Patents by Inventor Phillip A. Porras

Phillip A. Porras has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170346857
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Application
    Filed: June 13, 2017
    Publication date: November 30, 2017
    Applicant: SRI International
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Patent number: 9705918
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: July 11, 2017
    Assignee: SRI International
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Patent number: 9680876
    Abstract: A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: June 13, 2017
    Assignee: SRI International
    Inventor: Phillip A. Porras
  • Patent number: 9571523
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with packet disposition directives. A security actuator receives flow policy directives from a number of network applications. The flow policy directives express higher-level network security policy goals, including blocking and/or redirecting network traffic. The security actuator converts a flow policy directive into one or more packet disposition directives. The packet disposition directives may include trigger rules to cause network communications to be monitored for matching trigger packets. An automated mechanism initiated by the security actuator may cause trigger packets to be forwarded to the security actuator for analysis. The security actuator may generate packet disposition directives in response to receiving the trigger packets.
    Type: Grant
    Filed: July 2, 2014
    Date of Patent: February 14, 2017
    Assignee: SRI INTERNATIONAL
    Inventors: Phillip A. Porras, Keith M. Skinner, Steven M. Dawson
  • Publication number: 20160359870
    Abstract: In one embodiment, the present invention is a method and apparatus for detecting malware infection. One embodiment of a method for detecting a malware infection at a local host in a network, includes monitoring communications between the local host and one or more entities external to the network, generating a dialog warning if the communications include a transaction indicative of a malware infection, declaring a malware infection if, within a predefined period of time, the dialog warnings includes at least one dialog warning indicating a transaction initiated at the local host and at least one dialog warning indicating an additional transaction indicative of a malware infection, and outputting an infection profile for the local host.
    Type: Application
    Filed: January 21, 2015
    Publication date: December 8, 2016
    Inventors: Guofei Gu, Phillip A. Porras, Martin W. Fong
  • Patent number: 9444842
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: September 13, 2016
    Assignee: SRI INTERNATIONAL
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Publication number: 20160219048
    Abstract: Network management technology as disclosed herein conducts conversational natural language dialog with a user to facilitate the user's analysis of network activity and the implementation of network security measures and other actions in furtherance of network operations, management, or security.
    Type: Application
    Filed: July 23, 2015
    Publication date: July 28, 2016
    Inventors: Phillip A. Porras, Jeffrey Klaben, Patrick D. Lincoln, Nicholas Chapin
  • Publication number: 20160218933
    Abstract: Network management technology as disclosed herein performs an impact analysis of actual or hypothetical network commands, and presents the impact analysis results to facilitate the user's understanding of the predicted consequences of the actual or hypothetical commands on network operations, management, or security.
    Type: Application
    Filed: August 12, 2015
    Publication date: July 28, 2016
    Inventors: Phillip A. Porras, Jeffrey Klaben, Patrick D. Lincoln, Martin W. Fong, Nicholas Chapin
  • Publication number: 20160219078
    Abstract: Network management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network management technology interprets human user interactions, such as gestures, conversational natural language dialog, and combinations of gestures and natural language dialog, as network directives. The technology can implement the network directives to, for example, facilitate analysis of network activity or to respond to network security events.
    Type: Application
    Filed: July 23, 2015
    Publication date: July 28, 2016
    Inventors: Phillip A. Porras, Jeffrey Klaben, Patrick D. Lincoln, Nicholas Chapin
  • Publication number: 20160212171
    Abstract: Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network security management technology interprets human user interactions, such as gestures, as network directives. The network directives may be implemented by the network in response to security events.
    Type: Application
    Filed: June 8, 2015
    Publication date: July 21, 2016
    Inventors: Rukman Senanayake, Phillip A. Porras, Patrick D. Lincoln
  • Publication number: 20160212172
    Abstract: Network security management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network security management technology interprets human user interactions, such as gestures, as network directives, and updates the interactive visualization in response to the network directives.
    Type: Application
    Filed: June 8, 2015
    Publication date: July 21, 2016
    Inventors: Rukman Senanayake, Phillip A. Porras, Patrick D. Lincoln
  • Publication number: 20160072844
    Abstract: A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
    Type: Application
    Filed: November 13, 2015
    Publication date: March 10, 2016
    Inventor: Phillip A. Porras
  • Patent number: 9210194
    Abstract: A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: December 8, 2015
    Assignee: SRI INTERNATIONAL
    Inventor: Phillip A. Porras
  • Publication number: 20150256559
    Abstract: A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
    Type: Application
    Filed: May 20, 2015
    Publication date: September 10, 2015
    Inventor: Phillip A. Porras
  • Patent number: 9047463
    Abstract: A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
    Type: Grant
    Filed: October 24, 2012
    Date of Patent: June 2, 2015
    Assignee: SRI International
    Inventor: Phillip A. Porras
  • Publication number: 20140331280
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. An event auditor passively monitors network traffic and provides network activity data indicative of network flows to a network privilege manager. The network privilege manager determines a current network context based on the network activity data. In response to the current network context, the network privilege manager selects a security policy and generates one or more flow policy directives in accordance with the selected policy.
    Type: Application
    Filed: July 2, 2014
    Publication date: November 6, 2014
    Inventors: Phillip A. Porras, Kenneth C. Nitz
  • Publication number: 20140317684
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with packet disposition directives. A security actuator receives flow policy directives from a number of network applications. The flow policy directives express higher-level network security policy goals, including blocking and/or redirecting network traffic. The security actuator converts a flow policy directive into one or more packet disposition directives. The packet disposition directives may include trigger rules to cause network communications to be monitored for matching trigger packets. An automated mechanism initiated by the security actuator may cause trigger packets to be forwarded to the security actuator for analysis. The security actuator may generate packet disposition directives in response to receiving the trigger packets.
    Type: Application
    Filed: July 2, 2014
    Publication date: October 23, 2014
    Inventors: Phillip A. Porras, Keith M. Skinner, Steven M. Dawson
  • Publication number: 20140007184
    Abstract: A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
    Type: Application
    Filed: October 24, 2012
    Publication date: January 2, 2014
    Inventor: Phillip A. Porras
  • Publication number: 20120255009
    Abstract: A method and apparatus are provided for combating malicious code. In one embodiment, a method for combating malicious code in a network includes implementing a leap-ahead technique to defend against the malicious code reaching a full saturation potential in the network, by sending alert messages to a group of peers, and reselecting the membership of that group from time to time.
    Type: Application
    Filed: June 7, 2012
    Publication date: October 4, 2012
    Applicant: SRI International
    Inventors: Phillip Porras, Linda Briesemeister
  • Patent number: 8214901
    Abstract: A method and apparatus are provided for combating malicious code. In one embodiment, a method for combating malicious code in a network includes implementing a resource-limiting technique to slow a propagation of the malicious code and implementing a leap-ahead technique in parallel with the resource-limiting technique to defend against the malicious code reaching a full saturation potential in the network.
    Type: Grant
    Filed: September 19, 2005
    Date of Patent: July 3, 2012
    Assignee: SRI International
    Inventors: Phillip Porras, Linda Briesemeister