Patents by Inventor Yuhshiow Alice Lee
Yuhshiow Alice Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8677450Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: March 18, 2014Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8650610Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: February 11, 2014Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8578444Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: November 5, 2013Assignee: Info Express, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8347351Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: January 1, 2013Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8347350Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: February 10, 2012Date of Patent: January 1, 2013Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254938Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254939Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254937Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120246698Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: September 27, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120131637Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: February 10, 2012Publication date: May 24, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8117645Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: February 14, 2012Assignee: Infoexpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8112788Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: February 7, 2012Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8108909Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: January 31, 2012Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8051460Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: November 18, 2008Date of Patent: November 1, 2011Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231928Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231915Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231916Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 7523484Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: September 24, 2004Date of Patent: April 21, 2009Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20090083830Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: November 18, 2008Publication date: March 26, 2009Inventors: Stacey C. Lum, Yuhshiow Alice Lee