Patents by Inventor Todd Beebe
Todd Beebe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220374527Abstract: A system and method including the steps for dynamically or randomly selecting one or more criteria of a campaign assessment, in which said one or more criteria of said campaign assessment comprise tests, sub-techniques, techniques, tools, procedures, commands, behaviors, activities, flags, and/or schedule; randomly launching said campaign assessment; and generating a quiz which an analyst accesses by entering details included in a flag output.Type: ApplicationFiled: May 23, 2022Publication date: November 24, 2022Inventors: Todd Beebe, Laura Reuvers
-
Patent number: 7440558Abstract: A system and method of telephony resource management and security for monitoring and/or controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). One or more rules are defined which specify actions to be taken based upon at least one attribute of a call. Calls are detected and sensed to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the defined rules.Type: GrantFiled: June 17, 2004Date of Patent: October 21, 2008Assignee: SecureLogix CorporationInventors: Craig Heilmann, Mark D. Collier, Doug Conyers, Keith S. Pickens, David Buntin, Greg Schmid, Stephen Faustino, Todd Beebe, Michael Brysch, Robert R. Applonie
-
Publication number: 20040234056Abstract: A system and method of telephony resource management and security for monitoring and/or controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). One or more rules are defined which specify actions to be taken based upon at least one attribute of a call. Calls are detected and sensed to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the defined rules.Type: ApplicationFiled: June 17, 2004Publication date: November 25, 2004Applicant: SECURELOGIX CORPORATIONInventors: Craig Heilmann, Mark D. Collier, Doug Conyers, Keith S. Pickens, David Buntin, Greg Schmid, Stephen Faustino, Todd Beebe, Michael Brysch, Robert R. Applonie
-
Patent number: 6760421Abstract: A system and method of telephony security for controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: GrantFiled: October 19, 2001Date of Patent: July 6, 2004Assignee: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe
-
Patent number: 6760420Abstract: A system and method of telephony resource management and security for monitoring and/or controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A set of security rules is defined for each of the extensions which specify actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: GrantFiled: July 17, 2001Date of Patent: July 6, 2004Assignee: SecureLogix CorporationInventors: Craig Heilmann, Mark D. Collier, Doug Conyers, Keith S. Pickens, David Buntin, Greg Schmid, Stephen Faustino, Todd Beebe, Michael Brysch, Robert R. Applonie
-
Patent number: 6718024Abstract: A system and method for discriminating call content types for individual telephone lines at a plurality of user sites outside of a Public Switched Telephone Network (PSTN) is described. The system includes: a database containing security rules for each of a plurality of extensions, the rules specifying actions to be taken based upon a call content type of the call on the extension, wherein the call content type is determined at the user sites outside the PSTN; and a line sensor within the user sites outside the PSTN for determining the call content type of the call. The line sensor continuously checks the call content type to determine if the call content type changes.Type: GrantFiled: May 17, 2000Date of Patent: April 6, 2004Assignee: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe, David Buntin, Greg Schmid, Robert A. Applonie, Keith S. Pickens
-
Publication number: 20030112940Abstract: A system and method of telephony security for controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: ApplicationFiled: February 3, 2003Publication date: June 19, 2003Applicant: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe
-
Patent number: 6542592Abstract: A system and method of telephony security for controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: GrantFiled: October 19, 2001Date of Patent: April 1, 2003Assignee: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe
-
Publication number: 20020090073Abstract: A system and method of telephony security for controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: ApplicationFiled: October 19, 2001Publication date: July 11, 2002Applicant: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe
-
Publication number: 20020021791Abstract: A system and method of telephony resource management and security for monitoring and/or controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: ApplicationFiled: July 17, 2001Publication date: February 21, 2002Inventors: Craig Heilmann, Mark D. Collier, Doug Conyers, Keith S. Pickens, David Buntin, Greg Schmid, Stephen Faustino, Todd Beebe, Michael Brysch, Robert R. Applonie
-
Patent number: 6320948Abstract: A system and method of telephony security for controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: GrantFiled: June 14, 2000Date of Patent: November 20, 2001Assignee: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe
-
Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
Publication number: 20010014150Abstract: A system and method for implementing a fully integrated and cooperative telecommunications firewall/scanner that can be deployed either as a standalone device, or over a large-scale distributed client-server architecture is described. In addition to providing enhanced telecommunications firewall and scanner security capabilities, the integrated telecommunications firewall/scanner provides the capability to ensure implementation of a corporate-dictated security structure, and event visibility and report consolidation requirements, across a globally-distributed enterprise, using policy-based enforcement of a Security Policy. In the most basic configuration, the integrated firewall/scanner performs continuous security access monitoring and control functions, keyword and content monitoring and control functions, and remote access authentication, initiating coordinated vulnerability assessments, as well as automatic synchronous adjustments to the Security Policy in response to the vulnerability assessment results.Type: ApplicationFiled: January 16, 2001Publication date: August 16, 2001Inventors: Todd Beebe, Mark D. Collier, Doug Conyers, Chris Hamlett, Stephen Faustino -
Patent number: 6249575Abstract: A system and method of telephony security for controlling and logging access between an enterprise's end-user stations and their respective circuits into the public switched telephone network (PSTN). A security policy, i.e., a set of security rules, are defined for each of the extensions, the rules specifying actions to be taken based upon at least one attribute of the call on the extension. Calls are detected and sensed on the extensions to determine attributes associated with each call. Actions are then performed on selected calls based upon their attributes in accordance with the security rules defined for those extensions.Type: GrantFiled: December 11, 1998Date of Patent: June 19, 2001Assignee: SecureLogix CorporationInventors: Craig Heilmann, Todd Beebe
-
Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
Patent number: 6226372Abstract: A system and method for implementing a fully integrated and cooperative telecommunications firewall/scanner that can be deployed either as a standalone device, or over a large-scale distributed client-server architecture is described. In addition to providing enhanced telecommunications firewall and scanner security capabilities, the integrated telecommunications firewall/scanner provides the capability to ensure implementation of a corporate-dictated security structure, and event visibility and report consolidation requirements, across a globally-distributed enterprise, using policy-based enforcement of a Security Policy. In the most basic configuration, the integrated firewall/scanner performs continuous security access monitoring and control functions, keyword and content monitoring and control functions, and remote access authentication, initiating coordinated vulnerability assessments, as well as automatic synchronous adjustments to the Security Policy in response to the vulnerability assessment results.Type: GrantFiled: December 8, 1999Date of Patent: May 1, 2001Assignee: Securelogix CorporationInventors: Todd Beebe, Mark D. Collier, Doug Conyers, Chris Hamlett, Stephen Faustino