Patents Examined by Matthew S Lindsey
  • Patent number: 8539091
    Abstract: Methods and systems have been provided for preempting a secondary service provider from streaming information. The primary service provider sends an Ad-insert control packet for giving control of the streaming to the secondary service provider, during still periods determined on the basis of the Ad-insert control packet. When the primary service provider wants to take back control of streaming from the secondary service provider during the still periods, the primary service provider sends an Ad-insert preempt message. The secondary service provider is then preempted during the periods that are determined on the basis of the Ad-insert preempt message.
    Type: Grant
    Filed: December 21, 2005
    Date of Patent: September 17, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Ganesan Velrajan, Balaji Venkat Venkataswami, Mahesh Vittal, Srinivasan Santhanam
  • Patent number: 8078705
    Abstract: Systems, methodologies, media, and other embodiments associated with key-configured topology connection management are described. One exemplary system embodiment includes a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in a key-configured topology. Membership in the key-configured topology may be determined by a connection management logic analyzing a key provided by the requestor in a request related to accessing the resource. The key may be internally generated by a key maintenance logic.
    Type: Grant
    Filed: April 5, 2004
    Date of Patent: December 13, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Prashant Modi, Kathryn Hampton
  • Patent number: 8028026
    Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.
    Type: Grant
    Filed: May 31, 2006
    Date of Patent: September 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble
  • Patent number: 8005889
    Abstract: Systems, methods, and computer program products for synchronizing digital photo albums at peer servers with a proxy server and a guest content server in a photosharing peer-to-peer network are provided such that the proxy server and guest content server can serve content to requesters from photo albums of an off-line peer server. A synchronization manager receives a request from a peer server to synchronize image files of one or more photo albums at the peer server with image files cached on the proxy server. The synchronization manager directs a web robot to crawl the URL of each photo album identified in the request and to identify image files at the peer server that have been modified and/or that are not currently cached on the proxy server. The web robot also identifies non-image files associated with each image file. The web robot retrieves and caches identified image files on the proxy server. The web robot retrieves and caches identified non-image files on the guest content server.
    Type: Grant
    Filed: November 16, 2005
    Date of Patent: August 23, 2011
    Assignee: Qurio Holdings, Inc.
    Inventors: Alfredo Celino Issa, Gary Whitson Black, Patricia Ann Scardino, Christopher Michael Amidon, Hugh Blake Svendsen
  • Patent number: 7908390
    Abstract: A packet forwarding apparatus and network system for providing different types of bandwidth control services to the user; in which a packet forwarding apparatus for transferring data comprises an interface unit for sending and receiving packets, and a traffic shaper for controlling the packet transmission timing and a packet switch for sending an output to the interface unit as the destination of the received packet; and the traffic shaper uses a token bucket algorithm when transmitting a packet to guarantee the minimum frame rate, and uses a leaky bucket algorithm when limiting the peak frame rate.
    Type: Grant
    Filed: January 30, 2006
    Date of Patent: March 15, 2011
    Assignee: Hitachi, Ltd.
    Inventors: Masayuki Takase, Yoshihiro Ashi, Masahiko Mizutani, Tohru Kazawa, Kenichi Sakamoto, Taishi Shinagawa
  • Patent number: 7788325
    Abstract: A system and method for users to determine the email addresses of persons whose data used to develop email addresses and email server address is known. The system generates email address guesses and uses the returned mail feature of the persons email server to test these email address possibilities until a successful address is found. The system sends the desired email message, and provides the successful address and a copy of the sent email to the user.
    Type: Grant
    Filed: July 3, 2004
    Date of Patent: August 31, 2010
    Assignee: Hoover's Inc.
    Inventors: Kenneth A Glidden, Andrew Paulsen
  • Patent number: 7739374
    Abstract: An integrated tracing and logging system for an enterprise network is described. One embodiment of the integrated logging and tracing system has an object-oriented architecture which includes a controller class with two sub-classes: a tracing sub-class and a logging sub-class. Instances of the tracing sub-class (tracing modules) are associated with specified program code regions of network applications. The tracing modules receive method calls from the network applications and process the method calls based on defined severity levels. Instances of the logging sub-class (logging modules) are associated with specified “categories” related to the enterprise network (e.g., system, database, etc). The logging modules receive and process method calls from network components associated with the categories. The integrated logging and tracing system provides a unique architecture for configuring the logging and tracing modules using minimum/maximum severity settings and inheritance.
    Type: Grant
    Filed: December 30, 2003
    Date of Patent: June 15, 2010
    Assignee: SAP AG
    Inventors: Gregor K. Frey, Heiko D. Kiessling, Miroslav R. Petrov, Georgi G. Manev, Nikola I. Marchev
  • Patent number: 7653712
    Abstract: An agent of a storage area network generates a first checksum value for a first set of zone configuration data used to at least initially configure the storage area network. At a later time, after a potential change to the first zone configuration data of the storage area network, the agent generates a checksum value based on current zone configuration data presently used to configure the zone in the storage area network. The agent then compares the first checksum value and the second checksum value to identify whether there has been a change to the first zone configuration data. That is, if the first checksum value does not equal the second checksum value, the agent flags that there has been a change to zone configuration data of the storage area network. Users can control behavior of zoning importation and activation depending on whether current zone configuration data has been changed.
    Type: Grant
    Filed: March 30, 2005
    Date of Patent: January 26, 2010
    Assignee: EMC Corporation
    Inventors: Alexander Dubrovsky, Xiaojun Wu, Yifeng Chen, Yong Cai, James E. Lavallee
  • Patent number: 7496662
    Abstract: A packet transmitted on a network is read and decoded. A network device and its operating system are identified by analyzing the decoded packet. If more than one operating system is identified from the decoded packet, the operating system is selecting by comparing confidence values assigned to the operating systems identified. A service running on the network device is identified from the decoded packet or subsequent packets that are read, decoded and analyzed. The network topology of a network is determined by reading, decoding, and analyzing a plurality of packets. A flow between two network devices is determined by reading, decoding, and analyzing a plurality of packets. Vulnerabilities are assigned to operating systems and services identified by reading, decoding, and analyzing packets. Network configuration policy is enforced on operating systems and services identified by reading, decoding, and analyzing packets.
    Type: Grant
    Filed: May 12, 2004
    Date of Patent: February 24, 2009
    Assignee: Sourcefire, Inc.
    Inventors: Martin Roesch, Ronald A. Dempster