Patents by Inventor James Edward Winquist

James Edward Winquist has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230319082
    Abstract: A method and apparatus for processing flow specification (Flowspec) messages to one or more of a plurality of customer networks by a controller device coupled to the plurality of customer networks. Preferably a network controller monitors network traffic flowing through each of the customer networks for detecting a network attack in one of the plurality of customer networks, via monitoring of the network traffic. Upon detection of a network attack, a Flowspec message is generated for the customer network detected to be under network attack wherein the Flowspec message is configured specifically for that customer network. The generated Flowspec message is transmitted to the customer network detected to be under network attack for implementation by the customer network for mitigation of the detected network attack.
    Type: Application
    Filed: April 4, 2022
    Publication date: October 5, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Scott Cameron, Danielle Fritz, Mitchell Hoffmeyer, Scott Iekel-Johnson, Andrew Inman, Grant Levene, Jiasi Li, William Martin Northway, JR., Ryan O'Rielly, Michael Ratanatharathorn, Lori Sulik, Chris Thiele, James Edward Winquist
  • Patent number: 11558410
    Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: January 17, 2023
    Assignee: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
  • Publication number: 20200382540
    Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.
    Type: Application
    Filed: May 19, 2020
    Publication date: December 3, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
  • Patent number: 9432385
    Abstract: A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate information via status messages about attacks to an upstream service provider. The service provider is then able to mitigate attacks based on the status messages. There is a feedback loop whereby the amount of dropped traffic by the service provider is added to the network traffic to keep the mitigation request open and prevent flapping. Likewise, the detection device includes time-to-engage and time-to-disengage timers to further prevent flapping.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: August 30, 2016
    Assignee: Arbor Networks, Inc.
    Inventors: Chester Kustarz, Lawrence Bruce Huston, III, James A. Simpson, James Edward Winquist, Olan Patrick Barnes, Eric Jackson
  • Patent number: 9344440
    Abstract: A node in a communication network determines a data rate capacity of one or more nodes of the communication network and creates a single managed object grouping for each node of the one or more nodes having a same data rate capacity. The node establishes one or more static thresholds for the single managed object grouping based on the data rate capacity. The static thresholds are independent of a baseline condition of detected data rates at each node of the single managed object grouping. The node further detects a current rate of received data at each node of the single managed grouping and triggers at least one alert for each node of the single managed grouping when the current rate of the received data at a particular node exceeds the one or more static thresholds.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: May 17, 2016
    Assignee: Arbor Networks, Inc.
    Inventors: James Edward Winquist, Joseph Welch, Tim Hoffman, Olan Patrick Barnes
  • Publication number: 20140380467
    Abstract: A node in a communication network determines a data rate capacity of one or more nodes of the communication network and creates a single managed object grouping for each node of the one or more nodes having a same data rate capacity. The node establishes one or more static thresholds for the single managed object grouping based on the data rate capacity. The static thresholds are independent of a baseline condition of detected data rates at each node of the single managed object grouping. The node further detects a current rate of received data at each node of the single managed grouping and triggers at least one alert for each node of the single managed grouping when the current rate of the received data at a particular node exceeds the one or more static thresholds.
    Type: Application
    Filed: June 20, 2013
    Publication date: December 25, 2014
    Inventors: James Edward Winquist, Joseph Welch, Tim Hoffman, Olan Patrick Barnes
  • Publication number: 20130055374
    Abstract: A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate information via status messages about attacks to an upstream service provider. The service provider is then able to mitigate attacks based on the status messages. There is a feedback loop whereby the amount of dropped traffic by the service provider is added to the network traffic to keep the mitigation request open and prevent flapping. Likewise, the detection device includes time-to-engage and time-to-disengage timers to further prevent flapping.
    Type: Application
    Filed: December 16, 2011
    Publication date: February 28, 2013
    Applicant: ARBOR NETWORKS, INC.
    Inventors: Chester Kustarz, Lawrence Bruce Huston, III, James A. Simpson, James Edward Winquist, Olan Patrick Barnes, Eric Jackson