Patents by Inventor Joseph H. Levy

Joseph H. Levy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170078166
    Abstract: A non-transitory computer readable storage medium, comprising executable instructions to collect network traffic data, produce a Fourier signature from the network traffic data, associate the Fourier signature with a known pattern, collect new network traffic data, produce a new Fourier signature from the new network traffic data, compare the new Fourier signature with the Fourier signature to selectively identify a match and associate the new network traffic data with the known pattern upon a match.
    Type: Application
    Filed: November 3, 2016
    Publication date: March 16, 2017
    Inventors: Matthew S. Wood, Joseph H. Levy
  • Publication number: 20160344750
    Abstract: A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The specified network interactions are compared to normative values to produce a promiscuity score indicative of the risk of the client machine contracting malicious software. Depending upon the promiscuity score, prophylactic actions are optionally applied to the client machine.
    Type: Application
    Filed: August 3, 2016
    Publication date: November 24, 2016
    Inventors: Joseph H. Levy, Matthew S. Wood
  • Patent number: 9491070
    Abstract: A non-transitory computer readable storage medium, comprising executable instructions to collect network traffic data, produce a Fourier signature from the network traffic data, associate the Fourier signature with a known pattern, collect new network traffic data, produce a new Fourier signature from the new network traffic data, compare the new Fourier signature with the Fourier signature to selectively identify a match and associate the new network traffic data with the known pattern upon a match.
    Type: Grant
    Filed: April 12, 2013
    Date of Patent: November 8, 2016
    Assignee: Symantec Corporation
    Inventors: Matthew S. Wood, Joseph H. Levy
  • Patent number: 9419990
    Abstract: A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The specified network interactions are compared to normative values to produce a promiscuity score indicative of the risk of the client machine contracting malicious software. Depending upon the promiscuity score, prophylactic actions are optionally applied to the client machine.
    Type: Grant
    Filed: January 30, 2013
    Date of Patent: August 16, 2016
    Assignee: Blue Coat Systems, Inc.
    Inventors: Joseph H. Levy, Matthew S. Wood
  • Publication number: 20150372983
    Abstract: A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
    Type: Application
    Filed: July 28, 2015
    Publication date: December 24, 2015
    Inventors: John E. Gmuender, Huy Minh Nguyen, Joseph H. Levy, Michael B. Massing, Zhong Chen, David M. Telehowski
  • Patent number: 9094365
    Abstract: A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
    Type: Grant
    Filed: March 25, 2013
    Date of Patent: July 28, 2015
    Assignee: Dell Software Inc.
    Inventors: John E. Gmuender, Huy Minh Nguyen, Joseph H. Levy, Michael B. Massing, Zhong Chen, David M. Telehowski
  • Patent number: 8849991
    Abstract: HTTP layered reconstruction is disclosed. A database is queried to identify a location of a previously reconstructed HTML artifact file or packet data of a HTML file in a repository that stores packet data captured from a network. The reconstructed HTML file is analyzed. Links to external files are identified and the database is queried to identify a location of previously reconstructed artifact files or packet data of associated external files. The external files are reconstructed, as needed. A web page is then reconstructed based on the reconstructed HTML file and reconstructed external files, presenting a view of the web page as it originally appeared to a user. A user may specify which external file types to include and/or not include. New versions of external files may be obtained and indicated in the reconstructed web page when associated artifact files or packet data are not stored within the repository.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: September 30, 2014
    Assignee: Blue Coat Systems, Inc.
    Inventors: Joseph H. Levy, Matthew Scott Wood, Daniel Arnold, Kenny Foisy, Dave Tubbs
  • Publication number: 20140215615
    Abstract: A non-transitory computer readable storage medium includes executable instructions to identify specified network interactions initiated by a client machine. The specified network interactions are compared to normative values to produce a promiscuity score indicative of the risk of the client machine contracting malicious software. Depending upon the promiscuity score, prophylactic actions are optionally applied to the client machine.
    Type: Application
    Filed: January 30, 2013
    Publication date: July 31, 2014
    Applicant: SOLERA NETWORKS, INC.
