Paul Ashley, Ph.D.

Paul Ashley, Ph.D.

Brisbane, Queensland, Australia
1K followers 500+ connections

About

With over three decades of experience, I specialize in digital identity, privacy, and…

Experience

  • Anonyome Labs, Inc. Graphic
  • -

    Gold Coast

  • -

    Gold Coast

  • -

    Brisbane

  • -

    Brisbane, Australia

  • -

    Brisbane, Australia

  • -

    Austin, Texas Metropolitan Area

Education

Publications

  • MySudo VoIP with Privacy Focus

    Watchman Privacy Podcast

    Gabriel speaks with Paul Ashley of Anonyome Labs: creators of the VoIP service MySudo. The service is essential for privacy users: it allows you to have up to nine legitimate phone numbers organized in a handy app that is zero-knowledge encrypted.

    See publication
  • Reusable Digital Identity

    Privacy Files Podcast

    Dr. Ashley provides an update on the topic of decentralized identity and how companies are using blockchain technology to develop reusable credentials, sometimes referred to as reusable digital identity.

    See publication
  • Privacy Solutions

    The Bid Picture Podcast

    Host Bidemi Ologunde spoke with Dr. Paul Ashley, the Chief Technology Officer at Anonyome Labs, a company that specializes in decentralized identity and privacy solutions.

    See publication
  • Will Consumers Pay for an Identity Product?

    The Future of Identity Podcast

    Today’s guest is Paul Ashley, CTO and co-CEO of Anonyome Labs. Paul starts by talking about how the erosion of privacy online and the rise of data brokers and surveillance capitalism led them to create their IDtech product MySudo. MySudo is a privacy application that allows users to create secure digital profiles, or personas, with unique disposable phone numbers, emails, credit cards, and other identifiers to use across the internet.

    See publication
  • Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

    IBM Redpaper

    In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of…

    In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of risks.
    This IBM® Redguide™ publication introduces the solution, which is a (IPS) that extends on the capabilities of traditional protocol-based IPSes by providing application visibility and control. By using the IBM X-Force® advanced research and development, this solution provides critical insight and control of all user activities by analyzing each connection to identify the web or non-web application in use and the action being taken. The IBM Security Network Protection solution can then decide to allow or block the connection. Additionally, the solution is able to record connection information, including user and application context, and can use this information for local policy refinement including bandwidth management. Alternatively, the connection information can be sent off-box to a (SIEM) for longer term storage and analysis.
    The IBM Security Network Protection consolidation of the traditional IPS function, in combination with sophisticated user-based application control, can provide an integrated security solution. This approach allows for faster deployment and simplification of administration that is associated with the deployment of multiple products, reduces the cost of ownership and complexity, and provides for better return on investment (ROI).
    The target audience for this publication is business leaders, decision makers, network managers, IT security managers, and IT and business consultants.

    Other authors
    See publication
  • Deploy IBM Security Network Protection in an Open vSwitch

    IBM DeveloperWork

    This article outlines how to configure IBM Security Network Protection (XGS5100) into an Open vSwitch–based software-defined network to protect your virtual assets. Open vSwitch is an OpenFlow–based virtual switch commonly used in cloud-based environments.

    Other authors
    See publication
  • Providing Next Generation Intrusion Prevention Functionality by Using the IBM Security Network Protection System

    IBM Redpaper

    This IBM® Redguide™ publication introduces the solution, which is a (IPS) that extends on the capabilities of traditional protocol-based IPSes by providing application visibility and control.

    Other authors
    See publication
  • Understanding SOA Security Design and Implementation

    IBM Redbook

    Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them…

    Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business.

    In this IBM Redbooks publication, security is factored into the SOA life cycle reflecting the fact that security is a business requirement, and not just a technology attribute. We discuss an SOA security model that captures the essence of security services and securing services. These approaches to SOA security are discussed in the context of some scenarios, and observed patterns. We also discuss a reference model to address the requirements, patterns of deployment, and usage, and an approach to an integrated security management for SOA.

    This book is a valuable resource to senior security officers, architects, and security administrators.

