1
Gregor Freund: System and methodology for managing internet access on a per application basis for client computers connected to the internet. Zone Labs, John A Smart, November 16, 1999: US05987611 (975 worldwide citation)

A computing environment with methods for monitoring access to an open network, such as a WAN or the Internet, is described. The system includes one or more clients, each operating applications or processes (e.g., Netscape Navigator.TM. or Microsoft Internet Explorer.TM. browser software) requiring I ...


2
Anthony Albert, Kyle N Kawamura, Keith A Haycock, Conrad K Herrmann: System and methodology for security policy arbitration. Zone Labs, John A Smart, September 18, 2003: US20030177389-A1 (1 worldwide citation)

A system providing methods for a device to apply a security policy required for connection to a network is described. In response to receipt of a request from a device for connection to a particular network, a current policy to apply to said device for governing the connection to this particular net ...


3
Conrad K Herrmann: System Providing Methodology for Access Control with Cooperative Enforcement. Zone Labs, John A Smart, August 26, 2004: US20040167984-A1

A system providing methodology for access control with cooperative enforcement is described. In one embodiment, for example, a method is described for authorizing a client to access a service based on compliance with a policy required for access to the service, the method comprises steps of: specify ...


4
Conrad K Herrmann, Sinduja Murari: System and Methodology for Policy Enforcement. Zone Labs, John A Smart, June 3, 2004: US20040107360-A1

A system and methodology for policy enforcement during authentication of a client device for access to a network is described. A first authentication module establishes a session with a client device requesting network access for collecting information from the client device and determining whether ...


5
Joseph Bentley: Security System with Methodology for Computing Unique Signature for Executable File Employed across Different Machines. Zone Labs, John A Smart, May 20, 2004: US20040098599-A1

A security system with methodology for computing a machine independent unique identifier for an executable file across different machines is described. In response to a request to uniquely identify an executable file that has been installed on a given machine, portions of the executable file modifie ...


6
Gregor P Freund: Security System with Methodology for Interprocess Communication Control. Zone Labs, John A Smart, October 7, 2004: US20040199763-A1

A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a ...


7
Steven L Teixeira: System and Methodology Providing Information Lockbox. Zone Labs, John A Smart, January 6, 2005: US20050005145-A1

A system providing a secure lockbox methodology for protecting sensitive information is described. In one embodiment, the methodology includes steps of receiving input of sensitive information from a user; computing a data shadow of the sensitive information for storage in a repository; based on the ...


8
Gregor P Freund: System And Methodology For Providing Community-Based Security Policies. Zone Labs, John A Smart, January 29, 2004: US20040019807-A1

A system and methodology for providing community-based security policies is described. In one embodiment in a system comprising a plurality of devices connected to a network, a security module is provided for establishing security settings for regulating network access at these devices. Information ...


9
Gene Linetsky: Security System with Methodology for Defending Against Security Breaches of Peripheral Devices. Zone Labs, John A Smart, June 23, 2005: US20050138433-A1

A security system with methodology for defending against security breaches of peripheral devices is described. In one embodiment, for example, a method is described for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprises steps of: ...


10
Steven L Teixeira, Christopher Carr: Security System And Methodology For Providing Indirect Access Control. Zone Labs, John A Smart, April 22, 2004: US20040078591-A1

A system providing methods for indirect access control is described. When an attempt to access a network by a first application is detected, a determination is made as to whether at least one other application is attempting indirect network access through the first application. If at least one other ...