Patents Assigned to Zone Labs, Inc.
-
Publication number: 20050138433Abstract: A security system with methodology for defending against security breaches of peripheral devices is described. In one embodiment, for example, a method is described for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprises steps of: when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer; detecting detachment of the device from the computer; updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device.Type: ApplicationFiled: December 23, 2003Publication date: June 23, 2005Applicant: ZONE LABS, INC.Inventor: Gene Linetsky
-
Publication number: 20050005145Abstract: A system providing a secure lockbox methodology for protecting sensitive information is described. In one embodiment, the methodology includes steps of receiving input of sensitive information from a user; computing a data shadow of the sensitive information for storage in a repository; based on the data shadow stored in the repository, detecting any attempt to transmit the sensitive information; and blocking any detected attempt to transmit the sensitive information that is not authorized by the user.Type: ApplicationFiled: October 15, 2003Publication date: January 6, 2005Applicant: ZONE LABS, INC.Inventor: Steven Teixeira
-
Publication number: 20040199763Abstract: A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a particular application to invoke a particular system service; identifying the particular application that is attempting to invoke the particular system service; and based on identity of the particular application and on the rules indicating which system services a given application can invoke, blocking the attempt when the rules indicate that the particular application cannot invoke the particular system service.Type: ApplicationFiled: September 12, 2003Publication date: October 7, 2004Applicant: ZONE LABS, INC.Inventor: Gregor P. Freund
-
Publication number: 20040167984Abstract: A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specifying a policy required for access to the service; detecting a request for access to the service from a client; attempting authentication of the client based on credentials presented by the client; if the client is authenticated based on the credentials, determining whether the client is in compliance with the policy based, at least in part, on attributes of the client; and if the client is determined to be in compliance with the policy, providing access to the service.Type: ApplicationFiled: March 17, 2004Publication date: August 26, 2004Applicant: ZONE LABS, INC.Inventor: Conrad K. Herrmann
-
Publication number: 20040107360Abstract: A system and methodology for policy enforcement during authentication of a client device for access to a network is described. A first authentication module establishes a session with a client device requesting network access for collecting information from the client device and determining whether to authenticate the client device for access to the network based, at least in part, upon the collected information. A second authentication module participates in the session with the client device for supplemental authentication of the client device for access to the network. The supplemental authentication of the client device is based, at least in part, upon the collected information and a policy required as a condition for network access.Type: ApplicationFiled: March 13, 2003Publication date: June 3, 2004Applicant: ZONE LABS, INC.Inventors: Conrad K. Herrmann, Sinduja Murari
-
Publication number: 20040098599Abstract: A security system with methodology for computing a machine independent unique identifier for an executable file across different machines is described. In response to a request to uniquely identify an executable file that has been installed on a given machine, portions of the executable file modified as a result of installation of the executable file on the given machine are identified. A machine independent unique identifier is determined by performing a calculation on the executable file. The calculation is performed by excluding at least the identified portions of the executable file modified as a result of installation of the executable file on the given machine.Type: ApplicationFiled: May 9, 2003Publication date: May 20, 2004Applicant: ZONE LABS, INC.Inventor: Joseph Bentley
-
Publication number: 20040078591Abstract: A system providing methods for indirect access control is described. When an attempt to access a network by a first application is detected, a determination is made as to whether at least one other application is attempting indirect network access through the first application. If at least one other application is determined to be attempting indirect network access, each such other application is evaluated to determine if it is approved for network access. If each such other application is approved for network access, access to the network is permitted. Otherwise, access to the network is denied.Type: ApplicationFiled: May 8, 2003Publication date: April 22, 2004Applicant: ZONE LABS, INC.Inventors: Steven L. Teixeira, Christopher Carr
-
Publication number: 20040019807Abstract: A system and methodology for providing community-based security policies is described. In one embodiment in a system comprising a plurality of devices connected to a network, a security module is provided for establishing security settings for regulating network access at these devices. Information is collected from at least some the devices about the security settings established on such devices and consensus security settings are generated based upon the collected information. In response to a request for network access at a particular device, determining whether or not to permit network access is based, at least in part, upon the consensus security settings.Type: ApplicationFiled: May 14, 2003Publication date: January 29, 2004Applicant: ZONE LABS, INC.Inventor: Gregor P. Freund
-
Publication number: 20030177389Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.Type: ApplicationFiled: May 31, 2002Publication date: September 18, 2003Applicant: Zone Labs, Inc.Inventors: Anthony Albert, Kyle N. Kawamura, Keith A. Haycock, Conrad K. Herrmann
-
Publication number: 20030055994Abstract: A system providing methods for anti-virus cooperative enforcement is described. In response to a request from a device for access to protected resources, such as a network or protected data, a determination is made as to whether an anti-virus policy applies to the request for access made by the device. If an anti-virus policy is applicable, information pertaining to virus protection available on the device is collected. The virus protection information that is collected is evaluated to determine whether the device is in compliance with the anti-virus policy. If the device is determined to be in compliance with the anti-virus policy, the device is allowed to access the protected resources.Type: ApplicationFiled: July 9, 2002Publication date: March 20, 2003Applicant: Zone Labs, Inc.Inventors: Conrad K. Herrmann, Kaveh Baharestan, Joseph E. Bentley, Jess A. Leroy
-
Patent number: 5987611Abstract: A computing environment with methods for monitoring access to an open network, such as a WAN or the Internet, is described. The system includes one or more clients, each operating applications or processes (e.g., Netscape Navigator.TM. or Microsoft Internet Explorer.TM. browser software) requiring Internet (or other open network) access (e.g., an Internet connection to one or more Web servers). Client-based monitoring and filtering of access is provided in conjunction with a centralized enforcement supervisor. The supervisor maintains access rules for the client-based filtering and verifies the existence and proper operation of the client-based filter application. Access rules which can be defined can specify criteria such as total time a user can be connected to the Internet (e.g., per day, week, month, or the like), time a user can interactively use the Internet (e.g.Type: GrantFiled: May 6, 1997Date of Patent: November 16, 1999Assignee: Zone Labs, Inc.Inventor: Gregor Freund