    Other authors
    See publication
  • Federated Identity and Trust Management

    IBM Redpaper

    This IBM Redpaper discusses the IBM Tivoli software strategy and roadmap for a consistent, unified, and evolutionary approach to securing cross-enterprise e-business solutions. Built on open security standards, with tight integration to Web middleware (Java 2 Platform Enterprise Edition (J2EE) and Microsoft .NET), Tivoli security solutions allow you to increase the reach of your business. They build on existing Web security investments that can quickly evolve to take advantage of web services…

    This IBM Redpaper discusses the IBM Tivoli software strategy and roadmap for a consistent, unified, and evolutionary approach to securing cross-enterprise e-business solutions. Built on open security standards, with tight integration to Web middleware (Java 2 Platform Enterprise Edition (J2EE) and Microsoft .NET), Tivoli security solutions allow you to increase the reach of your business. They build on existing Web security investments that can quickly evolve to take advantage of web services and federation standards.

    Other authors
    See publication
  • Practical Intranet Security: Overiew of the State of the Art and Available Technologies

    Kluwer Academic Publishers

    Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and…

    Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies.
    This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet.
    The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets.
    The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book.

    Other authors
    See publication
Join now to see all publications

Patents

  • Apparatus and Method for Cross-Domain Digital Verifiable Credential Exchange

    Issued US 12,210,597

    A non-transitory computer readable storage medium has instructions executed by a processor to host a digital verified credential exchange in network communication with different verified credential operating environments. The digital verified credential exchange has a verified credential exchange engine in network communication with user and system interfaces for interacting with a verified credential holder machine, a credential database, a verified credential operating environment operating…

    A non-transitory computer readable storage medium has instructions executed by a processor to host a digital verified credential exchange in network communication with different verified credential operating environments. The digital verified credential exchange has a verified credential exchange engine in network communication with user and system interfaces for interacting with a verified credential holder machine, a credential database, a verified credential operating environment operating attributes database, an exchanged verified credential database, and an exchanged verified credential status monitor. The digital verified credential exchange automatically forms a reissued digital verified credential from a first verified credential operating environment for execution in a second verified credential operating environment.

    Other inventors
  • Apparatus and Method for Persistent Digital Rights Management

    Issued US12,141,247

    A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores instructions executed by the processor to record the purchase of a digital asset by a user at a client machine from a data source machine in network communication with the client machine. The location of the digital asset on one or more machines of the…

    A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores instructions executed by the processor to record the purchase of a digital asset by a user at a client machine from a data source machine in network communication with the client machine. The location of the digital asset on one or more machines of the networked machines is archived. The location is separate from the data source machine. The digital asset is associated with a data access policy. A request for the digital asset is received. The data access policy is enforced through programmatic control utilized by one or more of the networked machines to form a consent state. Distribution of the digital asset to a networked machine is authorized in response to the consent state.

    Other inventors
  • Apparatus and Method for Persistent Digital Rights Management

    Issued US 11,928,188

    A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores instructions executed by the processor to record the purchase of a digital asset by a user at a client machine from a data source machine in network communication with the client machine. The location of the digital asset on one or more machines of the…

    A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores instructions executed by the processor to record the purchase of a digital asset by a user at a client machine from a data source machine in network communication with the client machine. The location of the digital asset on one or more machines of the networked machines is archived. The location is separate from the data source machine. The digital asset is associated with a data access policy. A request for the digital asset is received. The data access policy is enforced through programmatic control utilized by one or more of the networked machines to form a consent state. Distribution of the digital asset to a networked machine is authorized in response to the consent state.

    Other inventors
  • A Persona Based Privacy Browser

    Issued US11,860,984

    A non-transitory computer readable storage medium with instructions executed by a
    processor maintains a digital wallet with digital identities. Each digital identity has persona
    attributes, a persona address book, a persona password manager, a persona email service, and a
    persona egress client specifying a persona egress location. A user is prompted to specify a
    selected digital identity. Browser state for the selected digital identity is loaded.

