Patents by Inventor Alain Jules Mayer
Alain Jules Mayer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8321944Abstract: A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host location with respect the vulnerability in response to incomplete configuration data, thereafter receiving updated network data selected from a group consisting of: updated configuration data, updated network topology, determining an updated security exposure for the host location with respect to the threat location from the updated network data, and to the incomplete configuration data, and displaying a difference between of the first security exposure and the second security exposure on the display.Type: GrantFiled: June 12, 2007Date of Patent: November 27, 2012Assignee: RedSeal Networks, Inc.Inventors: Alain Jules Mayer, Brian Laing, Michael Lloyd
-
Patent number: 8307444Abstract: A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a security exposure of the first server location with respect to the threat server in response to the configuration data, the topology, and to the configuration data associated the host server location, determining a vulnerability certainty for the first server location with respect the vulnerability in response to the configuration data associated the host server location, and outputting a visual representation of the security exposure and the vulnerability certainty on a display.Type: GrantFiled: June 12, 2007Date of Patent: November 6, 2012Assignee: Redseal Networks, Inc.Inventors: Alain Jules Mayer, Brian Laing, Michael Lloyd
-
Patent number: 8135815Abstract: A method for a computer system includes determining network devices within a network topology, wherein the network devices includes a first application server hosting a first application, receiving a policy for the network comprising requirements of a first application server including a description of a set of required network traffic, receiving a plurality of configuration files associated with the plurality of network devices, determining a network configuration model in response to the plurality of configuration files, computing network traffic on all network paths to and from the first application server to determine a plurality of computed paths, determining if the network traffic includes at least the set of required network traffic associated with the first server, and generating a report indicating whether the network traffic includes at least the set of required network traffic.Type: GrantFiled: November 8, 2005Date of Patent: March 13, 2012Assignee: Redseal Systems, Inc.Inventor: Alain Jules Mayer
-
Patent number: 8132260Abstract: A method for a computer system includes receiving a topology of a network including a server location and a threat server at a threat server location, determining a vulnerability security risk for the server location, determining remediation actions including a first action and a second action in response to the vulnerability, determining updated security risks associated with the server location including an first updated security risk for a first action and a second updated security risk for, and displaying a prioritized list of remediation actions on the display, wherein the first remediation action is prioritized over the second remediation action when the first updated security risk value with respect to the security risk value shows a greater improvement in risk than the second updated security risk value with respect to the security risk value.Type: GrantFiled: June 12, 2007Date of Patent: March 6, 2012Assignee: Redseal Systems, Inc.Inventors: Alain Jules Mayer, Brian Laing, Michael Lloyd
-
Patent number: 7890869Abstract: A method for a computer system including a display includes determining a plurality of security metrics associated with a plurality of servers within a network, displaying a tree map on the display representing at least a portion of the network, wherein the tree map comprises a plurality of shapes associated with servers from the plurality of servers, wherein a size of shapes in the plurality of shapes are determined in response to a first security metric from the plurality of security metric associated with the servers, and wherein an appearance of the shapes are determined in response to a second security metric from the plurality of security metrics associated with the servers.Type: GrantFiled: June 12, 2007Date of Patent: February 15, 2011Assignee: Redseal Systems, Inc.Inventors: Alain Jules Mayer, Brian Laing, Michael Lloyd
-
Patent number: 7171659Abstract: A system and method for the automated provisioning of software applications onto one or more computers. The provisioning system uses a model of the application, which describes the application in terms of its software features and the actions to manipulate the application. The model preferably describes this information in a general way, such that it is independent of any environmental characteristics associated with the computers. The provisioning system also receives as input a set of references to selected ones of the computers onto which the application is to be provisioned.Type: GrantFiled: March 19, 2002Date of Patent: January 30, 2007Assignee: Sun Microsystems, Inc.Inventors: Brian Eric Becker, Michael Robert Hanson, Alain Jules Mayer, Michael Todd Schroepfer
-
Patent number: 7146639Abstract: A method and apparatus are disclosed for managing a firewall. The disclosed firewall manager facilitates the generation of a security policy for a particular network environment, and automatically generates the firewall-specific configuration files from the security policy simultaneously for multiple gateways. The security policy is separated from the vendor-specific rule syntax and semantics and from the actual network topology. Thus, the security administrator can focus on designing an appropriate policy without worrying about firewall rule complexity, rule ordering, and other low-level configuration issues. In addition, the administrator can maintain a consistent policy in the presence of intranet topology changes. The disclosed firewall manager utilizes a model definition language (MDL) and an associated parser to produce an entity relationship model. A model compiler translates the entity-relationship model into the appropriate firewall configuration files.Type: GrantFiled: January 6, 2003Date of Patent: December 5, 2006Assignee: Lucent Technologies Inc.Inventors: Yair Bartal, Alain Jules Mayer, Avishai Wool
