Patents by Inventor Christopher C. O'Rourke

Christopher C. O'Rourke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8844035
    Abstract: Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
    Type: Grant
    Filed: February 9, 2012
    Date of Patent: September 23, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Christopher C. O'Rourke, Frank Gerard Bordonaro, Louis Menditto, Robert Batz
  • Patent number: 8769629
    Abstract: In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and an authenticated user ID of a user of the different node. Resource profile data is retrieved based on the user ID. The resource profile data indicates all application layer resources on the network that the user is allowed to access. The particular network address is associated at the local node with the resource profile data for the user. A request from the particular network address for a requested application layer resource on the network is blocked based on the resource profile data associated with the particular network address.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: July 1, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Kevin Shatzkamer, Christopher C. O'Rourke, Richard Alan Galatioto
  • Patent number: 8315261
    Abstract: Techniques for processing an IP packet at a router that supports SS7 signaling include receiving IP routing data that associates a network link and a destination IP address for a node in a signaling network that includes a plurality of signaling nodes. When an ingress IP data packet is received, it is determined whether conditions are satisfied for locally processing an SS7 payload within the ingress IP data packet. If it is determined that conditions are satisfied for locally processing the SS7 payload, then the SS7 payload is processed locally, i.e., without sending the SS7 payload over a network link to a different node in the signaling network. If it is determined that conditions are not satisfied for locally processing the SS7 payload, then the ingress IP data packet is routed normally. These techniques allow reduced numbers of expensive STP devices and expanded routing options in a signaling network.
    Type: Grant
    Filed: October 7, 2009
    Date of Patent: November 20, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Robert Delaney, Wayne Taylor, Jonathan Felten, Christopher C. O'Rourke
  • Patent number: 8266696
    Abstract: Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
    Type: Grant
    Filed: November 14, 2005
    Date of Patent: September 11, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Christopher C. O'Rourke, Frank Gerard Bordonaro, Louis Menditto, Robert Batz
  • Publication number: 20120227093
    Abstract: In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and an authenticated user ID of a user of the different node. Resource profile data is retrieved based on the user ID. The resource profile data indicates all application layer resources on the network that the user is allowed to access. The particular network address is associated at the local node with the resource profile data for the user. A request from the particular network address for a requested application layer resource on the network is blocked based on the resource profile data associated with the particular network address.
    Type: Application
    Filed: May 7, 2012
    Publication date: September 6, 2012
    Inventors: Kevin Shatzkamer, Christopher C. O'Rourke, Richard Alan Galatioto
  • Patent number: 8205246
    Abstract: In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and an authenticated user ID of a user of the different node. Resource profile data is retrieved based on the user ID. The resource profile data indicates all application layer resources on the network that the user is allowed to access. The particular network address is associated at the local node with the resource profile data for the user. A request from the particular network address for a requested application layer resource on the network is blocked based on the resource profile data associated with the particular network address.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: June 19, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Kevin Shatzkamer, Christopher C. O'Rourke, Richard Alan Galatioto
  • Patent number: 8194675
    Abstract: In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a source node directed toward a destination node. The flow is to be parsed by the local node to describe the flow for administration of the network. Based on sequence data in the sequenced data packet, it is determined whether the sequenced data packet is out of order in the flow. If it is determined that the sequenced data packet is out of order, then the sequenced data packet is forwarded toward the destination node before parsing the sequenced data packet. The out of order sequenced data packet is also stored for subsequent parsing at the local node.
    Type: Grant
    Filed: March 16, 2010
    Date of Patent: June 5, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Humberto Tavares, Christopher C. O'Rourke, Robert Batz, Walter Dixon, Robert Mackie
  • Publication number: 20120137366
    Abstract: Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access server and a content server. The user data includes subscriber identifier data that indicates a unique identifier for a particular user, network address data that indicates a network address for a host used by the particular user, NAS data that indicates an identifier for the network access server, flow list data that indicates one or more open data packet flows, and suspicious activity data. The suspicious activity data indicates a value for a property of the open data packet flows that indicates suspicious activity. It is determined whether an intrusion condition is satisfied based on the suspicious activity data. If the intrusion condition is satisfied, then the gateway responds based at least in part on user data other than the network address data.
    Type: Application
    Filed: February 9, 2012
    Publication date: May 31, 2012
    Inventors: Christopher C. O'Rourke, Frank Gerard Bordonaro, Louis Menditto, Robert Batz
  • Patent number: 7864771
    Abstract: In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a source node directed toward a destination node. The flow is to be parsed by the local node to describe the flow for administration of the network. Based on sequence data in the sequenced data packet, it is determined whether the sequenced data packet is out of order in the flow. If it is determined that the sequenced data packet is out of order, then the sequenced data packet is forwarded toward the destination node before parsing the sequenced data packet. The out of order sequenced data packet is also stored for subsequent parsing at the local node.
    Type: Grant
    Filed: April 20, 2007
    Date of Patent: January 4, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Humberto Tavares, Christopher C. O'Rourke, Robert Batz, Walter Dixon, Robert Mackie
  • Publication number: 20100172356
    Abstract: In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a source node directed toward a destination node. The flow is to be parsed by the local node to describe the flow for administration of the network. Based on sequence data in the sequenced data packet, it is determined whether the sequenced data packet is out of order in the flow. If it is determined that the sequenced data packet is out of order, then the sequenced data packet is forwarded toward the destination node before parsing the sequenced data packet. The out of order sequenced data packet is also stored for subsequent parsing at the local node.
