Patents by Inventor Brian Swander
Brian Swander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8301895Abstract: Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.Type: GrantFiled: December 2, 2009Date of Patent: October 30, 2012Assignee: Microsoft CorporationInventors: Brian Swander, Daniel R. Simon, Pascal Menezes
-
Patent number: 8060927Abstract: A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be handled at a high throughput while packets with unauthenticated connections may be handed at a low throughput or even discarded. In some embodiments, three or more levels of security classifications may be used to process packets at different speeds or priorities. In some embodiments, one device may classify and tag each packet, while another device within the network may process the packets according to the tags.Type: GrantFiled: October 31, 2007Date of Patent: November 15, 2011Assignee: Microsoft CorporationInventors: Christopher J. Engdahl, Brian Swander, Lee Walker
-
Publication number: 20110131417Abstract: Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.Type: ApplicationFiled: December 2, 2009Publication date: June 2, 2011Applicant: Microsoft CorporationInventors: Brian Swander, Daniel R. Simon, Pascal Menezes
-
Patent number: 7925693Abstract: An architecture that can provide for improved network content filtering is described herein. In particular, access to remote resources can be controlled by a remote mechanism. In accordance therewith, a gateway can seamlessly and/or transparently redirect packets from a client that are meant for an intended destination to an access control component. The access control component can determine whether the client has access to the resources requested. In addition, the gateway can provide IPSec features on behalf to the client.Type: GrantFiled: January 26, 2007Date of Patent: April 12, 2011Assignee: Microsoft CorporationInventors: Brian Swander, Richard Lamb, Eduard Guzovsky
-
Publication number: 20090113517Abstract: A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be handled at a high throughput while packets with unauthenticated connections may be handed at a low throughput or even discarded. In some embodiments, three or more levels of security classifications may be used to process packets at different speeds or priorities. In some embodiments, one device may classify and tag each packet, while another device within the network may process the packets according to the tags.Type: ApplicationFiled: October 31, 2007Publication date: April 30, 2009Applicant: Microsoft CorporationInventors: Christopher J. Engdahl, Brian Swander, Lee Walker
-
Patent number: 7500102Abstract: A method and apparatus for fragmenting and reassembling IKE protocol data packets that exceed a Maximum Transmission Unit is provided. A transmitting node determines whether to fragment IKE data depending on whether the receiving node has the capability to receive and reassemble fragmented data packets. The transmitting node detects whether fragmentation is appropriate and then intercepts and fragments appropriate IKE payloads for transmission over a network. The invention further includes a method and apparatus for reassembling fragmented IKE payloads. The receiving node discards certain packets according to a set of predetermined rules that are designed to prevent denial of service attacks and other similar attacks. No modification is required to the existing IKE protocol or to other lower level networking protocols.Type: GrantFiled: January 25, 2002Date of Patent: March 3, 2009Assignee: Microsoft CorporationInventors: Brian Swander, Christian Huitema
-
Publication number: 20070204154Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.Type: ApplicationFiled: February 1, 2007Publication date: August 30, 2007Applicant: Microsoft CorporationInventors: Brian Swander, William Dixon
-
Publication number: 20070124489Abstract: An architecture that can provide for improved network content filtering is described herein. In particular, access to remote resources can be controlled by a remote mechanism. In accordance therewith, a gateway can seamlessly and/or transparently redirect packets from a client that are meant for an intended destination to an access control component. The access control component can determine whether the client has access to the resources requested. In addition, the gateway can provide IPSec features on behalf to the client.Type: ApplicationFiled: January 26, 2007Publication date: May 31, 2007Applicant: MICROSOFT CORPORATIONInventors: Brian Swander, Richard Lamb, Eduard Guzovsky
-
Publication number: 20070011448Abstract: A method of communicating using IPSec security protocol. Security associations are provided for a connection based on session information that may include user information and/or information related to an application running on the device. One or more filters determine whether or not to accept a connection based on session information.Type: ApplicationFiled: July 6, 2005Publication date: January 11, 2007Applicant: Microsoft CorporationInventors: Avnish Chhabra, Brian Swander
-
Publication number: 20060085850Abstract: A system and method for ensuring that machines having invalid or corrupt states are restricted from accessing host resources are provided. A quarantine agent (QA) located on a client machine acquires statements of health from a plurality of quarantine policy clients. The QA packages the statements and provides the package to a quarantine enforcement client (QEC). The QEC sends the package to a quarantine Health Certificate Server (HCS) with a request for a health certificate. If the client provided valid statements of health, the HCS grants the client health certificate that may be used in IPsec session negotiation.Type: ApplicationFiled: February 14, 2005Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Paul Mayfield, Christopher Black, Jesper Johansson, Karthik Murthy, Brian Swander
-