    Inventors: Joseph H. Levy, Matthew S. Wood
  • Patent number: 8666985
    Abstract: An indexing database utilizes a non-transitory storage medium. A pattern matching processing unit generates preclassification data for the network data packets utilizing pattern matching analysis. At least one processing unit implements a storage process that receives the network data packets, stores the network data packets in at least one of the slots, and transfers the network data packets to a packet capture repository when slots in a shared memory are full. A preclassification process requests from the pattern matching processing unit the preclassification data. An indexing process determines, based upon the preclassification data, whether to invoke or omit additional analysis of the network data packets, and performs at least one of aggregation, classification, or annotation of the network data packets in the shared memory to maintain one or more indices in the indexing database.
    Type: Grant
    Filed: March 15, 2012
    Date of Patent: March 4, 2014
    Assignee: Solera Networks, Inc.
    Inventors: Matthew S. Wood, Joseph H. Levy, McKay Marston
  • Publication number: 20130227070
    Abstract: A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
    Type: Application
    Filed: March 25, 2013
    Publication date: August 29, 2013
    Inventors: John E. Gmuender, Huy Minh Nguyen, Joseph H. Levy, Michael B. Massing, Zhong Chen, David M. Telehowski
  • Patent number: 8521732
    Abstract: A system and method of presentation of an extracted artifact based on an indexing technique are disclosed. In an embodiment, the method includes indexing a database of a captured network characteristic data using a processor and a memory to form an indexed capture data. The method includes enhancing a query response time with the indexed capture data. The method further includes searching the indexed capture data to generate a capture query result. The capture query result includes an extracted artifact. The method also includes graphically presenting the capture query result as at least one of an artifact list and an artifact image.
    Type: Grant
    Filed: May 25, 2009
    Date of Patent: August 27, 2013
    Assignee: Solera Networks, Inc.
    Inventors: Matthew Scott Wood, Paal Tveit, Brian Edginton, Steve Shillingford, James Brown, Joseph H Levy, Daniel M Arnold
  • Patent number: 8429301
    Abstract: A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: April 23, 2013
    Assignee: eWinWin, Inc.
    Inventors: John E. Gmuender, Huy Minh Nguyen, Joseph H. Levy, Michael B. Massing, Zhong Chen, David M. Telehowski
  • Publication number: 20120239652
    Abstract: An indexing database utilizes a non-transitory storage medium. A pattern matching processing unit generates preclassification data for the network data packets utilizing pattern matching analysis. At least one processing unit implements a storage process that receives the network data packets, stores the network data packets in at least one of the slots, and transfers the network data packets to a packet capture repository when slots in a shared memory are full. A preclassification process requests from the pattern matching processing unit the preclassification data. An indexing process determines, based upon the preclassification data, whether to invoke or omit additional analysis of the network data packets, and performs at least one of aggregation, classification, or annotation of the network data packets in the shared memory to maintain one or more indices in the indexing database.
    Type: Application
    Filed: March 15, 2012
    Publication date: September 20, 2012
    Applicant: SOLERA NETWORKS, INC.
    Inventors: Matthew S. Wood, Joseph H. Levy, McKay Marston
  • Publication number: 20120158737
    Abstract: HTTP layered reconstruction is disclosed. A database is queried to identify a location of a previously reconstructed HTML artifact file or packet data of a HTML file in a repository that stores packet data captured from a network. The reconstructed HTML file is analyzed. Links to external files are identified and the database is queried to identify a location of previously reconstructed artifact files or packet data of associated external files. The external files are reconstructed, as needed. A web page is then reconstructed based on the reconstructed HTML file and reconstructed external files, presenting a view of the web page as it originally appeared to a user. A user may specify which external file types to include and/or not include. New versions of external files may be obtained and indicated in the reconstructed web page when associated artifact files or packet data are not stored within the repository.
    Type: Application
    Filed: December 15, 2010
    Publication date: June 21, 2012
    Applicant: SOLERA NETWORKS, INC.
