Patents by Inventor Stacey C. Lum
Stacey C. Lum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8677450Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: March 18, 2014Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8650610Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: February 11, 2014Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8578444Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: November 5, 2013Assignee: Info Express, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8347350Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: February 10, 2012Date of Patent: January 1, 2013Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8347351Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: January 1, 2013Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254939Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254937Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254938Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120246698Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: September 27, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120131637Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: February 10, 2012Publication date: May 24, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8117645Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: February 14, 2012Assignee: Infoexpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8112788Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: February 7, 2012Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8108909Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: January 31, 2012Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8051460Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: November 18, 2008Date of Patent: November 1, 2011Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231916Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231915Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231928Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 7890658Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.Type: GrantFiled: August 28, 2009Date of Patent: February 15, 2011Assignee: InfoExpress, Inc.Inventor: Stacey C. Lum
-
Publication number: 20100005506Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.Type: ApplicationFiled: August 28, 2009Publication date: January 7, 2010Inventor: Stacey C. Lum
-
Patent number: 7590733Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.Type: GrantFiled: September 14, 2005Date of Patent: September 15, 2009Assignee: InfoExpress, Inc.Inventor: Stacey C. Lum