Patents by Inventor Junaid Islam

Junaid Islam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9648044
    Abstract: A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system determines whether the client system is authorized to connect to the requested applications and resources. In response to determining the client system has authorization to connect to the requested applications and resources, the trust broker system determines, from a plurality of potential proxy servers, a proxy server associated with the requested server system and transmits an identification value for the client system to the requested server system. The trust broker system then transmits the identification value to the client system and transmits contact information for the determined proxy server to the client system, wherein all communication between the client system and the requested server system passes through the proxy server.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: May 9, 2017
    Assignee: VIDDER, INC.
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Patent number: 9398050
    Abstract: A method for connecting to a trust broker system is disclosed. The method is performed on a client device having one or more processors and memory storing one or more programs for execution by the one or more processors. The client device connects to a trust broker system upon start-up of the device, wherein the device is not enabled to connect to any other system. The client device transmits information identifying the electronic device to the trust broker system. The client device receives, from the trust broker, information that enables the client device to connect to a server system, wherein the trust broker determines the appropriate server system based on the client device. The client device downloads, from the server system, further instructions for performing the one or more tasks associated with the client device; wherein the downloaded instructions are only retained for the current session.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: July 19, 2016
    Assignee: VIDDER, INC.
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20160142415
    Abstract: A method for protecting application servers from network-based attacks and verifying the security posture of end client systems is disclosed. A trust broker system receives a request from a user agent associated with a client system remote from the trust broker to connect to applications and resources associated with the trust broker. The trust broker system verifies the integrity of the client system and verifies the identity of a user of the client system. The trust broker system then determines the access level permitted to the identified user and based on the access level. The trust broker system establishes a connection with the user agent and transmits session information to the server system. The trust broker system sends the user agent connection information, wherein the connection information enables the requesting user agent to connect to the requested server system.
    Type: Application
    Filed: January 25, 2016
    Publication date: May 19, 2016
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Patent number: 9282120
    Abstract: A method for protecting application servers from network-based attacks and verifying the security posture of end client systems is disclosed. A trust broker system receives a request from a user agent associated with a client system remote from the trust broker to connect to applications and resources associated with the trust broker. The trust broker system verifies the integrity of the client system and verifies the identity of a user of the client system. The trust broker system then determines the access level permitted to the identified user and based on the access level. The trust broker system establishes a connection with the user agent and transmits session information to the server system. The trust broker system sends the user agent connection information, wherein the connection information enables the requesting user agent to connect to the requested server system.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: March 8, 2016
    Assignee: VIDDER, INC.
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20160028694
    Abstract: A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system determines whether the client system is authorized to connect to the requested applications and resources. In response to determining the client system has authorization to connect to the requested applications and resources, the trust broker system determines, from a plurality of potential proxy servers, a proxy server associated with the requested server system and transmits an identification value for the client system to the requested server system. The trust broker system then transmits the identification value to the client system and transmits contact information for the determined proxy server to the client system, wherein all communication between the client system and the requested server system passes through the proxy server.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 28, 2016
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Patent number: 9178924
    Abstract: A system allows first users to connect through an IPv4 web interface to access content (e.g., information and services) of second users who provide the content using IPv6. The second users are effectively mobile web servers. In an implementation, the system is a streaming media network (e.g., life casting) where first users are video viewers and second users are streaming video providers. In the system, a second user runs a home agent client (e.g., plug in) that connects to a home agent server using IPv6. The home agent client and server encapsulate and deencapsulate the IPv6 information. Information is transmitted and routed using IPv6 in an IPv4 environment. Any number of second users connects to the first user's content via an IPv4 web interface.
    Type: Grant
    Filed: January 7, 2013
    Date of Patent: November 3, 2015
    Inventor: Junaid Islam
  • Patent number: 9172594
    Abstract: A system allows first users to connect through an IPv4 web interface to access content (e.g., information and services) of second users who provide the content using IPv6. The second users are effectively mobile web servers. In an implementation, the system is a streaming media network (e.g., lifecasting) where first users are video viewers and second users are streaming video providers. In the system, a second user runs a home agent client (e.g., plug in) that connects to a home agent server using IPv6. The home agent client and server encapsulate and deencapsulate the IPv6 information. Information is transmitted and routed using IPv6 in an IPv4 environment. Any number of second users connect to the first user's content via an IPv4 web interface.
    Type: Grant
    Filed: January 7, 2013
    Date of Patent: October 27, 2015
    Inventor: Junaid Islam
  • Publication number: 20150237035
    Abstract: A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session. The electronic device creates a plurality of virtual domains; each virtual domain representing a set of services and information distinct from the other virtual domains. The electronic device stores permissions associated with each respective client system in the plurality of client system. The electronic device receives a request from a first client system, including encrypted identifying information associated with the first client system, for information associated with a first virtual domain and then retrieves stored permissions of the first client system based on the encrypted identifying information.
    Type: Application
    Filed: May 5, 2015
    Publication date: August 20, 2015
    Inventors: JUNAID ISLAM, BRENT BILGER, TED SCHROEDER
  • Patent number: 9065856
    Abstract: A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system determines whether the client system is authorized to connect to the requested applications and resources. In response to determining the client system has authorization to connect to the requested applications and resources, the trust broker system determines, from a plurality of potential proxy servers, a proxy server associated with the requested server system and transmits an identification value for the client system to the requested server system. The trust broker system then transmits the identification value to the client system and transmits contact information for the determined proxy server to the client system, wherein all communication between the client system and the requested server system passes through the proxy server.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: June 23, 2015
    Assignee: VIDDER, INC.
