Patents by Inventor Christopher Macey
Christopher Macey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7533409Abstract: Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for routing the first packet, a second packet encapsulated within the first packet is detected. In the first packet, information for routing the second packet is identified based on which a second set of rules for processing the second packet and an index are determined. The second packet is then filtered based on the index, the second set of rules, and the information for routing the second packet. In addition, the index is associated with any additional packets encapsulated within the second packet. The additional packets are also filtered based on the index and the second set of rules.Type: GrantFiled: January 16, 2003Date of Patent: May 12, 2009Assignee: Corente, Inc.Inventors: John Keane, Christopher Macey, Samuel Bendinelli
-
Patent number: 7395354Abstract: Methods and systems are provided for resolving an addressing conflict between a first processor in a first network and a second processor in a second network. When an addressing conflict is detected between a first address of the first processor and a second address of the second processor, tunnel information is removed from one or more packets received from the first processor. Based on the removed tunnel information, the packets are associated with the detected addressing conflict and a translated address is determined. Based on the translated address, the packets are then forwarded.Type: GrantFiled: February 21, 2002Date of Patent: July 1, 2008Assignee: Corente, Inc.Inventors: John Keane, Christopher Macey
-
Patent number: 7181766Abstract: Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate from the network operations center, and a base address that is routable in the base network. The network operations center may provide through the base network code and information for self-configuring the first processor as a gateway that interfaces the base network at the base address. The first processor may execute the provided code to self-configure itself as the gateway based on the provided information.Type: GrantFiled: April 11, 2001Date of Patent: February 20, 2007Assignee: Corente, Inc.Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro
-
Patent number: 7181542Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The at least one additional processor determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: GrantFiled: March 22, 2001Date of Patent: February 20, 2007Assignee: Corente, Inc.Inventors: Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto
-
Patent number: 7085854Abstract: Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors. The additional processor may determine a first virtual address that identifies the first processor in the virtual network and provide the first virtual address to the first processor. When a tunnel between the first processor and the second processor is requested from the additional processor, the additional processor may authenticate the request based on the first virtual address and determine a second virtual address that identifies the second processor in the virtual network.Type: GrantFiled: April 11, 2001Date of Patent: August 1, 2006Assignee: Corente, Inc.Inventors: John Keane, Neil R. Brutman, Michael J. Harris, Christopher Macey
-
Patent number: 7047424Abstract: Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional processor may determine whether the first and second processors mutually consent to enabling a hairpin between the first and second processors. The first processor may be provided with a first information identifying the hairpin and the second processor may be provided with a second information identifying the hairpin, when the additional processor may determine that the first and second processors mutually consent to the hairpin. Moreover, a first information flow may be established from the first processor to the hairpin based on the provided first information, and a second information flow may be established from the second processor to the hairpin based on the provided second information.Type: GrantFiled: April 11, 2001Date of Patent: May 16, 2006Assignee: Corente, Inc.Inventors: Samuel Bendinelli, John Keane, Christopher Macey
-
Patent number: 7028333Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and the second processors. In one embodiment, the additional processor may provide a set of names that includes the name of the second processor and receive on behalf of the first processor information indicating a selection that includes the name of the second processor. Further, the additional processor may provide a set of names that includes the name of the first processor and receives on behalf of the second processor information indicating a selection that includes the name of the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: GrantFiled: April 11, 2001Date of Patent: April 11, 2006Assignee: Corente, Inc.Inventors: Mark Tuomenoksa, John Keane, Bob Larson, Christopher Macey
-
Patent number: 6996628Abstract: Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor. In one embodiment, the at the at least one additional processor may determine a first virtual address and a first base address for the first processor such that the first virtual address is routable through the virtual network and the first base address is routable through a base network and determine a second virtual address and a second base address for the second processor such that the second virtual address is routable through the virtual network and the second base address is routable through the base network. The at least one additional processor may provide the first virtual address and the first base address to the first processor and the second virtual address and the second base address to the second processor.Type: GrantFiled: April 11, 2001Date of Patent: February 7, 2006Assignee: Corente, Inc.Inventors: John Keane, Christopher Macey
-
