Patents by Inventor Brian Swander

Brian Swander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8301895
    Abstract: Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.
    Type: Grant
    Filed: December 2, 2009
    Date of Patent: October 30, 2012
    Assignee: Microsoft Corporation
    Inventors: Brian Swander, Daniel R. Simon, Pascal Menezes
  • Patent number: 8060927
    Abstract: A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be handled at a high throughput while packets with unauthenticated connections may be handed at a low throughput or even discarded. In some embodiments, three or more levels of security classifications may be used to process packets at different speeds or priorities. In some embodiments, one device may classify and tag each packet, while another device within the network may process the packets according to the tags.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: November 15, 2011
    Assignee: Microsoft Corporation
    Inventors: Christopher J. Engdahl, Brian Swander, Lee Walker
  • Publication number: 20110131417
    Abstract: Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.
    Type: Application
    Filed: December 2, 2009
    Publication date: June 2, 2011
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, Daniel R. Simon, Pascal Menezes
  • Patent number: 7925693
    Abstract: An architecture that can provide for improved network content filtering is described herein. In particular, access to remote resources can be controlled by a remote mechanism. In accordance therewith, a gateway can seamlessly and/or transparently redirect packets from a client that are meant for an intended destination to an access control component. The access control component can determine whether the client has access to the resources requested. In addition, the gateway can provide IPSec features on behalf to the client.
    Type: Grant
    Filed: January 26, 2007
    Date of Patent: April 12, 2011
    Assignee: Microsoft Corporation
    Inventors: Brian Swander, Richard Lamb, Eduard Guzovsky
  • Publication number: 20090113517
    Abstract: A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be handled at a high throughput while packets with unauthenticated connections may be handed at a low throughput or even discarded. In some embodiments, three or more levels of security classifications may be used to process packets at different speeds or priorities. In some embodiments, one device may classify and tag each packet, while another device within the network may process the packets according to the tags.
    Type: Application
    Filed: October 31, 2007
    Publication date: April 30, 2009
    Applicant: Microsoft Corporation
    Inventors: Christopher J. Engdahl, Brian Swander, Lee Walker
  • Patent number: 7500102
    Abstract: A method and apparatus for fragmenting and reassembling IKE protocol data packets that exceed a Maximum Transmission Unit is provided. A transmitting node determines whether to fragment IKE data depending on whether the receiving node has the capability to receive and reassemble fragmented data packets. The transmitting node detects whether fragmentation is appropriate and then intercepts and fragments appropriate IKE payloads for transmission over a network. The invention further includes a method and apparatus for reassembling fragmented IKE payloads. The receiving node discards certain packets according to a set of predetermined rules that are designed to prevent denial of service attacks and other similar attacks. No modification is required to the existing IKE protocol or to other lower level networking protocols.
    Type: Grant
    Filed: January 25, 2002
    Date of Patent: March 3, 2009
    Assignee: Microsoft Corporation
    Inventors: Brian Swander, Christian Huitema
  • Publication number: 20070204154
    Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
    Type: Application
    Filed: February 1, 2007
    Publication date: August 30, 2007
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, William Dixon
  • Publication number: 20070124489
    Abstract: An architecture that can provide for improved network content filtering is described herein. In particular, access to remote resources can be controlled by a remote mechanism. In accordance therewith, a gateway can seamlessly and/or transparently redirect packets from a client that are meant for an intended destination to an access control component. The access control component can determine whether the client has access to the resources requested. In addition, the gateway can provide IPSec features on behalf to the client.
    Type: Application
    Filed: January 26, 2007
    Publication date: May 31, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Brian Swander, Richard Lamb, Eduard Guzovsky
  • Publication number: 20070011448
    Abstract: A method of communicating using IPSec security protocol. Security associations are provided for a connection based on session information that may include user information and/or information related to an application running on the device. One or more filters determine whether or not to accept a connection based on session information.
    Type: Application
    Filed: July 6, 2005
    Publication date: January 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Avnish Chhabra, Brian Swander
  • Publication number: 20060085850
    Abstract: A system and method for ensuring that machines having invalid or corrupt states are restricted from accessing host resources are provided. A quarantine agent (QA) located on a client machine acquires statements of health from a plurality of quarantine policy clients. The QA packages the statements and provides the package to a quarantine enforcement client (QEC). The QEC sends the package to a quarantine Health Certificate Server (HCS) with a request for a health certificate. If the client provided valid statements of health, the HCS grants the client health certificate that may be used in IPsec session negotiation.
