Patents by Inventor Vincent J. Schiavone

Vincent J. Schiavone has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7647411
    Abstract: A network appliance controls access to network resources by identifying network paths passing through the network appliance to a protected network, drawings conclusions about the type of communications traveling along those paths, and then controlling, i.e. limiting, access to the protected network's resources for transmitting communications on a path-by-path basis. Recipient controlled mechanisms are used to control access to the recipient's network's resources, namely, restricting bandwidth, controlling allocation of SMTP or other connections, and packet level traffic shaping techniques including controlling of parameters of TCP and/or IP communications, such as TCP receive window size and Maximum Segment Size, or otherwise decreasing the amount of network traffic per unit of time passing through the network appliance. This limits the amount of network resources that may be used by incoming communications.
    Type: Grant
    Filed: May 7, 2004
    Date of Patent: January 12, 2010
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, David Ian Brussin, Tobias Phillip DiPasquale, John Francis D'Alessio
  • Patent number: 7634545
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: December 15, 2009
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Patent number: 7571214
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: August 4, 2009
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Patent number: 7543036
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: June 2, 2009
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Patent number: 7415504
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communicated to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: February 26, 2002
    Date of Patent: August 19, 2008
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Publication number: 20040153908
    Abstract: A Data Controller stores information in a secure vault and establishes rules for retrieval of information therefrom, subsequent use of such information, etc. Requests for information carry terms governing the subsequent use of such information. Any discrepancies in terms may be resolved by negotiation until agreement is reached. Requested information is retrieved only if the terms are in accord. The agreed-upon terms governing use of the information remain associated with the information, e.g. with the requesting party or any third parties to which the information is later transferred. Interfaces may be provided to later allow the Data Controller to access, modify and update any of its disclosed information or the associated terms of use. Accordingly, compliance with the original terms of disclosure can be ensured even after relinquishment of information to requesting parties, or third parties. Authentication of the information or requests therefor may be verified by an independent party.
    Type: Application
    Filed: September 9, 2003
    Publication date: August 5, 2004
    Applicant: ePrivacy Group, Inc.
    Inventors: Vincent J. Schiavone, David I. Brussin
  • Publication number: 20020120600
    Abstract: A method for negotiating an electronic mail transaction. An electronic mail message's mail type specifier is identified. A data store stores data specific to the intended recipient. The data store is referenced and the electronic mail message is processed as a function of the mail type specifier and data retrieved from the data store. The mail may be processed at the recipient's mail client device and the information maintained confidential. The processing may be based upon reference to a rule applicable to that particular message. The rule includes a conditional instruction conditioned upon a result of a logic or other function of recipient profile data. Alternatively, the processing may provide for modification of the content of the message as a function of such recipient profile data. Recipient preferences from multiple recipients may be aggregated and propagated to senders and/or intermediaries to allow for pre-transmission processing of electronic mail messages.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig, Simson Garfinkel
  • Publication number: 20020120702
    Abstract: A method for prioritization of a recipient's electronic mail messages. Messages are displayed in descending order of an associated priority bid. Messages include an initial priority bid and/or a maximum priority bid, e.g., a cash value. An incoming message's initial bid is compared to current bids of previous messages and the bid is increased if it is lower than any previous message's current bid so that it will appear first in descending sorted order, e.g. in the recipient's electronic mail inbox, and thus have priority. Prioritization may continue to permit a previous message to increase its bid until it has the highest priority bid among the messages or until the incoming message has a priority bid higher than the maximum bid of all previous messages or until the incoming mail message reaches its maximum bid. Messages may be displayed in categorized sections and prioritization performed on fewer than all sections.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig
  • Publication number: 20020120692
    Abstract: An electronic mail transaction system for rule-based processing of e-mail messages to conduct predefined transactions via an electronic mail messaging infrastructure. Rules are defined for conducting various transactions. Senders and/or receivers specify a rule selected from among a common set of accepted rules. Preferably, each rule provides for automated retrieval of at least some required data elements from a data store. The data store may be stored privately, which protects the privacy of users of the system. Senders and receivers can then conduct transactions according to the predefined rules, which standardizes and facilitates the transactions. Establishment, management and/or approval of rules by a trusted third party intermediary protects and engenders trust in users of the system and facilitates order and efficiency. The system permits users to conduct transactions without a continuous network connection, i.e.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig, Cedarampattu Mohan
  • Publication number: 20020120748
    Abstract: A method for selectively delivering and forwarding electronic mail messages. A user having a certain electronic mailbox for receiving electronic mail messages provides an alternate electronic mail address of an alternate electronic mailbox. Criteria is established for determining whether an e-mail message addressed for delivery to the certain electronic mailbox will be delivered to that mailbox or forwarded to the alternate electronic mail address. The method is implemented by mail routing software running on a mail server. The mail routing software forwards mail messages meeting the criteria without delivering them to the electronic mailbox to which they were addressed. The method thereby lessens the burdens on the electronic mail system servicing the certain electronic mailbox and prevents delivery of inappropriate messages to the certain electronic mailbox while permitting retrieval of such messages via an alternate electronic mailbox. An apparatus for carrying out the inventive method is also provided.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig, Cedarampattu Mohan
  • Publication number: 20020120705
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source.
    Type: Application
    Filed: February 26, 2002
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig
  • Publication number: 20020120581
    Abstract: A rule-based electronic mail transaction system and method for conducting predefined transactions via electronic mail messaging. An electronic mail message prescribes a reply action for confirming agreement to conduct the transaction. If the recipient performs the action, a rule for conducting the transaction is identified. The rule defines data required for the transaction. Required data is gathered from a recipient data store responsive to a confirming action on the part of the recipient. The required data is used to complete the transaction. Optionally, information may be retrieved from the sender's side to complete the transaction. Diverse transactions may be conducted in this manner, including sale and non-sale transactions, such as promotional and viral marketing, charitable donations, online bill payment, electoral voting, customer service communications, customer relationship management communications, product returns, and membership and enrollment transactions.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig