Patents by Inventor Mary Karnes

Mary Karnes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8701177
    Abstract: A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port number pointing toward the network is displayed to indicate that a communication is permitted to the port. The port number and the arrow are located between an icon for the network and an icon for the firewall. A port number of a destination of a communication originating from the network is displayed. Also, another arrow adjacent to the destination port number pointing toward the firewall is displayed to indicate that a communication is permitted to the destination port number. The destination port number and the other arrow are located between an icon for the network and an icon for the firewall.
    Type: Grant
    Filed: March 26, 2012
    Date of Patent: April 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Brooke Madsen Anderson, Wiliam C. Bunn, Mary Karnes, Sarah M. Lieberman, Mira E. Wilczek
  • Publication number: 20120216270
    Abstract: A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port number pointing toward the network is displayed to indicate that a communication is permitted to the port. The port number and the arrow are located between an icon for the network and an icon for the firewall. A port number of a destination of a communication originating from the network is displayed. Also, another arrow adjacent to the destination port number pointing toward the firewall is displayed to indicate that a communication is permitted to the destination port number. The destination port number and the other arrow are located between an icon for the network and an icon for the firewall.
    Type: Application
    Filed: March 26, 2012
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brooke Madsen Anderson, Wiliam C. Bunn, Mary Karnes, Sarah M. Lieberman, Mira E. Wilczek
  • Publication number: 20060041936
    Abstract: A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port number pointing toward the network is displayed to indicate that a communication is permitted to the port. The port number and the arrow are located between an icon for the network and an icon for the firewall. A port number of a destination of a communication originating from the network is displayed. Also, another arrow adjacent to the destination port number pointing toward the firewall is displayed to indicate that a communication is permitted to the destination port number. The destination port number and the other arrow are located between an icon for the network and an icon for the firewall. A table including definitions of a plurality of rules is generated and displayed. Each of the definitions includes entries for a source IP address and destination IP address of a permitted but vulnerable data flow.
    Type: Application
    Filed: August 19, 2004
    Publication date: February 23, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Brooke Anderson, William Bunn, Mary Karnes, Sarah Lieberman, Mira Wilczek
  • Publication number: 20050177746
    Abstract: A method for providing network perimeter security assessment that involves a combination of perimeter security assessment disciplines is disclosed. A security review of a network perimeter architecture is performed along with a review of the security of data processing devices that transfer data across the perimeter of the network, a review of the security of applications that transfer data across said perimeter and a review of the vulnerability of applications or data processing devices within said perimeter from computers or users outside of said perimeter. Each of the reviews may be performed by comparison to a security policy of an enterprise that owns or controls the network.
    Type: Application
    Filed: December 22, 2003
    Publication date: August 11, 2005
    Inventors: W. Bunn, Letitia Calvert, Mary Karnes