Patents by Inventor Stacey C. Lum

Stacey C. Lum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8677450
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: March 18, 2014
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8650610
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: February 11, 2014
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8578444
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: November 5, 2013
    Assignee: Info Express, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8347350
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: January 1, 2013
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8347351
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: January 1, 2013
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20120254939
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 14, 2012
    Publication date: October 4, 2012
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20120254937
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 14, 2012
    Publication date: October 4, 2012
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20120254938
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 14, 2012
    Publication date: October 4, 2012
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20120246698
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 14, 2012
    Publication date: September 27, 2012
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20120131637
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: February 10, 2012
    Publication date: May 24, 2012
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8117645
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: February 14, 2012
    Assignee: Infoexpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8112788
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: February 7, 2012
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8108909
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: January 31, 2012
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 8051460
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: November 18, 2008
    Date of Patent: November 1, 2011
    Assignee: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20110231916
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 10, 2011
    Publication date: September 22, 2011
    Applicant: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20110231915
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 10, 2011
    Publication date: September 22, 2011
    Applicant: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Publication number: 20110231928
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: June 10, 2011
    Publication date: September 22, 2011
    Applicant: InfoExpress, Inc.
    Inventors: Stacey C. Lum, Yuhshiow Alice Lee
  • Patent number: 7890658
    Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.
    Type: Grant
    Filed: August 28, 2009
    Date of Patent: February 15, 2011
    Assignee: InfoExpress, Inc.
    Inventor: Stacey C. Lum
  • Publication number: 20100005506
    Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.
    Type: Application
    Filed: August 28, 2009
    Publication date: January 7, 2010
    Inventor: Stacey C. Lum
  • Patent number: 7590733
    Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.
    Type: Grant
    Filed: September 14, 2005
    Date of Patent: September 15, 2009
    Assignee: InfoExpress, Inc.
    Inventor: Stacey C. Lum