comprises steps of: upon initial deployment of the computer, applying a preconfigured security policy that establishes a restricted zone of preapproved hosts that the computer may connect to upon its initial deployment; receiving a request for a connection from the computer to a particular host; based on the preconfigured security policy, determining whether the particular host is within the restricted zone of preapproved hosts; and blocking the connection if the particular host is not within the restricted zone of preapproved hosts.Type: GrantFiled: August 2, 2004Date of Patent: May 26, 2009Assignee: Check Point Software Technologies, Inc.Inventor: Gregor P. Freund
-
Patent number: 7360097Abstract: A system providing methodology for securing interfaces of executable files is described. In one embodiment, for example, a method is described for securing a program comprised of a plurality of interoperable components, the method comprises steps of: extracting information about a function of a first component of the program that is callable by at least one other component of the program; securing the extracted information; in response to an attempt by a second component of the program to invoke the function of the first component, validating authenticity of the second component; and if the second component is validated, providing access to the function of the first component using the secured extracted information.Type: GrantFiled: September 21, 2004Date of Patent: April 15, 2008Assignee: Check Point Software Technologies, Inc.Inventor: Arthur Rothstein