    Other inventors
  • Apparatus and Method for Processing Virtual Credit Cards for Digital Identities

    Issued US11,568,408

    A non-transitory computer readable storage medium has instructions executed by a
    processor to maintain digital identities. Each digital identity has identity attributes different
    than identity attributes associated with a real individual utilizing the digital identity. Each
    digital identity has an associated attribute for compartmentalized network activity.
    Interactions between the digital identities and a virtual card provider are supported to secure
    virtual cards for the…

    A non-transitory computer readable storage medium has instructions executed by a
    processor to maintain digital identities. Each digital identity has identity attributes different
    than identity attributes associated with a real individual utilizing the digital identity. Each
    digital identity has an associated attribute for compartmentalized network activity.
    Interactions between the digital identities and a virtual card provider are supported to secure
    virtual cards for the digital identities. Interactions between the digital identities and a persona
    management application are brokered, including delivering the virtual cards for the digital
    identities to the persona management application.

    Other inventors
    See patent
  • Digital Wallet for Digital Identities and Interactions with a Digital Identity Services Platform

    Issued US 11,507,943

    A non-transitory computer readable storage medium has instructions executed by a
    processor to maintain a digital wallet with digital identities. Each digital identity has
    identity attributes different than identity attributes associated with a real individual utilizing
    the digital identity, an associated attribute for compartmentalized network activity, a digital
    identity key pair, and a designated block chain. Interactions between the digital identities of
    the digital wallet and…

    A non-transitory computer readable storage medium has instructions executed by a
    processor to maintain a digital wallet with digital identities. Each digital identity has
    identity attributes different than identity attributes associated with a real individual utilizing
    the digital identity, an associated attribute for compartmentalized network activity, a digital
    identity key pair, and a designated block chain. Interactions between the digital identities of
    the digital wallet and a digital identity services platform are supported.

    Other inventors
    See patent
  • Apparatus and Method for Evaluating and Modifying Data Associated with Digital Identities

    Issued US 11,477,178

    An apparatus has a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to store identity attributes including
    real identity attributes for a real individual and at least two sets of digital identity attributes
    each operative as a personal privacy proxy with compartmental identity attributes. The at
    least two sets of digital identity attributes each include a digital identity name, a digital
    identity mobile device number and…

    An apparatus has a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to store identity attributes including
    real identity attributes for a real individual and at least two sets of digital identity attributes
    each operative as a personal privacy proxy with compartmental identity attributes. The at
    least two sets of digital identity attributes each include a digital identity name, a digital
    identity mobile device number and a digital identity email address. The at least two sets of
    digital identity attributes are evaluated to produce a similarity measure. The real individual is
    provided with a recommendation based upon the similarity measure.

    Other inventors
    See patent
  • Apparatus and Method for Persona Based Isolation Browsing

    Issued US11,290,429

    An apparatus has a persona services platform in communication with a user device via a network and a selected isolation browser provider via the network. The persona services platform is configured to receive from the user device a request for an isolation browser. The selected isolation browser provider is designated from a pool of isolation browser providers. Isolation browser configuration information is requested from the selected isolation browser provider. The isolation browser…

    An apparatus has a persona services platform in communication with a user device via a network and a selected isolation browser provider via the network. The persona services platform is configured to receive from the user device a request for an isolation browser. The selected isolation browser provider is designated from a pool of isolation browser providers. Isolation browser configuration information is requested from the selected isolation browser provider. The isolation browser configuration information is augmented with persona specific configuration information to form complete isolation browser configuration information. The complete isolation browser configuration information is sent to the user device.

    Other inventors
    See patent
  • Apparatus and Method for Establishing Trust of Anonymous Identities

    Issued US 11,177,937

    This invention relates generally to communications in computer networks. More particularly, this invention is directed toward techniques for establishing trust of anonymous identities operating in computer networks.

    Other inventors
    See patent
  • Apparatus And Method For Managing Digital Identities And Controlling Their Correlation To Legal Identities

    Issued US 11,159,578

    This invention relates generally to communications in computer networks. More particularly, this invention is directed towards techniques for operating anonymous digital identities that can be connected to an owner’s legal identity only after a legal mandate is presented.

    Other inventors
    See patent
  • Apparatus And Method For Enabling Owner Authorized Monitored Stewardship Over Protected Data In Computing Devices

    Issued US 10,963,582

    A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores cryptographically protected data, a data access policy and a steward group specifying individuals to administer the data access policy. The memory stores instructions executed by the processor to receive a request to access the cryptographically protected…

    A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores cryptographically protected data, a data access policy and a steward group specifying individuals to administer the data access policy. The memory stores instructions executed by the processor to receive a request to access the cryptographically protected data. Authentication tokens from individuals in the steward group are collected. It is determined that the authentication tokens satisfy the data access policy to establish a data access state. A decrypted version of the cryptographically protected data is supplied to one or more of the networked machines to establish a transaction. The transaction is recorded with a distributed ledger associated with at least a subset of the networked machines.

