Patents Assigned to Azure Networks, LLC
  • Patent number: 9445260
    Abstract: A portable endpoint device comprises a first virtual device and a second virtual device integrated in a same single unit and configured such that the first virtual device and the second virtual device are configured to allow communication therewith as virtually different physical devices despite being integrated in the same single unit. In operation, the device is configured to receive a first signal from another endpoint device to indicate the availability of the another endpoint device for attachment; send, to the another endpoint device a second signal utilizing first scheduling-related information, the second signal including a first one of a plurality of identifiers for unique identification in association with the portable endpoint device; receive, from the another endpoint device a third signal that is sent in response to the second signal; and receive, from the another endpoint device data utilizing a second one of the identifiers for identification in association with the portable endpoint device.
    Type: Grant
    Filed: April 14, 2014
    Date of Patent: September 13, 2016
    Assignee: Azure Networks, LLC
    Inventor: Robert J Donaghey
  • Publication number: 20100205672
    Abstract: A system (126-129) detects transmission of potentially malicious packets. The system (126-129) receives packets and generates hash values corresponding to each of the packets. The system (126-129) may then compare the generated hash values to hash values corresponding to prior packets. The system (126-129) determines that one of the packets is a potentially malicious packet when the generated hash value corresponding to the one packet matches one of the hash values corresponding to one of the prior packets and the one prior packet was received within a predetermined amount of time of the one packet. The system (126-129) may also facilitate the tracing of the path taken by a potentially malicious packet. In this case, the system (126-129) may receive a message that identifies a potentially malicious packet, generate hash values from the potentially malicious packet, and determine whether one or more of the generated hash values match hash values corresponding to previously-received packets.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20100205671
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20100205265
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Application
    Filed: April 19, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan
  • Publication number: 20100205670
    Abstract: A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS1) and at least one router configured to operate as a source path isolation router (SR1) operating within an autonomous system. When IDS detects a malicious packet, a message is sent to SS1. SS1 in turn generates a query message (QM) containing at least a portion of the malicious packet. Then, QM is sent to participating routers located one hop away. SR1 uses the query message to determine if it has observed the malicious packet by comparing it with locally stored information about packets having passed through SR1. SR1 sends a reply to SS1, and SS1 uses the reply to identify the ingress point into the network of the malicious packet.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 7756129
    Abstract: A network (100) includes a hub device (110) and at least one unattached peripheral device (120). The unattached peripheral device (120) transmits an attach request to the hub device (110) with a selected address, receives a new address from the hub device to identify the unattached peripheral device (120), and communicates with the hub device (110) using the new address.
    Type: Grant
    Filed: March 23, 2007
    Date of Patent: July 13, 2010
    Assignee: Azure Networks, LLC
    Inventor: Robert J. Donaghey
  • Publication number: 20100135219
    Abstract: A network (100) includes a hub device (110) and at least one unattached peripheral device (120). The unattached peripheral device (120) transmits an attach request to the hub device (110) with a selected address, receives a new address from the hub device to identify the unattached peripheral device (120), and communicates with the hub device (110) using the new address.
    Type: Application
    Filed: February 3, 2010
    Publication date: June 3, 2010
    Applicant: AZURE NETWORKS, LLC
    Inventor: Robert J. Donaghey
  • Publication number: 20100138585
    Abstract: A network (100) includes a hub device (110) and at least one unattached peripheral device (120). The unattached peripheral device (120) transmits an attach request to the hub device (110) with a selected address, receives a new address from the hub device to identify the unattached peripheral device (120), and communicates with the hub device (110) using the new address.
    Type: Application
    Filed: February 3, 2010
    Publication date: June 3, 2010
    Applicant: AZURE NETWORKS, LLC
    Inventor: Robert J. Donaghey
  • Publication number: 20100135293
    Abstract: A network (100) includes a hub device (110) and at least one unattached peripheral device (120). The unattached peripheral device (120) transmits an attach request to the hub device (110) with a selected address, receives a new address from the hub device to identify the unattached peripheral device (120), and communicates with the hub device (110) using the new address.
    Type: Application
    Filed: February 3, 2010
    Publication date: June 3, 2010
    Applicant: AZURE NETWORKS, LLC
    Inventor: Robert J. Donaghey
  • Patent number: 7623897
    Abstract: A wireless network (100) includes a communications node (120) configured to periodically generate and transmit at least one reception definition. Each reception definition indicates a time and manner in which the node will operate to receive information messages.
    Type: Grant
    Filed: July 16, 2008
    Date of Patent: November 24, 2009
    Assignee: Azure Networks, LLC
    Inventor: Brig Barnum Elliott