Patents by Inventor Stacey Lum

Stacey Lum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9621553
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: April 11, 2017
    Assignee: INFOEXPRESS, INC.
    Inventors: Alice Lee, Stacey Lum
  • Patent number: 9083753
    Abstract: A new approach to network security includes manipulating an access point (215) such that an initial communication from an external device (230) is passed to a restricted subset (205) of a computing network (200) including a gatekeeper (225). The gatekeeper is configured to enforce a security policy (330A) against the external device before granting access to a less-restricted subset (210) of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: July 14, 2015
    Assignee: InfoExpress, Inc.
    Inventors: Alice Lee, Stacey Lum
  • Publication number: 20070192500
    Abstract: Systems and methods of securing a computing network are described. Communication from unauthorized devices is prevented by defining one or more dynamic policy enforcement points (DPEPs) on a network segment and specifying one of these DPEPs as an active policy enforcement point (APEP). The APEP prevents communication from unauthorized devices by spoofing an ARP response. If an APEP becomes unavailable, another of the one or more DPEPs is automatically selected as a new APEP. Members of the one or more DPEPs may be non-dedicated devices configured as DPEPs by the addition of security software. The number of DPEPs and APEPs can automatically scale with the number of devices on the computing network.
    Type: Application
    Filed: May 11, 2006
    Publication date: August 16, 2007
    Inventor: Stacey Lum
  • Publication number: 20070192858
    Abstract: Systems and methods of securing a computing network are described. Communication from unauthorized devices is prevented by defining one or more dynamic policy enforcement points (DPEPs) on a network segment and specifying one of these DPEPs as an active policy enforcement point (APEP). The APEP prevents communication from unauthorized devices by spoofing an ARP response. If an APEP becomes unavailable, another of the one or more DPEPs is automatically selected as a new APEP. Members of the one or more DPEPs may be non-dedicated devices configured as DPEPs by the addition of security software. The number of DPEPs and APEPs can automatically scale with the number of devices on the computing network.
    Type: Application
    Filed: February 16, 2006
    Publication date: August 16, 2007
    Inventor: Stacey Lum
  • Publication number: 20070061458
    Abstract: Systems and methods of managing security on a computer network are disclosed. The computer network includes a restricted subnet and a less-restricted subnet. Access to the restricted subnet is controlled by a network filter, optionally inserted as a software shim on a DHCP server. In some embodiments, the network filter is configured to manipulate relay IP addresses to control whether the DHCP server provides, in a DHCPOFFER packet, an IP address that can be used to access the restricted subset. In some embodiments, configuration information is communicated between the DHCP server and the network filter via DHCPOFFER packets.
    Type: Application
    Filed: September 14, 2005
    Publication date: March 15, 2007
    Inventor: Stacey Lum
  • Publication number: 20050063400
    Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
    Type: Application
    Filed: September 24, 2004
    Publication date: March 24, 2005
    Inventor: Stacey Lum