    Inventors: Joseph H. Levy, Matthew Scott Wood, Daniel Arnold, Kenny Foisy, Dave Tubbs
  • Patent number: 8074259
    Abstract: An authentication mark-up data of multiple local area networks is disclosed. In one embodiment of a system, the system includes a wide area network, an update device coupled to the wide area network, and any number of gateway devices coupled to the wide area network. Each of the gateway devices is associated with a separate local area network. Each of the plurality of gateway devices automatically provide an authentication page stored in the update device based upon a data provided to the update device. In addition, the authentication page is the same for at least some of the plurality of gateway devices, according to the one embodiment.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: December 6, 2011
    Assignee: SonicWall, Inc.
    Inventors: Joseph H. Levy, Shannon L. Johnson, David M. Telehowski, Zhong Chen
  • Patent number: 8004998
    Abstract: Methods and a system of capture and regeneration of a network data using a virtual software switch are disclosed. In an embodiment, a method includes capturing a network data using a virtual software switch, a processor, and a memory. The network data is captured to perform a network visibility analysis and the network data is communicated to at least one port of the virtual software switch. The method includes forming a stored network data in a memory. The method also includes regenerating the stored network data to form a reconstructed data.
    Type: Grant
    Filed: May 25, 2009
    Date of Patent: August 23, 2011
    Assignee: Solera Networks, Inc.
    Inventors: Joseph H Levy, Matthew Scott Wood, Paal Tveit, Brian Edginton, Steve Shillingford, James Brown
  • Patent number: 7996894
    Abstract: A method is disclosed for providing security to a client-to-client communication. The method includes authenticating a first client and a second client with an access point device, transmitting the packet to the security device and modifying a destination media access control (MAC) address of a packet from the first client to a MAC address of a security device for a first network. The packet contains a destination internet protocol (IP) address of the second client. The access point device and the first and second clients belong to the first network. The security device is located between the first network and a second network.
    Type: Grant
    Filed: February 15, 2005
    Date of Patent: August 9, 2011
    Assignee: Sonicwall, Inc.
    Inventors: Zhong Chen, Joseph H. Levy, David M. Telehowski, Jin Shang
  • Publication number: 20110125748
    Abstract: Methods and a system of method and apparatus for real time identification and recording of artifacts are disclosed. In one embodiment, a method of network database maintenance includes designating a network packet data to be stored in one of a packet capture repository and a file system resident database to indicate an artifact type, a protocol type, an application, a user-definable attribute, and a temporal session duration based on a real-time packet inspection. The method includes grouping the designated packet data in a database including packet data having a similar one of the artifact type, the protocol type, the application, the user-definable attribute and the temporal session duration. In addition, the method of network database maintenance includes indexing the database to point to a memory location of the designated packet data grouped in the database in the packet capture repository.
    Type: Application
    Filed: November 15, 2010
    Publication date: May 26, 2011
    Applicant: Solera Networks, Inc.
    Inventors: Matthew S. Wood, Joseph H. Levy, Paal Tveit
  • Publication number: 20110125749
    Abstract: Storing and indexing of high-speed network traffic data is disclosed. In one embodiment, a method of network database maintenance includes sequentially recording in real-time packet header and/or packet content attributes derived from network packets captured and stored in one of a packet capture repository and a file system in database units ordered by arrival of the network packet data. In addition, the method includes indexing each database unit to point to a memory location of the network packet data in one of the packet capture repository and the file system. The method also includes computing a hash value on certain input data and creating index bitmaps on each database unit to facilitate grouping of a similar attributes associated with the network packet data recorded in the database units. The resulting data may then be stored in compressed and/or encrypted formats on a file system for efficiency and security.
    Type: Application
    Filed: November 15, 2010
    Publication date: May 26, 2011
    Applicant: Solera Networks, Inc.
    Inventors: Matthew S. Wood, Joseph H. Levy, Paal Tveit
  • Publication number: 20100235543
    Abstract: A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
    Type: Application
    Filed: May 21, 2010
    Publication date: September 16, 2010
    Inventors: John E. Gmuender, Huy Minh Nguyen, Joseph H. Levy, Michael B. Massing, Zhong Chen, David M. Telehowski