Patents by Inventor Adam Sweeney
Adam Sweeney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11946286Abstract: A vertical door latch assembly includes a housing and a bolt movably attached to the housing having a catch portion. A drive motor is located within the housing and is configured to selectively move a lock assembly between a locked position preventing movement of the bolt and an unlocked position allowing movement of the bolt. A controller is in electrical communication with the drive motor and is configured to direct the actuator lock assembly between the locked position and the unlocked position. A force sensor is in electrical communication with the controller configured to measured when a force exceeds a predetermined threshold.Type: GrantFiled: August 21, 2020Date of Patent: April 2, 2024Assignee: Carrier CorporationInventors: Adam Kuenzi, Anthony Pettigrew, Matthew Hill, Eric Chang, Christopher Marks, Patrick Sweeney
-
Patent number: 11914853Abstract: Systems and methods are provided for configuring automatic playback settings on a media playback device. A graphical user interface displays automatic playback settings and receives selections of customized settings for automatic playback. The settings can include context granularity for automatic playback, limiting autoplay to when the media playback device is connected to a wireless network, and activating an audible notification when automatic playback of media content is beginning. An initial queue of media content is selected for playback on the media playback device. The system ascertains whether autoplay is enabled for a particular situation. If autoplay is enabled, the system automatically generates a queue of media that is related to the initial queue and initiates playback on the media playback device after the initial queue concludes.Type: GrantFiled: January 15, 2021Date of Patent: February 27, 2024Assignee: Spotify ABInventors: Adam Chase, Andrew Greene, Christopher Barthle, Eric Lundin, Jeffrey Paul Baxter, Kevin Sweeney, Mark Kizelshteyn, Matthew Young-Wook Lim, Michelle Ackerman, Thomas Gayno, Kylan McBride, Joseph Levin
-
Patent number: 11729166Abstract: Some embodiments provide a method, executable by a network device, that receives a first set of commands instructing the network device to allow network traffic to egress out of an authentication port of the network device. The authentication port is configured to belong to a first virtual local area network (VLAN). An unauthenticated device is connected to the authentication port. The method further receives a second set of commands instructing the network device to add ports belonging to the first VLAN to a broadcast domain of a second VLAN. The method also broadcasts an address request to the broadcast domain of the second VLAN. The method further receives, from the unauthenticated device, a response to the address request.Type: GrantFiled: July 7, 2020Date of Patent: August 15, 2023Assignee: ARISTA NETWORKS, INC.Inventors: Adam Sweeney, Jifei Song, Avinash Ratnavel Maharaj Ratnavel, Jaffar Hameed Abdul Kather Jilani
-
Patent number: 11552821Abstract: Systems and methods are provided herein for supporting Spanning Tree Protocol (STP) in networks that use Ethernet Virtual Private Network (EVPN) All-Active (A-A) multihoming. This may be accomplished by a network administrator defining a super root group comprising a plurality of network devices, wherein each network device provides A-A multihoming to a multihomed device. All network devices in the super root group use a common bridge ID when generating BPDU messages for STP. All network devices in the super root group will send BPDU messages comprising the common bridge ID to the multihomed device. Because the BPDU messages comprise a common bridge ID, the multihomed device treats the network devices in the super root group as a single local bridge, thus STP is enabled without causing STP flapping.Type: GrantFiled: December 15, 2020Date of Patent: January 10, 2023Assignee: ARISTA NETWORKS, INC.Inventors: Jeevan Kamisetty, Alton Lo, Adam Sweeney
-
Publication number: 20220191061Abstract: Systems and methods are provided herein for supporting Spanning Tree Protocol (STP) in networks that use Ethernet Virtual Private Network (EVPN) All-Active (A-A) multihoming. This may be accomplished by a network administrator defining a super root group comprising a plurality of network devices, wherein each network device provides A-A multihoming to a multihomed device. All network devices in the super root group use a common bridge ID when generating BPDU messages for STP. All network devices in the super root group will send BPDU messages comprising the common bridge ID to the multihomed device. Because the BPDU messages comprise a common bridge ID, the multihomed device treats the network devices in the super root group as a single local bridge, thus STP is enabled without causing STP flapping.Type: ApplicationFiled: December 15, 2020Publication date: June 16, 2022Inventors: Jeevan Kamisetty, Alton Lo, Adam Sweeney
-
Publication number: 20220109642Abstract: In general, embodiments relate to a method for managing a network device. The method includes detecting a change of at least one physical port on the network device; and in response to detecting the change, disabling the at least one physical port, wherein disabling the at least one physical port prevents the at least one physical port from being allocated to any logical port on a network processor in the network device.Type: ApplicationFiled: October 4, 2021Publication date: April 7, 2022Inventors: Ravil Baizhiyenov, Adam Sweeney, John Nelson, Daniel Cunningham, Kewei Shi
-
Publication number: 20220014519Abstract: Some embodiments provide a method, executable by a network device, that receives a first set of commands instructing the network device to allow network traffic to egress out of an authentication port of the network device. The authentication port is configured to belong to a first virtual local area network (VLAN). An unauthenticated device is connected to the authentication port. The method further receives a second set of commands instructing the network device to add ports belonging to the first VLAN to a broadcast domain of a second VLAN. The method also broadcasts an address request to the broadcast domain of the second VLAN. The method further receives, from the unauthenticated device, a response to the address request.Type: ApplicationFiled: July 7, 2020Publication date: January 13, 2022Inventors: Adam Sweeney, Jifei Song, Avinash Ratnavel Maharaj Ratnavel, Jaffar Hameed Abdul Kather Jilani
