Patents by Inventor Howard Cooper

Howard Cooper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9413785
    Abstract: A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received. The session descriptor and the content tag may be correlated with a network policy, which may be applied to the network connection. In some embodiments, the content tag may be received with the session descriptor. The file may be tainted by another file in some embodiments, and the content tag may be associated with other file.
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: August 9, 2016
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Robert Ma
  • Publication number: 20160205071
    Abstract: The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of advantageous use cases. One exemplary use case involves providing a fast path at network speeds using SDN by routing network traffic to bypass a security appliance once the security appliance determines that the security appliance no longer needs to inspect the network traffic. Another exemplary use case involves remote provisioning of security zones.
    Type: Application
    Filed: December 10, 2013
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Howard COOPER, John Richard GUZIK
  • Publication number: 20150365380
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Application
    Filed: August 17, 2015
    Publication date: December 17, 2015
    Applicant: MCAFEE, INC.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Publication number: 20150267364
    Abstract: Systems and methods for the continuous slip form construction of concrete barriers over support cages. A tube feeder of a slip form construction system can include angled tubes that can direct reinforcing bars into a concrete barrier and also provide space between the tubes for insertion of a support cage through the system and into the concrete barrier.
    Type: Application
    Filed: November 26, 2014
    Publication date: September 24, 2015
    Inventor: Howard Cooper
  • Patent number: 9112830
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: August 18, 2015
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Publication number: 20150180903
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Application
    Filed: December 22, 2014
    Publication date: June 25, 2015
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Patent number: 9049171
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Patent number: 8931043
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: January 6, 2015
    Assignee: McAfee Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Publication number: 20140250492
    Abstract: A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received. The session descriptor and the content tag may be correlated with a network policy, which may be applied to the network connection. In some embodiments, the content tag may be received with the session descriptor. The file may be tainted by another file in some embodiments, and the content tag may be associated with other file.
    Type: Application
    Filed: May 15, 2014
    Publication date: September 4, 2014
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Robert Ma
  • Patent number: 8739272
    Abstract: A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received. The session descriptor and the content tag may be correlated with a network policy, which may be applied to the network connection. In some embodiments, the content tag may be received with the session descriptor. The file may be tainted by another file in some embodiments, and the content tag may be associated with other file.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: May 27, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Robert Ma
  • Publication number: 20140115578
    Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.
    Type: Application
    Filed: October 21, 2012
    Publication date: April 24, 2014
    Inventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
  • Patent number: 8584195
    Abstract: User names and user groups serve as the basis of a formal policy in a network. A passive monitor examines network traffic in near real time and indicates: which network traffic is flowing on the network as before; which users or user groups were logged into workstations initiating this network traffic; and which of this traffic conforms to the formal policy definition. In one embodiment of the invention, users and user groups are determined by querying Microsoft® Active Directory and Microsoft® Windows servers, to determine who is logged onto the Microsoft® network. Other sources of identity information are also possible.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: November 12, 2013
    Assignee: McAfee, Inc
    Inventors: Kieran Gerard Sherlock, Geoffrey Howard Cooper, John Richard Guzik, Derek Patton Pearcy, Luis Filipe Pereira Valente
  • Publication number: 20130268994
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Application
    Filed: April 10, 2012
    Publication date: October 10, 2013
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Publication number: 20120216271
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Application
    Filed: February 23, 2011
    Publication date: August 23, 2012
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Patent number: 8190734
    Abstract: A system and method for implementing network monitoring with a unified IPv4+IPv6 address type. IPv4 network traffic and IPv6 network traffic are captured. IPv4 and IPv6 address patterns read from the captured network traffic are then encoded into a unified IPv4+IPv6 address space using a data type encoding.
    Type: Grant
    Filed: May 21, 2009
    Date of Patent: May 29, 2012
    Assignee: McAfee, Inc.
    Inventor: Geoffrey Howard Cooper
  • Patent number: 8185488
    Abstract: A system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events. Moreover, extensibility may be provided by enabling a user to define rules to be triggered when events occur in a predetermined pattern, and actions to be executed when a predetermined rule triggers a correlated event. Further, to plug a new correlation engine into the system, adapters may be deployed to handle input and output, while the user-defined rules may be validating according to semantic requirements of the new correlation engine.
