Patents Assigned to Crimson Corporation
  • Patent number: 8838759
    Abstract: A method for detecting unmanaged nodes within a system is described. A flow of data associated with a node is detected, wherein a managed node detects the flow of data. Information relating to the node is discovered. A determination is made whether the node has been previously discovered. The identification of the node is recorded to a list if it is determined the node has not been previously discovered. The identification of the node is transmitted to a management device.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: September 16, 2014
    Assignee: Crimson Corporation
    Inventors: David A. Eatough, Peter E. Johnson, David B. Morley
  • Patent number: 8825651
    Abstract: A computing device configured for determining a group of related products is described. The computing device includes a processor and instructions stored in memory that is in electronic communication with the processor. The computing device obtains product data that identifies a first product and a second product. The computing device also obtains license data. The computing device further identifies a relationship between the first product and the second product based on the license data. The computing device additionally determines a group of related products based on the relationship. The computing device also performs an operation based on the group.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: September 2, 2014
    Assignee: Crimson Corporation
    Inventors: Jerome Broekhuijsen, Peter E. Johnson
  • Publication number: 20140237124
    Abstract: Methods of adding data identifiers and speech/voice recognition functionality are disclosed. A telnet client runs one or more scripts that add data identifiers to data fields in a telnet session. The input data is inserted in the corresponding fields based on data identifiers. Scripts run only on the telnet client without modifications to the server applications. Further disclosed are methods for providing speech recognition and voice functionality to telnet clients. Portions of input data are converted to voice and played to the user. A user also may provide input to certain fields of the telnet session by using his voice. Scripts running on the telnet client convert the user's voice into text and is inserted to corresponding fields.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 21, 2014
    Applicant: Crimson Corporation
    Inventors: Lamar John Van Wagenen, Brant David Thomsen, Scott Allen Caddes
  • Publication number: 20140236674
    Abstract: A method for predicting whether a party will purchase a product. The method includes accessing data wherein the data is obtained from a plurality of computing environments of a plurality of parties, analyzing the data; and predicting whether one of the plurality of parties will purchase a product based on the analyzed data.
    Type: Application
    Filed: February 20, 2013
    Publication date: August 21, 2014
    Applicant: Crimson Corporation
    Inventor: Brandon LEHNER
  • Patent number: 8806246
    Abstract: A computing device configured for enforcing a computing device power policy is described. The computing device includes a processor and executable instructions stored in memory that is in electronic communication with the processor. The computing device generates a power policy. The computing device also sends the power policy. The computing device further receives a suspicious process alert. Additionally, the computing device determines whether to terminate a suspicious process. The computing device also sends a process termination command if it is determined to terminate the suspicious process.
    Type: Grant
    Filed: May 5, 2011
    Date of Patent: August 12, 2014
    Assignee: Crimson Corporation
    Inventors: Jojo Wu, Fay Li, Marco Wu, Charles Huang
  • Patent number: 8799174
    Abstract: A business process management system may include a parent workflow process and a child workflow process. The parent workflow process may include a call to the child workflow process. The business process management system may also include a workflow engine that is configured to execute the parent workflow process and the child workflow process, and that is configured to determine an undefined characteristic of the child workflow process with reference to data that corresponds to the parent workflow process.
    Type: Grant
    Filed: June 15, 2007
    Date of Patent: August 5, 2014
    Assignee: Crimson Corporation
    Inventors: Jason J. Mitchell, Marty Kurzinski, Richard Thomson, Brian J. Kerr
  • Patent number: 8793782
    Abstract: A method for injecting a security token into an authentication protocol response is disclosed. An authentication protocol response from a node requesting access to a network is intercepted. It is determined if the node complies with a health policy of the network. A security token is inserted into the authentication protocol response based on the compliance node.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: July 29, 2014
    Assignee: Crimson Corporation
    Inventor: Jin Su
  • Patent number: 8787576
    Abstract: Unauthorized wireless access points are detected by configuring authorized access points and mobile units to listen to all wireless traffic in its cell and report all detected wireless devices to a monitor. The monitor checks the reported devices against a list of authorized network devices. If the reported wireless device is not an authorized device, the monitor determines if the reported device is connected to the network. If the reported device is connected to the network and is not an authorized device, the monitor alerts the network operator or network manager of a rogue device connected to the network and attempts to locate and isolate the rogue device.
    Type: Grant
    Filed: June 20, 2011
    Date of Patent: July 22, 2014
    Assignee: Crimson Corporation
    Inventors: Robert Whelan, Lamar Van Wagenen, Roy Morris
  • Patent number: 8788707
    Abstract: A method for assigning a random static IP address in a quarantine network is disclosed. An initial IP address is selected from a set of reserved IP addresses. The selected IP address is assigned to a device in a quarantine network. A random static IP address is determined. The uniqueness within the quarantine network of the random static IP address is verified. The random static IP address is assigned to the device if the random static IP address is unique.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: July 22, 2014
    Assignee: Crimson Corporation
    Inventor: Jin Su
  • Patent number: 8782740
    Abstract: A method for detecting unauthorized or unsecured access points is disclosed. At least one node of a computer network having a wireless network interface is identified. At least one of the identified nodes is requested to scan for detectable wireless access points. A listing of identified wireless access points is utilizing information gathered through at least one of the scans. An inventory of authorized wireless access points is formulated. The listing is compared to the inventory to identify unauthorized wireless access points. Also, security information may be gathered and analyzed for identified wireless access points.
    Type: Grant
    Filed: January 28, 2009
    Date of Patent: July 15, 2014
    Assignee: Crimson Corporation
    Inventors: Anthony Nicholas Sarra, Plinio Pimentel
  • Patent number: 8732690
    Abstract: A computing device configured for installing an application is described. The computing device includes a processor and instructions stored in memory that is in electronic communication with the processor. The computing device determines if an application instruction length is a first instruction length or a second instruction length. The first instruction length is shorter than the second instruction length. If the application instruction length is the first instruction length, then the computing device runs an application installer in a first instruction length mode. If the application instruction length is the second instruction length, then the computing device determines if an operating system instruction length is the first instruction length or the second instruction length. If the operating system instruction length is the second instruction length, then the computing device disables a compatibility module.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: May 20, 2014
    Assignee: Crimson Corporation
    Inventor: James Lester Memmott
  • Patent number: 8719815
    Abstract: A method for distributing a computer software package using a pre-requisite query is disclosed. A first pre-requisite query is associated with a package. Attribute information is obtained from one or more managed nodes across a computer network. The attribute information is stored on an administrative system. The first pre-requisite query is run using the attribute information on the administrative system to obtain a first result. The first result indicates whether the one or more managed nodes has the necessary attribute information for the package. The package is sent to the one or more managed nodes that have the necessary attribute information for the package.
    Type: Grant
    Filed: December 9, 2005
    Date of Patent: May 6, 2014
    Assignee: Crimson Corporation
    Inventors: Richard Park, Mark Bird, David A. Eatough
  • Patent number: 8706849
    Abstract: A method and system for polling an administrative system for one or more managed nodes is described. The administrative system is connected to a managed node. The administrative system is polled for data to be downloaded. A node list is sent to the administrative system. A connect list is received from the administrative system. The connect list is multicast to the one or more managed nodes.
    Type: Grant
    Filed: February 9, 2007
    Date of Patent: April 22, 2014
    Assignee: Crimson Corporation
    Inventors: Peter E. Johnson, Mark E. Howarth, Alan B. Butt, Plinio Pimentel, Anthony N. Sarra
  • Patent number: 8635069
    Abstract: Methods of adding data identifiers and speech/voice recognition functionality are disclosed. A telnet client runs one or more scripts that add data identifiers to data fields in a telnet session. The input data is inserted in the corresponding fields based on data identifiers. Scripts run only on the telnet client without modifications to the server applications. Further disclosed are methods for providing speech recognition and voice functionality to telnet clients. Portions of input data are converted to voice and played to the user. A user also may provide input to certain fields of the telnet session by using his voice. Scripts running on the telnet client convert the user's voice into text and is inserted to corresponding fields.