Patent number: 6631416Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the additional processor. Further, the additional processor may receive information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: GrantFiled: April 11, 2001Date of Patent: October 7, 2003Assignee: Openreach Inc.Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey
-
Publication number: 20030158962Abstract: Methods and systems are provided for resolving an addressing conflict between a first processor in a first network and a second processor in a second network. When an addressing conflict is detected between a first address of the first processor and a second address of the second processor, tunnel information is removed from one or more packets received from the first processor. Based on the removed tunnel information, the packets are associated with the detected addressing conflict and a translated address is determined. Based on the translated address, the packets are then forwarded.Type: ApplicationFiled: February 21, 2002Publication date: August 21, 2003Inventors: John Keane, Christopher Macey
-
Publication number: 20030131263Abstract: Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for routing the first packet, a second packet encapsulated within the first packet is detected. In the first packet, information for routing the second packet is identified based on which a second set of rules for processing the second packet and an index are determined. The second packet is then filtered based on the index, the second set of rules, and the information for routing the second packet. In addition, the index is associated with any additional packets encapsulated within the second packet. The additional packets are also filtered based on the index and the second set of rules.Type: ApplicationFiled: January 16, 2003Publication date: July 10, 2003Applicant: Opeanreach, Inc.Inventors: John Keane, Christopher Macey, Samuel Bendinelli
-
Publication number: 20020091859Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and the second processors. In one embodiment, the additional processor may provide a set of names that includes the name of the second processor and receive on behalf of the first processor information indicating a selection that includes the name of the second processor. Further, the additional processor may provide a set of names that includes the name of the first processor and receives on behalf of the second processor information indicating a selection that includes the name of the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: ApplicationFiled: April 11, 2001Publication date: July 11, 2002Inventors: Mark Tuomenoksa, John Keane, Bob Larson, Christopher Macey
-
Publication number: 20020056008Abstract: Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor. In one embodiment, the at the at least one additional processor may determine a first virtual address and a first base address for the first processor such that the first virtual address is routable through the virtual network and the first base address is routable through a base network and determine a second virtual address and a second base address for the second processor such that the second virtual address is routable through the virtual network and the second base address is routable through the base network. The at least one additional processor may provide the first virtual address and the first base address to the first processor and the second virtual address and the second base address to the second processor.Type: ApplicationFiled: April 11, 2001Publication date: May 9, 2002Inventors: John Keane, Christopher Macey
-
Publication number: 20020053031Abstract: Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional processor may determine whether the first and second processors mutually consent to enabling a hairpin between the first and second processors. The first processor may be provided with a first information identifying the hairpin and the second processor may be provided with a second information identifying the hairpin, when the additional processor may determine that the first and second processors mutually consent to the hairpin. Moreover, a first information flow may be established from the first processor to the hairpin based on the provided first information, and a second information flow may be established from the second processor to the hairpin based on the provided second information.Type: ApplicationFiled: April 11, 2001Publication date: May 2, 2002Inventors: Samuel Bendinelli, John Keane, Christopher Macey
-
Publication number: 20020026503Abstract: Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate from the network operations center, and a base address that is routable in the base network. The network operations center may provide through the base network code and information for self-configuring the first processor as a gateway that interfaces the base network at the base address. The first processor may execute the provided code to self-configure itself as the gateway based on the provided information.Type: ApplicationFiled: April 11, 2001Publication date: February 28, 2002Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro
-
Publication number: 20020026531Abstract: Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors. The additional processor may determine a first virtual address that identifies the first processor in the virtual network and provide the first virtual address to the first processor. When a tunnel between the first processor and the second processor is requested from the additional processor, the additional processor may authenticate the request based on the first virtual address and determine a second virtual address that identifies the second processor in the virtual network.Type: ApplicationFiled: April 11, 2001Publication date: February 28, 2002Inventors: John Keane, Neil R. Brutman, Michael J. Harris, Christopher Macey
-
Publication number: 20020023210Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The at least one additional processor determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: ApplicationFiled: March 22, 2001Publication date: February 21, 2002Inventors: Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto