Patents by Inventor John Jerrim

John Jerrim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10547674
    Abstract: A system and method comprising: receiving network flow data; identifying a peer to peer network flow within the network flow data comparing the peer to peer network flow to a known peer to peer application flow; labeling the peer to peer network flow as the known peer to peer application flow when the peer to peer network flow matches the known peer to peer application flow; and creating a data set to be associated with the labeled peer to flow.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: January 28, 2020
    Assignee: Help/Systems, LLC
    Inventor: John Jerrim
  • Publication number: 20140059216
    Abstract: A system and method comprising: receiving network flow data; identifying a peer to peer network flow within the network flow data comparing the peer to peer network flow to a known peer to peer application flow; labeling the peer to peer network flow as the known peer to peer application flow when the peer to peer network flow matches the known peer to peer application flow; and creating a data set to be associated with the labeled peer to flow.
    Type: Application
    Filed: August 26, 2013
    Publication date: February 27, 2014
    Applicant: DAMBALLA, INC.
    Inventor: JOHN JERRIM
  • Patent number: 7895326
    Abstract: A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services. An alarm or other appropriate action is taken upon the detection of unauthorized network usage.
    Type: Grant
    Filed: December 1, 2009
    Date of Patent: February 22, 2011
    Assignee: Lancope, Inc.
    Inventors: John Jerrim, John A. Copeland, III
  • Publication number: 20100138535
    Abstract: A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services.
    Type: Application
    Filed: December 1, 2009
    Publication date: June 3, 2010
    Applicant: LANCOPE, INC.
    Inventors: John Jerrim, John A. Copeland, III
  • Patent number: 7644151
    Abstract: A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services. An alarm or other appropriate action is taken upon the detection of unauthorized network usage.
    Type: Grant
    Filed: March 25, 2002
    Date of Patent: January 5, 2010
    Assignee: Lancope, Inc.
    Inventors: John Jerrim, John A. Copeland
  • Patent number: 7512980
    Abstract: A flow-based intrusion detection system for detecting intrusions in computer communication networks. Data packets representing communications between hosts in a computer-to-computer communication network are processed and assigned to various client/server flows. Statistics are collected for each flow. Then, the flow statistics are analyzed to determine if the flow appears to be legitimate traffic or possible suspicious activity. A concern index value is assigned to each flow that appears suspicious. By assigning a value to each flow that appears suspicious and adding that value to the total concern index of the responsible host, it is possible to identify hosts that are engaged in intrusion activity. When the concern index value of a host exceeds a preset alarm value, an alert is issued and appropriate action can be taken.
    Type: Grant
    Filed: May 26, 2005
    Date of Patent: March 31, 2009
    Assignee: Lancope, Inc.
    Inventors: John A. Copeland, John Jerrim
  • Publication number: 20050210533
    Abstract: A flow-based intrusion detection system for detecting intrusions in computer communication networks. Data packets representing communications between hosts in a computer-to-computer communication network are processed and assigned to various client/server flows. Statistics are collected for each flow. Then, the flow statistics are analyzed to determine if the flow appears to be legitimate traffic or possible suspicious activity. A concern index value is assigned to each flow that appears suspicious. By assigning a value to each flow that appears suspicious and adding that value to the total concern index of the responsible host, it is possible to identify hosts that are engaged in intrusion activity. When the concern index value of a host exceeds a preset alarm value, an alert is issued and appropriate action can be taken.
    Type: Application
    Filed: May 26, 2005
    Publication date: September 22, 2005
    Inventors: John Copeland, John Jerrim
  • Publication number: 20040088571
    Abstract: A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services. An alarm or other appropriate action is taken upon the detection of unauthorized network usage.
    Type: Application
    Filed: March 25, 2002
    Publication date: May 6, 2004
    Inventors: John Jerrim, John A. Copeland