Patrick Drew McDaniel - Chatham NJ, US Martin Joel Strauss - Summit NJ, US
Assignee:
AT&T Intellectual Property II, L.P. - Reno NV
International Classification:
H04M 1/66
US Classification:
455411, 455410, 37911201, 37911414
Abstract:
The present invention is a system and method for establishing a secure connection using a public a wireless telephone network. The method utilizes a proxy base station and establishes an encrypted session over the public wireless network between a wireless handset and the proxy base station. The proxy base station further establishes a connection with second communication station such as a landline phone. The proxy base station determines a most secure channel between the base station and the second communication station by consulting a database of channels and associated measures of security.
End-To-End Secure Wireless Communication For Requesting A More Secure Channel
Patrick Drew McDaniel - Chatham NJ, US Martin Joel Strauss - Summit NJ, US
Assignee:
AT&T Intellectual Property II, L.P. - Atlanta GA
International Classification:
H04M 1/66
US Classification:
455411, 455410, 37911201, 37911414
Abstract:
The present invention is a system and method for establishing a secure connection using a public a wireless telephone network. The method utilizes a proxy base station and establishes an encrypted session over the public wireless network between a wireless handset and the proxy base station. The proxy base station further establishes a connection with second communication station such as a landline phone. The proxy base station determines a most secure channel between the base station and the second communication station by consulting a database of channels and associated measures of security.
Method And Apparatus For On Demand Certificate Revocation Updates
Aviel Rubin - West Caldwell NJ, US Patrick McDaniel - Ann Arbor MI, US
International Classification:
G06F015/173
US Classification:
709/225000, 709/223000
Abstract:
A method of distributing revocation state information includes receiving first update scheduling information from a first party, and sending digital certificate revocation state information to the first party according to a schedule that is based on the first update scheduling information.
Method And System For Determining And Enforcing Security Policy In A Communication Session
Patrick McDaniel - Chatham NJ, US Atul Prakash - Ann Arbor MI, US
International Classification:
G06F011/30
US Classification:
713/201000, 713/153000, 380/277000
Abstract:
A method and system for determining and enforcing security policy in a communication session are provided in distributed systems. Policy encompasses the provisioning, authorization, and access control within the protected environment. Hence, all communication security requirements are explicitly stated through policy. A policy instantiation is constructed at run-time through policy determination. Conditional, abstract, and discretionary policies stated by communication participants are reconciled to arrive at an instantiation. The resulting instantiation is a concrete specification of the mechanisms, configurations, and access control model to be implemented by the session. The semantics of an instantiation are achieved through policy enforcement. The policy enforcement architecture implements session policies through the composition and configuration of security mechanisms using a novel event-bus architecture. Policy is enforced through the observation of and reaction to relevant events. The method and system of the invention diverges from past subscription-based event architectures by introducing additional infrastructure allowing significant implementation flexibility, robustness, and efficiency.
William Aiello - Vancouver, CA Charles Kalmanek - Short Hills NJ, US William Leighton - Scotch Pines NJ, US Patrick McDaniel - State College PA, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Jacobus Van der Merwe - New Providence NJ, US
Assignee:
AT&T Corp - New York NY
International Classification:
G06F 15/16
US Classification:
726011000
Abstract:
A reverse firewall for removing undesirable traffic from a computing network, such as a virtual private network (VPN), is disclosed. The reverse firewall uses firewall rules that may be determined and maintained within the enterprise network to control communication sent between computers in the computing network. The reverse firewall rules may be used to identify the communications between computers in the network that are undesirable and/or intrusive. For example, a computer in a network that is infected with a worm or that is surreptitiously hosting a denial-of-service attack may be identified by the reverse firewall and quarantined. The reverse firewall may be implemented in hardware and/or software.
Marketing mad scientist at 2nd Mile Marketing. In former lives Pat has pastored churches, been a CPA, been a sales manager, and an all around funny guy. Hopefully, he still is.
Tagline:
I find and share interesting (insightful) ideas- for marketing your biz online. And for life.