Patents by Inventor ROBERT K. LEMASTER

ROBERT K. LEMASTER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9729514
    Abstract: In one exemplary embodiment, a computer-implemented method of a secure-access gateway to a destination device in a protected computer network include the step of receiving a request from a remote user to access the destination device in the protected computer network. A session for the remote user is registered. The session includes an access to the destination device by the remote user according to a set of specified parameters controlled by the secure access gateway. The session is created. When the remote user connects and authenticates, the secure access gateway establishes the connection to the destination device on behalf of the remote user. The session is monitored according to the set of specified parameters. The session is monitored to determine if at least one specified parameters is achieved. The session between the remote user and the destination device is when terminated when the at least one specified parameters is achieved.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: August 8, 2017
    Inventors: Robert K Lemaster, Duleep G. Pillai
  • Patent number: 9578005
    Abstract: A set of authentication server configuration rules are implemented. The authentication server configuration rules utilize regular-expression based commands. A running log of commands entered by every user is maintained for each command is run by the at least one authentication server. A configuration diff command is run each time a session ends. A set of actions of an authentication-server administrator on the authentication server is tracked. The set of actions of the authentication-server administrator is stored in a log. The log includes a username of the authentication-server administrator who generated the log and a time source and a time zone associated of a location of the set of actions. A hash algorithm is run on the log. A portable document format (PDF) formatted the of the log is generated. A list of usernames is generated from a set logs that filled a user-authentication process required to access the authentication server.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: February 21, 2017
    Inventors: Robert K Lemaster, Duleep G Pillai
  • Patent number: 9071575
    Abstract: In one exemplary embodiment, a computer-implemented method includes receiving a request to block a host, wherein the host provides a prohibited content via a computer network. A spider program can verify that the host provides the prohibited content. An abuse route list can be generated. The abuse route list can include an internet protocol address of the host. The abuse route list is provided to a network operator with a computer networking protocol. A search engine of a database of infringing hosts can be provided. The database of infringing hosts can include the internet protocol address of the host. Whether the host provides the prohibited content can be reverified with a third-party review. The host from can be removed from the abuse route list if the third-party review determines that the host does not provide prohibited content.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: June 30, 2015
    Inventors: Robert K. Lemaster, Duleep G. Pillai, Vikas Khanna
  • Publication number: 20150113589
    Abstract: A set of authentication server configuration rules are implemented. The authentication server configuration rules utilize regular-expression based commands. A running log of commands entered by every user is maintained for each command is run by the at least one authentication server. A configuration diff command is run each time a session ends. A set of actions of an authentication-server administrator on the authentication server is tracked. The set of actions of the authentication-server administrator is stored in a log. The log includes a username of the authentication-server administrator who generated the log and a time source and a time zone associated of a location of the set of actions. A hash algorithm is run on the log. A portable document format (PDF) formatted the of the log is generated. A list of usernames is generated from a set logs that filled a user-authentication process required to access the authentication server.
    Type: Application
    Filed: September 29, 2014
    Publication date: April 23, 2015
    Inventors: Robert K. Lemaster, Duleep G. Pillai
  • Publication number: 20140289830
    Abstract: In one exemplary embodiment, a computer-implemented method of a secure-access gateway to a destination device in a protected computer network include the step of receiving a request from a remote user to access the destination device in the protected computer network. A session for the remote user is registered. The session includes an access to the destination device by the remote user according to a set of specified parameters controlled by the secure access gateway. The session is created. When the remote user connects and authenticates, the secure access gateway establishes the connection to the destination device on behalf of the remote user. The session is monitored according to the set of specified parameters. The session is monitored to determine if at least one specified parameters is achieved. The session between the remote user and the destination device is when terminated when the at least one specified parameters is achieved.
    Type: Application
    Filed: March 22, 2013
    Publication date: September 25, 2014
    Inventors: Robert K. LEMASTER, Duleep G. PILLAI
  • Publication number: 20120272331
    Abstract: In one exemplary embodiment, a computer-implemented method includes receiving a request to block a host, wherein the host provides a prohibited content via a computer network. A spider program can verify that the host provides the prohibited content. An abuse route list can be generated. The abuse route list can include an internet protocol address of the host. The abuse route list is provided to a network operator with a computer networking protocol. A search engine of a database of infringing hosts can be provided. The database of infringing hosts can include the internet protocol address of the host. Whether the host provides the prohibited content can be reverified with a third-party review. The host from can be removed from the abuse route list if the third-party review determines that the host does not provide prohibited content.
    Type: Application
    Filed: April 20, 2012
    Publication date: October 25, 2012
    Inventors: ROBERT K. LEMASTER, Duleep G. Pillai, Vikas Khanna