Patents by Inventor Michael Rash

Michael Rash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240135090
    Abstract: Disclosed is a platform that manages worker users in a temporary staffing environment via an artificial machine learning model. The temporary staffing platform matches available workers to available shifts/gigs. Additional features include generating provisional or near-miss matches and informing workers how to turn those near-misses into full matches, plotting a gig-career path to develop additional skills, gamify development, and automatically generate resumes. The platform generates a set of skill tags associated with each shift/gig performed by the user. Designing of resume text files by the artificial machine learning model includes procedurally generated descriptions of experience the user has based on the recording of each shift/gig performed by the user and the skill tags associated with each recorded shift/gig, wherein a format of the resume text file is formulated by the artificial machine learning model evaluating a mix of skill tags and employers amassed by the user.
    Type: Application
    Filed: October 15, 2023
    Publication date: April 25, 2024
    Inventors: Christopher A. KAPCAR, Richard Paul BETORI, Jeffrey Howard RASH, Robert Michael WARD, Jeffrey S. DIRKS, Jeroen Anton DECKER, Shawn David DILLENBECK
  • Patent number: 9813447
    Abstract: A function is provided in a network system for adjusting network policies associated with the operation of network infrastructure devices of the network system. Network policies are established on network devices including packet forwarding devices. The network has a capability to identify computer applications associated with traffic running on the network. A network policy controller of the network is arranged to change one or more policies of one or more network devices based on computer application information acquired. The policies changed may be network policies as well as mirroring policies. An example policy to change is direct a network device to mirror traffic to an application identification appliance for the purpose of identifying applications running on the network through a plurality of mechanisms. The function may be provided in one or more devices of the network.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: November 7, 2017
    Assignee: Extreme Networks, Inc.
    Inventors: Michael Rash, Markus Nispel, Jamie Woodhead, Richard Graham
  • Publication number: 20160191568
    Abstract: A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data, by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control.
    Type: Application
    Filed: September 1, 2015
    Publication date: June 30, 2016
    Inventors: Markus Nispel, David Kjendal, Michael Rash, Richard Graham
  • Patent number: 9256636
    Abstract: A function is provided for identifying computer applications running on a network. Information obtained from frames having content associated with computer applications is examined and compared to information stored on the network. The stored information is obtained from a plurality of mechanisms including computer application signatures. An application identification engine of the function compares examined content with the known application information and determines an indication of the likely computer application associated with the examined frames. The determination output may include a level of confidence in the accuracy of the determination. The function includes an application programming interface to allow the introduction into the engine of custom mechanisms for application identification. The different mechanisms may be weighted. The function may be provided in one or more devices of the network including a standalone appliance.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: February 9, 2016
    Assignee: Extreme Networks, Inc.
    Inventors: Michael Rash, Patrick Bosa, Richard Graham
  • Patent number: 9230213
    Abstract: A function is provided for effectively identifying computer applications running on a network. The function receives information related to frames of packets moving through the network. The information is compared to known information about computer applications. The known information is obtained from a plurality of mechanisms, including the option of obtaining it through custom mechanisms. The comparison information is scored for each of the plurality of mechanisms and those scores are combined to establish a single score indicative of the likely computer application associated with the received frames. One or more mathematical operations can be used to combine the scores. The mechanisms may be weighted for likely accuracy and the score that is established may include with it an indication of the level of confidence in that score. One or more of the plurality of mechanisms may be used to weight others of the types of mechanisms.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: January 5, 2016
    Assignee: Extreme Networks, Inc.
    Inventors: Michael Rash, Patrick Bosa, Richard Graham
  • Patent number: 9130826
    Abstract: A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 8, 2015
    Assignee: Enterasys Networks, Inc.
    Inventors: Markus Nispel, David Kjendal, Michael Rash, Richard Graham
  • Publication number: 20140279768
    Abstract: A function is provided for effectively identifying computer applications running on a network. The function receives information related to frames of packets moving through the network. The information is compared to known information about computer applications. The known information is obtained from a plurality of mechanisms, including the option of obtaining it through custom mechanisms. The comparison information is scored for each of the plurality of mechanisms and those scores are combined to establish a single score indicative of the likely computer application associated with the received frames. One or more mathematical operations can be used to combine the scores. The mechanisms may be weighted for likely accuracy and the score that is established may include with it an indication of the level of confidence in that score. One or more of the plurality of mechanisms may be used to weight others of the types of mechanisms.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: ENTERASYS NETWORKS, INC.
