Patents by Inventor Steven James Carlander

Steven James Carlander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8239917
    Abstract: Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: August 7, 2012
    Assignee: Enterprise Information Management, Inc.
    Inventors: Frank J. Hammond, II, Frank J. Ricotta, Jr., Hans Michael Dykstra, Blake Andrew Williams, Steven James Carlander, Sarah Williams Gerber
  • Publication number: 20080307488
    Abstract: Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy.
    Type: Application
    Filed: October 30, 2007
    Publication date: December 11, 2008
    Inventors: Frank J. Hammond, II, Frank J. Ricotta, JR., Hans Michael Dykstra, Blake Andrew Williams, Steven James Carlander, Sarah Williams Gerber
  • Publication number: 20040193923
    Abstract: A system and method protect an electronic network. One or more agents are installed within the electronic network and perform an initial assessment of the electronic network to determine normal activity. The electronic network is then monitored for abnormal activity using the agents, and protected by blocking the abnormal activity using the agents.
    Type: Application
    Filed: January 16, 2004
    Publication date: September 30, 2004
    Inventors: Frank J. Hammond, Frank J. Ricotta, Hans Michael Dykstra, Blake Andrew Williams, Steven James Carlander, Sarah Williams Gerber