Check Point Software Technologies has patented a method and system for setting network policies based on connected electronic devices. Profiles of device behavior are used to generate policies to prevent unauthorized communications, rather than reacting to malware. The server stores device profiles and generates policies based on acceptable communications. GlobalData’s report on Check Point Software Technologies gives a 360-degree view of the company including its patenting strategy. Buy the report here.

According to GlobalData’s company profile on Check Point Software Technologies, IoT network security was a key innovation area identified from patents. Check Point Software Technologies's grant share as of April 2024 was 65%. Grant share is based on the ratio of number of grants to total number of patents.

Network policies based on electronic device profiles

Source: United States Patent and Trademark Office (USPTO). Credit: Check Point Software Technologies Ltd

The granted patent (Publication Number: US11968223B2) describes a server designed for sharing network profiles for electronic devices connected to a network. The server includes a memory to store profiles associated with the make and function of each device, along with details of acceptable communications. When a request for a profile is received, the server's circuitry identifies applicable profiles based on the make and function specified in the request. It then generates a policy by combining these profiles, deduplicating acceptable communications, and including them in the policy to regulate network access.

Furthermore, the server can also consider detected communications related to the make and function specified in the request. In such cases, the circuitry identifies the profile that enables these detected communications as an applicable profile. Additionally, the server can generate modified profiles to ensure that all detected communications are enabled. The patent also covers profiles containing approved external or internal communication sources and destinations. The system described in the patent includes the server and a controlling electronic device that implements the generated network policy to restrict unauthorized outgoing and incoming communications, acting as a firewall or network access control mechanism.

To know more about GlobalData’s detailed insights on Check Point Software Technologies, buy the report here.

Premium Insights

From

The gold standard of business intelligence.

Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.

GlobalData

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData Patent Analytics tracks bibliographic data, legal events data, point in time patent ownerships, and backward and forward citations from global patenting offices. Textual analysis and official patent classifications are used to group patents into key thematic areas and link them to specific companies across the world’s largest industries.