Patents Examined by Ashok B. Patel
  • Patent number: 7979531
    Abstract: Methods and systems for network management data collection have been provided. Underutilized computers in the network are allocated as a Network Management Data Collection Client (NMDCC) to collect network management data. The NMDCC receives program files from the network management server. The received program files are downloaded by the NMDCC in a compressed manner via a web service. The downloaded program files are executed for collecting the Network Management Data (NMD). The collected NMD is updated back on the network management server. The downloaded program files are discarded when the NMDCC is not collecting the network management data.
    Type: Grant
    Filed: February 8, 2006
    Date of Patent: July 12, 2011
    Assignee: Cisco Technology, Inc.
    Inventor: Ramaswamy Krishnaswamy
  • Patent number: 7970894
    Abstract: A method and a system for detecting access point devices that provide unauthorized wireless access to local area computer networks is provided. The method includes transferring one or more marker packets to the wired portion of the local area network. The one or more marker packets include an authentication data that is computed based at least upon identify of the wirelessly active access point device and a secret key. The method includes processing one or more wireless frames transmitted from the wirelessly active access point device to extract and to verify at least a portion of the authentication data.
    Type: Grant
    Filed: November 15, 2007
    Date of Patent: June 28, 2011
    Assignee: AirTight Networks, Inc.
    Inventor: Aniruddha Patwardhan
  • Patent number: 7966406
    Abstract: In one embodiment, supporting outbound proxy discovery includes receiving a first registration request at a home proxy, where the first registration request is received from a user agent. An outbound proxy set is assigned to the user agent. The outbound proxy set includes outbound proxies. An outbound proxy set identifier is inserted into a first registration response for the user agent. The outbound proxy set identifier allows the user agent to identify the plurality of outbound proxies.
    Type: Grant
    Filed: August 1, 2007
    Date of Patent: June 21, 2011
    Assignee: Cisco Technology, Inc.
    Inventor: Jonathan D. Rosenberg
  • Patent number: 7962558
    Abstract: The identity of the sender of an e-mail message is verified by performing a plurality of tests on DNS information. The DNS information is based on a client IP address or a sender address. Each test performed has a corresponding intrinsic confidence value representing the degree of confidence the test provides of the sender identity relationship. If multiple tests are successful the test result with the highest confidence value of the hierarchy of confidence values is used. The confidence value is optionally used in subsequent identity tests as specified by the subsequent test.
    Type: Grant
    Filed: March 3, 2009
    Date of Patent: June 14, 2011
    Assignee: International Business Machines Corporation
    Inventors: Mathew A. Nelson, Matthew N. Roy
  • Patent number: 7962606
    Abstract: A system for analyzing a packet-based network includes a correlator processor that is configured to receive packet records corresponding to packets communicated over a network and store the packet records in a data store. The correlator processor is also configured to generate correlated packet records from the packet records stored in the data store, the correlated packet records representative of the order in which the packets were transmitted in the network.
    Type: Grant
    Filed: January 24, 2006
    Date of Patent: June 14, 2011
    Assignee: Daintree Networks, Pty. Ltd.
    Inventors: Gregory Joseph Barron, Jason Yew Choo Choong, Peter Graeme Cobb, William Raymond Wood
  • Patent number: 7953868
    Abstract: A method and system for preventing a detection of web crawling. A randomizing HTTP proxy server receives a first request from a web crawler to scan a website and forwards the first request to a randomly selected first proxy computer. The first proxy computer utilizes a first network address translation (NAT)-enabled router to forward the first request to the website. A NAT algorithm associates a first source Internet Protocol (IP) address with the first request. The randomizing HTTP proxy server receives a second web crawler-initiated request to scan the website and forwards the second request to a randomly selected second proxy computer. The second proxy computer utilizes a second NAT-enabled router to forward the second request to the website. The NAT algorithm associates a second source IP address with the second request. The web server identifies the first and second source IP addresses as being different.
    Type: Grant
    Filed: January 31, 2007
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 7953830
    Abstract: Generally speaking, systems, methods and media for detection and network reconfiguration upon changes in dynamic host configuration protocol (DHCP) IP addresses are disclosed. Embodiments of a method may include setting a renew time and a rebind time of a DHCP configuration and establishing an IP address with a first DHCP server. Embodiments may also include, after passage of the renew time, transmitting a renew request to the first DHCP server at its IP address and, in response to failure to receive an acknowledgement message from the first DHCP server, determining if the first DHCP server IP address is still valid. Embodiments may also include, in response to determining that the first DHCP server IP address is not still valid, retrieving a second, different DHCP server IP address from a network change event signal and configuring a network adapter based on the second DHCP server IP address.
