Patents by Inventor Paul Judge

Paul Judge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7693947
    Abstract: Systems and methods for graphically displaying messaging traffic flows by collecting messaging data, converting a portion of the messaging data to a geographical position and collecting statistics related to the messaging data for overlaying upon a geographical map.
    Type: Grant
    Filed: June 9, 2006
    Date of Patent: April 6, 2010
    Assignee: McAfee, Inc.
    Inventors: Paul Judge, Dmitri Alperovitch, Sven Krasser, Arasendran Sellakannu, Lamar Lorenzo Willis
  • Publication number: 20090122699
    Abstract: Methods and systems for operation upon one or more data processors for prioritizing transmission among a plurality of data streams based upon a classification associated with the data packets associated with each of the plurality of data streams, respectively. Systems and methods can operate to allocate bandwidth to priority data streams first and recursively allocate remaining bandwidth to lesser priority data streams based upon the priority associated with those respective lesser priority data streams.
    Type: Application
    Filed: November 8, 2007
    Publication date: May 14, 2009
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Paula Greve, Paul Judge, Sven Krasser, Phyllis Adele Schneck
  • Publication number: 20090125980
    Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity.
    Type: Application
    Filed: November 9, 2007
    Publication date: May 14, 2009
    Applicant: Secure Computing Corporation
    Inventors: Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Adele Schneck
  • Patent number: 7519994
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.
    Type: Grant
    Filed: July 11, 2006
    Date of Patent: April 14, 2009
    Assignee: Secure Computing Corporation
    Inventors: Paul Judge, Guru Rajan
  • Patent number: 7458098
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication related to an application is received and stored. One or more risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The risk profile is analyzed with respect to data associated with previously received communications to determine if the received communication is anomalous. If the received communication is determined to be anomalous, an anomaly indicator signal is output.
    Type: Grant
    Filed: March 8, 2002
    Date of Patent: November 25, 2008
    Assignee: Secure Computing Corporation
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20080175226
    Abstract: Methods and systems for operation upon one or more data processors for throttling connections based upon reputation of the entity requesting connection.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Aarjav Jyotindra Neeta Trivedi, Weilai Yang
  • Publication number: 20080178259
    Abstract: Methods and systems for operation upon one or more data processors for efficiently processing communications based upon reputation of an entity associated with the communication.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Sven Krasser, Paul Judge, Lamar Lorenzo Willis
  • Publication number: 20080177691
    Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Yuchun Tang, Jonathan Alexander Zdziarski
  • Publication number: 20080175266
    Abstract: Methods and systems for assigning reputation to communications entities include collecting communications data from distributed agents, aggregating the communications data, analyzing the communications data and identifying relationships between communications entities based upon the communications data.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Adele Schneck, Martin Stecher, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
  • Publication number: 20080178288
    Abstract: Methods and systems for operation upon one or more data processors for detecting image spam by detecting an image and analyzing the content of the image to determine whether the incoming communication comprises an unwanted communication.
    Type: Application
    Filed: January 24, 2007
    Publication date: July 24, 2008
    Applicant: Secure Computing Corporation
    Inventors: Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
  • Publication number: 20070300286
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Application
    Filed: May 29, 2007
    Publication date: December 27, 2007
    Applicant: Secure Computing Corporation
    Inventor: Paul Judge
  • Publication number: 20070195753
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. A communication transmitted over a communications network is received and tested by a collection engine to generate data associated with the received communication. An analysis engine analyzes the data generated by the collection engine along with data associated with previously received communications to whether an anomaly exists. If an anomaly exists with respect to the received communication, an action engine initiates a predetermined response.
    Type: Application
    Filed: July 11, 2006
    Publication date: August 23, 2007
    Applicant: CIPHERTRUST, INC.
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20070195779
    Abstract: Methods and systems for operation upon one or more data processors to filter communications of users in accordance with content-based policy.
    Type: Application
    Filed: May 15, 2006
    Publication date: August 23, 2007
    Applicant: CIPHERTRUST, INC.
    Inventors: Paul Judge, Phyllis Schneck, Weilai Yang, Jonathan Zdziarski
  • Publication number: 20070130350
    Abstract: Methods and systems for operation upon one or more data processors for assigning reputation to web-based entities based upon previously collected data.
    Type: Application
    Filed: January 24, 2007
    Publication date: June 7, 2007
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Tomo Foote-Lennox, Paula Greve, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Jonathan Zdziarski
  • Publication number: 20070130351
    Abstract: Methods and systems for operation upon one or more data processors for aggregating reputation data from dispersed reputation engines and deriving global reputation information for use in handling received communications.
    Type: Application
    Filed: January 24, 2007
    Publication date: June 7, 2007
    Applicant: SECURE COMPUTING CORPORATION
    Inventors: Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, Phyllis Schneck
  • Patent number: 7225466
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Grant
    Filed: March 24, 2006
    Date of Patent: May 29, 2007
    Assignee: Secure Computing Corporation
    Inventor: Paul Judge
  • Patent number: 7213260
    Abstract: The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communication and compare extracted attributes to information stored in a system data store. In processing the communication, the system processor may assign a confidence level) a trust level, or other indicia of content. The results of that processing, analysis, and comparison can be propagated to one or more upstream computers in the path from the communication's origin to its destination. Such one or more upstream computers are identified from within the content of the communication, the header of the communication and/or the transfer protocol interactions in receiving the communication. The identified computers are authenticated to limit forgery.
    Type: Grant
    Filed: February 24, 2003
    Date of Patent: May 1, 2007
    Assignee: Secure Computing Corporation
    Inventor: Paul Judge
  • Publication number: 20070027992
    Abstract: Systems and methods for providing message reputation to an end user.
    Type: Application
    Filed: June 9, 2006
    Publication date: February 1, 2007
    Applicant: CIPHERTRUST, INC.
    Inventors: Paul Judge, Dmitri Alperovitch, Joel Caracciolo, Alejandro Hernandez, Sven Krasser, Phyllis Schneck
  • Publication number: 20060267802
    Abstract: Systems and methods for graphically displaying messaging traffic flows by collecting messaging data, converting a portion of the messaging data to a geographical position and collecting statistics related to the messaging data for overlaying upon a geographical map.
    Type: Application
    Filed: June 9, 2006
    Publication date: November 30, 2006
    Applicant: CIPHERTRUST, INC.
    Inventors: Paul Judge, Dmitri Alperovitch, Sven Krasser, Arasendran Sellakannu, Lamar Willis
  • Publication number: 20060265747
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical term. Features are extracted from the reduced threat information; these features in conjuntion with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Application
    Filed: July 12, 2006
    Publication date: November 23, 2006
    Applicant: CIPHERTRUST, INC.
    Inventor: Paul Judge