1
Robert E Gleichauf, William A Randall, Daniel M Teal, Scott V Waddell, Kevin J Ziese: Method and system for adaptive network security using network vulnerability assessment. Cisco Technology, Baker Botts L, October 9, 2001: US06301668 (446 worldwide citation)

A method and system for adaptive network security using network vulnerability assessment is disclosed. The method comprises directing a request onto a network. A response to the request is assessed to discover network information. A plurality of analysis tasks are prioritized based upon the network ...


2
Robert E Gleichauf, Daniel M Teal, Kevin L Wiley: Method and system for adaptive network security using intelligent packet analysis. Cisco Technology, Baker Botts L, December 24, 2002: US06499107 (329 worldwide citation)

A method and system for adaptive network security using intelligent packet analysis are provided. The method comprises monitoring network data traffic. The network data traffic is analyzed to assess network information. A plurality of analysis tasks are prioritized based upon the network information ...


3
Daniel M Teal: Intrusion detection system and method having dynamically loaded signatures. Cisco Technology, Baker Botts L, November 5, 2002: US06477651 (119 worldwide citation)

An intrusion detection system and method for detecting unauthorized or malicious use of network resources includes an intrusion detection analysis engine that instanciates one or more analysis objects to detect signatures associated with attacks on network vulnerabilities. As new network vulnerabili ...


4
Robert E Gleichauf, Daniel M Teal, Kevin L Wiley: Method and system for adaptive network security using intelligent packet analysis. Cisco Technology, Baker Botts L, November 9, 2004: US06816973 (114 worldwide citation)

A method and system for adaptive network security using intelligent packet analysis are provided. The method comprises monitoring network data traffic. The network data traffic is analyzed to assess network information. A plurality of analysis tasks are prioritized based upon the network information ...


5
Daniel M Teal: Intrusion detection system and method having dynamically loaded signatures. Cisco Technology, Baker Botts L, August 31, 2004: US06785821 (67 worldwide citation)

An intrusion detection system and method for detecting unauthorized or malicious use of network resources includes an intrusion detection analysis engine that instanciates one or more analysis objects to detect signatures associated with attacks on network vulnerabilities. As new network vulnerabili ...


6
Daniel M Teal, Richard S Teal: Kernel-based network security infrastructure. Coretrace Corporation, Winstead PC, July 8, 2008: US07398389 (43 worldwide citation)

A system and method for network security using a kernel based network security infrastructure is disclosed. The method comprises the installation of a computer code set into the operating system kernel of each computer on a network and use of the computer code set to detect and stop unwanted or mali ...


7
Daniel M Teal, Richard S Teal, Todd A Schell: Method and system for license management. Coretrace Corporation, Winstead PC, May 4, 2010: US07711952 (5 worldwide citation)

System and method are disclosed for securing and managing individual end-user platforms as part of an enterprise network. The method/system of the invention has three main components: a security module, a manager appliance, and a console appliance. The security module enforces the enterprise license ...


8
Daniel M Teal, Richard S Teal: Kernel-based network security infrastructure. Coretrace Corporation, Alan R Thiele, Jenkens & Gilchrist PC, June 26, 2003: US20030120935-A1 (1 worldwide citation)

A system and method for network security using a kernel based network security infrastructure is disclosed. The method comprises the installation of a computer code set into the operating system kernel of each computer on a network and use of the computer code set to detect and stop unwanted or mali ...


9
Daniel M Teal, Wesley G Miller, Charisse Castagnoli, Toney Jennings, Todd Schell, Richard S Teal: Policy-based whitelisting with system change management based on trust framework. LUMENSION SECURITY, Greenberg Traurig, June 21, 2016: US09374390

Techniques allow runtime extensions to a whitelist that locks down a computational system. For example, executable code is not only subject to whitelist checks that allow (or deny) its execution, but is also subject to checks that determine whether a whitelisted executable is itself trusted to intro ...


10
Daniel M Teal, Richard S Teal, Todd A Schell: Method and system for license management. Coretrace Corporation, Jenkens & Gilchrist, March 23, 2006: US20060064582-A1

System and method are disclosed for securing and managing individual end-user platforms as part of an enterprise network. The method/system of the invention has three main components: a security module, a manager appliance, and a console appliance. The security module enforces the enterprise license ...