Patents by Inventor Christopher Thomas Gloe

Christopher Thomas Gloe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10033749
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Grant
    Filed: April 21, 2017
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Publication number: 20170222975
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Application
    Filed: April 21, 2017
    Publication date: August 3, 2017
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Patent number: 9686298
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Publication number: 20160191556
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Application
    Filed: March 7, 2016
    Publication date: June 30, 2016
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Patent number: 9300680
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Patent number: 8407368
    Abstract: A method, apparatus and computer readable medium is provided for tracking processes using a socket object. The processes are utilized to execute an application program. Initially, a process list for the socket object is created, such that the process list contains a process identifier for a first process using the socket object. If a second process is using the socket object, the process list is updated to include the process identifier for the second process.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: March 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Mark Linus Bauman, Paul Richard Chmielewski, Christopher Thomas Gloe, Dawn Marie May, Jay Robert Weeks
  • Publication number: 20120324576
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Application
    Filed: August 31, 2012
    Publication date: December 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Patent number: 8286243
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Grant
    Filed: October 23, 2007
    Date of Patent: October 9, 2012
    Assignee: International Business Machines Corporation
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Patent number: 7984181
    Abstract: A method, apparatus, system, and non-transitory computer-readable storage medium that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: July 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Bob Richard Cernohous, Christopher Thomas Gloe, Scott Jon Prunty
  • Patent number: 7849197
    Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: December 7, 2010
    Assignee: International Business Machines Corporation
    Inventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
  • Patent number: 7734745
    Abstract: A host node connected to the Internet automatically generates an Internet interface addresses for itself, and automatically generates a request to an Internet domain name server to update the domain name server's database with the self-generated address. Preferably, the node employs a draft standard stateless address autoconfiguration protocol to create a link-local address, find a router, obtain a prefix from the router, and generate a global address from the prefix and the link-local address. Preferably, the node automatically determines the identity of its master domain name server, and transmits a request to update the master's database using a BIND 8 (or subsequent) protocol. Such a request may be encrypted for security and may include a self-generated identity key for further security.
    Type: Grant
    Filed: October 24, 2002
    Date of Patent: June 8, 2010
    Assignee: International Business Machines Corporation
    Inventor: Christopher Thomas Gloe
  • Patent number: 7711830
    Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
  • Publication number: 20090119366
    Abstract: A storage medium and computer system that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.
    Type: Application
    Filed: December 23, 2008
    Publication date: May 7, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bob Richard Cernohous, Christopher Thomas Gloe, Scott Jon Prunty
  • Publication number: 20090106838
    Abstract: A method, apparatus, and program product are provided for protecting a network from intrusions. An offending packet communicated by an offending host coupled to a protected network is detected. In response to the detection, a blocking instruction is returned to the offending host to initiate an intrusion protection operation on the offending host, where the blocking instruction inhibits further transmission of offending packets by the offending host. At the offending host, a blocking instruction is received with a portion of an offending packet. The offending host verifies that the offending packet originated from the host. In response to the verification of the offending packet originating from the host, an intrusion protection operation is initiated on the host thereby inhibiting transmission of a subsequent outbound offending packet by the host.
    Type: Application
    Filed: October 23, 2007
    Publication date: April 23, 2009
    Inventors: Adam Thomas Clark, Christopher Thomas Gloe, Daniel Paul Kolz, Kathryn Ann Tri
  • Patent number: 7480733
    Abstract: A method, apparatus, system, and signal-bearing medium that in an embodiment dynamically allocate client requests to target servers based on prepare messages sent by the target servers. The addresses of target servers are added to a queue in response to the prepare messages from the target servers. A network interface is then prepared to receive an incoming call request from a client. After the call request arrives from a client, one of the addresses is selected from the queue. The call request is then sent through a tunnel to the target server associated with the selected address.
    Type: Grant
    Filed: July 15, 2004
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Bob Richard Cernohous, Christopher Thomas Gloe, Scott Jon Prunty
  • Patent number: 7461152
    Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: December 2, 2008
    Assignee: International Business Machines Corporation
    Inventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
  • Publication number: 20080229243
    Abstract: A method, apparatus and computer readable medium is provided for tracking processes using a socket object. The processes are utilized to execute an application program. Initially, a process list for the socket object is created, such that the process list contains a process identifier for a first process using the socket object. If a second process is using the socket object, the process list is updated to include the process identifier for the second process.
    Type: Application
    Filed: May 30, 2008
    Publication date: September 18, 2008
    Inventors: Mark Linus Bauman, Paul Richard Chmielewski, Christopher Thomas Gloe, Dawn Marie May, Jay Robert Weeks
  • Publication number: 20080222298
    Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.
    Type: Application
    Filed: April 16, 2008
    Publication date: September 11, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John Joseph Bird, Bob RIchard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
  • Publication number: 20080215676
    Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.
    Type: Application
    Filed: April 16, 2008
    Publication date: September 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
  • Publication number: 20080215738
    Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.
    Type: Application
    Filed: April 16, 2008
    Publication date: September 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty