Patents by Inventor Letitia K. Calvert

Letitia K. Calvert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9749350
    Abstract: A method and system. All Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports on a gateway computer at a network perimeter of a network are scanned to determine whether an unauthorized application outside the network perimeter and/or at least one unauthorized service from the unauthorized application is available within the network perimeter via the gateway computer. Penetration tests are executed on the gateway computer to attempt to exploit a vulnerability of the gateway computer as revealed by scanning the ports on the gateway computer. A first component associated with a first respective connection to the network is identified. It is determined that the first component complies with a corresponding industry benchmark for security. A second component associated with a second respective connection to the network is identified. It is determined that the second component complies with a corresponding security policy of a company associated with the network.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: August 29, 2017
    Assignee: International Business Machines Corporation
    Inventors: W. Carey Bunn, Letitia K. Calvert, Mary E. Karnes
  • Publication number: 20170026403
    Abstract: A method and system. All Transmission Control Protocol (TOP) and User Datagram Protocol (UDP) ports on a gateway computer at a network perimeter of a network are scanned to determine whether an unauthorized application outside the network perimeter and/or at least one unauthorized service from the unauthorized application is available within the network perimeter via the gateway computer. Penetration tests are executed on the gateway computer to attempt to exploit a vulnerability of the gateway computer as revealed by scanning the ports on the gateway computer. A first component associated with a first respective connection to the network is identified. It is determined that the first component complies with a corresponding industry benchmark for security. A second component associated with a second respective connection to the network is identified. It is determined that the second component complies with a corresponding security policy of a company associated with the network.
    Type: Application
    Filed: October 10, 2016
    Publication date: January 26, 2017
    Inventors: W. Carey Bunn, Letitia K. Calvert, Mary E. Karnes
  • Patent number: 9503479
    Abstract: A method and system for assessing security of a network perimeter of a network. Security of an authentication computer from attack is reviewed. Users outside of the network perimeter that request access to an application within the network perimeter are authenticated. Vulnerability of a gateway computer at the network perimeter from applications outside of the network perimeter is reviewed. The reviewing of vulnerability of the gateway computer includes scanning ports on the gateway computer to determine whether an unauthorized application outside the network perimeter and/or at least one unauthorized service from the unauthorized application is available within the network perimeter via the gateway computer.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: November 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: W. Carey Bunn, Letitia K. Calvert, Mary E. Karnes
  • Publication number: 20150195308
    Abstract: A method and system for assessing security of a network perimeter of a network. Security of an authentication computer from attack is reviewed. Users outside of the network perimeter that request access to an application within the network perimeter are authenticated. Vulnerability of a gateway computer at the network perimeter from applications outside of the network perimeter is reviewed. The reviewing of vulnerability of the gateway computer includes scanning ports on the gateway computer to determine whether an unauthorized application outside the network perimeter and/or at least one unauthorized service from the unauthorized application is available within the network perimeter via the gateway computer.
    Type: Application
    Filed: March 23, 2015
    Publication date: July 9, 2015
    Inventors: W. Carey Bunn, Letitia K. Calvert, Mary E. Karnes
  • Patent number: 9071646
    Abstract: A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security review of a network perimeter architecture is performed along with a review of the security of data processing devices that transfer data across the perimeter of the network, a review of the security of applications that transfer data across said perimeter and a review of the vulnerability of applications or data processing devices within said perimeter from computers or users outside of said perimeter. Each of the reviews may be performed by comparison to a security policy of an enterprise that owns or controls the network.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: June 30, 2015
    Assignee: International Business Machines Corporation
    Inventors: W. Carey Bunn, Letitia K Calvert, Mary E Karnes
  • Publication number: 20140013386
    Abstract: A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security review of a network perimeter architecture is performed along with a review of the security of data processing devices that transfer data across the perimeter of the network, a review of the security of applications that transfer data across said perimeter and a review of the vulnerability of applications or data processing devices within said perimeter from computers or users outside of said perimeter. Each of the reviews may be performed by comparison to a security policy of an enterprise that owns or controls the network.
    Type: Application
    Filed: September 13, 2013
    Publication date: January 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: W. CAREY BUNN, LETITIA K. CALVERT, MARY E. KARNES
  • Patent number: 8561154
    Abstract: A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security review of a network perimeter architecture is performed along with a review of the security of data processing devices that transfer data across the perimeter of the network, a review of the security of applications that transfer data across said perimeter and a review of the vulnerability of applications or data processing devices within said perimeter from computers or users outside of said perimeter. Each of the reviews may be performed by comparison to a security policy of an enterprise that owns or controls the network.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: W. Carey Bunn, Letitia K. Calvert, Mary E. Karnes