Patents by Inventor Gregory L. Galloway

Gregory L. Galloway has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230156014
    Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.
    Type: Application
    Filed: January 17, 2023
    Publication date: May 18, 2023
    Applicant: Fortinet, Inc.
    Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
  • Patent number: 11601438
    Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: March 7, 2023
    Assignee: Fortinet, Inc.
    Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
  • Publication number: 20220103569
    Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.
    Type: Application
    Filed: September 25, 2020
    Publication date: March 31, 2022
    Applicant: Fortinet, Inc.
    Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
  • Publication number: 20220103523
    Abstract: Systems and methods for establishing a secure connection between an endpoint agent and a cloud-based security service are provided. According to one embodiment, a DNS request is issued by an agent running on an endpoint device to a secure Internet connection service of a cloud-based security service that includes multiple pools of geographically distributed VPN servers. A DNS response to the DNS request is received containing an IP address of a particular VPN server within a pool of the multiple pools. The pool is selected by the secure Internet connection service based on a geographic location of the endpoint device inferred by a source IP address of the DNS request. The particular VPN server is selected from multiple VPN servers in the pool based on its status. A secure Internet connection is established between the agent and the particular VPN server via a particular logical port.
    Type: Application
    Filed: September 30, 2020
    Publication date: March 31, 2022
    Applicant: Fortinet, Inc.
    Inventors: Michael C. Starr, Gregory L. Galloway
  • Publication number: 20220103594
    Abstract: Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device detects whether the endpoint has moved to a new network by monitoring for changes to an IP address associated with the endpoint. When the detecting is affirmative, the agent further determines whether a trusted network determination service associated with a cloud-based security service is reachable. When the determining is affirmative, the agent further identifies whether the new network is among a set of trusted networks that have been previously registered with the cloud-based security service by querying the trusted network determination service. When the identifying is affirmative, a particular security feature on the endpoint is configured for operation within a trusted network and when the identifying is negative, the particular security feature is configured for operation outside of a trusted networks.
    Type: Application
    Filed: September 25, 2020
    Publication date: March 31, 2022
    Applicant: Fortinet, Inc.
    Inventors: Gregory L. Galloway, Karl D. Melcher, Michael C. Starr, Scott M. Davis
  • Patent number: 11042384
    Abstract: Disclosed is a method of customizing an appliance. The method includes steps of pre-storing a public key in the appliance; connecting the appliance to an external storage device; and booting up the appliance to automatically proceed with the following customization process: obtaining a customization file from the external storage device; authenticating the customization file with the public key; and executing customization with the customization file if the authentication succeeds.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: June 22, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chih-Wen Chao, Gregory L. Galloway, Cheng-Ta Lee, Ming-Hsun Wu, Rick M. F. Wu
  • Patent number: 10708348
    Abstract: Methods and systems for high-availability data processing include detecting, at a first data processing system, a change in link state between the first data processing system and a second data processing system. A link state between the first data processing system and a third data processing system is changed responsive to the detection in accordance with a first high availability policy stored at the first data processing system. An identifier of the first data processing system is changed in accordance with the first high availability policy to conform to a second high availability policy stored at the first data processing system. The detection, change of the link state, and change of the identifier are repeated in accordance with the second high availability policy.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: July 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Coccoli, Gregory L. Galloway, Cheng-Ta Lee, Wei-Shiau Suen, Ming-Hsun Wu
  • Publication number: 20190278613
    Abstract: Disclosed is a method of customizing an appliance. The method includes steps of pre-storing a public key in the appliance; connecting the appliance to an external storage device; and booting up the appliance to automatically proceed with the following customization process: obtaining a customization file from the external storage device; authenticating the customization file with the public key; and executing customization with the customization file if the authentication succeeds.
    Type: Application
    Filed: May 22, 2019
    Publication date: September 12, 2019
    Inventors: Chih-Wen Chao, Gregory L. Galloway, Cheng-Ta Lee, Ming-Hsun Wu, Rick M. F. Wu
  • Patent number: 10379876
    Abstract: Disclosed is a method of customizing an appliance. The method includes steps of pre-storing a public key in the appliance; connecting the appliance to an external storage device; and booting up the appliance to automatically proceed with the following customization process: obtaining a customization file from the external storage device; authenticating the customization file with the public key; and executing customization with the customization file if the authentication succeeds.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chih-Wen Chao, Gregory L. Galloway, Cheng-Ta Lee, Ming-Hsun Wu, Rick M. F. Wu
  • Publication number: 20180048546
    Abstract: Methods and systems for high-availability data processing include detecting, at a first data processing system, a change in link state between the first data processing system and a second data processing system. A link state between the first data processing system and a third data processing system is changed responsive to the detection in accordance with a first high availability policy stored at the first data processing system. An identifier of the first data processing system is changed in accordance with the first high availability policy to conform to a second high availability policy stored at the first data processing system. The detection, change of the link state, and change of the identifier are repeated in accordance with the second high availability policy.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: Paul Coccoli, Gregory L. Galloway, Cheng-Ta Lee, Wei-Shiau Suen, Ming-Hsun Wu
  • Publication number: 20160147546
    Abstract: Disclosed is a method of customizing an appliance. The method includes steps of pre-storing a public key in the appliance; connecting the appliance to an external storage device; and booting up the appliance to automatically proceed with the following customization process: obtaining a customization file from the external storage device; authenticating the customization file with the public key; and executing customization with the customization file if the authentication succeeds.
    Type: Application
    Filed: November 16, 2015
    Publication date: May 26, 2016
    Inventors: Chih-Wen Chao, Gregory L. Galloway, Cheng-Ta Lee, Ming-Hsun Wu, Rick M. F. Wu