    Other inventors
    See patent
  • System and Method to Automate Website User Interface Navigation

    Issued US 10,943,063

    An apparatus has a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to store identity attributes including
    real identity attributes for a real individual and a digital identity with digital identity data
    attributes operative as a personal privacy proxy for the real individual. Website input forms
    are automatically filled alternately using the real identity attributes and the digital identity
    attributes.

    Other inventors
    See patent
  • Apparatus and Method for Building, Extending and Managing Interactions Between Digital Identities and Digital Identity Applications

    Issued US 10,931,650

    An apparatus includes a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to store identity attributes including
    real identity attributes for a real individual and a digital identity with digital identity data
    attributes operative as a personal privacy proxy for the real individual. A digital identity
    management system is hosted to communicate with digital identity applications that observe a
    common application program…

    An apparatus includes a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to store identity attributes including
    real identity attributes for a real individual and a digital identity with digital identity data
    attributes operative as a personal privacy proxy for the real individual. A digital identity
    management system is hosted to communicate with digital identity applications that observe a
    common application program interface. Each digital identity application implements at least
    one digital network function for the digital identity.

    Other inventors
    See patent
  • Apparatus and Method for Managing Digital Identities

    Issued US 10,511,493

    An apparatus has a processor and memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual an at least two sets of digital identity attributes each operative as a personal privacy proxy with compartmental identity attributes. The at least two sets of digital identity attribute include a first machine generated digital identity email address with a first role and a second…

    An apparatus has a processor and memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual an at least two sets of digital identity attributes each operative as a personal privacy proxy with compartmental identity attributes. The at least two sets of digital identity attribute include a first machine generated digital identity email address with a first role and a second machine generated digital identity email address associated with a second role.

    Other inventors
    See patent
  • Apparatus And Method For Automating Secure Email For Multiple Personas

    Issued US 10,382,211

    A machine has a processor and a network interface circuit connected to the processor
    to provide network connectivity to a client device. A memory is connected to the processor.
    The memory stores instructions executed by the processor to implement a persona
    management service that operates to receive a request for a new email account from the client
    device. A new email account is created in response to the request. Cryptographic credentials
    for the new email account are received…

    A machine has a processor and a network interface circuit connected to the processor
    to provide network connectivity to a client device. A memory is connected to the processor.
    The memory stores instructions executed by the processor to implement a persona
    management service that operates to receive a request for a new email account from the client
    device. A new email account is created in response to the request. Cryptographic credentials
    for the new email account are received from the client device. The cryptographic credentials
    are sent to a certificate authority. A certificate authority validation is received from the
    certificate authority. The new email account with a cryptographic credential from the
    certificate authority is registered. The cryptographic credential is conveyed to the client
    device.

    Other inventors
    See patent
  • Apparatus and Method For Administering Proxy Identities

    Issued US 10,356,052

    A non-transitory computer readable storage medium has instructions executed
    by a processor to host a proxy identity depot service application program interface to provide
    communication channels for proxy identity enabled applications operative on client devices.
    A proxy identity depot has a proxy identity management service, a proxy identity reputation
    service and a proxy identity transfer service. The proxy identity depot includes proxy
    identities for a real user, where each…

    A non-transitory computer readable storage medium has instructions executed
    by a processor to host a proxy identity depot service application program interface to provide
    communication channels for proxy identity enabled applications operative on client devices.
    A proxy identity depot has a proxy identity management service, a proxy identity reputation
    service and a proxy identity transfer service. The proxy identity depot includes proxy
    identities for a real user, where each proxy identity has its own identity attributes to protect
    primary identity attributes of the real user and thereby each proxy identity is operative as a
    personal privacy proxy.