    Type: Grant
    Filed: November 7, 2006
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Robert K. Foster, Ajay K. Mahajan, Charles A. McLaughlin, Hemlata N. Reddy
  • Patent number: 7953827
    Abstract: Network addresses are dynamically allocated to blade information handling systems supported by a blade chassis having plural blade slots. A network address seed stored in memory associated with the blade chassis is retrieved by a management controller of a blade information handling system and applied by a network address generator to local network address information to generate a network address. The generated network address is applied by the management controller to a network component of the blade information handling system to establish communications over a network. For example, a WWN generated from a blade chassis seed address provides a blade information handling system host bus adapter access to a storage area network for boot from SAN support for the blade information handling system.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: May 31, 2011
    Assignee: Dell Products L.P.
    Inventors: Brett Roscoe, Michael Falsone
  • Patent number: 7945661
    Abstract: A method for real time monitoring of at least one TCP flow involves monitoring TCP packets flowing past a particular point in a TCP network. A flow trace including at least source and destination addresses for each TCP packet is determined and a packet record for each monitored TCP packet within a determined flow trace is created. Each of the packet records includes at least a transmitted order number and an actual received sequence number, from which an expected received sequence number for each packet record is determined and stored in the packet record. The difference between the expected received sequence number for each packet record and the expected received sequence number for the previous packet record is used to thereby determine by how much a particular packet was moved out of sequence.
    Type: Grant
    Filed: September 12, 2006
    Date of Patent: May 17, 2011
    Assignee: JDS Uniphase Corporation
    Inventors: Andrew Lehane, Martin Curran-Gray, Colin Arthur, Demessie Girma
  • Patent number: 7937442
    Abstract: A method, system, and architecture for detecting MCU failures is provided. The conference system detects the failure of MCUs that have been allocated to provide shared conference resources to conferences that are being hosted by the conference system. The conference system utilizes the sending and receiving of “heartbeat” messages between the MCUs and the conference server pool to detect failed MCUs. Upon detecting the failure of an MCU, the conference system performs a “rollover” of the conferences which were being serviced by the failed MCU to another available MCU. The conference system may then identify the clients which were connected to the failed MCU and notifies the clients that an MCU rollover has occurred and a new (replacement) MCU is available in order that these clients can reconnect and reestablish their media sessions.
    Type: Grant
    Filed: October 25, 2006
    Date of Patent: May 3, 2011
    Assignee: Microsoft Corporation
    Inventors: Dhigha Sekaran, Sankaran Narayanan
  • Patent number: 7933413
    Abstract: Key exchanges between peer-to-peer devices can be vulnerable to man in the middle attacks. Verification of the key exchanges can be made on a channel, network and/or device different from the channel, network and/or device used for the key exchange to determine whether the key exchange was secure. Verification of the key exchange can also be made through an established and trusted device and/or entity. If the key exchange was secure, the parties to a communication utilizing the key(s) exchanged can be notified, if desired. If the key exchange was not secure, the parties can be notified and the communication can be selectively disconnected.
    Type: Grant
    Filed: February 2, 2007
    Date of Patent: April 26, 2011
    Assignee: Microsoft Corporation
    Inventors: David J. Steeves, Gregory D. Hartrell, Ryan M. Burkhardt, Jason L. Cohen
  • Patent number: 7934001
    Abstract: Techniques for network-initiated session recovery are described. A relationship is maintained between two identifiers both associated with a session between a first device and an access terminal in a wireless network. The first identifier is associated with the first device, and the second identifier is associated with a second device in communication with the first device. After a breach of the session, communications associated with the session are preserved based on the relationship between the first and second identifiers.
    Type: Grant
    Filed: April 22, 2010
    Date of Patent: April 26, 2011
    Assignee: Airvana Network Solutions, Inc.
    Inventors: Gopal Harikumar, Woojune Kim, Dennis Ng, Sanjay Cherian
  • Patent number: 7930339
    Abstract: A distributed processing system includes plural nodes each provided with a processor and communicably connected to each other. A task information obtaining unit obtains antecedent dependency between tasks. A node information obtaining unit obtains a time constraint imposed on the tasks. A start time computing unit computes an absolute earliest start time at which a task can be started and an absolute latest start time allowed in order to complete the task within the time constraint, by referring to the time constraint. A node selector selects a destination node to which a target task not yet allocated to a node should be allocated, by referring to the absolute earliest start time and the absolute latest start time. A task placement unit causes the task to be executed in the selected node.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: April 19, 2011
    Assignee: Sony Computer Entertainment Inc.
