Patents by Inventor Paul Judge
Paul Judge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7693947Abstract: Systems and methods for graphically displaying messaging traffic flows by collecting messaging data, converting a portion of the messaging data to a geographical position and collecting statistics related to the messaging data for overlaying upon a geographical map.Type: GrantFiled: June 9, 2006Date of Patent: April 6, 2010Assignee: McAfee, Inc.Inventors: Paul Judge, Dmitri Alperovitch, Sven Krasser, Arasendran Sellakannu, Lamar Lorenzo Willis
-
Publication number: 20090122699Abstract: Methods and systems for operation upon one or more data processors for prioritizing transmission among a plurality of data streams based upon a classification associated with the data packets associated with each of the plurality of data streams, respectively. Systems and methods can operate to allocate bandwidth to priority data streams first and recursively allocate remaining bandwidth to lesser priority data streams based upon the priority associated with those respective lesser priority data streams.Type: ApplicationFiled: November 8, 2007Publication date: May 14, 2009Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Paula Greve, Paul Judge, Sven Krasser, Phyllis Adele Schneck
-
Publication number: 20090125980Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity.Type: ApplicationFiled: November 9, 2007Publication date: May 14, 2009Applicant: Secure Computing CorporationInventors: Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Adele Schneck
-
Patent number: 7519994Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.Type: GrantFiled: July 11, 2006Date of Patent: April 14, 2009Assignee: Secure Computing CorporationInventors: Paul Judge, Guru Rajan
-
Patent number: 7458098Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication related to an application is received and stored. One or more risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The risk profile is analyzed with respect to data associated with previously received communications to determine if the received communication is anomalous. If the received communication is determined to be anomalous, an anomaly indicator signal is output.Type: GrantFiled: March 8, 2002Date of Patent: November 25, 2008Assignee: Secure Computing CorporationInventors: Paul Judge, Guru Rajan
-
Publication number: 20080175226Abstract: Methods and systems for operation upon one or more data processors for throttling connections based upon reputation of the entity requesting connection.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Aarjav Jyotindra Neeta Trivedi, Weilai Yang
-
Publication number: 20080178259Abstract: Methods and systems for operation upon one or more data processors for efficiently processing communications based upon reputation of an entity associated with the communication.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Sven Krasser, Paul Judge, Lamar Lorenzo Willis
-
Publication number: 20080177691Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity by analyzing the attributes of the entity, correlating the attributes with known attributes to define relationships between entities sharing attributes, and attributing a portion of the reputation of one related entity to the reputation of the other related entity.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Yuchun Tang, Jonathan Alexander Zdziarski
-
Publication number: 20080175266Abstract: Methods and systems for assigning reputation to communications entities include collecting communications data from distributed agents, aggregating the communications data, analyzing the communications data and identifying relationships between communications entities based upon the communications data.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Adele Schneck, Martin Stecher, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
-
Publication number: 20080178288Abstract: Methods and systems for operation upon one or more data processors for detecting image spam by detecting an image and analyzing the content of the image to determine whether the incoming communication comprises an unwanted communication.Type: ApplicationFiled: January 24, 2007Publication date: July 24, 2008Applicant: Secure Computing CorporationInventors: Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Adele Schneck, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
-
Publication number: 20070300286Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.Type: ApplicationFiled: May 29, 2007Publication date: December 27, 2007Applicant: Secure Computing CorporationInventor: Paul Judge
-
Publication number: 20070195753Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. A communication transmitted over a communications network is received and tested by a collection engine to generate data associated with the received communication. An analysis engine analyzes the data generated by the collection engine along with data associated with previously received communications to whether an anomaly exists. If an anomaly exists with respect to the received communication, an action engine initiates a predetermined response.Type: ApplicationFiled: July 11, 2006Publication date: August 23, 2007Applicant: CIPHERTRUST, INC.Inventors: Paul Judge, Guru Rajan
-
Publication number: 20070195779Abstract: Methods and systems for operation upon one or more data processors to filter communications of users in accordance with content-based policy.Type: ApplicationFiled: May 15, 2006Publication date: August 23, 2007Applicant: CIPHERTRUST, INC.Inventors: Paul Judge, Phyllis Schneck, Weilai Yang, Jonathan Zdziarski
-
Publication number: 20070130350Abstract: Methods and systems for operation upon one or more data processors for assigning reputation to web-based entities based upon previously collected data.Type: ApplicationFiled: January 24, 2007Publication date: June 7, 2007Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Tomo Foote-Lennox, Paula Greve, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Jonathan Zdziarski
-
Publication number: 20070130351Abstract: Methods and systems for operation upon one or more data processors for aggregating reputation data from dispersed reputation engines and deriving global reputation information for use in handling received communications.Type: ApplicationFiled: January 24, 2007Publication date: June 7, 2007Applicant: SECURE COMPUTING CORPORATIONInventors: Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, Phyllis Schneck
-
Patent number: 7225466Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.Type: GrantFiled: March 24, 2006Date of Patent: May 29, 2007Assignee: Secure Computing CorporationInventor: Paul Judge
-
Patent number: 7213260Abstract: The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communication and compare extracted attributes to information stored in a system data store. In processing the communication, the system processor may assign a confidence level) a trust level, or other indicia of content. The results of that processing, analysis, and comparison can be propagated to one or more upstream computers in the path from the communication's origin to its destination. Such one or more upstream computers are identified from within the content of the communication, the header of the communication and/or the transfer protocol interactions in receiving the communication. The identified computers are authenticated to limit forgery.Type: GrantFiled: February 24, 2003Date of Patent: May 1, 2007Assignee: Secure Computing CorporationInventor: Paul Judge
-
Publication number: 20070027992Abstract: Systems and methods for providing message reputation to an end user.Type: ApplicationFiled: June 9, 2006Publication date: February 1, 2007Applicant: CIPHERTRUST, INC.Inventors: Paul Judge, Dmitri Alperovitch, Joel Caracciolo, Alejandro Hernandez, Sven Krasser, Phyllis Schneck
-
Publication number: 20060267802Abstract: Systems and methods for graphically displaying messaging traffic flows by collecting messaging data, converting a portion of the messaging data to a geographical position and collecting statistics related to the messaging data for overlaying upon a geographical map.Type: ApplicationFiled: June 9, 2006Publication date: November 30, 2006Applicant: CIPHERTRUST, INC.Inventors: Paul Judge, Dmitri Alperovitch, Sven Krasser, Arasendran Sellakannu, Lamar Willis
-
Publication number: 20060265747Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical term. Features are extracted from the reduced threat information; these features in conjuntion with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.Type: ApplicationFiled: July 12, 2006Publication date: November 23, 2006Applicant: CIPHERTRUST, INC.Inventor: Paul Judge