Patents by Inventor Chuck A. Black

Chuck A. Black has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190007316
    Abstract: A protocol such as OpenFlow providing communication between an SDN framework controller on one network and a data plane device for another network can be used to modify or process network packets so that an external application or server can communicate with the controller and obtain information needed to uniquely associate the packets with particular end-stations even after those packets have traversed a NAT router.
    Type: Application
    Filed: August 20, 2018
    Publication date: January 3, 2019
    Inventors: Paul T. Congdon, Chuck A. Black
  • Patent number: 10057167
    Abstract: A protocol such as OpenFlow providing communication between an SDN framework controller on one network and a data plane device for another network can be used to modify or process network packets so that an external application or server can communicate with the controller and obtain information needed to uniquely associate the packets with particular end-stations even after those packets have traversed a NAT router.
    Type: Grant
    Filed: April 9, 2015
    Date of Patent: August 21, 2018
    Assignee: Tallac Networks, Inc.
    Inventors: Paul T Congdon, Chuck A Black
  • Patent number: 9584497
    Abstract: In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.
    Type: Grant
    Filed: August 26, 2011
    Date of Patent: February 28, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Chuck A. Black, Shaun Wakumoto, Nathan Stanley Jenne
  • Patent number: 9521695
    Abstract: A probe request from a wireless station can cause the access point to contact a roaming enablement service and alter the services accessible through the access point. The roaming enablement service can identify preferred services of the wireless station and mediate automated negotiations between the access point and a service provider to determine whether the access point may provide a service from the service provider. Upon successful negotiations, the brokerage service can enable the access point to provide access to the preferred services.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: December 13, 2016
    Assignee: Tallac Networks, Inc.
    Inventors: Paul T. Congdon, Ali Ezzet, William R. Johnson, Chuck A. Black
  • Patent number: 9313221
    Abstract: In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: April 12, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Chuck A Black, Daniel E Ford
  • Patent number: 9270454
    Abstract: In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: February 23, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Kamat Maruti, Chuck A Black
  • Patent number: 9215234
    Abstract: Example embodiments disclosed herein relate to authentication based on Media Access Control (MAC) addresses. A network security device receives one or more client identity databases from one or more edge network devices. The client identity databases include MAC addresses of clients and secondary identification information for each of the clients. The network security device determines that a client device has been connected to one of the edge devices. A security action is performed based on whether the MAC address and respective secondary identification information of one of the clients matches the MAC address and respective secondary identification information of the connected client device.
    Type: Grant
    Filed: January 24, 2012
    Date of Patent: December 15, 2015
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Chuck A Black
  • Publication number: 20150324578
    Abstract: A user of a user device may be verified based on user credentials. The user device may be self-registered in a network. After a predetermined period of time, a re-verification timer may be implemented to re-verify credentials of a user of a user device.
    Type: Application
    Filed: June 29, 2012
    Publication date: November 12, 2015
    Inventors: Saro Chandra Bhooshan, Chuck A. Black
  • Publication number: 20150295885
    Abstract: A protocol such as OpenFlow providing communication between an SDN framework controller on one network and a data plane device for another network can be used to modify or process network packets so that an external application or server can communicate with the controller and obtain information needed to uniquely associate the packets with particular end-stations even after those packets have traversed a NAT router.
    Type: Application
    Filed: April 9, 2015
    Publication date: October 15, 2015
    Inventors: Paul T Congdon, Chuck A Black
  • Patent number: 9147172
    Abstract: Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes and server attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The source is authenticated using a credential, and server attributes from the connection profile are sent to the source to configure the source to use the connection.
    Type: Grant
    Filed: January 26, 2009
    Date of Patent: September 29, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Chuck A. Black, Lin A. Nease
  • Publication number: 20150207757
    Abstract: A compilation of potentially shared resources is received. The potentially shared resources are analyzed to determine compatibility among the shared resources. A user accessible list of acceptable combinations of potentially shared resources is generated.
    Type: Application
    Filed: April 1, 2015
    Publication date: July 23, 2015
    Inventors: Lin A. Nease, Chuck A. Black
  • Publication number: 20140359763
    Abstract: In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
    Type: Application
    Filed: January 31, 2012
    Publication date: December 4, 2014
    Inventors: Chuck A. Black, Daniel E. Ford
  • Publication number: 20140355523
    Abstract: A probe request from a wireless station can cause the access point to contact a roaming enablement service and alter the services accessible through the access point. The roaming enablement service can identify preferred services of the wireless station and mediate automated negotiations between the access point and a service provider to determine whether the access point may provide a service from the service provider. Upon successful negotiations, the brokerage service can enable the access point to provide access to the preferred services.
    Type: Application
    Filed: June 4, 2014
    Publication date: December 4, 2014
    Applicant: TALLAC NETWORKS, INC.
    Inventors: Paul T. Congdon, Ali Ezzet, William R. Johnson, Chuck A. Black
  • Patent number: 8817664
    Abstract: Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The network attributes for the assigned connection are sent to an edge switch for the source to configure the edge switch to accept traffic for the source.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: August 26, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Chuck A. Black, Lin A. Nease
  • Publication number: 20140165162
    Abstract: In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.
    Type: Application
    Filed: August 26, 2011
    Publication date: June 12, 2014
    Inventors: Chuck A. Black, Shaun Wakumoto, Nathan Stanley Jenne
  • Publication number: 20140068252
    Abstract: In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted.
    Type: Application
    Filed: August 31, 2012
    Publication date: March 6, 2014
    Inventors: Kamat Maruti, Chuck A. Black
  • Publication number: 20130191901
    Abstract: Example embodiments disclosed herein relate to authentication based on Media Access Control (MAC) addresses. A network security device receives one or more client identity databases from one or more edge network devices. The client identity databases include MAC addresses of clients and secondary identification information for each of the clients. The network security device determines that a client device has been connected to one of the edge devices. A security action is performed based on whether the MAC address and respective secondary identification information of one of the clients matches the MAC address and respective secondary identification information of the connected client device.
    Type: Application
    Filed: January 24, 2012
    Publication date: July 25, 2013
    Inventor: Chuck A. Black
  • Publication number: 20130111008
    Abstract: An edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device.
    Type: Application
    Filed: October 28, 2011
    Publication date: May 2, 2013
    Inventors: Chuck A. Black, Daniel E. Ford
  • Publication number: 20130028136
    Abstract: Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The network attributes for the assigned connection are sent to an edge switch for the source to configure the edge switch to accept traffic for the source.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 31, 2013
    Inventors: Chuck A. Black, Lin A. Nease
  • Publication number: 20130031227
    Abstract: A method is provided that includes receiving a communication from a trusted device indicating that a device to be provisioned has been added to the network; obtaining identifying information of the device to be provisioned; accessing a stored configuration for the device based on the identifying information; and transmitting the configuration to the device for provisioning. Alternatively, a computer-readable medium is provided that stores instructions to perform a method to transmit a discovery communication to a trusted device, receive a communication originating at an administrative device including a configuration; and provision the device via reboot with the configuration.
    Type: Application
    Filed: July 27, 2011
    Publication date: January 31, 2013
    Inventors: Daniel E. Ford, Chuck A. Black