-
Patent number: 7003562Abstract: A method and an apparatus for analyzing a network configuration against a corporate network policy and determining violation(s) against the corporate network policy. A report indicating the violation(s) can be generated indicating instances of the violation(s). An analysis platform reads in a network policy. The analysis platform collects configuration files from the relevant network devices in the network and builds up an internal instance of a network configuration model based on the configuration files and the network topology. The analysis platform analyzes this network configuration model according to the network policy and adds an entry to its final report each time that it detects a violation against the network policy in the network configuration model. The data in the entries pinpoints the cause of the deviation(s) from the network policy.Type: GrantFiled: September 17, 2001Date of Patent: February 21, 2006Assignee: Redseal Systems, Inc.Inventor: Alain Jules Mayer
-
Publication number: 20040088397Abstract: A system and method for the management of applications on one or more computers. The management system can manage the applications based on the state of each resource belonging to the application. One aspect of the management system includes a master server and a plurality of agents. The master server allows resources to be selected from among a plurality of resources that are already deployed and combine the resources together to form an application. The master server can then generate instructions for capturing the selected resources, along with their corresponding resource states, and combining the captured resources and resource states into an application package. Another aspect of the management system can associate management procedures with the application based on the resource type of each of the resources making up the application. The management procedures can thus be executed to manage the application based on the states of each of its resources.Type: ApplicationFiled: November 5, 2002Publication date: May 6, 2004Applicant: SIDLEY AUSTIN BROWN & WOOD LLP.Inventors: Brian Eric Becker, Alain Jules Mayer, Michael Todd Schroepfer
-
Patent number: 6681017Abstract: A number of protocols are disclosed for providing simplified security for a series of low-cost transactions carried out between a client and a server within an on-going client-server relationship. A key establishment protocol is used to generate a shared key which will be used by the client and server for the series of transactions. The client generates the shared key as a function of a client identifier, a server identifier and secret client information, encrypts the shared key using a public key of the server, and sends the encrypted shared key to the server. The server responds by incorporating server information into a response which is encrypted using the shared key and sent to the client. The client decrypts the response, verifies that the server has accepted the shared key, and then sends additional client information, such as a credit card number, to the server, using the shared key for encryption. The client may then use the shared key in a series of subsequent transactions with the server.Type: GrantFiled: September 3, 1997Date of Patent: January 20, 2004Assignee: Lucent Technologies Inc.Inventors: Yossi Matias, Alain Jules Mayer, Abraham Silberschatz
-
Publication number: 20030195921Abstract: A system and method for the automated provisioning of software applications onto one or more computers. The provisioning system uses a model of the application, which describes the application in terms of its software features and the actions to manipulate the application. The model preferably describes this information in a general way, such that it is independent of any environmental characteristics associated with the computers. The provisioning system also receives as input a set of references to selected ones of the computers onto which the application is to be provisioned.Type: ApplicationFiled: March 19, 2002Publication date: October 16, 2003Inventors: Brian Eric Becker, Michael Robert Hanson, Alain Jules Mayer, Michael Todd Schroepfer
-
Publication number: 20030120955Abstract: A method and apparatus are disclosed for managing a firewall. The disclosed firewall manager facilitates the generation of a security policy for a particular network environment, and automatically generates the firewall-specific configuration files from the security policy simultaneously for multiple gateways. The security policy is separated from the vendor-specific rule syntax and semantics and from the actual network topology. Thus, the security administrator can focus on designing an appropriate policy without worrying about firewall rule complexity, rule ordering, and other low-level configuration issues. In addition, the administrator can maintain a consistent policy in the presence of intranet topology changes. The disclosed firewall manager utilizes a model definition language (MDL) and an associated parser to produce an entity relationship model. A model compiler translates the entity-relationship model into the appropriate firewall configuration files.Type: ApplicationFiled: January 6, 2003Publication date: June 26, 2003Applicant: Lucent Technologies Inc.Inventors: Yair Bartal, Alain Jules Mayer, Avishai Wool
-
Publication number: 20020178246Abstract: A method and an apparatus for analyzing a network configuration against a corporate network policy and determining violation(s) against the corporate network policy. A report indicating the violation(s) can be generated indicating instances of the violation(s). An analysis platform reads in a network policy. The analysis platform collects configuration files from the relevant network devices in the network and builds up an internal instance of a network configuration model based on the configuration files and the network topology. The analysis platform analyzes this network configuration model according to the network policy and adds an entry to its final report each time that it detects a violation against the network policy in the network configuration model. The data in the entries pinpoints the cause of the deviation(s) from the network policy.Type: ApplicationFiled: September 17, 2001Publication date: November 28, 2002Inventor: Alain Jules Mayer