    Inventors: Takao Tobita, Seiji Murata, Akihito Nagata, Wataru Kaneko, Kenichi Murata
  • Patent number: 7930401
    Abstract: A solution is provided for accessing a shared resource in a data processing system (such as a server of a DAM application) by a plurality of exploiter entities (such as clients). A corresponding method starts with the step of monitoring an activity of each enabled entity being granted an access to the shared resource. The access granted to each enabled entity is released in response to the reaching of a first threshold (such as a time-out period) by an inactivity indicator, which is indicative of the non-activity of the enabled entity (such as an idle time). The method continues by detecting a critical condition of the shared resource (such as after reaching a maximum number of concurrent accesses). The access granted to an eligible enabled entity (or more) is released in response to the critical condition; the inactivity indicator of each eligible enabled entity reaches a second threshold preceding the first threshold (such as a grant period lower than the time-out period).
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Antonio Castellucci, Roberto Guarda
  • Patent number: 7929690
    Abstract: An apparatus and method for implementing a secure quantum cryptography system using two non-orthogonal states. For each qubit, the to emitter station prepares a quantum system in one of two non-orthogonal quantum states in the time-basis to code bit values. Intra- and inter-qubit interference is then used to reveal eavesdropping attempts. Witness states are used to help reveal attacks performed across the quantum system separation.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: April 19, 2011
    Assignee: ID Quantique SA
    Inventors: Nicolas Gisin, Grégoire Ribordy, Hugo Zbinden
  • Patent number: 7921227
    Abstract: A method and apparatus for processing message is described. In one embodiment, an application programming interface is configured for receiving and sending messages. A building block layer is coupled to the application programming interface. A channel layer is coupled to the building block layer. A transport protocol stack is coupled to the channel layer for implementing properties specified by the channel layer. The transport protocol stack has a concurrent stack consisting of an out of band thread pool and a regular thread pool. The transport protocol layer is to process messages from each sender in parallel with the corresponding channel for each sender.
    Type: Grant
    Filed: May 30, 2007
    Date of Patent: April 5, 2011
    Assignee: Red Hat, Inc.
    Inventor: Bela Ban
  • Patent number: 7912926
    Abstract: A method for changing network configuration parameters that includes generating a request to change a network configuration parameter by a user, determining whether the user is allowed to change the network configuration parameter using a network configuration database, if the user is allowed to change the network configuration parameter, updating the network configuration database to reflect the change in the network configuration parameter, updating a container associated with the network configuration parameter to reflect the change in the configuration parameter, and if the user is not allowed to change the network configuration parameter, dropping the request.
    Type: Grant
    Filed: July 20, 2006
    Date of Patent: March 22, 2011
    Assignee: Oracle America, Inc.
    Inventors: Kais Belgaied, Erik Nordmark, Nicolas G. Droux, Sunay Tripathi, Darrin P. Johnson
  • Patent number: 7908491
    Abstract: The invention concerns a method for controlling access to encrypted data by control words (CW), said control words being received by a security module in control messages (ECM) and returned to a unit operating on (STB) the encrypted data.
    Type: Grant
    Filed: July 6, 2006
    Date of Patent: March 15, 2011
    Assignee: NagraCard S.A.
    Inventors: Henri Kudelski, Jimmy Cochard
  • Patent number: 7904572
    Abstract: An image processing apparatus which can be readily used by an authenticated user without laborsome setting even if the user uses the image processing apparatus for the first time through an authentication server. A user is authenticated with an authentication server connected to an image processing apparatus via a network. User unique setting information for the authenticated user is set, and the user unique setting information for each user is stored in user information storing areas. Initial setting information of initial setting of the image processing apparatus is stored in an initial setting information storing area. When the authenticated user uses the image processing apparatus for the first time, duplicate copy of the initial setting information stored in the initial setting information storing area is stored as the user unique setting information in the user information storing areas.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: March 8, 2011
    Assignee: Canon Denshi Kabushiki Kaisha
    Inventors: Shigeru Tadokoro, Satomi Yotsuyanagi
  • Patent number: 7895295
    Abstract: A data storage infrastructure is disclosed for a communication network that produces a plurality of data flows of network data. The data storage infrastructure comprises a plurality of data storage systems and a storage management system. The data storage systems are configured to store the network data. The storage management system is configured to identify characteristics for the data flows, score the characteristics for the data flows, and process the scores to assign individual ones of the data flows to individual ones of the data storage systems.
    Type: Grant
    Filed: January 19, 2006
    Date of Patent: February 22, 2011
    Assignee: Sprint Communications Company L.P.
    Inventors: Brajendra Singh Thakur, Nasir Mahmood Mirza