Patents Assigned to Secure Computing Corporation
-
Patent number: 7516483Abstract: A method of accomplishing two-factor user authentication, comprising providing two separate user authentication methods, enabling a user to communicate authentication data for both authentication methods to a first web site using the internet, and enabling the communication of at least some of the authentication data from the first web site to a second web site also using the internet. Both web sites are thus involved in user authentication using the authentication data.Type: GrantFiled: February 26, 2007Date of Patent: April 7, 2009Assignee: Secure Computing CorporationInventor: Sean Brennan
-
Patent number: 7458098Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication related to an application is received and stored. One or more risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The risk profile is analyzed with respect to data associated with previously received communications to determine if the received communication is anomalous. If the received communication is determined to be anomalous, an anomaly indicator signal is output.Type: GrantFiled: March 8, 2002Date of Patent: November 25, 2008Assignee: Secure Computing CorporationInventors: Paul Judge, Guru Rajan
-
Publication number: 20080263669Abstract: Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity approximations and weightings for each of a plurality of blocks within the known malware file, creating a second fuzzy fingerprint of a file to be checked, the second fuzzy fingerprint including a second set of calculated complexity approximations and weightings for each of a plurality of blocks within the file to be checked, comparing the second fuzzy fingerprint to the first fuzzy fingerprint, calculating a similarity probability for each of the block-wise comparisons, the calculation including a respective weightings for each of the plurality of blocks within the known malware file and for each of the plurality of blocks within the file to be checked, and the calculation including a distance between the compared blocks; and calculating an overall similarity probability for the plurality of blocks compared.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Applicant: Secure Computing CorporationInventor: Christoph Alme
-
Publication number: 20080184366Abstract: Methods and systems for processing electronic communications based upon reputation. Reputation of an entity associated with the electronic communication can be generated. The communication can be placed in a queue based upon the reputation. The queued communication can be processed based upon updated information about the entity.Type: ApplicationFiled: January 25, 2008Publication date: July 31, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Sven Krasser
-
Publication number: 20080178288Abstract: Methods and systems for operation upon one or more data processors for detecting image spam by detecting an image and analyzing the content of the image to determine whether the incoming communication comprises an unwanted communication.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: Secure Computing CorporationInventors: Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
-
Publication number: 20080175226Abstract: Methods and systems for operation upon one or more data processors for throttling connections based upon reputation of the entity requesting connection.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Aarjav Jyotindra Neeta Trivedi, Weilai Yang
-
Publication number: 20080177691Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Yuchun Tang, Jonathan Alexander Zdziarski
-
Publication number: 20080178259Abstract: Methods and systems for operation upon one or more data processors for efficiently processing communications based upon reputation of an entity associated with the communication.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Sven Krasser, Paul Judge, Lamar Lorenzo Willis
-
Publication number: 20080175266Abstract: Methods and systems for assigning reputation to communications entities include collecting communications data from distributed agents, aggregating the communications data, analyzing the communications data and identifying relationships between communications entities based upon the communications data.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Adele Schneck, Martin Stecher, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
-
Patent number: 7315801Abstract: A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerabilities of the simulated network based on the network configuration data and the vulnerabilities database.Type: GrantFiled: January 14, 2000Date of Patent: January 1, 2008Assignee: Secure Computing CorporationInventors: Alan Dowd, Thomas R. Markham, Tomo Foote-Lennox, David Apostal, Raymond Lu
-
Publication number: 20070300286Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.Type: ApplicationFiled: May 29, 2007Publication date: December 27, 2007Applicant: Secure Computing CorporationInventor: Paul Judge
-
Patent number: 7308706Abstract: Systems and methods for an associative policy model are provided. One embodiment of the present invention provides a method for implementing an associative policy. In this embodiment, the method includes providing a policy on a policy server, the policy having a service definition that contains first and second relational components, providing first and second network entities, operatively coupling the first and second network entities to the policy server, dynamically associating the first network entity with the second network entity (wherein such associating includes binding the first relational component of the service definition in the policy to the first network entity, and binding the second relational component of the service definition in the policy to the second network entity), and enforcing the policy on the first and second network entities.Type: GrantFiled: October 28, 2002Date of Patent: December 11, 2007Assignee: Secure Computing CorporationInventors: Thomas R. Markham, Jessica J. Bogle, Charles N. Payne, Jr.
-
Patent number: 7308702Abstract: A system and method for defining and enforcing a security policy. Security mechanism application specific information for each security mechanism is encapsulated as a key and exported to a semantic layer. Keys are combined to form key chains within the semantic layer. The key chains are in turn encapsulated as keys and passed to another semantic layer. A security policy is defined by forming key chains from keys and associating users with the key chains. The security policy is translated and exported to the security mechanisms. The security policy is then enforced via the security mechanisms.Type: GrantFiled: January 14, 2000Date of Patent: December 11, 2007Assignee: Secure Computing CorporationInventors: Daniel Jay Thomsen, Richard O'Brien, Jessica Bogle, Charles Payne
-
Patent number: 7263718Abstract: An inventive security framework for supporting kernel-based hypervisors within a computer system. The security framework includes a security master, one or more security modules and a security manager, wherein the security master and security modules execute in kernel space.Type: GrantFiled: December 2, 2003Date of Patent: August 28, 2007Assignee: Secure Computing CorporationInventors: Richard O'Brien, Raymond Lu, Terrence Mitchem, Spencer Minear
-
Patent number: 7231664Abstract: A novel system and method for transmitting and receiving secure data in a virtual private group (VPG). In one embodiment, a method for transmitting secure data from a first node to a second node includes accessing a group membership table on the first node, the group membership table having group membership information for each group, including a first group, to which the first node belongs and group security information associated with each group, wherein the first group has two or more members, and checking the group membership table to determine if the second node is a member of the first group. If the second node is a member of the first group, the method further includes encrypting a data packet using the group security information associated with the first group, processing the encrypted data packet, and transmitting the encrypted data packet from the first node to the second node.Type: GrantFiled: September 4, 2002Date of Patent: June 12, 2007Assignee: Secure Computing CorporationInventors: Thomas R. Markham, Lynn Marquette Meredith, Robert Otto Hanzlik, Geoffrey A. Lowe
-
Publication number: 20070130350Abstract: Methods and systems for operation upon one or more data processors for assigning reputation to web-based entities based upon previously collected data.Type: ApplicationFiled: January 24, 2007Publication date: June 7, 2007Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Tomo Foote-Lennox, Paula Greve, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Jonathan Zdziarski
-
Publication number: 20070130351Abstract: Methods and systems for operation upon one or more data processors for aggregating reputation data from dispersed reputation engines and deriving global reputation information for use in handling received communications.Type: ApplicationFiled: January 24, 2007Publication date: June 7, 2007Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, Phyllis Schneck
-
Patent number: 7225466Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.Type: GrantFiled: March 24, 2006Date of Patent: May 29, 2007Assignee: Secure Computing CorporationInventor: Paul Judge
-
Patent number: D577022Type: GrantFiled: July 5, 2007Date of Patent: September 16, 2008Assignee: Secure Computing CorporationInventor: Noah L. Anglin
-
Patent number: D577023Type: GrantFiled: July 5, 2007Date of Patent: September 16, 2008Assignee: Secure Computing CorporationInventor: Noah L. Anglin