Patents Examined by Matthew S Lindsey
-
Patent number: 8539091Abstract: Methods and systems have been provided for preempting a secondary service provider from streaming information. The primary service provider sends an Ad-insert control packet for giving control of the streaming to the secondary service provider, during still periods determined on the basis of the Ad-insert control packet. When the primary service provider wants to take back control of streaming from the secondary service provider during the still periods, the primary service provider sends an Ad-insert preempt message. The secondary service provider is then preempted during the periods that are determined on the basis of the Ad-insert preempt message.Type: GrantFiled: December 21, 2005Date of Patent: September 17, 2013Assignee: Cisco Technology, Inc.Inventors: Ganesan Velrajan, Balaji Venkat Venkataswami, Mahesh Vittal, Srinivasan Santhanam
-
Patent number: 8078705Abstract: Systems, methodologies, media, and other embodiments associated with key-configured topology connection management are described. One exemplary system embodiment includes a logic for mapping a resource to a port through which it can be accessed and a logic for determining whether a requestor will be granted a connection to the machine on which the resource resides based, at least in part, on membership in a key-configured topology. Membership in the key-configured topology may be determined by a connection management logic analyzing a key provided by the requestor in a request related to accessing the resource. The key may be internally generated by a key maintenance logic.Type: GrantFiled: April 5, 2004Date of Patent: December 13, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prashant Modi, Kathryn Hampton
-
Patent number: 8028026Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.Type: GrantFiled: May 31, 2006Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble
-
Patent number: 8005889Abstract: Systems, methods, and computer program products for synchronizing digital photo albums at peer servers with a proxy server and a guest content server in a photosharing peer-to-peer network are provided such that the proxy server and guest content server can serve content to requesters from photo albums of an off-line peer server. A synchronization manager receives a request from a peer server to synchronize image files of one or more photo albums at the peer server with image files cached on the proxy server. The synchronization manager directs a web robot to crawl the URL of each photo album identified in the request and to identify image files at the peer server that have been modified and/or that are not currently cached on the proxy server. The web robot also identifies non-image files associated with each image file. The web robot retrieves and caches identified image files on the proxy server. The web robot retrieves and caches identified non-image files on the guest content server.Type: GrantFiled: November 16, 2005Date of Patent: August 23, 2011Assignee: Qurio Holdings, Inc.Inventors: Alfredo Celino Issa, Gary Whitson Black, Patricia Ann Scardino, Christopher Michael Amidon, Hugh Blake Svendsen
-
Patent number: 7908390Abstract: A packet forwarding apparatus and network system for providing different types of bandwidth control services to the user; in which a packet forwarding apparatus for transferring data comprises an interface unit for sending and receiving packets, and a traffic shaper for controlling the packet transmission timing and a packet switch for sending an output to the interface unit as the destination of the received packet; and the traffic shaper uses a token bucket algorithm when transmitting a packet to guarantee the minimum frame rate, and uses a leaky bucket algorithm when limiting the peak frame rate.Type: GrantFiled: January 30, 2006Date of Patent: March 15, 2011Assignee: Hitachi, Ltd.Inventors: Masayuki Takase, Yoshihiro Ashi, Masahiko Mizutani, Tohru Kazawa, Kenichi Sakamoto, Taishi Shinagawa
-
Patent number: 7788325Abstract: A system and method for users to determine the email addresses of persons whose data used to develop email addresses and email server address is known. The system generates email address guesses and uses the returned mail feature of the persons email server to test these email address possibilities until a successful address is found. The system sends the desired email message, and provides the successful address and a copy of the sent email to the user.Type: GrantFiled: July 3, 2004Date of Patent: August 31, 2010Assignee: Hoover's Inc.Inventors: Kenneth A Glidden, Andrew Paulsen
-
Patent number: 7739374Abstract: An integrated tracing and logging system for an enterprise network is described. One embodiment of the integrated logging and tracing system has an object-oriented architecture which includes a controller class with two sub-classes: a tracing sub-class and a logging sub-class. Instances of the tracing sub-class (tracing modules) are associated with specified program code regions of network applications. The tracing modules receive method calls from the network applications and process the method calls based on defined severity levels. Instances of the logging sub-class (logging modules) are associated with specified “categories” related to the enterprise network (e.g., system, database, etc). The logging modules receive and process method calls from network components associated with the categories. The integrated logging and tracing system provides a unique architecture for configuring the logging and tracing modules using minimum/maximum severity settings and inheritance.Type: GrantFiled: December 30, 2003Date of Patent: June 15, 2010Assignee: SAP AGInventors: Gregor K. Frey, Heiko D. Kiessling, Miroslav R. Petrov, Georgi G. Manev, Nikola I. Marchev
-
Patent number: 7653712Abstract: An agent of a storage area network generates a first checksum value for a first set of zone configuration data used to at least initially configure the storage area network. At a later time, after a potential change to the first zone configuration data of the storage area network, the agent generates a checksum value based on current zone configuration data presently used to configure the zone in the storage area network. The agent then compares the first checksum value and the second checksum value to identify whether there has been a change to the first zone configuration data. That is, if the first checksum value does not equal the second checksum value, the agent flags that there has been a change to zone configuration data of the storage area network. Users can control behavior of zoning importation and activation depending on whether current zone configuration data has been changed.Type: GrantFiled: March 30, 2005Date of Patent: January 26, 2010Assignee: EMC CorporationInventors: Alexander Dubrovsky, Xiaojun Wu, Yifeng Chen, Yong Cai, James E. Lavallee
-
Patent number: 7496662Abstract: A packet transmitted on a network is read and decoded. A network device and its operating system are identified by analyzing the decoded packet. If more than one operating system is identified from the decoded packet, the operating system is selecting by comparing confidence values assigned to the operating systems identified. A service running on the network device is identified from the decoded packet or subsequent packets that are read, decoded and analyzed. The network topology of a network is determined by reading, decoding, and analyzing a plurality of packets. A flow between two network devices is determined by reading, decoding, and analyzing a plurality of packets. Vulnerabilities are assigned to operating systems and services identified by reading, decoding, and analyzing packets. Network configuration policy is enforced on operating systems and services identified by reading, decoding, and analyzing packets.Type: GrantFiled: May 12, 2004Date of Patent: February 24, 2009Assignee: Sourcefire, Inc.Inventors: Martin Roesch, Ronald A. Dempster