Patents by Inventor Gerald R. Malan
Gerald R. Malan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230388141Abstract: A media presentation system includes a page editor enabling the embedding of clips into pages for documenting meetings. The media presentation system is represented by a bot that attends the meetings with recording controls being provided in the pages.Type: ApplicationFiled: May 24, 2023Publication date: November 30, 2023Inventors: Gerald R. Malan, Andrew Mortensen
-
Patent number: 8667047Abstract: A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts.Type: GrantFiled: March 21, 2008Date of Patent: March 4, 2014Assignee: Arbor NetworksInventors: Eric S. Jackson, Douglas J. Song, Lawrence Benjamin Fleis, Aidan Christopher Dysart, Gerald R. Malan
-
Publication number: 20120124087Abstract: A system is provided that polls one or more caching nameservers and compares their results to a trusted or standard set of data. The set of data may be, for example, stored in a computer system or distributed among several computer systems. In one aspect, the system comprises a discrepancy detector that detects discrepancies between one or more copies of mapping information. Mapping information may be, for example, mapping stored on a Domain Name System (DNS).Type: ApplicationFiled: August 11, 2011Publication date: May 17, 2012Applicant: Arbor NetworksInventors: Gerald R. Malan, Robert Stone
-
Patent number: 8103755Abstract: An administration system is defined that provides an interface between a subscriber and resources on a provider network. The subscriber, via the administration system, has access to and control over certain of the resources on the provider network. The subscriber may have access to and control over only those resources on the provider network related to the services provided to his network. Also, the subscriber may not be capable of altering resources on the provider network in a way that affects the services provided to another subscriber. Because the administration system allows a user to control resources on the provider network that relate to services provided to his network, the amount of support required by the provider to administer those resources is reduced.Type: GrantFiled: July 2, 2002Date of Patent: January 24, 2012Assignee: Arbor Networks, Inc.Inventors: Gerald R. Malan, Robert Stone, David Langhorst
-
Patent number: 8001271Abstract: A system is provided that polls one or more caching nameservers and compares their results to a trusted or standard set of data. The set of data may be, for example, stored in a computer system or distributed among several computer systems. In one aspect, the system comprises a discrepancy detector that detects discrepancies between one or more copies of mapping information. Mapping information may be, for example, mapping stored on a Domain Name System (DNS).Type: GrantFiled: October 20, 2003Date of Patent: August 16, 2011Assignee: Arbor Networks, Inc.Inventors: Gerald R. Malan, Robert Stone
-
Publication number: 20080294770Abstract: A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts.Type: ApplicationFiled: March 21, 2008Publication date: November 27, 2008Applicant: ARBOR NETWORKSInventors: Eric S. Jackson, Douglas J. Song, Lawrence Benjamin Fleis, Aidan Christopher Dysart, Gerald R. Malan
-
Patent number: 7359930Abstract: A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts.Type: GrantFiled: November 21, 2002Date of Patent: April 15, 2008Assignee: Arbor NetworksInventors: Eric S Jackson, Douglas J Song, Lawrence Benjamin Fleis, Aidan Christopher Dysart, Gerald R Malan
-
Patent number: 6944673Abstract: A method and system for profiling network flows at a measurement point within a computer network is provided. The method includes measuring network flows having invariant features at a measurement point located within routing infrastructure of the computer network to obtain flow statistics. The method also includes aggregating the flow statistics to obtain a traffic profile of the network flows at the measurement point. The method and system utilize the natural hierarchy in the Internet addressing scheme to provide a means for making tractable measurements of network traffic in high-speed networks. Moreover, the method and system adapt dynamically to the changing underlying traffic characteristics to maintain a maximum memory footprint for the profiles. The method and system adapt by adjusting the level of aggregation of the traffic endpoints along a scale from Interface to fully specified network address.Type: GrantFiled: May 15, 2001Date of Patent: September 13, 2005Assignee: The Regents of the University of MichiganInventors: Gerald R. Malan, Farnam Jahanian
-
Publication number: 20040103211Abstract: A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts.Type: ApplicationFiled: November 21, 2002Publication date: May 27, 2004Inventors: Eric S. Jackson, Douglas J. Song, Lawrence Benjamin Fleis, Aidan Christopher Dysart, Gerald R. Malan
-
Publication number: 20040004941Abstract: An administration system is defined that provides an interface between a subscriber and resources on a provider network. The subscriber, via the administration system, has access to and control over certain of the resources on the provider network. The subscriber may have access to and control over only those resources on the provider network related to the services provided to his network. Also, the subscriber may not be capable of altering resources on the provider network in a way that affects the services provided to another subscriber. Because the administration system allows a user to control resources on the provider network that relate to services provided to his network, the amount of support required by the provider to administer those resources is reduced.Type: ApplicationFiled: July 2, 2002Publication date: January 8, 2004Inventors: Gerald R. Malan, Robert Stone, David Langhorst
-
Publication number: 20020035698Abstract: A method and system are provided for protecting publicly accessible network computer services from undesirable network traffic in real-time. The method includes receiving network traffic destined for the services and analyzing the network traffic to identify an undesirable user of the services. Access of the undesirable user to the services is limited to protect the services. The method and system identify and remove a new level of security threat that is not addressable by current techniques. Specifically, the method and system identify topologically anomalous application-level patterns of traffic and remove these data flows in real-time from the network.Type: ApplicationFiled: May 15, 2001Publication date: March 21, 2002Applicant: The Regents of The University of MichiganInventors: Gerald R. Malan, Farnam Jahanian
-
Publication number: 20020032871Abstract: A system and method is provided for detecting, tracking and blocking denial of service (“DoS”) attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a collector adapted to receive a plurality of data statistics from the computer network and to process the plurality of data statistics to detect one or more data packet flow anomalies. The collector is further adapted to generate a plurality of signals representing the one or more data packet flow anomalies. The system further includes a controller that is coupled to the collector and is adapted to receive the plurality of signals from the collector.Type: ApplicationFiled: May 15, 2001Publication date: March 14, 2002Applicant: The Regents of The University of MichiganInventors: Gerald R. Malan, Farnam Jahanian
-
Publication number: 20020032793Abstract: A method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic is provided. The method includes collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network. The method also includes analyzing the statistics to reconstruct the path taken by the undesirable network traffic through the network from the source of the traffic. The method and system use a combination of well-known misuse signatures of network resources in combination with modeling of normal network service behavior to identify bandwidth anomalies.Type: ApplicationFiled: May 15, 2001Publication date: March 14, 2002Applicant: The Regents of The University of MichiganInventors: Gerald R. Malan, Farnam Jahanian
-
Publication number: 20020032717Abstract: A method and system for profiling network flows at a measurement point within a computer network is provided. The method includes measuring network flows having invariant features at a measurement point located within routing infrastructure of the computer network to obtain flow statistics. The method also includes aggregating the flow statistics to obtain a traffic profile of the network flows at the measurement point. The method and system utilize the natural hierarchy in the Internet addressing scheme to provide a means for making tractable measurements of network traffic in high-speed networks. Moreover, the method and system adapt dynamically to the changing underlying traffic characteristics to maintain a maximum memory footprint for the profiles. The method and system adapt by adjusting the level of aggregation of the traffic endpoints along a scale from Interface to fully specified network address.Type: ApplicationFiled: May 15, 2001Publication date: March 14, 2002Applicant: The Regents of The University of MichiganInventors: Gerald R. Malan, Farnam Jahanian