Patents by Inventor Eric C. Hastings

Eric C. Hastings has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11720661
    Abstract: Systems and methods for a passive wireless multi-factor authentication approach are provided. According to one embodiment, a user authentication request is received by a first computing device connected to a private network. The user authentication request is sent by an endpoint protection suite running on the first computing device to an authentication device associated with the private network. A proximity of a second computing device, which was previously registered with the authentication device to be used as a factor of a multi-factor authentication process involving the first computing device, is determined by the authentication device in relation to one or more wireless access points of a wireless network of the private network. The user authentication request is then processed by the authentication device based on the proximity.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: August 8, 2023
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 11695733
    Abstract: Systems and methods for automatic VPN establishment are provided.
    Type: Grant
    Filed: March 12, 2021
    Date of Patent: July 4, 2023
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 11265347
    Abstract: Systems and methods for automated testing of network security controls are provided. According to one embodiment, information regarding multiple desired security controls for a protected network are received by a network device. Network traffic configured to validate an extent of conformance by the protected network with the desired security controls is generated by the network device. The generated network traffic is transmitted by the network device onto the protected network. An assessment is performed by the network device regarding how network security policies configured within the protected network process the generated network traffic.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: March 1, 2022
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20210203640
    Abstract: Systems and methods for automatic VPN establishment are provided.
    Type: Application
    Filed: March 12, 2021
    Publication date: July 1, 2021
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 10979395
    Abstract: Systems and methods for automatic VPN establishment are provided. According to one embodiment, a P1 message is received by a hub network device (ND) a remote device (RD) of a spoke. P1 specifies VPN connection attributes corresponding to a lowest ENC/AUTH suite supported by RD. A VPN tunnel entry is automatically created by ND based on the VPN connection attributes. A P2 message is transmitted by ND specifying ENC/AUTH attributes based on corresponding ENC/AUTH of the VPN connection attributes. A third message is received by ND from RD indicating a highest level ENC/AUTH suite supported by RD. ND determines its compatibility with the proposed ENC/AUTH suite. If compatible, ND transmits a random PSK to enable creation of a permanent tunnel and establishment of the VPN connection; otherwise, compatibility with a lower level ENC/AUTH suite is determined by RD iteratively reducing the proposed suite until a match is found.
    Type: Grant
    Filed: April 16, 2019
    Date of Patent: April 13, 2021
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20200336464
    Abstract: Systems and methods for automatic VPN establishment are provided. According to one embodiment, a P1 message is received by a hub network device (ND) a remote device (RD) of a spoke. P1 specifies VPN connection attributes corresponding to a lowest ENC/AUTH suite supported by RD. A VPN tunnel entry is automatically created by ND based on the VPN connection attributes. A P2 message is transmitted by ND specifying ENC/AUTH attributes based on corresponding ENC/AUTH of the VPN connection attributes. A third message is received by ND from RD indicating a highest level ENC/AUTH suite supported by RD. ND determines its compatibility with the proposed ENC/AUTH suite. If compatible, ND transmits a random PSK to enable creation of a permanent tunnel and establishment of the VPN connection; otherwise, compatibility with a lower level ENC/AUTH suite is determined by RD iteratively reducing the proposed suite until a match is found.
    Type: Application
    Filed: April 16, 2019
    Publication date: October 22, 2020
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 10505900
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security device. An upper layer protocol associated with the packet is identified. It is determined whether the identified upper layer protocol is one of multiple candidate upper layer protocols having a potential to carry sensitive information with reference to a database identifying the candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning. Responsive to an affirmative determination and when a command represented by the packet is one of the corresponding commands of interest for the identified upper layer protocol, then a DLP scan is performed on content contained within the corresponding suspect field of the packet. Otherwise, performance of the DLP scan for the received packet is skipped.
    Type: Grant
    Filed: September 4, 2017
    Date of Patent: December 10, 2019
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20190188368
    Abstract: Systems and methods for a passive wireless multi-factor authentication approach are provided. According to one embodiment, a user authentication request is received by a first computing device connected to a private network. The user authentication request is sent by an endpoint protection suite running on the first computing device to an authentication device associated with the private network. A proximity of a second computing device, which was previously registered with the authentication device to be used as a factor of a multi-factor authentication process involving the first computing device, is determined by the authentication device in relation to one or more wireless access points of a wireless network of the private network. The user authentication request is then processed by the authentication device based on the proximity.
    Type: Application
    Filed: December 18, 2017
    Publication date: June 20, 2019
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20190089740
    Abstract: Systems and methods for automated testing of network security controls are provided. According to one embodiment, information regarding multiple desired security controls for a protected network are received by a network device. Network traffic configured to validate an extent of conformance by the protected network with the desired security controls is generated by the network device. The generated network traffic is transmitted by the network device onto the protected network. An assessment is performed by the network device regarding how network security policies configured within the protected network process the generated network traffic.
    Type: Application
    Filed: September 18, 2017
    Publication date: March 21, 2019
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20170366507
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security device. An upper layer protocol associated with the packet is identified. It is determined whether the identified upper layer protocol is one of multiple candidate upper layer protocols having a potential to carry sensitive information with reference to a database identifying the candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning. Responsive to an affirmative determination and when a command represented by the packet is one of the corresponding commands of interest for the identified upper layer protocol, then a DLP scan is performed on content contained within the corresponding suspect field of the packet. Otherwise, performance of the DLP scan for the received packet is skipped.
    Type: Application
    Filed: September 4, 2017
    Publication date: December 21, 2017
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 9756017
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security device. An upper layer protocol associated with the packet is identified. It is determined whether the identified upper layer protocol is one of multiple candidate upper layer protocols having a potential to carry sensitive information with reference to a database identifying the candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning. Responsive to an affirmative determination and when a command represented by the packet is one of the corresponding commands of interest for the identified upper layer protocol, then a DLP scan is performed on content contained within the corresponding suspect field of the packet. Otherwise, performance of the DLP scan for the received packet is skipped.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: September 5, 2017
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20160344698
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a packet is received by a network security device. An upper layer protocol associated with the packet is identified. It is determined whether the identified upper layer protocol is one of multiple candidate upper layer protocols having a potential to carry sensitive information with reference to a database identifying the candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning. Responsive to an affirmative determination and when a command represented by the packet is one of the corresponding commands of interest for the identified upper layer protocol, then a DLP scan is performed on content contained within the corresponding suspect field of the packet. Otherwise, performance of the DLP scan for the received packet is skipped.
    Type: Application
    Filed: August 8, 2016
    Publication date: November 24, 2016
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 9444788
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. A data structure is maintained within a network security appliance identifying candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information. A packet is received by the network security appliance. A protocol associated with the packet is identified. It is determined whether the identified protocol is among those of the candidate protocols. Responsive to an affirmative determination and when a command represented by the packet is among those of the corresponding commands of interest for the candidate protocol, then a DLP scan is performed on the packet. Otherwise, the packet is allowed to pass through the network security appliance without being subject to a DLP scan.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: September 13, 2016
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Publication number: 20160105396
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. A data structure is maintained within a network security appliance identifying candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information. A packet is received by the network security appliance. A protocol associated with the packet is identified. It is determined whether the identified protocol is among those of the candidate protocols. Responsive to an affirmative determination and when a command represented by the packet is among those of the corresponding commands of interest for the candidate protocol, then a DLP scan is performed on the packet. Otherwise, the packet is allowed to pass through the network security appliance without being subject to a DLP scan.
    Type: Application
    Filed: November 12, 2015
    Publication date: April 14, 2016
    Applicant: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 9225734
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, a data packet is received by a network security appliance. The data packet is originated by a first networking device within a network protected by the network security appliance and is directed to a second networking device that is outside the network. The data packet is decoded in accordance with an upper layer protocol through which the data packet is being transmitted. A command, request or method of the upper layer protocol that is specified by or represented by the data packet is determined. A field of the command, request or method, which is not designed for carrying a message or a file, is scanned for sensitive or confidential information based on a sensor rule. When the scanning results in a match, then an action associated with the sensor rule is performed.
    Type: Grant
    Filed: September 10, 2014
    Date of Patent: December 29, 2015
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 9197628
    Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. According to one embodiment, information is received from an administrator (i) defining a DLP rule to be applied to packets associated with an upper layer protocol and (ii) defining an action to take when a condition associated with the rule is satisfied. The rule includes a regular expression and/or a string that is configured to detect existence of sensitive information. A packet originated by a host device is received. The packet is determined to be associated with the upper layer protocol. A command, request or method of the protocol is identified that is specified by or represented by the packet. The packet is scanned for sensitive information based on the rule. When the scanning results in a conclusion that sensitive information is contained within the packet, then the defined action is performed.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: November 24, 2015
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings