1
Vimal Vaidya: Dynamic signature inspection-based network intrusion detection. Internet Tools, Luce Forward Hamilton & Scripps, August 21, 2001: US06279113 (621 worldwide citation)

A signature based dynamic network intrusion detection system (IDS) includes attack signature profiles which are descriptive of characteristics of known network security violations. The attack signature profiles are organized into sets of attack signature profiles according to security requirements o ...


2
Pankaj S Parekh, Vimal Vaidya, Sandeep Gupta, Pranav Shah: Architecture for an integrated policy enforcement system. Ipolicy Networks, Thelen Reid Brown Raysman & Steiner, August 14, 2007: US07257833 (26 worldwide citation)

Enforcing a plurality of different policies on a stream of packets is disclosed. In lieu of running separate algorithms for each policy, the system exploits the commonalities of all of the policies. The conditions corresponding to the compiled rules are arranged in a condition tree and processed in ...


3
Vimal Vaidya, Kurt U Lennartsson, John C Myung: Method and apparatus to secure a computing environment. Law Office of Philip A Steiner, September 14, 2010: US07797752 (19 worldwide citation)

A method and apparatus for a surround security system is provided. The surround security system is embodied on a computer readable medium and includes a packet enforcement engine to screen packets to and from the network and a TCP/IP stack, an application enforcement engine to screen packets to and ...


4
Vimal Vaidya: Surround security system. RPX Corporation, Berkeley Law & Technology Group, November 26, 2013: US08595820 (3 worldwide citation)

A surround security system which screens packets transitioning a TCP/IP stack of a computer system from being broadcast over a network or being communicated to applications installed on the computer system. The surround security system may further include protections for the operating system, applic ...


5
Vimal Vaidya, Kurt Lennartsson: Method and apparatus for creating a secure anywhere system. RedCannon Security, December 17, 2013: US08613091 (2 worldwide citation)

A method and apparatus for providing portable end-point security are provided. In one embodiment, a PEPS system may include a PEPS processor having a memory operatively coupled thereto, the memory having stored therein instructions which when executed by the PEPS processor causes: an automatic loade ...


6
Vimal Vaidya, Silvia Siu: System, method and computer program product for centrally managing policies assignable to a plurality of portable end-point security devices over a network. Redcannon, Law Office Of Philip A Steiner, November 15, 2007: US20070266421-A1

A system, method and computer program product for centrally managing policies prescriptively assignable to a plurality of portable end-point security devices over a network is provided. Various embodiments incorporate an central management console configured to define a plurality of group folders on ...


7
Vimal Vaidya, Sylvia Siu: System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device. Redcannon, Law Office Of Philip A Steiner, April 24, 2008: US20080098478-A1

A system, method and computer program product for administering trust dependent functional control over a portable endpoint security device (PEPS). A reconnoitering application in conjunction with a trust enforcement policy determines a relative trusted state of the host processing unit and administ ...