Patents by Inventor William H. Dixon

William H. Dixon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7761708
    Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
    Type: Grant
    Filed: February 1, 2007
    Date of Patent: July 20, 2010
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, William H. Dixon
  • Patent number: 7386881
    Abstract: A method and system for mapping security parameters to a plurality of network sessions is provided. A responding computer maps the security parameters to the combination of packet parameters and a mapped port value used in each of the plurality of sessions. The packet parameters includes IP source and destination addresses, application source and destination ports and protocol type. The mapped port value is assigned by the responding computer to maintain a unique mapping between each security association and each network session.
    Type: Grant
    Filed: January 21, 2003
    Date of Patent: June 10, 2008
    Inventors: Brian D. Swander, William H. Dixon, Abolade Gbadegesin
  • Patent number: 7346770
    Abstract: The invention uses a three phase IKE protocol main mode negotiation to implement a port float algorithm that permits UDP encapsulated ESP traffic to traverse an IPSec-aware NAT. The NAT is connected to a plurality of client computers on a private network and provides an interface between the client computers and a server connected to a public network. In a first phase, a client and the server determine whether both are capable of sending UDP encapsulated ESP packets. In a second phase, the client and server conduct NAT discovery and determine whether the client, server, or both operate behind a NAT. In a third phase, the client and server initiate a port float algorithm, moving a destination UDP port specified in IKE packets from a first port value to a second port value. The server maintains a data structure that allows the server to identify the client sending IKE packets after exiting the second phase and entering the third phase.
    Type: Grant
    Filed: October 31, 2002
    Date of Patent: March 18, 2008
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, William H. Dixon
  • Patent number: 7308711
    Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
    Type: Grant
    Filed: June 6, 2003
    Date of Patent: December 11, 2007
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, William H. Dixon
  • Publication number: 20040143758
    Abstract: A method and system for mapping security parameters to a plurality of network sessions is provided. A responding computer maps the security parameters to the combination of packet parameters and a mapped port value used in each of the plurality of sessions. The packet parameters includes IP source and destination addresses, application source and destination ports and protocol type. The mapped port value is assigned by the responding computer to maintain a unique mapping between each security associations and each network session.
    Type: Application
    Filed: January 21, 2003
    Publication date: July 22, 2004
    Applicant: Microsoft Corporation
    Inventors: Brian D. Swander, William H. Dixon, Abolade Gbadegesin
  • Publication number: 20040088537
    Abstract: The invention uses a three phase IKE protocol main mode negotiation to implement a port float algorithm that permits UDP encapsulated ESP traffic to traverse an IPSec-aware NAT. The NAT is connected to a plurality of client computers on a private network and provides an interface between the client computers and a server connected to a public network. In a first phase, a client and the server determine whether both are capable of sending UDP encapsulated ESP packets. In a second phase, the client and server conduct NAT discovery and determine whether the client, server, or both operate behind a NAT. In a third phase, the client and server initiate a port float algorithm, moving a destination UDP port specified in IKE packets from a first port value to a second port value. The server maintains a data structure that allows the server to identify the client sending IKE packets after exiting the second phase and entering the third phase.
    Type: Application
    Filed: October 31, 2002
    Publication date: May 6, 2004
    Applicant: Microsoft Corporation
    Inventors: Brian D. Swander, William H. Dixon
  • Patent number: 6697857
    Abstract: A method of network security policy administration for a network client uses a finite state machine to maintain the security policy information of the network client. Security policy information may originate in a remote source such a directory storage as well as, or alternatively, locally in cache and local store locations. The finite state machine has four states, Initial, DS, Cache, and Local, and transitions between states responsive to the availability of security policy information from the various policy information sources. Furthermore, security policy updates occur via a differencing mechanism, wherein only filters that have changed are updated, minimizing impact on unchanged policy filters and the traffic protected by them, and minimizing lulls in policy coverage.
    Type: Grant
    Filed: June 9, 2000
    Date of Patent: February 24, 2004
    Assignee: Microsoft Corporation
    Inventors: William H. Dixon, Krishna Ganugapati, Abhishek Abhishek
  • Publication number: 20030084331
    Abstract: The distributed firewall performs user authentication at a first level to establish a user security context for traffic from that user, and an authority context provides authorization for subsequent traffic. This authority context may be based on an underlying policy for particular types of traffic, access to particular applications, etc. Additionally, the system includes the ability to allow a user/process/application to define its own access control. The linking of the user security context from the traffic to the application is accomplished by enabling IPSec on a socket and forcing the socket to be bound in exclusive mode. The most common policy definitions may be included by default. Extensions of the Internet key exchange protocol (IKE) to provide the desired user authentication plus application/purpose are also provided. The architecture includes pluggable authorization module(s) that are called after IKE has successfully authenticated the peer, but before the connection is allowed to complete.
    Type: Application
    Filed: October 26, 2001
    Publication date: May 1, 2003
    Applicant: Microsoft Corporation
    Inventors: William H. Dixon, Gurdeep S. Pall, Ashwin Palekar, Bernard D. Aboba, Brian D. Swander