Patents by Inventor Conrad K. Herrmann

Conrad K. Herrmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7627896
    Abstract: A security system providing methodology for cooperative enforcement of security policies during SSL sessions is described. In one embodiment, for example, a method is described for controlling SSL (Secure Sockets Layer) communication, the method comprises steps of: defining rules indicating conditions under which a machine is permitted to participate in an SSL session; trapping an attempt by a particular application running on the machine to participate in an SSL session, by intercepting the particular application's attempt to provide authentication; determining whether the machine complies with the rules; allowing the attempt to succeed when the machine complies with the rules; and otherwise blocking the attempt when the machine does not comply with the rules.
    Type: Grant
    Filed: April 25, 2005
    Date of Patent: December 1, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Conrad K. Herrmann
  • Patent number: 7590684
    Abstract: A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specifying a policy required for access to the service; detecting a request for access to the service from a client; attempting authentication of the client based on credentials presented by the client; if the client is authenticated based on the credentials, determining whether the client is in compliance with the policy based, at least in part, on attributes of the client; and if the client is determined to be in compliance with the policy, providing access to the service.
    Type: Grant
    Filed: March 17, 2004
    Date of Patent: September 15, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventor: Conrad K. Herrmann
  • Patent number: 6873988
    Abstract: A system providing methods for anti-virus cooperative enforcement is described. In response to a request from a device for access to protected resources, such as a network or protected data, a determination is made as to whether an anti-virus policy applies to the request for access made by the device. If an anti-virus policy is applicable, information pertaining to virus protection available on the device is collected. The virus protection information that is collected is evaluated to determine whether the device is in compliance with the anti-virus policy. If the device is determined to be in compliance with the anti-virus policy, the device is allowed to access the protected resources.
    Type: Grant
    Filed: July 9, 2002
    Date of Patent: March 29, 2005
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Conrad K. Herrmann, Kaveh Baharestan, Joseph E. Bentley, Jess A. Leroy
  • Publication number: 20040167984
    Abstract: A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specifying a policy required for access to the service; detecting a request for access to the service from a client; attempting authentication of the client based on credentials presented by the client; if the client is authenticated based on the credentials, determining whether the client is in compliance with the policy based, at least in part, on attributes of the client; and if the client is determined to be in compliance with the policy, providing access to the service.
    Type: Application
    Filed: March 17, 2004
    Publication date: August 26, 2004
    Applicant: ZONE LABS, INC.
    Inventor: Conrad K. Herrmann
  • Publication number: 20040107360
    Abstract: A system and methodology for policy enforcement during authentication of a client device for access to a network is described. A first authentication module establishes a session with a client device requesting network access for collecting information from the client device and determining whether to authenticate the client device for access to the network based, at least in part, upon the collected information. A second authentication module participates in the session with the client device for supplemental authentication of the client device for access to the network. The supplemental authentication of the client device is based, at least in part, upon the collected information and a policy required as a condition for network access.
    Type: Application
    Filed: March 13, 2003
    Publication date: June 3, 2004
    Applicant: ZONE LABS, INC.
    Inventors: Conrad K. Herrmann, Sinduja Murari
  • Publication number: 20030177389
    Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.
    Type: Application
    Filed: May 31, 2002
    Publication date: September 18, 2003
    Applicant: Zone Labs, Inc.
    Inventors: Anthony Albert, Kyle N. Kawamura, Keith A. Haycock, Conrad K. Herrmann
  • Publication number: 20030055994
    Abstract: A system providing methods for anti-virus cooperative enforcement is described. In response to a request from a device for access to protected resources, such as a network or protected data, a determination is made as to whether an anti-virus policy applies to the request for access made by the device. If an anti-virus policy is applicable, information pertaining to virus protection available on the device is collected. The virus protection information that is collected is evaluated to determine whether the device is in compliance with the anti-virus policy. If the device is determined to be in compliance with the anti-virus policy, the device is allowed to access the protected resources.
    Type: Application
    Filed: July 9, 2002
    Publication date: March 20, 2003
    Applicant: Zone Labs, Inc.
    Inventors: Conrad K. Herrmann, Kaveh Baharestan, Joseph E. Bentley, Jess A. Leroy
  • Publication number: 20030055962
    Abstract: A computing environment with methods for monitoring access to an open network such as the Internet, is described. The system includes one or more client computers, each operating applications (e.g., Netscape Navigator or Microsoft Internet Explorer) requiring access to an open network, such as a WAN or the Internet, and a router or other equipment that serves a routing function (e.g., a cable modem) for the client computers. A centralized security enforcement module on the router maintains access rules for the client computers and verifies the existence and proper operation of a client-based security module on each client computer. The router-side security module periodically sends out a router challenge via Internet broadcast to the local computers on the network. If the client-side security module is installed and properly operating, the client-side security module responds to the router challenge. The responses received by the router-side security module are maintained in a table.
    Type: Application
    Filed: August 30, 2001
    Publication date: March 20, 2003
    Inventors: Gregor P. Freund, Keith A. Haycock, Conrad K. Herrmann