    Other inventors
    See patent
  • Method And System For Providing Persona Masking In A Computer Network

    Issued US 10,320,753

    A machine has a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to allow a user to designate a selected
    persona from a pool of potential personas, where each potential persona is associated with the
    user and has a distinct set of computer network attributes. A virtual private network egress
    point for the selected persona is designated, where the virtual private network egress point
    masks computer network attributes of…

    A machine has a processor and a memory connected to the processor. The
    memory stores instructions executed by the processor to allow a user to designate a selected
    persona from a pool of potential personas, where each potential persona is associated with the
    user and has a distinct set of computer network attributes. A virtual private network egress
    point for the selected persona is designated, where the virtual private network egress point
    masks computer network attributes of the selected persona. Contact with the virtual private
    network egress point is coordinated to initiate a network communication for the selected
    persona.

    Other inventors
    See patent
  • Apparatus and Method For Identifying and Warning Of Synthetic Identity Behavior That Reduces User Privacy

    Issued US 10,178,106

    A non-transitory computer readable storage medium has instructions executed by a processor to collect mobile device environment parameters. Identity attributes including real identity attributes for a real individual and at least one set of synthetic identity attributes are stored. An electronic communication attempt by a designated entity corresponding to either the real identity attributes or the at least one set of synthetic identity attributes is monitored. The electronic communication…

    A non-transitory computer readable storage medium has instructions executed by a processor to collect mobile device environment parameters. Identity attributes including real identity attributes for a real individual and at least one set of synthetic identity attributes are stored. An electronic communication attempt by a designated entity corresponding to either the real identity attributes or the at least one set of synthetic identity attributes is monitored. The electronic communication attempt is analyzed in connection with the mobile device environment parameters and identity attributes to identify a rule transgression. A warning is supplied in connection with the electronic communication attempt in response to the rule transgression.

    Other inventors
    See patent
  • Executing Electronic Contract on NFC Enabled Mobile Devices

    Issued US 10,032,240

    A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted…

    A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.

    Other inventors
    See patent
  • Secure Connection Certificate Verification

    Issued US 9,906,371

    One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.

    Other inventors
    See patent
  • Email Application for Synthetic Identities

    Issued US 9,729,519

    A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive an email account request, a name and a public key. A selected domain name is designated from a group of available domain names. A user name is generated based upon the name. An email account is formed using the user name and the selected domain name. The public key is stored.

    A machine has a processor and a memory connected to the processor. The memory…

    A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive an email account request, a name and a public key. A selected domain name is designated from a group of available domain names. A user name is generated based upon the name. An email account is formed using the user name and the selected domain name. The public key is stored.

    A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to prompt a user for a name associated with a request for an email account. A private key and a public key for the email account are generated. The public key, the name and the request for an email account are sent to an email provider. The private key is stored.

    Other inventors
    See patent
  • Sharing Web Application Sessions Across Multiple Devices

    Issued US 9,729,642

    A technique to at least partial transfer an active network communication session associated with a server and an authenticated user communicating through a first device. The at least partial transfer includes the following actions (not necessarily in the following order): (i) recording the network communication session on an inline network device; (ii) asso­ ciating the network communication session with the second device on the inline network device; and (iii) sending session continuation…

    A technique to at least partial transfer an active network communication session associated with a server and an authenticated user communicating through a first device. The at least partial transfer includes the following actions (not necessarily in the following order): (i) recording the network communication session on an inline network device; (ii) asso­ ciating the network communication session with the second device on the inline network device; and (iii) sending session continuation information from the inline network device to at least the second device and/or the server. The first device is in data communication with the inline network device during at least a portion ofthe recording step. The session continuation information sent at the sending step includes information enabling the user to continue the active network communica­ tion session through the second device. The inline network device performs at least the associating step and the sending step under control of computer software running on computer hardware.

    Other inventors
    See patent
  • Decentralized Reputation Service for Synthetic Identities

    Issued US 9,703,986

    A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to collect synthetic identity activity information characterizing computer network activity associated with a synthetic identity. A synthetic identity reputation score is computed based upon a current synthetic identity reputation score, a synthetic identity activity value and an activity provider weighting.

