Patents by Inventor Jeffrey A. Christy

Jeffrey A. Christy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8001594
    Abstract: Methods and systems are disclosed for monitoring activity of a user on a network component, such as an end user computer, in a virtual private network for adherence to a security enforcement provision or policy utilized in the virtual private network. A method of determining whether a security provision in a computer network has been violated is described. It is determined whether the network component has violated, modified or circumvented a security enforcement provision of the computer network. If the detection is affirmative, the network component, such as an end user system, is modified in a manner in which the computer network operates at a level appropriate to the degree of the violation, modification, or circumvention of the security enforcement provision. If instructed to do so, a third party operating the virtual private network is notified of the violation and access to the network by the network component is restricted or terminated.
    Type: Grant
    Filed: June 10, 2002
    Date of Patent: August 16, 2011
    Assignee: iPass, Inc.
    Inventors: Robert Gordon Heintz, Jeffrey A. Christy
  • Publication number: 20060010492
    Abstract: Methods and systems are disclosed for monitoring activity of a user on a network component, such as an end user computer, in a virtual private network for adherence to a security enforcement provision or policy utilized in the virtual private network. A method of determining whether a security provision in a computer network has been violated is described. It is determined whether the network component has violated, modified or circumvented a security enforcement provision of the computer network. If the detection is affirmative, the network component, such as an end user system, is modified in a manner in which the computer network operates at a level appropriate to the degree of the violation, modification, or circumvention of the security enforcement provision. If instructed to do so, a third party operating the virtual private network is notified of the violation and access to the network by the network component is restricted or terminated.
    Type: Application
    Filed: June 10, 2002
    Publication date: January 12, 2006
    Inventors: Robert Heintz, Jeffrey Christy
  • Publication number: 20050172565
    Abstract: A deflector shield apparatus for rain gutters to prevent leaf and similar debris from entering the trough portion of the gutter. The deflector shield apparatus includes means for mounting the deflector to the gutter and associated building structure to provide improved function of the gutter system and easy installation. The deflector shield comprises a rigid sheet material having a rear portion adapted to be mounted under the outermost row of roof shingles, a central portion extending outward over the gutter, and a forward portion provided with a downturned curve forming a nose disposed over the front lip of the gutter and a reverse curved terminal and extending rearwardly over the trough portion of the gutter. Included in the apparatus is a modified gutter support strap having opposing ends in engagement with the front and rear wall of the gutter and means to connect the rear wall of the gutter to the associated building wall.
    Type: Application
    Filed: January 25, 2005
    Publication date: August 11, 2005
    Inventors: Philip Riley, Jeffrey Christy
  • Publication number: 20030229808
    Abstract: Methods and systems are disclosed for monitoring activity of a user on a network component, such as an end user computer, in a virtual private network for adherence to a security enforcement provision or policy utilized in the virtual private network. A method of determining whether a security provision in a computer network has been violated is described. It is determined whether the network component has violated, modified or circumvented a security enforcement provision of the computer network. If the detection is affirmative, the network component, such as an end user system, is modified in a manner in which the computer network operates at a level appropriate to the degree of the violation, modification, or circumvention of the security enforcement provision. If instructed to do so, a third party operating the virtual private network is notified of the violation and access to the network by the network component is restricted or terminated.
    Type: Application
    Filed: June 10, 2002
    Publication date: December 11, 2003
    Applicant: Axcelerant, Inc.
    Inventors: Robert Gordon Heintz, Jeffrey A. Christy