Patents by Inventor Christopher Thomas Gloe
Christopher Thomas Gloe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10033749Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: April 21, 2017Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Publication number: 20170222975Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: April 21, 2017Publication date: August 3, 2017Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 9686298Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: March 7, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Publication number: 20160191556Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: March 7, 2016Publication date: June 30, 2016Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 9300680Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: August 31, 2012Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 8407368Abstract: A method, apparatus and computer readable medium is provided for tracking processes using a socket object. The processes are utilized to execute an application program. Initially, a process list for the socket object is created, such that the process list contains a process identifier for a first process using the socket object. If a second process is using the socket object, the process list is updated to include the process identifier for the second process.Type: GrantFiled: May 30, 2008Date of Patent: March 26, 2013Assignee: International Business Machines CorporationInventors: Mark Linus Bauman, Paul Richard Chmielewski, Christopher Thomas Gloe, Dawn Marie May, Jay Robert Weeks
-
Publication number: 20120324576Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: August 31, 2012Publication date: December 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 8286243Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: GrantFiled: October 23, 2007Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 7984181Abstract: A method, apparatus, system, and non-transitory computer-readable storage medium that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.Type: GrantFiled: December 23, 2008Date of Patent: July 19, 2011Assignee: International Business Machines CorporationInventors: Bob Richard Cernohous, Christopher Thomas Gloe, Scott Jon Prunty
-
Patent number: 7849197Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: April 16, 2008Date of Patent: December 7, 2010Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 7734745Abstract: A host node connected to the Internet automatically generates an Internet interface addresses for itself, and automatically generates a request to an Internet domain name server to update the domain name server's database with the self-generated address. Preferably, the node employs a draft standard stateless address autoconfiguration protocol to create a link-local address, find a router, obtain a prefix from the router, and generate a global address from the prefix and the link-local address. Preferably, the node automatically determines the identity of its master domain name server, and transmits a request to update the master's database using a BIND 8 (or subsequent) protocol. Such a request may be encrypted for security and may include a self-generated identity key for further security.Type: GrantFiled: October 24, 2002Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventor: Christopher Thomas Gloe
-
Patent number: 7711830Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: April 16, 2008Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20090119366Abstract: A storage medium and computer system that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.Type: ApplicationFiled: December 23, 2008Publication date: May 7, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bob Richard Cernohous, Christopher Thomas Gloe, Scott Jon Prunty
-
Publication number: 20090106838Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.Type: ApplicationFiled: October 23, 2007Publication date: April 23, 2009Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
-
Patent number: 7480733Abstract: A method, apparatus, system, and signal-bearing medium that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.Type: GrantFiled: July 15, 2004Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Bob Richard Cernohous, Christopher Thomas Gloe, Scott Jon Prunty
-
Patent number: 7461152Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: March 31, 2004Date of Patent: December 2, 2008Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080229243Abstract: A method, apparatus and computer readable medium is provided for tracking processes using a socket object. The processes are utilized to execute an application program. Initially, a process list for the socket object is created, such that the process list contains a process identifier for a first process using the socket object. If a second process is using the socket object, the process list is updated to include the process identifier for the second process.Type: ApplicationFiled: May 30, 2008Publication date: September 18, 2008Inventors: Mark Linus Bauman, Paul Richard Chmielewski, Christopher Thomas Gloe, Dawn Marie May, Jay Robert Weeks
-
Publication number: 20080222298Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob RIchard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080215676Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080215738Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty