Patents by Inventor Christopher Dalton

Christopher Dalton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070280243
    Abstract: A virtual network has virtual machines on physical devices connected to network interfaces each coupled by tunnels (100) through a forwarding network (40), each interface having a forwarding address in an address space of the forwarding network, each network interface having a reconfigurable address mapper (320) for determining a forwarding address for a packet, and encapsulating the packet with its forwarding address so that the forwarding network can deliver the data packet to the remote physical device having that forwarding address. Such encapsulation enables virtual machines on different physical devices to communicate transparently to the underlying forwarding network. Virtual networks can be created to suit their applications yet use or share existing forwarding networks, while protecting the forwarding network from interference by the virtual machines, and maintaining isolation between virtual machines.
    Type: Application
    Filed: August 3, 2005
    Publication date: December 6, 2007
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Michael Wray, Christopher Dalton
  • Publication number: 20060062564
    Abstract: An interactive three-dimensional virtual-reality photo gallery containing pictures taken by a user is displayed on a display of a digital camera 10. The user navigates through the gallery using camera buttons. Methods relating to implementing the virtual-reality photo gallery are also disclosed.
    Type: Application
    Filed: April 6, 2004
    Publication date: March 23, 2006
    Inventors: Dan Dalton, Christopher Dalton
  • Publication number: 20050243730
    Abstract: A method of administering a network comprises the steps of: detecting the occurrence of a triggering event alerting an administrator to the presence of a user entity on the network, the triggering event being selected from the group consisting of: (i) allocation of a network address to the user entity; (ii) alteration of the user entity's network address; (iii) an action by the user entity causing resolution between a network address and an identifier; (iv) association of the user entity's network address and an identifier. Upon detecting such an event, the user entity having the network address is scanned for vulnerabilities by sending at least one outward packet to it, for example seeking to establish a connection on a particular port, and the response, if any, is then used to determine whether is vulnerable to known malicious code.
    Type: Application
    Filed: April 28, 2005
    Publication date: November 3, 2005
    Inventors: Matthew Williamson, Stefek Zaba, Christopher Dalton, Jonathan Griffin
  • Publication number: 20050228770
    Abstract: Access to a data processor is controlled by determining if a requested function command conforms to a set of parameters, the set of parameters being derived from previously executed function commands. If the requested function command does not conform to the set of parameters the data processor is controlled to temporarily hold the execution of the requested function commands.
    Type: Application
    Filed: March 2, 2005
    Publication date: October 13, 2005
    Inventors: Matthew Willamson, Christopher Dalton
  • Publication number: 20050086511
    Abstract: Control of access to data within a first data processing device is provided. The data processing device contains at least one data item which has a use policy associated with it. In response to a request from or a requirement of a second data processing device to perform an operation on the data item, the first data processing device seeks information about the ability of the second data processing device to respect conditions specified in the policy and on the basis of a comparison between the policy and the ability of the device to satisfy the policy, the first data processing device decides whether to allow the operation to be performed.
    Type: Application
    Filed: August 19, 2004
    Publication date: April 21, 2005
    Inventors: Boris Balacheff, David Plaquin, Christopher Dalton