1
Ashar Aziz: Method and apparatus for key-management scheme for use with internet protocols at site firewalls. Sun Microsystems, Irell & Manella, May 16, 1995: US05416842 (471 worldwide citation)

The present invention includes a first data processing device (node I) coupled to a first private network and to a firewall server (FWA). Firewall server FWA is in turn coupled to a public network, such as the Internet. A second data processing device (node J) is coupled to a second private network ...


2
Whitfield Diffie, Ashar Aziz: Method and apparatus for privacy and authentication in wireless networks. Sun Microsystems, Blakely Sokoloff Taylor & Zafman, December 6, 1994: US05371794 (406 worldwide citation)

A method and apparatus is disclosed for providing a secure wireless communication link between a mobile nomadic device and a base computing unit. A mobile sends a host certificate (Cert.sub.-- Mobile) to the base along with a randomly chosen challenge value (CH1) and a list of supported shared key a ...


3
Ashar Aziz, Geoffrey Mulligan, Martin Patterson, Glenn Scott: System for signatureless transmission and reception of data packets between computer networks. Sun Microsystems, Matthew C Rainey, August 20, 1996: US05548646 (248 worldwide citation)

A system for automatically encrypting and decrypting data packet sent from a source host to a destination host across a public internetwork. A tunnelling bridge is positioned at each network, and intercepts all packets transmitted to or from its associated network. The tunnelling bridge includes tab ...


4
Ashar Aziz, Tom Markson, Martin Patterson, Mark Gray: Method and apparatus for controlling an extensible computing system. Terraspring, Edward A Becker, Hickman Palermo Truong & Becker, July 22, 2003: US06597956 (222 worldwide citation)

A Virtual Server Farm (VSF) is created out of a wide scale computing fabric (“Computing Grid”) which is physically constructed once and then logically divided up into VSFs for various organizations on demand. Allocation and control of the elements in the VSF is performed by a control plane connected ...


5
Ashar Aziz, Geoffrey Baehr, Germano Caronni, Amit Gupta, Vipul Gupta, Glenn C Scott: Method and apparatus for providing secure communication with a relay in a network. Sun Microsystems, Finnegan Henderson Farabow Garrett & Dunner, November 4, 2003: US06643701 (167 worldwide citation)

Methods and systems of the present invention include providing a connection between a first computer and a second computer by receiving, at a third computer, information regarding one of the first and second computers to facilitate establishment of a secure connection between the first computer and ...


6
Ashar Aziz, Tom Markson, Martin Patterson: Extensible computing system. Terraspring, Edward A Becker, Hickman Palermo Truong & Becker, August 17, 2004: US06779016 (158 worldwide citation)

Methods and apparatus providing a dynamically sized, highly scalable and available server farm are disclosed. A Virtual Server Farm (VSF) is created out of a wide scale computing fabric (“Computing Grid”) which is physically constructed once and then logically divided up into VSFs for various organi ...


7
Ashar Aziz, Adrian Drzewiecki, Ramesh Radhakrishnan, Jayaraman Manni, Muhammad Amin: Heuristic based capture with replay to virtual machine. FireEye, Carr & Ferrell, May 1, 2012: US08171553 (151 worldwide citation)

A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller. The controller is coupled to the tap and is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic t ...


8
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: Malware containment on connection. FireEye, Blakely Sokoloff Taylor & Zafman, October 22, 2013: US08566946 (144 worldwide citation)

Systems and methods for malware containment on connection are provided. Digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device is temporarily directed to ...


9
Ashar Aziz: System and method of detecting computer worms. FireEye, Blakely Sokoloff Taylor & Zafman, September 3, 2013: US08528086 (142 worldwide citation)

A computer worm detection system orchestrates a sequence of network activities in a computer network and monitors the computer network to identify an anomalous behavior of the computer network. The computer worm detection system then determines whether the anomalous behavior is caused by the compute ...


10
Ashar Aziz: Computer worm defense system and method. FireEye, Carr & Ferrell, August 23, 2011: US08006305 (142 worldwide citation)

A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. Computer worm identifiers generated by a worm sensor of one containmen ...