    Other inventors
  • Automated Network Security Policy Deployment in a Dynamic Environment

    Issued US 9,654,513

    A method, system and computer-usable medium are disclosed for automatically deploying a network security policy based on virtual network topology in a dynamic software defined network (SDN) comprising: providing a flow control interface in a dynamic SDN wherein the flow control interface receives virtual network topology, operational endpoints, and policy to apply to the operational endpoints; responsive to receiving an SDN change indication, identifying changes to enforcement points for an SDN…

    A method, system and computer-usable medium are disclosed for automatically deploying a network security policy based on virtual network topology in a dynamic software defined network (SDN) comprising: providing a flow control interface in a dynamic SDN wherein the flow control interface receives virtual network topology, operational endpoints, and policy to apply to the operational endpoints; responsive to receiving an SDN change indication, identifying changes to enforcement points for an SDN change corresponding to the SDN change indication; and, providing enforcement points affected by the SDN change with a policy reflecting the SDN change.

    Other inventors
  • System And Method For Software Defined Deployment Of Security Appliances Using Policy Templates

    Issued US 9,621,592

    A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating…

    A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed. A security template library is accessed to select a security template for each network appliance that will implement the one or more security policy for that network appliance to be deployed.

    Other inventors
  • Dynamic Security Sandboxing Based on Intruder Intent

    Issued US 9,535,731

    A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of…

    A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.

    Other inventors
  • Apparatus and Method for Masking a Real User Controlling Synthetic Identities

    Issued US 9,372,987

    A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response to the challenge to establish confirmation that the first request originated from a human user, issue a user identification in response to the confirmation, store the user identification with encrypted identity data, receive a second request that includes the user identification, and return the encrypted identity data in response to the…

    A machine has a processor and a memory storing instructions executed by the processor to issue a challenge in response to a first request, evaluate a response to the challenge to establish confirmation that the first request originated from a human user, issue a user identification in response to the confirmation, store the user identification with encrypted identity data, receive a second request that includes the user identification, and return the encrypted identity data in response to the second request.

    Other inventors
  • Apparatus and Method for Supporting Telephonic Synthetic Identities

    Issued US 9,374,689

    A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to match a communication sender number or a communication receiver number associated with a communication to a synthetic identity. A parameter associated with the synthetic identity is selected. Delivery of the communication is coordinated such that the recipient of the communication views the parameter upon receipt of the communication.

    Other inventors
  • Providing a Domain to IP Address Reputation Service

    Issued US 9,270,684

    An approach is provided to verify a network address. In the approach, a network address is received from a domain name service (DNS) based on a requested uniform resource locator (URL) that corresponds to a requested domain. A set of one or more network addresses previously established as corresponding to the requested domain is retrieved from a data store accessible from the information handling system. The information handling system is automatically connected to the network address in…

    An approach is provided to verify a network address. In the approach, a network address is received from a domain name service (DNS) based on a requested uniform resource locator (URL) that corresponds to a requested domain. A set of one or more network addresses previously established as corresponding to the requested domain is retrieved from a data store accessible from the information handling system. The information handling system is automatically connected to the network address in response to the received network address matching one of the set of one or more retrieved network addresses.

    Other inventors
  • Managing Distribution of Software Updates in Near Field Communication (NFC) Mobile Devices

    Issued US 9,198,031

    A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information…

    A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.

    Other inventors
  • Automated Role And Entitlements Mining Using Network Observations

    Issued US 9,154,507

    A role and entitlements mining system uses network intelligence to facilitate role definition. The system records traffic on a network. The traffic is analyzed to identify the user and application involved. The matched data is then provided to an analytics engine, which analyzes that data to attempt to derive an initial set of one or more roles and the application entitlements for each role. Each role derived by the analytics engine identifies one or more users who are identified as belonging…

    A role and entitlements mining system uses network intelligence to facilitate role definition. The system records traffic on a network. The traffic is analyzed to identify the user and application involved. The matched data is then provided to an analytics engine, which analyzes that data to attempt to derive an initial set of one or more roles and the application entitlements for each role. Each role derived by the analytics engine identifies one or more users who are identified as belonging to the role, as well as one or more application entitlements. Preferably, one or more directory services are then interrogated for known group and user relationships to detect
    whether the roles identified by the analytics engine can be modified or enriched. Evaluation of the known group and user relationships provides a way to identify a more granular set of role definitions. A role-based access control policy is then generated.

    Other inventors
  • Accessing Local Applications When Roaming Using A NFC Mobile Device

    Issued US 9,088,410

    A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the…

    A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the sec­ond partition of the SIM.

    Other inventors
  • Cooperative Intrusion Detection Ecosystem For IP Reputation-Based Security

    Issued US 8,925,082

    An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation influencing events information
    between or among the cooperating systems in realtime to enhance overall system response time and to prevent otherwise hidden attacks from damaging network resources. An IDS includes an IP reputation analytics engine to analyze new and existing events, correlate information, and to raise
    potential…

    An intrusion detection system (IDS) is enhanced to operate in a cluster of such systems, and IDSs organized into a cluster cooperate to exchange IP reputation influencing events information
    between or among the cooperating systems in realtime to enhance overall system response time and to prevent otherwise hidden attacks from damaging network resources. An IDS includes an IP reputation analytics engine to analyze new and existing events, correlate information, and to raise
    potential alerts. The IP reputation analytics engines may implement an algorithm, such as a pattern matching algorithm, a continuous data mining algorithm, or the like, to facilitate this operation. Clustering IDS endpoints to share IP reputation influencing events, using the cluster-wide view to
    determine IP reputation, and feeding the cluster-wide view back to the IDS endpoints, provides for enhanced and early detection of threats that is much more reliable and scalable as
    compared to prior art techniques.

  • Method and System for Implementing Privacy Notice, Consent, and Preference with a Privacy Proxy

    Issued US 8,464,311

    A method is presented for processing data for a privacy policy concerning management of personally identifiable information. A proxy intercepts a first message from a server to a client and determines that the first message initiates collection of personally identifiable information from a user of the client. The proxy then sends a second message to the client that requests consent from the user to the privacy policy. If the user provides consent within a third message that is received by the…

    A method is presented for processing data for a privacy policy concerning management of personally identifiable information. A proxy intercepts a first message from a server to a client and determines that the first message initiates collection of personally identifiable information from a user of the client. The proxy then sends a second message to the client that requests consent from the user to the privacy policy. If the user provides consent within a third message that is received by the proxy from the client, then the proxy sends the intercepted first message to the client. If the user does not provide consent, then the proxy sends a fourth message to the server that fails the collection of personally identifiable information from the client by the server. The proxy may also obtain user preferences for options concerning management of the personally identifiable information by a data processing system.

    Other inventors
  • Method And System For Externalizing Session Management Using A Reverse Proxy

    Issued US 8,095,658

    A method system and computer program product is presented for providing access to a set of resources in a distributed data processing system. A reverse proxy server receives a resource request from a client and determines whether or not it is managing a session identifier that was previously associated with the client by the reverse proxy server. If so, it retrieves the session identifier, otherwise it obtains a session identifier and associates the session identifier with the client using…

    A method system and computer program product is presented for providing access to a set of resources in a distributed data processing system. A reverse proxy server receives a resource request from a client and determines whether or not it is managing a session identifier that was previously associated with the client by the reverse proxy server. If so, it retrieves the session identifier, otherwise it obtains a session identifier and associates the session identifier with the client using information that is managed by the reverse proxy server. The reverse proxy server then modifies the resource request to include the session identifier and forwards the modified resource request to an application server.

    Other inventors
  • Method And System For Providing User Control Over Receipt Of Cookies From E-Commerce Applications

    Issued US 7921152B2

    A method, system, apparatus, and computer program product are presented for processing cookies that are transmitted from a server through a proxy server to a client that is operated by a user. The proxy server detects that a response message from the server for the client has an associated cookie. The proxy server extracts a domain identifier associated with the server from the response message, and the proxy server retrieves a set of parameters that contain domain identifiers that are…

    A method, system, apparatus, and computer program product are presented for processing cookies that are transmitted from a server through a proxy server to a client that is operated by a user. The proxy server detects that a response message from the server for the client has an associated cookie. The proxy server extracts a domain identifier associated with the server from the response message, and the proxy server retrieves a set of parameters that contain domain identifiers that are associated with indications of whether to block transmission of cookies from servers associated with the domain identifiers. The proxy server then processes the cookie in the response message in accordance with the retrieved set of parameters and the extracted domain identifier, either blocking or not blocking cookies from the identified domain. Blocked cookies are cached for subsequent use. Multiple sets of parameters may be configured by the user.

