Patents by Inventor Bart Brinckman

Bart Brinckman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200162503
    Abstract: Systems and methods provide for identification and remediation of IoT devices exhibiting anomalous behaviors. An IoT management system can identify IoT devices requiring remediation. The IoT management system may present a first interface including representations of the devices requiring remediation, where each representation can include identifying information for an IoT device, policies applied to the IoT device, and bandwidth/throughput information of the IoT device. The IoT management system can present a second remediation interface representing a detailed representation of a first IoT device. The detailed representation can include user interface elements representing actions to be performed relating to the first IoT device. The IoT management system can perform a first action corresponding to a selection of one of the user interface elements.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 21, 2020
    Inventors: Mark Stephan Shurtleff, Jerome Henry, Bart Brinckman
  • Publication number: 20200145413
    Abstract: Various embodiments disclosed herein include apparatuses, systems, devices, and methods for anonymously generating an encrypted session for a client device in a wireless network. The method comprises, in response to providing, to the client device in the wireless network, a request for credentials associated with the client device, obtaining, from the client device, a response including proposed credentials associated with the client device. The method further comprises determining whether or not the format of the response matches a response template. The method further comprises, in response to determining that the format of the response matches the response template, generating an encrypted wireless session for the client device independent of the proposed credentials associated with the client device.
    Type: Application
    Filed: November 1, 2018
    Publication date: May 7, 2020
    Inventors: Bart BRINCKMAN, Jerome Henry, Malcolm Muir SMITH, Mark GRAYSON, David Delano WARD
  • Publication number: 20200120481
    Abstract: Profile prioritization in a roaming consortium environment may be provided. First, a client device may initiate a network discovery with a network device. Next, the client device may receive in response to initiating the network discovery, a response. The response may comprise an organization identifier and a plurality of response access identifiers corresponding to the organization identifier. A one of the plurality of response access identifiers may be labeled as preferred. Then the client device may determine to access the network based on the organization identifier. The client device may then select, from a plurality of profiles, a profile for accessing the network. The selected profile may have a profile access identifier corresponding to the one of the plurality of response access identifiers labeled as preferred.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Applicant: Cisco Technology, Inc.
    Inventors: Mark Grayson, Bart A. Brinckman, Jerome Henry, Desmond Joseph O'Connor, Simon Dyke
  • Patent number: 10609634
    Abstract: In one embodiment, an enterprise network includes: at least one wireless access point operative to enable a wireless device to connect to the enterprise network, networked resources to be accessed by the wireless device, and a network selection server implemented on at least one computing device and operative to: authenticate credentials provided by the wireless device when connecting to the enterprise network via the at least one wireless access point, and provide network access selection policies to the wireless device, where the network access selection policies at least determine access by the wireless device to network resources while said wireless device is connected to said enterprise network.
    Type: Grant
    Filed: December 24, 2017
    Date of Patent: March 31, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: John M. Graybeal, Ben Bleichman, Bart Brinckman, Konstantin Livanos
  • Publication number: 20200092296
    Abstract: A method comprises obtaining, from a client device, a first set of application authentication credentials formatted in accordance with a first authentication protocol. The first set of application authentication credentials corresponds to a first user profile. The method includes translating the first set of application authentication credentials to a second set of application authentication credentials. The second set of application authentication credentials is formatted in accordance with a second authentication protocol different from the first authentication protocol and corresponds to the first user profile. The method includes providing the second set of application authentication credentials to an application authentication system. The method includes, in response to providing the second set of application authentication credentials to the application authentication system, obtaining, from the application authentication system, an application authentication indicator.
    Type: Application
    Filed: September 19, 2018
    Publication date: March 19, 2020
    Inventors: Bart BRINCKMAN, Jerome HENRY, Robert Edgar BARTON, David Delano WARD
  • Publication number: 20190253407
    Abstract: Single sign-on (SSO) techniques of the present disclosure provide for enterprise application user identities that are bound to a mobile identity (e.g. IMSI) associated with a user equipment (UE) for authentication, using general bootstrapping architecture (GBA)/general authentication architecture (GAA) functionality in combination with identity provider (IDP) functionality (e.g. OpenID Connect), all of which may be provided in an enterprise network. The present techniques need not rely on GBA/GAA infrastructure of a mobile network operator (MNO), and have little or no impact or effect on the mobile network.
    Type: Application
    Filed: February 9, 2018
    Publication date: August 15, 2019
    Inventors: Konstantin Livanos, Bart Brinckman, Ian McDowell Campbell
  • Publication number: 20190215692
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Application
    Filed: January 11, 2018
    Publication date: July 11, 2019
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Publication number: 20190199725
    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network.
    Type: Application
    Filed: December 26, 2017
    Publication date: June 27, 2019
    Inventors: Gangadharan Byju Pularikkal, Mark Grayson, Santosh Ramrao Patil, Jerome Henry, Bart Brinckman, Mark Allen Webb
  • Publication number: 20190200283
    Abstract: In one embodiment, an enterprise network includes: at least one wireless access point operative to enable a wireless device to connect to the enterprise network, networked resources to be accessed by the wireless device, and a network selection server implemented on at least one computing device and operative to: authenticate credentials provided by the wireless device when connecting to the enterprise network via the at least one wireless access point, and provide network access selection policies to the wireless device, where the network access selection policies at least determine access by the wireless device to network resources while said wireless device is connected to said enterprise network.
    Type: Application
    Filed: December 24, 2017
    Publication date: June 27, 2019
    Inventors: John M. Graybeal, Ben Bleichman, Bart Brinckman, Konstantin Livanos
  • Publication number: 20170208011
    Abstract: An example method is provided in one example embodiment and may include receiving traffic associated with at least one of a mobile network and a Gi-Local Area Network (Gi-LAN), wherein the traffic comprises one or more packets; determining a classification of the traffic to a service chain, wherein the service chain comprises one or more service functions associated at least one of one or more mobile network services and one or more Gi-LAN services; routing the traffic through the service chain; and routing the traffic to a network using one of a plurality of egress interfaces, wherein each egress interface of the plurality of egress interfaces is associated with at least one of the one or more mobile network services and the one or more Gi-LAN services.
    Type: Application
    Filed: June 2, 2016
    Publication date: July 20, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Hendrikus G.P. Bosch, Jeffrey Napper, Alessandro Duminuco, Humberto J. La Roche, Sape Jurriƫn Mullender, Surendra M. Kumar, Louis Gwyn Samuel, Bart A. Brinckman, Aeneas Sean Dodd-Noble, Luca Martini
  • Publication number: 20130007286
    Abstract: In general, techniques are described for dynamically redirecting session requests received with a mobile network gateway to another gateway of the mobile network. Heterogeneous static and dynamic capabilities among gateways of the mobile network lead some gateways unable to service a particular session requested by a wireless device attached to the mobile network. A set of policies configured within the gateways by a mobile network operator and applied by the gateway enable the gateway to identify and offload session requests to another gateway of the mobile network that has the present capability to service the session. The policies may define conditions and actions to provide flexible routing of the user session to an appropriate gateway.
    Type: Application
    Filed: June 29, 2011
    Publication date: January 3, 2013
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Apurva Mehta, Bart Brinckman, Bin W. Hong, Huiyang Yang, Krishna Sankaran, Kumar Mehta