    Type: Application
    Filed: March 16, 2010
    Publication date: July 8, 2010
    Inventors: Humberto Tavares, Christopher C. O'Rourke, Robert Batz, Walter Dixon, Robert Mackie
  • Patent number: 7738452
    Abstract: Techniques for distributing network traffic from an access server to a service gateway include receiving, at a load balancer, sticky table data that indicates an association between a particular subscriber IP address and a particular subscriber-aware service gateway in a gateway cluster. An input data packet is received with an input source address and an input transport-layer destination. If it is determined that the input transport-layer destination indicates a type of payload that uses a service gateway, then the particular service gateway associated with the particular subscriber is determined based on the sticky table and IP address in the input source address. An output data packet is directed to the particular service gateway using a link-layer or networking-layer destination address. These techniques allow a load balancer to be located anywhere on the network and to bypass a subscriber-aware service gateway for some data traffic.
    Type: Grant
    Filed: June 22, 2005
    Date of Patent: June 15, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Christopher C. O'Rourke, Robert Batz, Kevin Shatzkamer
  • Patent number: 7694011
    Abstract: Techniques for distributing control plane traffic, from an end node in a packet switched network to a cluster of service gateway nodes that host subscriber-aware application servers, include receiving a control plane message for supporting data plane traffic from a particular subscriber. A particular service gateway node is determined among the cluster of service gateway nodes based on policy-based routing (PBR) for the data plane traffic from the particular subscriber. A message based on the control plane message is sent to a control plane process on the particular service gateway node. Thereby, data plane traffic and control plane traffic from the same subscriber are directed to the same gateway node, or otherwise related gateway nodes, of the cluster of service gateway nodes. This approach allows currently-available, hardware-accelerated PBR to be used with clusters of subscriber-aware service gateways that must also monitor control plane traffic from the same subscriber.
    Type: Grant
    Filed: January 17, 2006
    Date of Patent: April 6, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Christopher C. O'Rourke, Robert Batz, Kevin Shatzkamer
  • Publication number: 20100020808
    Abstract: Techniques for processing an IP packet at a router that supports SS7 signaling include receiving IP routing data that associates a network link and a destination IP address for a node in a signaling network that includes a plurality of signaling nodes. When an ingress IP data packet is received, it is determined whether conditions are satisfied for locally processing an SS7 payload within the ingress IP data packet. If it is determined that conditions are satisfied for locally processing the SS7 payload, then the SS7 payload is processed locally, i.e., without sending the SS7 payload over a network link to a different node in the signaling network. If it is determined that conditions are not satisfied for locally processing the SS7 payload, then the ingress IP data packet is routed normally. These techniques allow reduced numbers of expensive STP devices and expanded routing options in a signaling network.
    Type: Application
    Filed: October 7, 2009
    Publication date: January 28, 2010
    Inventors: Robert Delaney, Wayne Taylor, Jonathan Felten, Christopher C. O'Rourke
  • Patent number: 7616643
    Abstract: Techniques for processing an IP packet at a router that supports SS7 signaling include receiving IP routing data that associates a network link and a destination IP address for a node in a signaling network that includes a plurality of signaling nodes. When an ingress IP data packet is received, it is determined whether conditions are satisfied for locally processing an SS7 payload within the ingress IP data packet. If it is determined that conditions are satisfied for locally processing the SS7 payload, then the SS7 payload is processed locally, i.e., without sending the SS7 payload over a network link to a different node in the signaling network. If it is determined that conditions are not satisfied for locally processing the SS7 payload, then the ingress IP data packet is routed normally. These techniques allow reduced numbers of expensive STP devices and expanded routing options in a signaling network.
    Type: Grant
    Filed: April 19, 2006
    Date of Patent: November 10, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Robert Delaney, Wayne Taylor, Jonathan Felten, Christopher C. O'Rourke
  • Publication number: 20080279200
    Abstract: In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and an authenticated user ID of a user of the different node. Resource profile data is retrieved based on the user ID. The resource profile data indicates all application layer resources on the network that the user is allowed to access. The particular network address is associated at the local node with the resource profile data for the user. A request from the particular network address for a requested application layer resource on the network is blocked based on the resource profile data associated with the particular network address.
    Type: Application
    Filed: May 10, 2007
    Publication date: November 13, 2008
    Inventors: Kevin Shatzkamer, Christopher C. O'Rourke, Richard Alan Galatioto
  • Publication number: 20080259926
    Abstract: In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a source node directed toward a destination node. The flow is to be parsed by the local node to describe the flow for administration of the network. Based on sequence data in the sequenced data packet, it is determined whether the sequenced data packet is out of order in the flow. If it is determined that the sequenced data packet is out of order, then the sequenced data packet is forwarded toward the destination node before parsing the sequenced data packet. The out of order sequenced data packet is also stored for subsequent parsing at the local node.
    Type: Application
    Filed: April 20, 2007
    Publication date: October 23, 2008
    Inventors: Humberto Tavares, Christopher C. O'Rourke, Robert Batz, Walter Dixon, Robert MacKie