    Type: Application
    Filed: February 14, 2005
    Publication date: April 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul Mayfield, Christopher Black, Jesper Johansson, Karthik Murthy, Brian Swander
  • Publication number: 20060015935
    Abstract: The distributed firewall performs user authentication at a first level to establish a user security context for traffic from that user, and an authority context provides authorization for subsequent traffic. This authority context may be based on an underlying policy for particular types of traffic, access to particular applications, etc. Additionally, the system includes the ability to allow a user/process/application to define its own access control. The linking of the user security context from the traffic to the application is accomplished by enabling IPSec on a socket and forcing the socket to be bound in exclusive mode. The most common policy definitions may be included by default. Extensions of the Internet key exchange protocol (IKE) to provide the desired user authentication plus application/purpose are also provided. The architecture includes pluggable authorization module(s) that are called after IKE has successfully authenticated the peer, but before the connection is allowed to complete.
    Type: Application
    Filed: September 22, 2005
    Publication date: January 19, 2006
    Applicant: Microsoft Corporation
    Inventors: William Dixon, Gurdeep Pall, Ashwin Palekar, Bernard Aboba, Brian Swander
  • Publication number: 20050149732
    Abstract: Embodiments of the invention authenticate devices and establish secure connections between devices using static Diffie-Hellman key pairs. A first device obtains in a trusted manner a static DH public key of a second device prior to negotiation. The second device negotiates a secure connection to the first device using a shared secret created from the static DH public key, which serves as both a claim on the second device's identity and an encryption key. The static DH public key can be used to establish subsequent secure, authenticated communications sessions.
    Type: Application
    Filed: March 23, 2004
    Publication date: July 7, 2005
    Applicant: Microsoft Corporation
    Inventors: Trevor Freeman, Scott Manchester, Paul Mayfield, Brian Swander
  • Publication number: 20050114704
    Abstract: A preprocessor used in conjunction with a network firewall is disclosed. The preprocessor creates a first index for identifying a plurality of filters installed in the firewall. The preprocessor maintains statistics including selected criteria and corresponding values for the installed filters. When the value for the selected criteria exceeds a threshold value, the preprocessor creates a second index and moves a subset of filters from the first index to the second index.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Applicant: Microsoft Corporation
    Inventor: Brian Swander
  • Publication number: 20050108531
    Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.
    Type: Application
    Filed: November 14, 2003
    Publication date: May 19, 2005
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, Sara Bitan, Christian Huitema, Paul Mayfield, Daniel Simon
  • Publication number: 20050091527
    Abstract: A system is provided for establishing a secure link among multiple users on a single machine with a remote machine. The system includes a subsystem to filter traffic so that traffic from each user is separate. The subsystem generates and associates a Security Association (SA) with at least one filter corresponding to the user and the traffic, and employs the SA to establish the secure link. An Internet Key Exchange module and a policy module may be included to generate and associate the security association, wherein the policy module is configured via Internet Protocol Security (IPSEC).
    Type: Application
    Filed: December 20, 2000
    Publication date: April 28, 2005
    Inventors: Brian Swander, Bernard Aboba
  • Publication number: 20050022011
    Abstract: A method is provided for implementing a firewall in a firewall architecture. The firewall architecture includes a plurality of network layers and a first firewall engine. The layers send packets and packet information to the first firewall engine, maintain and pass packet context to subsequent layers, and process the packets. The first firewall engine compares the packet information to one or more installed filters and returns an action to the layers indicating how to treat the packet.
    Type: Application
    Filed: June 6, 2003
    Publication date: January 27, 2005
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, Gurdeep Pall, Nagampalli Rao
  • Publication number: 20050022010
    Abstract: A method and system are provided for implementing a firewall architecture in a network device. The firewall architecture includes a plurality of network layers, a first firewall engine, and one or more callout modules. The layers send packets and packet information to the first firewall engine, maintain and pass packet context to subsequent layers, and process the packets. The first firewall engine compares the packet information to one or more installed filters and returns an action to the layers indicating how to treat the packet. The callouts provide additional functionality such as intrusion detection, logging, and parental control features.
    Type: Application
    Filed: June 6, 2003
    Publication date: January 27, 2005
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, Paul Mayfield
  • Publication number: 20050010765
    Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
    Type: Application
    Filed: June 6, 2003
    Publication date: January 13, 2005
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, William Dixon
  • Publication number: 20030142823
    Abstract: A method and apparatus for fragmenting and reassembling IKE protocol data packets that exceed a Maximum Transmission Unit is provided. A transmitting node determines whether to fragment IKE data depending on whether the receiving node has the capability to receive and reassemble fragmented data packets. The transmitting node detects whether fragmentation is appropriate and then intercepts and fragments appropriate IKE payloads for transmission over a network. The invention further includes a method and apparatus for reassembling fragmented IKE payloads. The receiving node discards certain packets according to a set of predetermined rules that are designed to prevent denial of service attacks and other similar attacks. No modification is required to the existing IKE protocol or to other lower level networking protocols.
    Type: Application
    Filed: January 25, 2002
    Publication date: July 31, 2003
    Inventors: Brian Swander, Christian Huitema