    Inventors: Michael Rash, Patrick Bosa, Richard Graham
  • Publication number: 20140280211
    Abstract: A function is provided for identifying computer applications running on a network. Information obtained from frames having content associated with computer applications is examined and compared to information stored on the network. The stored information is obtained from a plurality of mechanisms including computer application signatures. An application identification engine of the function compares examined content with the known application information and determines an indication of the likely computer application associated with the examined frames. The determination output may include a level of confidence in the accuracy of the determination. The function includes an application programming interface to allow the introduction into the engine of custom mechanisms for application identification. The different mechanisms may be weighted. The function may be provided in one or more devices of the network including a standalone appliance.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Enterasys Networks, Inc.
    Inventors: Michael Rash, Patrick Bosa, Richard Graham
  • Publication number: 20140280889
    Abstract: A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: ENTERASYS NETWORKS, INC.
    Inventors: Markus Nispel, David Kjendal, Michael Rash, Richard Graham
  • Publication number: 20140282823
    Abstract: A function is provided in a network system for adjusting network policies associated with the operation of network infrastructure devices of the network system. Network policies are established on network devices including packet forwarding devices. The network has a capability to identify computer applications associated with traffic running on the network. A network policy controller of the network is arranged to change one or more policies of one or more network devices based on computer application information acquired. The policies changed may be network policies as well as mirroring policies. An example policy to change is direct a network device to mirror traffic to an application identification appliance for the purpose of identifying applications running on the network through a plurality of mechanisms. The function may be provided in one or more devices of the network.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: ENTERASYS NETWORKS, INC.
    Inventors: Michael Rash, Markus Nispel, Jamie Woodhead, Richard Graham
  • Publication number: 20110305160
    Abstract: A system for identifying a network device includes a local area network (“LAN”), an external network, one or more network devices, a packet-modifying device, a monitoring device, a data store, and an analysis terminal. Each network device is configured for having a network address and to communicate with the LAN. The packet-modifying device is coupled to the LAN and the external network and has an external-network network address. The monitoring device generates identifying information of the network device when communicating with the external network via the packet-modifying device. The monitoring device configures the identifying information to identify the obfuscated network address of the network device. The data store stores the identifying information. The analysis terminal is coupled to the data store and is adapted to resolve the network address of the network device upon receiving an alert regarding the network address obfuscated by the packet-modifying device.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 15, 2011
    Applicant: G2, INC.
    Inventors: Paul Green, Michael Rash, Judy Novack
  • Publication number: 20070234428
    Abstract: A method for secure single-packet remote authorization using a single packet authorization (SPA) server on a host system that passively monitors the network for connection attempts and anonymously accept or rejects said attempts depending on whether a valid SPA packet is detected, an SPA client on a client system that is responsible for generating the appropriately encrypted SPA packet in order to gain access to services on the host, and a particular packet format sent from the client to the host to gain access. The packet format is encrypted and non-replayable by virtue of 16 bytes of random data in every message, and an MD5 sum that is a hash function of the random data (made via any known hashing function). The SPA server stores the MD5 sum of every valid SPA packet that it monitors and flags any duplicate access attempts using the same MD5 hash as a previously monitored packet, in which case the SPA server treats the packet as being generated by a malicious attempt to replay the original packet.
    Type: Application
    Filed: March 22, 2007
    Publication date: October 4, 2007
    Inventor: Michael Rash
  • Publication number: 20070194070
    Abstract: A snowboard carrier designed to be attached to a standard frame hitch receiver of an automobile for transporting a plurality of snowboards. The snowboard carrier includes a shank having two ends, configured to be releasably secured to a frame hitch receiver. Pivotally mounted thereon the shank opposite the frame hitch receiver is a support beam. The support beam has a pair of parallel lateral support members distally located from each other. The lateral support members have a plurality of board support members that define board slots which are configured to receive a snowboard therein. A locking beam is releasably secured superimposed the lateral support members and board slots.
    Type: Application
    Filed: February 21, 2006
    Publication date: August 23, 2007
    Inventor: Michael Rash