    Type: Grant
    Filed: April 17, 2008
    Date of Patent: May 22, 2012
    Assignee: EMC Corporation
    Inventors: Dipto Chakravarty, Usman Choudhary, John Melvin Antony, Michael Howard Cooper, Jason Lee Arrington, Cheryl Witt
  • Publication number: 20110173359
    Abstract: A computer-implemented device provides security events from publishers to subscribers. There is provided a message bus, configured to contain a plurality of security events. Also provided is a receiver unit, responsive to a plurality of publishers, to receive the plurality of security events from the publishers. There is also a queue unit, responsive to receipt of the security events, to queue the plurality of security events in the message bus. Also, there is a transport unit, responsive to the security events in the message bus, to transport the plurality of security events in the message bus to a plurality of subscribers.
    Type: Application
    Filed: March 1, 2011
    Publication date: July 14, 2011
    Applicant: Novell, Inc.
    Inventors: Dipto CHAKRAVARTY, Usman Choudhary, Ofer Zajicek, Srinivasa Phanindra Mallapragada, John Paul Gassner, Frank Anthony Pellegrino, John Melvin Antony, Tao Yu, Michael Howard Cooper, William Matthew Weiner, Magdalence Ramona Merritt, Peng Liu, Raghunath Boyalakuntla, Srivani Sangita, Vasile Adiaconitei, Shahid Saied Malik, Karthik Ramu, Prathap Adusumilli, Walter Mathews, Adedoyin Akinnurun, Brett Hankins
  • Patent number: 7926099
    Abstract: A computer-implemented device provides security events from publishers to subscribers. There is provided a message bus, configured to contain a plurality of security events. Also provided is a receiver unit, responsive to a plurality of publishers, to receive the plurality of security events from the publishers. There is also a queue unit, responsive to receipt of the security events, to queue the plurality of security events in the message bus. Also, there is a transport unit, responsive to the security events in the message bus, to transport the plurality of security events in the message bus to a plurality of subscribers.
    Type: Grant
    Filed: December 27, 2005
    Date of Patent: April 12, 2011
    Assignee: Novell, Inc.
    Inventors: Dipto Chakravarty, Usman Choudhary, Ofer Zajicek, Srinivasa Phanindra Mallapragada, John Paul Gassner, Frank Anthony Pellegrino, John Melvin Antony, Tao Yu, Michael Howard Cooper, William Matthew Weiner, Magdalene Ramona Merritt, Peng Liu, Raghunath Boyalakuntla, Srivani Sangita, Vasile Adiaconitei, Shahid Saied Malik, Karthik Ramu, Prathap Adusumilli, Walter Mathews, Adedoyin Akinnurun, Brett Hankins
  • Publication number: 20100198636
    Abstract: Described herein is a system and method for auditing governance, risk, and compliance using an event correlation architecture. In particular, the event correlation architecture may include a solution designer for defining a solution pack that enforces one or more specific governance, risk, or compliance controls, and a solution manager for deploying the solution pack within the event correlation architecture to configure the architecture for enforcement of the one or more controls. Thus, a collection of content defined in the solution pack may be used to enrich one or more events received at the event correlation architecture, and a correlation engine may then correlate the events using the content in the solution pack to enforce the one or more governance, risk, or compliance controls.
    Type: Application
    Filed: April 15, 2009
    Publication date: August 5, 2010
    Applicant: Novell, Inc.
    Inventors: Usman Choudhary, John Melvin Antony, Michael Howard Cooper, Pattabiraman Srinivasan
  • Publication number: 20100067390
    Abstract: A system and method of discovering network entities. Network traffic is monitored, wherein monitoring includes finding network entities in the network traffic. If the network entities are network assets, the system determines if the network entities are critical network assets. If the network entities are network users, the system classifies the network users automatically into user groups. The network traffic is then displayed as a function of the critical network assets and the user groups.
    Type: Application
    Filed: May 21, 2009
    Publication date: March 18, 2010
    Inventors: Luis Filipe Pereira Valente, Derek Patton Pearcy, Geoffrey Howard Cooper, Kieran Gerard Sherlock