Patents by Inventor Richard Guzik

Richard Guzik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9356909
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: May 31, 2016
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20140237584
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: April 28, 2014
    Publication date: August 21, 2014
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8800024
    Abstract: A method is provided in one example embodiment that includes intercepting a network flow to a destination node having a network address and sending a discovery query based on a discovery action associated with the network address in a firewall cache. A discovery result may be received and metadata associated with the flow may be sent to a firewall before releasing the network flow. In other embodiments, a discovery query may be received from a source node and a discovery result sent to the source node, wherein the discovery result identifies a firewall for managing a route to a destination node. Metadata may be received from the source node over a metadata channel. A network flow from the source node to the destination node may be intercepted, and the metadata may be correlated with the network flow to apply a network policy to the network flow.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: August 5, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8713668
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: April 29, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8584195
    Abstract: User names and user groups serve as the basis of a formal policy in a network. A passive monitor examines network traffic in near real time and indicates: which network traffic is flowing on the network as before; which users or user groups were logged into workstations initiating this network traffic; and which of this traffic conforms to the formal policy definition. In one embodiment of the invention, users and user groups are determined by querying Microsoft® Active Directory and Microsoft® Windows servers, to determine who is logged onto the Microsoft® network. Other sources of identity information are also possible.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: November 12, 2013
    Assignee: McAfee, Inc
    Inventors: Kieran Gerard Sherlock, Geoffrey Howard Cooper, John Richard Guzik, Derek Patton Pearcy, Luis Filipe Pereira Valente
  • Publication number: 20130097692
    Abstract: A method is provided in one example embodiment that includes intercepting a network flow to a destination node having a network address and sending a discovery query based on a discovery action associated with the network address in a firewall cache. A discovery result may be received and metadata associated with the flow may be sent to a firewall before releasing the network flow. In other embodiments, a discovery query may be received from a source node and a discovery result sent to the source node, wherein the discovery result identifies a firewall for managing a route to a destination node. Metadata may be received from the source node over a metadata channel. A network flow from the source node to the destination node may be intercepted, and the metadata may be correlated with the network flow to apply a network policy to the network flow.
    Type: Application
    Filed: October 17, 2011
    Publication date: April 18, 2013
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20130097658
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: October 17, 2011
    Publication date: April 18, 2013
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20080109870
    Abstract: User names and user groups serve as the basis of a formal policy in a network. A passive monitor examines network traffic in near real time and indicates: which network traffic is flowing on the network as before; which users or user groups were logged into workstations initiating this network traffic; and which of this traffic conforms to the formal policy definition. In one embodiment of the invention, users and user groups are determined by querying Microsoft® Active Directory and Microsoft® Windows servers, to determine who is logged onto the Microsoft® network. Other sources of identity information are also possible.
    Type: Application
    Filed: September 12, 2007
    Publication date: May 8, 2008
    Inventors: Kieran Gerard Sherlock, Geoffrey Howard Cooper, John Richard Guzik, Derek Patton Pearcy, Luis Filipe Pereira Valente