Patents by Inventor Keith Haycock

Keith Haycock has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7546629
    Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: June 9, 2009
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Anthony Albert, Kyle Kawamura, Keith Haycock, Conrad Herrmann
  • Patent number: 7222359
    Abstract: A system providing methodologies for automatically detecting when a computing device is plugged into a new network is described. The system includes methods for detecting a connection to a new network by receiving notice of, and evaluating, changes to an existing network configuration. The system profiles and generates an identity for the new network. This includes collecting information about the network to uniquely identify it and generating a unique identifier for the network. Once a network has been profiled, a user may decide whether or not to include it as part of a trusted zone. Alternatively, this decision may be guided by policy established by a system administrator or user. The system automatically reconfigures a firewall to include or exclude the network from the trusted zone based upon this decision. The profile of each network is stored so that the next time the device is connected to the same network it remembers the network and applies the same security settings previously adopted.
    Type: Grant
    Filed: November 14, 2001
    Date of Patent: May 22, 2007
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Gregor Freund, Keith Haycock, Conrad Hermann
  • Publication number: 20030177389
    Abstract: A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular network is determined from a plurality of available security policies available to the device. This current policy to apply to said device is generated by merging a plurality of security policies available for governing connections. After said current policy is applied to the device, the connection from the device to this particular network is allowed to proceed.
    Type: Application
    Filed: May 31, 2002
    Publication date: September 18, 2003
    Applicant: Zone Labs, Inc.
    Inventors: Anthony Albert, Kyle N. Kawamura, Keith A. Haycock, Conrad K. Herrmann
  • Publication number: 20030167405
    Abstract: A system providing methodologies for automatically detecting when a computing device is plugged into a new network is described. The system includes methods for detecting a connection to a new network by receiving notice of, and evaluating, changes to an existing network configuration. The system profiles and generates an identity for the new network. This includes collecting information about the network to uniquely identify it and generating a unique identifier for the network. Once a network has been profiled, a user may decide whether or not to include it as part of a trusted zone. Alternatively, this decision may be guided by policy established by a system administrator or user. The system automatically reconfigures a firewall to include or exclude the network from the trusted zone based upon this decision. The profile of each network is stored so that the next time the device is connected to the same network it remembers the network and applies the same security settings previously adopted.
    Type: Application
    Filed: November 14, 2001
    Publication date: September 4, 2003
    Inventors: Gregor Freund, Keith Haycock, Conrad Herrmann
  • Publication number: 20030055962
    Abstract: A computing environment with methods for monitoring access to an open network such as the Internet, is described. The system includes one or more client computers, each operating applications (e.g., Netscape Navigator or Microsoft Internet Explorer) requiring access to an open network, such as a WAN or the Internet, and a router or other equipment that serves a routing function (e.g., a cable modem) for the client computers. A centralized security enforcement module on the router maintains access rules for the client computers and verifies the existence and proper operation of a client-based security module on each client computer. The router-side security module periodically sends out a router challenge via Internet broadcast to the local computers on the network. If the client-side security module is installed and properly operating, the client-side security module responds to the router challenge. The responses received by the router-side security module are maintained in a table.
    Type: Application
    Filed: August 30, 2001
    Publication date: March 20, 2003
    Inventors: Gregor P. Freund, Keith A. Haycock, Conrad K. Herrmann