    Other inventors
  • Method and System For Implementing Privacy Policy Enforcement With a Privacy Proxy

    Issued US 7797726B2

    A method is presented for enforcing a privacy policy concerning management of personally identifiable information in a centralized manner through a privacy proxy agent. A proxy intercepts a message from a first system to a second system, e.g., from a server to a client, and determines whether the message is associated with an operation on personally identifiable information; if not, then the proxy sends the message to the second system, but if so, then the proxy determines whether the operation…

    A method is presented for enforcing a privacy policy concerning management of personally identifiable information in a centralized manner through a privacy proxy agent. A proxy intercepts a message from a first system to a second system, e.g., from a server to a client, and determines whether the message is associated with an operation on personally identifiable information; if not, then the proxy sends the message to the second system, but if so, then the proxy determines whether the operation on the personally identifiable information is compliant with a privacy policy and with user preference information with respect to the privacy policy for a user who is associated the personally identifiable information. If the message is compliant with the privacy policy and user preference data, then the proxy sends the first message to the second system; otherwise, an error indication is returned to the first system.

    Other inventors
  • Method and System for Automating Purpose Usage Selection on Web Sites

    Issued US 7734642B2

    This invention automates the selection of purpose usages when a user agent interacts with a web site that has been enabled for automated purpose usage information exchange. A user first configures the purpose usage automation in his or her user agent. At this stage, which typically occurs offline, the user decides on a level of automation when specifying the one or more purpose usages. If desired, this preference may depend on how "trusted" the site is to the user.

    Other inventors
  • Method and System for Stepping up to Certificate-Based Authentication without breaking an existing SSL Session

    Issued US 7395424B2

    A method is presented for performing authentication operations. When a client requests a resource from a server, a non-certificate-based authentication operation is performed through an SSL (Secure Sockets Layer) session between the server and the client. When the client requests another resource, the server determines to step up to a more restrictive level of authentication, and a certificate-based authentication operation is performed through the SSL session without exiting or renegotiating…

    A method is presented for performing authentication operations. When a client requests a resource from a server, a non-certificate-based authentication operation is performed through an SSL (Secure Sockets Layer) session between the server and the client. When the client requests another resource, the server determines to step up to a more restrictive level of authentication, and a certificate-based authentication operation is performed through the SSL session without exiting or renegotiating the SSL session prior to completion of the certificate-based authentication operation. During the certificate-based authentication procedure, an executable module is downloaded to the client from the server through the SSL session, after which the server receives through the SSL session a digital signature that has been generated by the executable module using a digital certificate at the client. In response to successfully verifying the digital signature at the server, the server provides access to a requested resource.

    Other inventors
  • Establishing a Secure Context for Communicating Messages Between Computer Systems

    Issued EU 1714422B1

    Also filed in the US US20050154889A1 Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol

    A method for establishing a secure context for communicating messages between a client and a server is presented that is compliant with the Generic Security Service application programming interface (GSS-API). The client sends to the server a first message containing a first symmetric secret key generated by the client and an authentication token; the first…

    Also filed in the US US20050154889A1 Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol

    A method for establishing a secure context for communicating messages between a client and a server is presented that is compliant with the Generic Security Service application programming interface (GSS-API). The client sends to the server a first message containing a first symmetric secret key generated by the client and an authentication token; the first message is secured with the public key from the server's public key certificate. After the server authenticates the client based on the authentication token, the client then receives from the server a second message that has been secured with the first symmetric secret key and that contains a second symmetric secret key. The client and the server employ the second symmetric secret key to secure subsequent messages sent between the client and the server. The authentication token may be a public key certificate associated with the client, a username-password pair, or a secure ticket.

    Other inventors
    • robert fyfe
    • Michael Thomas

Organizations

  • Australian Information Security Association

    Honorary Life Time Member

    - Present
  • IEEE

    Senior Member

    - Present
  • International Conference on Blockchain and Cryptocurrency (ICBC)

    Organizing Committee

    Industry Relations Co-Chair

Recommendations received

View Paul’s full profile

  • See who you know in common
  • Get introduced
  • Contact Paul directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses