Patents Represented by Attorney Patent Capital Group
  • Patent number: 8161551
    Abstract: A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system.
    Type: Grant
    Filed: April 21, 2009
    Date of Patent: April 17, 2012
    Assignee: McAfee, Inc.
    Inventors: Igor Muttik, Steve O. Hearnden, Joel Robert Spurlock
  • Patent number: 8156209
    Abstract: Several keep-alive messages of point to point (PPP) sessions received from a remote system are aggregated into a single packet in an aggregation device (e.g., network access server). The aggregated packet is sent to a peer aggregation device (e.g., home gateway) at the other end of the PPP session. The peer aggregation device may send the status of the sessions in a single packet. As a result, the data traffic on a communication backbone due to keep-alive status checks may be reduced. Without waiting for the peer aggregation device to provide the status information, a proxy reply may be generated from the aggregation device.
    Type: Grant
    Filed: February 15, 2001
    Date of Patent: April 10, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Amit Phadnis, Pankaj Vyas, Chandrahasa Chakravarthi Pullagura
  • Patent number: 8156541
    Abstract: A system, method, and computer program product are provided for identifying unwanted activity utilizing a honeypot accessible via virtual local area network (VLAN) trunking. In use, a honeypot device is allowed to be accessed via VLAN trunking. Furthermore, unwanted data is identified, utilizing the honeypot device.
    Type: Grant
    Filed: October 17, 2007
    Date of Patent: April 10, 2012
    Assignee: McAfee, Inc.
    Inventors: Vinoo Thomas, Nitin Jyoti
  • Patent number: 8156504
    Abstract: In one embodiment, a load balancing system may include a first physical device that provides a resource. The first physical device may have a first virtual device running actively thereon. The first virtual device may have the resource allocated to it on the physical device. The first physical device may also have a virtual server load balancer running actively thereon. The server load balancer may be adapted to balance a workload associated with the resource between the first virtual device and a second virtual device. The second virtual device may be running in active mode on a second physical device, and in standby mode on the first physical device. The first virtual device may be in standby mode on the second physical device.
    Type: Grant
    Filed: October 5, 2007
    Date of Patent: April 10, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Sukento Sukirya
  • Patent number: 8156542
    Abstract: In one embodiment a method comprises enrolling a mobile device in a local area network by setting a variable to a mobile device identifier and authenticating the mobile device using a network gateway and the mobile device identifier. A request for data is received from the mobile device and the data is delivered from a service provider to the mobile device.
    Type: Grant
    Filed: April 4, 2008
    Date of Patent: April 10, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Allen J. Huotari, Kendra S. Harrington
  • Patent number: 8149843
    Abstract: Techniques for exchanging capabilities in a wireless network are provided. In one embodiment, a first device receives a capability message over a communication link from a second device in a WiMAX network. The communication link may be between any combination of base stations and gateways. For example, the R4, R6, or R8 interface may be used. Other interfaces may also be appreciated in a WiMAX network. The capability message includes one or more capabilities supported by a second device in the WiMAX network. Capabilities to support are then determined based on the one or more capabilities. These capabilities will be supported by the first device for communications with the second device. The first device is then configured to support the determined capabilities. Accordingly, the first device is dynamically configured based on the capability message received.
    Type: Grant
    Filed: June 28, 2006
    Date of Patent: April 3, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Anand K. Oswal, Jayaraman Iyer, Bhaskar Bhupalam
  • Patent number: 8146057
    Abstract: One or more test controls within code under test are enabled and then executing the code under test is executed. When enabled, the test control will interact with a tester when the code under test is executed (e.g., by providing data to the tester). The selection to enable the test control can be made based on whether the system accessing the code under test is a tester. If the system is a tester, the test control is enabled. Otherwise, the test control is disabled. The test control can include an execution control, a data definition control, and/or a log control.
    Type: Grant
    Filed: January 9, 2006
    Date of Patent: March 27, 2012
    Assignee: Interactive TKO, Inc.
    Inventor: John Joseph Michelsen
  • Patent number: 8135830
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: March 13, 2012
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8135823
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: May 14, 2007
    Date of Patent: March 13, 2012
    Assignee: McAfee, Inc.
    Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
  • Patent number: 8130643
    Abstract: A method is provided in one example and includes querying for a total capacity for data transmissions for a local network segment, and identifying an available capacity for the local network segment by subtracting a sum of current aggregate consumption of the local network segment from the total capacity. The method also includes comparing the available capacity to a requested capacity that is generated by a network element for a specific communication session. If the requested capacity is equal to or greater than the available capacity, the request is withheld and not transmitted. In more specific embodiments, if the requested capacity is less than the available capacity, the request is transmitted. The query can be communicated to a gateway. In still other embodiments, the query includes a specific query as to a capacity allocated for video data and the network element is a set-top box.
    Type: Grant
    Filed: April 7, 2009
    Date of Patent: March 6, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Siddhartha Dattagupta, Allen J. Huotari
  • Patent number: 8132164
    Abstract: A system, method, and computer program product are provided for virtual patching. Initially, information associated with at least one vulnerability of a computer application is collected. Further, at least one host interface is identified that is capable of being used to access the vulnerability. In use, data sent to the at least one host interface is analyzed to determine whether the data is unwanted, based on the information.
    Type: Grant
    Filed: August 1, 2005
    Date of Patent: March 6, 2012
    Assignee: McAfee, Inc.
    Inventors: Oded Horovitz, Yona Hollander
  • Patent number: 8130965
    Abstract: A system and method for the retrieval and transfer of encrypted content from a failed set-top box by a content transcription device. When content is recorded to the storage device of a set-top box, the content is encrypted with a content instance key. This content instance key is encrypted with the public key of the set-top box and a duplicate of the content instance key is encrypted by another public key other than the public key of the set-top. In the event the set-top fails, the encrypted content on the storage device may be retrieved from the storage device by decrypting the duplicate content instance key with the private key that corresponds with the public key that encrypted the duplicate of the content instance key.
    Type: Grant
    Filed: November 20, 2007
    Date of Patent: March 6, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Anthony J. Wasilewski
  • Patent number: 8127354
    Abstract: A system, method, and computer program product are provided for identifying vulnerabilities associated with data loaded in memory. In operation, a subset of data that is loaded in memory is identified. Additionally, the subset of data is compared to a list of known data. Furthermore, there is a reaction based on the comparison.
    Type: Grant
    Filed: October 9, 2008
    Date of Patent: February 28, 2012
    Assignee: McAfee, Inc.
    Inventors: Anthony J. Bettini, Michael M. Price
  • Patent number: 8123797
    Abstract: An apparatus is provided that includes a graft for coupling two vascular conduits within a patient. The graft includes: 1) an anchor system that forms an arc at one end of the conduits; and 2) a body element coupled to the anchor system. The anchor system comprises a biodegradable stent. In particular embodiments, portions of the graft are either self-expandable or balloon-expandable. In still other embodiments, anchor system includes NITINOL and the anchor system is substantially self-sealing at one end of the conduits. In one embodiment, the body element comprises polytetrafluoroethylene (PTFE) or expanded polytetrafluoroethylene (EPTFE). In yet other embodiments, the body element includes either a gelatinous or an elastomeric coating disposed on its surface.
    Type: Grant
    Filed: April 8, 2010
    Date of Patent: February 28, 2012
    Assignee: Graft Technologies, Inc.
    Inventors: Azam Anwar, Georges A. Feghali, Kenneth B. Johnson
  • Patent number: 8125920
    Abstract: An apparatus is provided in one example embodiment and includes a network element configured to receive a plurality of packets. The network element is configured to couple to a module, the module being configured to generate a data record that is based on information associated with the packets and capable of being interpreted according to a template in which multiple information elements can be positioned to create a hierarchical relationship within structured data. The structured data further includes references to the information elements. The network element further including an export module configured to export the data record to a next destination.
    Type: Grant
    Filed: May 14, 2009
    Date of Patent: February 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Paul J. Aitken, Benoit Claise, Gowri Dhandapani, Zhipu Jin, Nagaraj Varadharajan, Stanford L. Yates
  • Patent number: 8126494
    Abstract: A method is provided in one example and includes receiving a first channel release notification from a communication network at a trunked radio network gateway connecting one or more trunked radio networks to the communication network. The method also includes determining whether the first channel release notification was generated in response to an initial seizure or a release of a channel in a trunked radio network of the gateway. The method further includes suppressing transmission of a further channel release notification based on data included in the first channel release notification that indicates an origin of the channel seizure or the release causing the first channel release notification to be generated. In more specific embodiments, the data includes parameter values indicating an originating source for the seizure or the release and a responding source generating the channel release notification.
    Type: Grant
    Filed: December 19, 2008
    Date of Patent: February 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Shmuel Shaffer, David S. Bicknell
  • Patent number: 8117591
    Abstract: Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon. An assertion (e.g., against test results obtained by performing the first testing activity) is associated with the connector.
    Type: Grant
    Filed: January 9, 2006
    Date of Patent: February 14, 2012
    Assignee: Interactive TKO, Inc.
    Inventor: John Joseph Michelsen
  • Patent number: 8117091
    Abstract: A method for providing a certified photograph in a network environment is offered that includes interfacing with one or more end users and managing information related to one or more of the end users. The method further includes displaying one or more photos of the end users and providing a label on the photos that certifies the photos as being substantially accurate.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: February 14, 2012
    Assignee: MATCH.COM, L.L.C.
    Inventors: Chris S. Terrill, Todd W. Kirby
  • Patent number: D655279
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: March 6, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Kyle A. Buzzard, Andrew R. Church, Ashok T. Desai, Daniel K. Harden, Juli A. Satoh, Richard T. Wales, Christopher L. Whittall
  • Patent number: D657809
    Type: Grant
    Filed: December 19, 2009
    Date of Patent: April 17, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Daniel K. Harden, Christopher L. Whittall, J. Gerson Goldberg, Mickey C. Makay, Andrew R. Church