Patents by Inventor Christopher N. Thomas

Christopher N. Thomas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240314053
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: May 23, 2024
    Publication date: September 19, 2024
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Bhuvangyan Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Publication number: 20240214291
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: February 29, 2024
    Publication date: June 27, 2024
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Bhuvangyan Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Publication number: 20240089189
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: November 20, 2023
    Publication date: March 14, 2024
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Bhuvangyan Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Patent number: 11824750
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Grant
    Filed: January 10, 2022
    Date of Patent: November 21, 2023
    Assignee: Workspot, Inc.
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Publication number: 20220131779
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: January 10, 2022
    Publication date: April 28, 2022
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Patent number: 11223547
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: January 11, 2022
    Assignee: Workspot, Inc.
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Patent number: 9426182
    Abstract: A system and method are disclosed for adaptive authentication. An access control system stores policies for an enterprise, where each policy specifies a type of access control. The type of access control includes one or more security rules, which may specify authentication procedures, allowable behaviors, or both. The access control system stores a mapping from contexts of requests to interact with applications and access control policies. When a user requests access to an application associated with the enterprise via a client, the access control system receives the context of the request. The access control system selects an access control policy for the context of the request. The access control system sends access control information from the access control policy selected to the client. The client interacts with the user to perform the authentication.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: August 23, 2016
    Assignee: Workspot, Inc.
    Inventors: Robert Zeljko, Puneet Chawla, Christopher N. Thomas, Amitabh Sinha, Yatin Vasavada, Abhijeet Kumar, Guang Yuan Li
  • Patent number: 8316226
    Abstract: Adaptive failover occurs between a Layer Three (L3) based network tunnel and a Layer Four (L4) based network tunnel. An example of a L4 based network tunnel is a Secure Sockets Layer (SSL) tunnel and an example of a L3 based network tunnel is an Internet Protocol Security (IPSec) tunnel. SSL tunnels work through most firewalls and proxies, but may introduce latency and other performance problems. IPSec tunnels provide a more efficient performance, but may not work through some firewalls and proxies. The techniques include dynamically selecting a tunneling protocol in order to achieve a more efficient network tunnel performance when possible while maintaining consistent L3 connectivity from a variety of remote network environments.
    Type: Grant
    Filed: September 14, 2005
    Date of Patent: November 20, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Shekhar Kshirsagar, James Wood, David W. Young, Vamsi K. Anne, Vadim Egorov, Christopher N. Thomas
  • Patent number: 8230415
    Abstract: A network system includes an access control device and a client device. The access control device provides access to an enterprise network using a virtual private network (VPN) and provides a software update package to the client device. The client device includes an operating system that maintains a user context for a user having restricted privileges and a system context having elevated privileges. The client device further includes a user-level setup module, a system-level installation service and a user-level installation service. The setup module, system-level installation service and the user-level installation service interact to provide on-demand advertisement and installation of authorized software update packages on computing devices when needed by the user without requiring action by an administrator.
    Type: Grant
    Filed: March 13, 2007
    Date of Patent: July 24, 2012
    Assignee: Juniper Networks, Inc.
    Inventor: Christopher N. Thomas
  • Patent number: 8095786
    Abstract: Techniques are described for providing secure communication of network traffic from specific applications operating on a client device to a server device using a network-layer virtual private network (VPN). For example, a module on a client device may intercept network traffic from an application executing on the client device. The module may then determine whether to send the application-layer data through a network-layer VPN tunnel from the client device to a gateway device. This network-layer VPN tunnel may be defined by a network address of a physical adapter of the client device and a network address of the VPN gateway. In other words, there may be no need for the interposition of a VPN proxy on the client device. The module makes this determination on an application-by-application basis. The client device then forwards the application-layer data through the VPN tunnel based on the determination.
    Type: Grant
    Filed: November 9, 2006
    Date of Patent: January 10, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Shekhar Kshirsagar, Christopher N. Thomas
  • Patent number: 6148336
    Abstract: Low-level network services are provided by network-service-provider plugins. These plugins are controlled by an extensible service provider that is layered above the TCP layer but below the Winsock-2 library and API. The extensible service provider orders the plugins based on the function performed by each plugin and on ordering hints. Plugins that redirect the protocol or socket are executed first. Plugins that examine packets or block entire packets are executed before plugins that modify packets. Plugins that compress or encrypt data are executed last for outgoing packets. Ordering hints cause a plugin to be executed before or after others in its functional class. Ordering allows examining plugins that simply read data get to the packets before an encrypting or compressing plugin renders the data unreadable. The extensible service provider has a plugin manager that orders and controls execution of the plugins. A filter manager evaluates one or more packet-filters.
    Type: Grant
    Filed: March 13, 1998
    Date of Patent: November 14, 2000
    Assignee: Deterministic Networks, Inc.
    Inventors: Christopher N. Thomas, Steven J. Jackowski, Keven J. Brock
  • Patent number: 6141686
    Abstract: Low-level network services are provided by network-service-provider plugins. These plugins are controlled by an extensible service provider that is layered above the TCP or other protocol layer but below the Winsock-2 library and API. Policy servers determine priority of network traffic through control points on a network. Examining packets passing through these control points provides limited data such as the source and destination IP address and TCP ports. Many applications on a client machine may use the same IP address and TCP ports, so packet examination is ineffective for prioritizing data from different applications on one client machine. Often some applications such as videoconferencing or data-entry for corporate sales are more important than other applications such as web browsing. A application-classifier plugin to the extensible service provider intercepts network traffic at above the client's TCP/IP stack and associates applications and users with network packets.
    Type: Grant
    Filed: June 23, 1998
    Date of Patent: October 31, 2000
    Assignee: Deterministic Networks, Inc.
    Inventors: Steven J. Jackowski, Christopher N. Thomas