1
Gregor P Freund, Philippe R Kahn, Sonia Lee: Databank system with methods for efficiently storing non-uniform data records. Starfish Software, John A Smart, October 28, 1997: US05682524 (273 worldwide citation)

System and methods are described for efficient storage and processing of non-uniform data records. An exemplary embodiment includes a Databank system having a Database Engine, a Database Engine API (Application Program Interface), a Databank Engine, a Databank Engine Class Interface, and a Databank ...


2
Gregor P Freund, Philippe R Kahn, Sonia Lee: Databank system with methods for efficiently storing non uniforms data records. Starfish Software, John A Smart, September 15, 1998: US05809497 (90 worldwide citation)

System and methods are described for efficient storage and processing of non-uniform data records. An exemplary embodiment includes a Databank system having a Database Engine, a Database Engine API (Application Program Interface), a Databank Engine, a Databank Engine Class Interface, and a Databank ...


3
Sonia Lee, Philippe R Kahn, Gregor P Freund: Information management system with user data-based user interface. Starfish Software, John A Smart, November 3, 1998: US05832473 (12 worldwide citation)

Information Management System and methods providing an improved user interface (UI) are described. In particular, the present invention provides a specialized region of the user interface which comprises a world or "landscape" which is a core representation or view of the user's own data. To render ...


4
Gregor P Freund: System and methodology for protecting new computers by applying a preconfigured security update policy. Check Point Software Technologies, John A Smart, May 26, 2009: US07540013 (5 worldwide citation)

A system and methodology for protecting new computers by applying a preconfigured security update policy is described. In one embodiment, for example, a method is described for controlling connections to a computer upon its initial deployment, the method comprises steps of: upon initial deployment o ...


5
Gregor P Freund: Security system with methodology for interprocess communication control. Check Point Software Technologies, John A Smart, G Mack Riddle, March 13, 2012: US08136155 (2 worldwide citation)

A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a ...


6
Gregor P Freund, Keith A Haycock, Conrad K Herrmann: System providing internet access management with router-based policy enforcement. John A Smart, March 20, 2003: US20030055962-A1 (1 worldwide citation)

A computing environment with methods for monitoring access to an open network such as the Internet, is described. The system includes one or more client computers, each operating applications (e.g., Netscape Navigator or Microsoft Internet Explorer) requiring access to an open network, such as a WAN ...


7
Gregor P Freund: Security System with Methodology for Interprocess Communication Control. Zone Labs, John A Smart, October 7, 2004: US20040199763-A1

A security system with methodology for interprocess communication control is described. In one embodiment, a method for controlling interprocess communication is provided that includes steps of: defining rules indicating which system services a given application can invoke; trapping an attempt by a ...


8
Gregor P Freund: System And Methodology For Providing Community-Based Security Policies. Zone Labs, John A Smart, January 29, 2004: US20040019807-A1

A system and methodology for providing community-based security policies is described. In one embodiment in a system comprising a plurality of devices connected to a network, a security module is provided for establishing security settings for regulating network access at these devices. Information ...


9
Gregor P Freund: System and Methodology for Protecting New Computers by Applying a Preconfigured Security Update Policy. Check Point Software Technologies, John A Smart, December 8, 2005: US20050273841-A1

A system and methodology for protecting new computers by applying a preconfigured security update policy is described. In one embodiment, for example, a method is described for controlling connections to a computer upon its initial deployment, the method comprises steps of: upon initial deployment o ...


10
Gregor P Freund: Security System with Methodology Providing Verified Secured Individual End Points. Check Point Software Technologies, John A Smart, December 8, 2005: US20050273850-A1

A security system with methodology providing verified secured individual end points is described. In one embodiment, for example, a method of the present invention is described for controlling access to a particular application, the method comprises steps of: defining firewall rules specifying filte ...