Patents by Inventor Dario Calia

Dario Calia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8504822
    Abstract: In one embodiment, a proxy device located between a first device and a second device intercepts a security session request for a security session between the first device and the second device. The proxy device obtains security information from the first device that includes at least a subject name of the first device. The proxy device creates a dynamic certificate using the subject name of the first device and a trusted proxy certificate of the proxy device. The proxy device establishes a security session between the proxy device and the second device using the dynamic certificate. Further, the proxy device establishes a security session between the first device and the proxy device using the trusted proxy certificate of the proxy device. The two security sessions collectively operate as a security session between the first device and the second device.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: August 6, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Jianxin Wang, Anupama Sundaresan, Vijaya Bharathi Kaza, Dario Calia
  • Publication number: 20120272058
    Abstract: In one embodiment, a proxy device located between a first device and a second device intercepts a security session request for a security session between the first device and the second device. The proxy device obtains security information from the first device that includes at least a subject name of the first device. The proxy device creates a dynamic certificate using the subject name of the first device and a trusted proxy certificate of the proxy device. The proxy device establishes a security session between the proxy device and the second device using the dynamic certificate. Further, the proxy device establishes a security session between the first device and the proxy device using the trusted proxy certificate of the proxy device. The two security sessions collectively operate as a security session between the first device and the second device.
    Type: Application
    Filed: July 3, 2012
    Publication date: October 25, 2012
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Jianxin Wang, Anupama Sundaresan, Vijaya Bharathi Kaza, Dario Calia
  • Patent number: 8214635
    Abstract: In one embodiment, a server and a client are configured to trust a certificate of an intermediate proxy device. The proxy device may then intercept a client-server security session request message sent from the client to the server. In response, the proxy device initiates a proxy-server security session with the server and obtains server security information from the server. Then, the proxy device initiates a client-proxy security session with the client using the trusted proxy certificate, and obtains client security information from the client. Upon obtaining the client security information, the proxy device creates a dynamic certificate using the obtained client security information and the trusted proxy certificate, and establishes the initiated proxy-server security session with the dynamic certificate.
    Type: Grant
    Filed: November 28, 2006
    Date of Patent: July 3, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Jianxin Wang, Anupama Sundaresan, Vijaya Bharathi Kaza, Dario Calia
  • Patent number: 8209747
    Abstract: Methods and systems for associating an event log entry with the rule that triggered its creation are described. In one embodiment, an apparatus is described. The apparatus has an event handling device for applying a plurality of rules; an event log with a plurality of log entries, and a hash value appender for appending a hash value log entries. When the event handling device performs an application of one of the rules, an entry is created in said event log, and the hash value generator appends a unique hash value to the entry. The unique hash value corresponds to the rule that was applied.
    Type: Grant
    Filed: January 3, 2006
    Date of Patent: June 26, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Iqlas Maheen Ottamalika, Dario Calia, Steven Lee
  • Publication number: 20080126794
    Abstract: In one embodiment, a server and a client are configured to trust a certificate of an intermediate proxy device. The proxy device may then intercept a client-server security session request message sent from the client to the server. In response, the proxy device initiates a proxy-server security session with the server and obtains server security information from the server. Then, the proxy device initiates a client-proxy security session with the client using the trusted proxy certificate, and obtains client security information from the client. Upon obtaining the client security information, the proxy device creates a dynamic certificate using the obtained client security information and the trusted proxy certificate, and establishes the initiated proxy-server security session with the dynamic certificate.
    Type: Application
    Filed: November 28, 2006
    Publication date: May 29, 2008
    Inventors: Jianxin Wang, Anupama Sundaresan, Vijaya Bharathi Kaza, Dario Calia
  • Publication number: 20070157302
    Abstract: Methods and systems for associating an event log entry with the rule that triggered its creation are described. In one embodiment, an apparatus is described. The apparatus has an event handling device for applying a plurality of rules; an event log with a plurality of log entries, and a hash value appender for appending a hash value log entries. When the event handling device performs an application of one of the rules, an entry is created in said event log, and the hash value generator appends a unique hash value to the entry. The unique hash value corresponds to the rule that was applied.
    Type: Application
    Filed: January 3, 2006
    Publication date: July 5, 2007
    Inventors: Iqlas Ottamalika, Dario Calia, Steven Lee
  • Patent number: 6067573
    Abstract: A mechanism limits the flow of topology information to only those nodes of a computer network that require the information. The mechanism comprises a filter having a plurality of conditions that are evaluated by a node of the network prior to forwarding the topology information to another node. Specifically, the conditions are evaluated with respect to lists of nodes that are defined according to the configuration of the network. By applying the filtering conditions to the defined lists, each node may selectively propagate the topology information throughout the network, thereby substantially reducing the amount of information flowing over the network.
    Type: Grant
    Filed: September 10, 1997
    Date of Patent: May 23, 2000
    Assignee: Cisco Technology, Inc.
    Inventors: Ulrica Tam, Steven H. Berl, Leo Pereira, Dario Calia, John David Billings, David Scott McCowan