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Patent number: 9027086
    Abstract: A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session. The electronic device creates a plurality of virtual domains; each virtual domain representing a set of services and information distinct from the other virtual domains. The electronic device stores permissions associated with each respective client system in the plurality of client system. The electronic device receives a request from a first client system, including encrypted identifying information associated with the first client system, for information associated with a first virtual domain and then retrieves stored permissions of the first client system based on the encrypted identifying information.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: May 5, 2015
    Assignee: Vidder, Inc.
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Patent number: 8976963
    Abstract: Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software.
    Type: Grant
    Filed: October 5, 2010
    Date of Patent: March 10, 2015
    Inventors: Junaid Islam, John S. McFarlane, Carl Williams
  • Publication number: 20140223537
    Abstract: A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system determines whether the client system is authorized to connect to the requested applications and resources. In response to determining the client system has authorization to connect to the requested applications and resources, the trust broker system determines, from a plurality of potential proxy servers, a proxy server associated with the requested server system and transmits an identification value for the client system to the requested server system. The trust broker system then transmits the identification value to the client system and transmits contact information for the determined proxy server to the client system, wherein all communication between the client system and the requested server system passes through the proxy server.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20140222955
    Abstract: A method for connecting to a trust broker system is disclosed. The method is performed on a client device having one or more processors and memory storing one or more programs for execution by the one or more processors. The client device connects to a trust broker system upon start-up of the device, wherein the device is not enabled to connect to any other system. The client device transmits information identifying the electronic device to the trust broker system. The client device receives, from the trust broker, information that enables the client device to connect to a server system, wherein the trust broker determines the appropriate server system based on the client device. The client device downloads, from the server system, further instructions for performing the one or more tasks associated with the client device; wherein the downloaded instructions are only retained for the current session.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20140223513
    Abstract: A method for protecting application servers from network-based attacks and verifying the security posture of end client systems is disclosed. A trust broker system receives a request from a user agent associated with a client system remote from the trust broker to connect to applications and resources associated with the trust broker. The trust broker system verifies the integrity of the client system and verifies the identity of a user of the client system. The trust broker system then determines the access level permitted to the identified user and based on the access level. The trust broker system establishes a connection with the user agent and transmits session information to the server system. The trust broker system sends the user agent connection information, wherein the connection information enables the requesting user agent to connect to the requested server system.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20140223178
    Abstract: A method for securing communication over a network is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system receives a first encrypted user identifier from a trust broker system associated with the server system, the first encrypted user identifier including information identifying a user of a client system verified by the trust broker system. The server system receives a connection request packet from a first client system. The server system then receives a second encrypted user identifier from the first client system. The server system determines whether first encrypted user identifier matches the second encrypted user identifier. In accordance with a determination that the first encrypted user identifier matches the second encrypted user identifier, the server system establishes an encrypted connection with the first client system.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20140223515
    Abstract: A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session. The electronic device creates a plurality of virtual domains; each virtual domain representing a set of services and information distinct from the other virtual domains. The electronic device stores permissions associated with each respective client system in the plurality of client system. The electronic device receives a request from a first client system, including encrypted identifying information associated with the first client system, for information associated with a first virtual domain and then retrieves stored permissions of the first client system based on the encrypted identifying information.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Publication number: 20140223514
    Abstract: A method for validating a client system is disclosed. A trust broker system receives a request to connect to a server system from a previously authorized client system, wherein the client system has an associated user agent. The trust broker system determines the machine fingerprint associated with the client system, wherein the fingerprint is a digital value that represents all software installed on the client system. Based on the machine finger print, the trust broker determines whether the client system has software installed since the previous authorization. In accordance with a determination that the client system does have newly installed software, the trust broker system transmits instructions to evaluate the newly installed software and receives the results of the evaluation from the client system establishes an encrypted connection with the first client system.
    Type: Application
    Filed: March 11, 2013
    Publication date: August 7, 2014
    Inventors: Junaid Islam, Brent Bilger, Ted Schroeder
  • Patent number: 8719337
    Abstract: A system allows first users to connect through an IPv4 web interface to access content (e.g., information and services) of second users who provide the content using IPv6. The second users are effectively mobile web servers. In an implementation, the system is a streaming media network (e.g., lifecasting) where first users are video viewers and second users are streaming video providers. In the system, a second user runs a home agent client (e.g., plug in) that connects to a home agent server using IPv6. The home agent client and server encapsulate and deencapsulate the IPv6 information. Information is transmitted and routed using IPv6 in an IPv4 environment. Any number of second users connect to the first user's content via an IPv4 web interface.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: May 6, 2014
    Inventor: Junaid Islam
  • Publication number: 20110023105
    Abstract: Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software.
    Type: Application
    Filed: October 5, 2010
    Publication date: January 27, 2011
    Inventors: Junaid Islam, John S. McFarlane, Carl Williams
  • Patent number: 7810149
    Abstract: Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a seamless, disruption-free connectivity experience for mobile clients. Mobile clients are automatically connected to other mobile clients irrespective of their network connectively, whether wireless, wire line, IPv4, IPv6, public or private. Mobile clients communicate with other mobile clients using a secure, end-to-end IPv6 tunnel. This creates a persistent VPN connection between two clients using software.
    Type: Grant
    Filed: August 29, 2006
    Date of Patent: October 5, 2010
    Inventors: Junaid Islam, John S. McFarlane, Carl Williams