Publication number: 20060015935Abstract: The distributed firewall performs user authentication at a first level to establish a user security context for traffic from that user, and an authority context provides authorization for subsequent traffic. This authority context may be based on an underlying policy for particular types of traffic, access to particular applications, etc. Additionally, the system includes the ability to allow a user/process/application to define its own access control. The linking of the user security context from the traffic to the application is accomplished by enabling IPSec on a socket and forcing the socket to be bound in exclusive mode. The most common policy definitions may be included by default. Extensions of the Internet key exchange protocol (IKE) to provide the desired user authentication plus application/purpose are also provided. The architecture includes pluggable authorization module(s) that are called after IKE has successfully authenticated the peer, but before the connection is allowed to complete.Type: ApplicationFiled: September 22, 2005Publication date: January 19, 2006Applicant: Microsoft CorporationInventors: William Dixon, Gurdeep Pall, Ashwin Palekar, Bernard Aboba, Brian Swander
-
Publication number: 20050149732Abstract: Embodiments of the invention authenticate devices and establish secure connections between devices using static Diffie-Hellman key pairs. A first device obtains in a trusted manner a static DH public key of a second device prior to negotiation. The second device negotiates a secure connection to the first device using a shared secret created from the static DH public key, which serves as both a claim on the second device's identity and an encryption key. The static DH public key can be used to establish subsequent secure, authenticated communications sessions.Type: ApplicationFiled: March 23, 2004Publication date: July 7, 2005Applicant: Microsoft CorporationInventors: Trevor Freeman, Scott Manchester, Paul Mayfield, Brian Swander
-
Publication number: 20050114704Abstract: A preprocessor used in conjunction with a network firewall is disclosed. The preprocessor creates a first index for identifying a plurality of filters installed in the firewall. The preprocessor maintains statistics including selected criteria and corresponding values for the installed filters. When the value for the selected criteria exceeds a threshold value, the preprocessor creates a second index and moves a subset of filters from the first index to the second index.Type: ApplicationFiled: November 26, 2003Publication date: May 26, 2005Applicant: Microsoft CorporationInventor: Brian Swander
-
Publication number: 20050108531Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.Type: ApplicationFiled: November 14, 2003Publication date: May 19, 2005Applicant: Microsoft CorporationInventors: Brian Swander, Sara Bitan, Christian Huitema, Paul Mayfield, Daniel Simon
-
Publication number: 20050091527Abstract: A system is provided for establishing a secure link among multiple users on a single machine with a remote machine. The system includes a subsystem to filter traffic so that traffic from each user is separate. The subsystem generates and associates a Security Association (SA) with at least one filter corresponding to the user and the traffic, and employs the SA to establish the secure link. An Internet Key Exchange module and a policy module may be included to generate and associate the security association, wherein the policy module is configured via Internet Protocol Security (IPSEC).Type: ApplicationFiled: December 20, 2000Publication date: April 28, 2005Inventors: Brian Swander, Bernard Aboba
-
Publication number: 20050022011Abstract: A method is provided for implementing a firewall in a firewall architecture. The firewall architecture includes a plurality of network layers and a first firewall engine. The layers send packets and packet information to the first firewall engine, maintain and pass packet context to subsequent layers, and process the packets. The first firewall engine compares the packet information to one or more installed filters and returns an action to the layers indicating how to treat the packet.Type: ApplicationFiled: June 6, 2003Publication date: January 27, 2005Applicant: Microsoft CorporationInventors: Brian Swander, Gurdeep Pall, Nagampalli Rao
-
Publication number: 20050022010Abstract: A method and system are provided for implementing a firewall architecture in a network device. The firewall architecture includes a plurality of network layers, a first firewall engine, and one or more callout modules. The layers send packets and packet information to the first firewall engine, maintain and pass packet context to subsequent layers, and process the packets. The first firewall engine compares the packet information to one or more installed filters and returns an action to the layers indicating how to treat the packet. The callouts provide additional functionality such as intrusion detection, logging, and parental control features.Type: ApplicationFiled: June 6, 2003Publication date: January 27, 2005Applicant: Microsoft CorporationInventors: Brian Swander, Paul Mayfield
-
Publication number: 20050010765Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.Type: ApplicationFiled: June 6, 2003Publication date: January 13, 2005Applicant: Microsoft CorporationInventors: Brian Swander, William Dixon
-
Publication number: 20030142823Abstract: A method and apparatus for fragmenting and reassembling IKE protocol data packets that exceed a Maximum Transmission Unit is provided. A transmitting node determines whether to fragment IKE data depending on whether the receiving node has the capability to receive and reassemble fragmented data packets. The transmitting node detects whether fragmentation is appropriate and then intercepts and fragments appropriate IKE payloads for transmission over a network. The invention further includes a method and apparatus for reassembling fragmented IKE payloads. The receiving node discards certain packets according to a set of predetermined rules that are designed to prevent denial of service attacks and other similar attacks. No modification is required to the existing IKE protocol or to other lower level networking protocols.Type: ApplicationFiled: January 25, 2002Publication date: July 31, 2003Inventors: Brian Swander, Christian Huitema