-
Patent number: 8107370Abstract: Access devices and methods according to the invention interconnect digital devices and a network. Setting a parameter associated with each input port of an access device specifies whether the device connected with that port is restricted or unrestricted. When a particular input port is restricted, packet detectors examine the packets received on that port. In some embodiments, an exception handler handles restricted packets from restricted devices in an advantageously flexible manner. In other embodiments, a controller receives a configuration command and sets the restriction parameters accordingly. The invention provides a simple, abstract, easy to use, and flexible tool for network management, configuration, and reconfiguration.Type: GrantFiled: April 6, 2005Date of Patent: January 31, 2012Assignee: Cisco Technology, Inc.Inventors: Nagarani Chandika, Hugh Holbrook, Adam Sweeney
-
Patent number: 7672244Abstract: A network device that manages the flow rate of a stream of packets traveling within a network is converted from managing based on data rate to managing based on packet rate. In one embodiment, an interface receives from the device an actual length of a packet and provides to the device an effective length for the packet. A multiplexer generates the effective length by selecting the actual length during data rate mode and selecting a virtual length during packet rate mode. Various embodiments work with network devices that use various traffic management techniques. Such techniques include, but are not limited to: virtual time algorithms for determining excess packets; policing techniques that drop excess packets; and shaping techniques that buffer excess packets for possible later transmission.Type: GrantFiled: March 30, 2005Date of Patent: March 2, 2010Assignee: Cisco Technology, Inc.Inventor: Adam Sweeney
-
Patent number: 7424016Abstract: Methods and systems for distributing packets across all available output paths within a network is provided. A distribution key is extracted from each packet and is hashed to generate a hash value. An output path for each packet is selected by using all N bits of the hash value to address a distribution table having at least 2N indications of the output paths available for that packet. Thus, the stream of packets is distributed, or split up, across the available output paths, thereby balancing the load. In some embodiments, the order of the output paths is randomized within each distribution table. Other embodiments include a forwarding table used to determine the available output paths for a particular packet. In yet other embodiments, the distribution key includes the packet's source and destination; thus preventing packets within the same stream having varying latencies due to traveling along varying paths.Type: GrantFiled: April 5, 2005Date of Patent: September 9, 2008Assignee: Cisco Technology, Inc.Inventors: Adam Sweeney, Fusun Ertemalp, Hugh Holbrook
-
Publication number: 20060282892Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: ApplicationFiled: June 14, 2005Publication date: December 14, 2006Inventors: Premkumar Jonnala, Neha Shah, Sivakumar Narayanan, Adam Sweeney, Silviu Dobrota
-
Publication number: 20060227797Abstract: Access devices and methods according to the invention interconnect digital devices and a network. Setting a parameter associated with each input port of an access device specifies whether the device connected with that port is restricted or unrestricted. When a particular input port is restricted, packet detectors examine the packets received on that port. In some embodiments, an exception handler handles restricted packets from restricted devices in an advantageously flexible manner. In other embodiments, a controller receives a configuration command and sets the restriction parameters accordingly. The invention provides a simple, abstract, easy to use, and flexible tool for network management, configuration, and reconfiguration.Type: ApplicationFiled: April 6, 2005Publication date: October 12, 2006Applicant: Cisco Technology, Inc.Inventors: Nagarani Chandika, Hugh Holbrook, Adam Sweeney
-
Publication number: 20060221835Abstract: A network device that manages the flow rate of a stream of packets traveling within a network is converted from managing based on data rate to managing based on packet rate. In one embodiment, an interface receives from the device an actual length of a packet and provides to the device an effective length for the packet. A multiplexer generates the effective length by selecting the actual length during data rate mode and selecting a virtual length during packet rate mode. Various embodiments work with network devices that use various traffic management techniques. Such techniques include, but are not limited to: virtual time algorithms for determining excess packets; policing techniques that drop excess packets; and shaping techniques that buffer excess packets for possible later transmission.Type: ApplicationFiled: March 30, 2005Publication date: October 5, 2006Applicant: Cisco Technology, Inc.Inventor: Adam Sweeney
-
Publication number: 20060221930Abstract: Methods and systems for distributing packets across all available output paths within a network is provided. A distribution key is extracted from each packet and is hashed to generate a hash value. An output path for each packet is selected by using all N bits of the hash value to address a distribution table having at least 2N indications of the output paths available for that packet. Thus, the stream of packets is distributed, or split up, across the available output paths, thereby balancing the load. In some embodiments, the order of the output paths is randomized within each distribution table. Other embodiments include a forwarding table used to determine the available output paths for a particular packet. In yet other embodiments, the distribution key includes the packet's source and destination; thus preventing packets within the same stream having varying latencies due to traveling along varying paths.Type: ApplicationFiled: April 5, 2005Publication date: October 5, 2006Applicant: Cisco Technology, Inc.Inventors: Adam Sweeney, Fusun Ertemalp, Hugh Holbrook