Patents Represented by Attorney, Agent or Law Firm Kevin J. Zilka
  • Patent number: 6754705
    Abstract: A system and associated method and computer program product are provided for analyzing a network. Included is a plurality of agents coupled to a plurality of computers interconnected via a network. Each agent is adapted to collect information relating to at least one of the computers. Further provided is a plurality of host controllers coupled to the agents for collecting the information from the agents. Still yet, a plurality of zone controllers is coupled to the host controllers for collecting the information from the host controllers.
    Type: Grant
    Filed: December 21, 2001
    Date of Patent: June 22, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Herbert V. Joiner, Ken W. Elwell
  • Patent number: 6754488
    Abstract: A system, method and computer program product are provided for ascertaining the location of an access point in a wireless network. Initially, a strength of a radio frequency signal of an access point of a wireless network is monitored at a position utilizing a wireless network analyzer. Next, the wireless network analyzer is moved about the position. The foregoing operations may be repeated to allow the location of the access point to be ascertained based on the monitored strength of the radio frequency signal.
    Type: Grant
    Filed: March 1, 2002
    Date of Patent: June 22, 2004
    Assignee: Networks Associates Technologies, Inc.
    Inventors: King L. Won, Kazim O. Yildiz, Handong Wu
  • Patent number: 6751627
    Abstract: One embodiment of the present invention provides a system that facilitates accessing a network management protocol table. The system operates by first collecting a network management protocol tuple that includes data related to a network connection. Next, the system creates a hash index from the network management protocol tuple. This network management protocol tuple is inserted into the network management protocol table. The system then saves a pointer to the row indexed by the hash index in a hash table. The system also forms a search index using data within the network management protocol tuple that identifies the data pointed to by the hash index in the hash table. This search index is inserted into a search tree, so that the hash index provides fast insertion into the network management protocol table and the search index in the search table provides fast ordered retrieval from the network management protocol table.
    Type: Grant
    Filed: July 23, 2001
    Date of Patent: June 15, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Jeffrey Y. Sternin
  • Patent number: 6750862
    Abstract: A method and system for performing enhanced lighting functions with respect to texture map data is operable within a computer controlled graphics display system and allows defined portions of a texture map to bypass prescribed lighting processes. Within a texture map, each texel data (u,v) is defined to contain color information and a control code (e.g., “texel light bit”). The texel light bit indicates to the lighting process whether or not texel color modulation is to occur to this texel data. In one embodiment, if the texel light bit is set, then no lighting modifications (e.g., color modulations) are performed with respect to the texel data. Also, if the texel light bit is not set, then normal lighting modifications are performed with respect to the texel data. In this way, the present invention allows texture map data to be lit in a non-uniform manner across a same graphics primitive. The present invention is particularly useful with respect to graphics objects (e.g.
    Type: Grant
    Filed: April 27, 1998
    Date of Patent: June 15, 2004
    Assignee: NVIDIA Corporation
    Inventors: Christopher W. Shaw, Goran Devic, Evan Leland
  • Patent number: 6751718
    Abstract: A method, system and computer program product for detecting when insufficient RAM is available in a computer system, and estimating the additional RAM needed to avoid excess paging. The invention uses memory management parameters to estimate the number of frequently-used pages stored in “virtual memory” on disk. If this estimate is nonzero for an appreciable period the amount of RAM is insufficient, and RAM equal to the estimate should be added to the system.
    Type: Grant
    Filed: March 26, 2001
    Date of Patent: June 15, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Dmitrii Manin
  • Patent number: 6744433
    Abstract: A system and method are provided for using information from at least one depth layer and for collecting information about at least one additional depth layer utilizing a graphics pipeline. Initially, constraining depth layers are provided which, in turn, define a plurality of depth constraints. Next, a plurality of tests is performed involving the constraining depth layers for collecting information about at least one additional depth layer. The information relating to the at least one depth layer may then be used to improve processing in the graphics pipeline. By the foregoing multiple tests, information relating to a plurality of depth layers may be collected during each of a plurality of rendering passes. Initially, information relating to the constraining depth layers and associated depth constraints is provided in the aforementioned manner. Thereafter, information relating to at least one additional depth layer is collected during additional rendering passes using multiple tests on each rendering pass.
    Type: Grant
    Filed: August 31, 2001
    Date of Patent: June 1, 2004
    Assignee: nVidia Corporation
    Inventors: Rui M. Bastos, Cass W. Everitt, Mark J. Kilgard
  • Patent number: 6745201
    Abstract: This invention includes a method of navigating a collection of nodes by selecting a first node, generating a context list and displaying first node and context list. Each context of the context collection includes a second node essentially referencing the first node. Another aspect of the invention includes a method of generating an address from a collection of contexts containing steps of receiving a selected attribute collection and generating the address. Each context includes a resolution address and an attribute collection. Each of the attribute collections contains at least one attribute. Whenever the attribute collection of a first context of the context collection is essentially the same as the selected attribute collection, the resolution address of the first context is selected as the generated address. Another aspect of the invention includes a method of navigating a hypergraph. The hypergraph includes at least one context list. Each context list contains at least one context.
    Type: Grant
    Filed: October 8, 2002
    Date of Patent: June 1, 2004
    Assignee: Monkeymedia, Inc.
    Inventors: Eric Justin Gould, Janna Buckmaster, Todd Wilkens, Paulus W. Trisnadi
  • Patent number: 6745311
    Abstract: The present invention is a method of allocating clusters of a disk or other computer readable medium containing a plurality of clusters to minimize fragmentation. To accomplish this, at least one available block is identified in the computer readable medium. Each block includes one or more contiguous available clusters, where each cluster comprises one or more units of storage space. A request is received to allocate one or more clusters to a file. At least one of the available blocks is selected based on a location of the available block. At least some of the clusters are allocated, and the file is written to the allocated clusters.
    Type: Grant
    Filed: January 24, 2001
    Date of Patent: June 1, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Daniel Fabrizio, Jonathan Daub
  • Patent number: 6742124
    Abstract: A real-time sequence-based anomaly detection system is disclosed. In a preferred embodiment, the intrusion detection system is incorporated as part of a software wrapper. Event abstraction in the software wrapper enables the intrusion detection system to apply generically across various computing platforms. Real-time anomaly detection is enabled through the definition of a distance matrix that defines allowable separation distances between pairs of system calls. The distance matrix indirectly specifies known sequences of system calls and can be used to determine whether a sequence of system calls in an event window represents an anomaly. Anomalies that are detected are further analyzed through levenshtein distance calculations that also rely on the contents of the distance matrix.
    Type: Grant
    Filed: May 8, 2000
    Date of Patent: May 25, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Douglas Kilpatrick, Calvin Ko, Stephen J. Kiernan
  • Patent number: 6742128
    Abstract: A system, method and computer program product are provided for assessing threats to a network utilizing a plurality of data sources. Initially, network data is collected from a plurality of different network data sources. Such data is then aggregated and correlated, after which it is stored. Threats to a network are then assessed utilizing the aggregated and correlated network data.
    Type: Grant
    Filed: August 28, 2002
    Date of Patent: May 25, 2004
    Assignee: Networks Associates Technology
    Inventor: Herbert V. Joiner
  • Patent number: 6738062
    Abstract: A representation is provided for displacement mapping. Included are a coarse first mesh, and a fine second mesh with a topology substantially similar to a topology of the first mesh. The second mesh includes a plurality of scalar values which each represent an offset between various points on the first mesh and the second mesh.
    Type: Grant
    Filed: April 20, 2001
    Date of Patent: May 18, 2004
    Assignee: NVIDIA Corporation
    Inventor: Henry P. Moreton
  • Patent number: 6735703
    Abstract: A real-time sequence-based anomaly detection system is disclosed. In a preferred embodiment, the intrusion detection system is incorporated as part of a software wrapper. Event abstraction in the software wrapper enables the intrusion detection system to apply generically across various computing platforms. Real-time anomaly detection is enabled through the definition of a distance matrix that defines allowable separation distances between pairs of system calls. The distance matrix indirectly specifies known sequences of system calls and can be used to determine whether a sequence of system calls in an event window represents an anomaly. Anomalies that are detected are further analyzed through levenshtein distance calculations that also rely on the contents of the distance matrix.
    Type: Grant
    Filed: May 8, 2000
    Date of Patent: May 11, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Douglas Kilpatrick, Mark Lee Badger, Calvin Ko
  • Patent number: 6735629
    Abstract: In a probe system for monitoring and analyzing data flow and associated activities between devices connected in common to a point in a network, in the mode of operation, the probe's driver runs in a “Kernel mode” on Windows NT for analyzing in relatively low detail packets of data retrieved from the network, whereby programming is provided for operating the Kernel mode driver to monitor the rate of traffic or data packets entering an NIC card buffer, for causing the CPU to respond to an interrupt issued by the NIC everytime a data packet is received at a traffic rate below a predetermined threshold to access data packets entering the NIC card buffer, and to cause the CPU to respond to polling pulses at regular predetermined intervals to access data packets, when the traffic rate exceeds the predetermined threshold, for providing more CPU cycles to analyze the data packets.
    Type: Grant
    Filed: May 4, 2000
    Date of Patent: May 11, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Dominick Anthony Cafarelli, III, Daniel Hansen
  • Patent number: 6734861
    Abstract: A system, method and article of manufacture are afforded for providing an interlock module in a graphics pipeline. initially, first information is received indicative of a first set of pixels that overlap a primitive. Such first set of pixels are currently being processed in the graphics pipeline. Also received is second information indicative of a second set of pixels that overlap the primitive. The second set of pixels are ready for being inputted in the graphics pipeline for processing. Thereafter, the first information and the second information are evaluated, and the second set of pixels is conditionally processed based on the evaluation.
    Type: Grant
    Filed: October 16, 2000
    Date of Patent: May 11, 2004
    Assignee: nVidia Corporation
    Inventors: James M. Van Dyke, Douglas A. Voorhies, James E. Margeson, III, John Montrym
  • Patent number: 6734874
    Abstract: A method, apparatus and article of manufacture are provided for handling both scalar and vector components during graphics processing. To accomplish this, vertex data is received in the form of vectors after which vector operations are performed on the vector vertex data. Next, scalar operations may be executed on an output of the vector operations, thereby rendering vertex data in the form of scalars. Such scalar vertex data may then be converted to vector vertex data for performing vector operations thereon.
    Type: Grant
    Filed: January 31, 2001
    Date of Patent: May 11, 2004
    Assignee: nVidia Corporation
    Inventors: John Erik Lindholm, Simon Moy, David B. Kirk, Paolo E. Sabella
  • Patent number: 6732157
    Abstract: A system, method and computer program product are provided for filtering unwanted electronic mail messages. After receiving electronic mail messages, the electronic mail messages that are unwanted are filtered utilizing a combination of techniques including: compound filters, paragraph hashing, and Bayes rules. The electronic mail messages that are filtered as being unwanted are then categorized.
    Type: Grant
    Filed: December 13, 2002
    Date of Patent: May 4, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Bryson P. Gordon, Thor Ivar Ekle
  • Patent number: 6731298
    Abstract: A system, method and article of manufacture are provided for computer graphics processing. First, pixel data is received including a depth-value. Thereafter, the depth-value is modified based on a depth-component of an algorithm. An operation is subsequently performed on the pixel data taking into account the modified depth-value.
    Type: Grant
    Filed: October 2, 2000
    Date of Patent: May 4, 2004
    Assignee: NVIDIA Corporation
    Inventors: Henry P. Moreton, John Erik Lindholm, Matthew N. Papakipos, Harold Robert Feldman Zatz
  • Patent number: 6728885
    Abstract: A method, system and computer program for providing multilevel security to a computer network. The method comprises the step of receiving a first communication packet on at least one network interface port from an outside network. The method further includes the steps of filtering the first packet in one of at least two levels of security comprising a first level of security which examines the content information of the packet and a second level of security which examines the first packet excluding the content information of the packet. The system includes a first packet filter configured to filter its input packets by examining content information of its packets and a second packet filter configured to filter its input packets by examining the header information without examining the content information of its packets. The system further includes a third filter which is configured to forward a number of packets to one of the first and second filters, thereby providing security to the computer network.
    Type: Grant
    Filed: October 8, 1999
    Date of Patent: April 27, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Kevin R. Taylor, Ganesh Murugesan, Homayoon Tajalli
  • Patent number: 6728219
    Abstract: A graphical user interface is provided for displaying network analysis including a window including a plurality of gauges selected from the group consisting of a first gauge for indicating a number of packets specified by the network analysis, a second gauge for indicating a network utilization specified by the network analysis, and a third gauge for indicating a number of errors specified by the network analysis.
    Type: Grant
    Filed: August 19, 2002
    Date of Patent: April 27, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Pak-Tak Patrick Leong, King L. Won
  • Patent number: 6725377
    Abstract: A method and system for updating anti-intrusion software is provided. In a preferred embodiment, a computer program product updates anti-intrusion software on a computer network which has an anti-intrusion monitor server. The anti-intrusion monitor server recognizes attacks on the computer network in accordance with attack pattern information contained in the anti-intrusion software. The computer program product includes computer code that installs modified attack pattern information onto a central anti-intrusion server, and computer code that transfers the modified attack pattern information from the central anti-intrusion server to the anti-intrusion monitor server using push technology. The result is that newly discovered attack patterns are capable of being rapidly communicated from the central anti-intrusion server to the computer network.
    Type: Grant
    Filed: March 12, 1999
    Date of Patent: April 20, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Victor Kouznetsov