    Type: Grant
    Filed: August 16, 2007
    Date of Patent: January 21, 2014
    Assignee: Crimson Corporation
    Inventors: Lamar John Van Wagenen, Brant David Thomsen, Scott Allen Caddes
  • Publication number: 20140013300
    Abstract: General-purpose components are selectively included in a toolkit hosted by hosting provider computing devices. The general-purpose components are software components. The general-purpose components in the toolkit are available over a computer network to end user computing devices. The end user computing devices utilizes general-purpose components in the toolkit to provide system administration solutions. The system administration solutions are web applications hosted by the hosting provider computing devices. The system administration solutions provide an ability to perform administration tasks on on-premises computer systems of the end users. A hosting provider computing device is configured such that the end user computing devices are able to utilize the general-purpose components in the toolkit on a Software-as-a-Service (SaaS) basis.
    Type: Application
    Filed: April 1, 2013
    Publication date: January 9, 2014
    Applicant: Crimson Corporation
    Inventors: Mark SHAVLIK, John G. MORGAN, Rob JUNCKER
  • Patent number: 8621451
    Abstract: A computing device configured for improving the responsiveness of a computing device in connection with software distribution is described. The computing device includes a processor and executable instructions stored in memory that is in electronic communication with the processor. The computing device receives a return code and package information from a remote computing device. The computing device also looks up a code mapping in a cache, wherein the code mapping is based on the return code. The computing device further stores the package information in a database. The computing device furthermore displays the code mapping and the package information.
    Type: Grant
    Filed: January 19, 2012
    Date of Patent: December 31, 2013
    Assignee: Crimson Corporation
    Inventors: David Bradford Morley, Blake Alan Thompson
  • Patent number: 8601542
    Abstract: A computer-implemented method providing for configuration file downloads is disclosed. A first resource path is built. The first resource path may comprise a root component, a group component, and a time component based on a rounded time. Any computer systems within a group of the computer systems that have previously downloaded or are currently downloading a configuration file for the rounded time are identified. If any such computer system is identified, a copy of the configuration file is obtained from one of the identified computer systems. Otherwise, the configuration file is requested for the rounded time from a source. The source may generate the configuration file based on policies for the group of computer systems identified by the group component. The configuration file may then be downloaded.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: December 3, 2013
    Assignee: Crimson Corporation
    Inventor: David A. Eatough
  • Patent number: 8584194
    Abstract: Network address requests from candidate nodes are directed to a quarantined server rather than a network address server. The candidate node is admitted to a virtual network, enabling the candidate node to access only limited resources of the network and minimizing security risks to the network. The quarantined server determines whether the candidate node complies with a set of security criteria. If the candidate node conforms to the set of criteria, when a second request for a network address is sent by the candidate node, the second request is received by the quarantined server and relayed to the network address server. Thereafter, the network address server will issue a network address to the candidate node, enabling the candidate node to access at least a portion of the full resources of the network. If the candidate node does not comply with the security criteria and cannot be remediated, the network address server will not issue a network address to the candidate node.
    Type: Grant
    Filed: August 29, 2005
    Date of Patent: November 12, 2013
    Assignee: Crimson Corporation
    Inventors: Brian J. Kerr, Russell Anderson, Corey Young
  • Patent number: 8561131
    Abstract: A computing device configured for allocating products to licenses is described. The computing device includes a processor and instructions stored in memory that is in electronic communication with the processor. The computing device obtains license data that identifies a plurality of licenses. The computing device also obtains product data that identifies a plurality of products. The computing device determines a degree of constraint for each of the plurality of products. The computing device also allocates at least one of the plurality of products to at least one of the plurality of licenses based on the degree of constraint. The computing device further performs an operation based on the allocation.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: October 15, 2013
    Assignee: Crimson Corporation
    Inventors: Jerome Broekhuijsen, Peter E. Johnson
  • Patent number: 8533332
    Abstract: A method for obtaining exclusive access to a computing resource utilizing a network is disclosed. A discovery request is sent by a sending node within a network segment to one or more recipient nodes within the network segment. The discovery request is configured to determine whether each recipient node is accessing a specified computing resource. One or more replies to their request or an absence of replies from the recipient nodes are analyzed to determine whether any of the recipient nodes are accessing the specified computing resource. If the replies or the absence of replies indicate that none of the recipient nodes are accessing the specified resource, exclusive access is obtained on usage of the specified computing resource by the sending node.
    Type: Grant
    Filed: June 18, 2007
    Date of Patent: September 10, 2013
    Assignee: Crimson Corporation
    Inventor: David A. Eatough