Patents by Inventor Clark D. Jeffries

Clark D. Jeffries has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9633202
    Abstract: A method, system, and/or computer program product manages a distributed denial of service attack in a multiprocessor environment. A determination is made of (a) a first upper threshold for a normal number of packets from the multiprocessor environment to multiple destination addresses, (b) a second upper threshold for a normal ratio of the packets from the multiprocessor environment to a single destination address compared to the packets from the multiprocessor environment to the multiple destination addresses, and (c) a third upper threshold for a normal ratio of packets from the multiprocessor environment to a single port at a single destination address compared to packets from the multiprocessor environment to the multiple destination addresses. In response to the first and second thresholds being exceeded, a specific port is monitored to determine if the third upper threshold is being exceeded at that port, thus indicating an apparent distributed denial of service attack.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: April 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Robert W. Danford, Terry D. Escamilla, Kevin D. Himberger, Clark D. Jeffries
  • Publication number: 20120210430
    Abstract: An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures.
    Type: Application
    Filed: April 25, 2012
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc A. Boulanger, Clark D. Jeffries, C. Marcel Kinard, Kerry A. Kravec, Ravinder K. Sabhikhi, Ali G. Saidi, Jan M. Slyfield, Pascal R. Tannhof
  • Patent number: 8239945
    Abstract: An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures.
    Type: Grant
    Filed: December 14, 2008
    Date of Patent: August 7, 2012
    Assignee: International Business Machines Corporation
    Inventors: Marc A. Boulanger, Clark D. Jeffries, C. Marcel Kinard, Kerry A. Kravec, Ravinder K. Sabhikhi, Ali G. Saidi, Jan M. Slyfield, Pascal R. Tannhof
  • Patent number: 8169906
    Abstract: A method and system for managing asynchronous transfer mode (ATM) traffic in a computer system is disclosed. The computer system is used in sending, receiving, or sending and receiving a plurality of ATM flows. Each ATM flow has a plurality of ATM cells, a minimum ATM bandwidth guarantee, and a maximum ATM bandwidth. The method and system include determining whether excess bandwidth exists for the ATM flows. The method and system also include gracefully increasing a portion of the ATM cells transmitted for each ATM flow during periods of excess bandwidth. The portion of the ATM cells transmitted is not more than the maximum ATM bandwidth limit. If an ATM flow presents a sufficient offered load, the portion of the ATM cells transmitted in the flow is not less than a minimum ATM bandwidth guarantee.
    Type: Grant
    Filed: November 28, 2007
    Date of Patent: May 1, 2012
    Assignee: International Busines Machines Corporation
    Inventors: Patrick Droz, Ilias Iliadis, Clark D. Jeffries, Andreas Kind, Joseph F. Logan
  • Patent number: 8161145
    Abstract: A method for managing attacks in a computer system is disclosed. The computer system is used in sending, receiving, or sending and receiving a plurality of packets, which include a plurality of administrative packets. The method includes determining whether a congestion of the administrative packets exists. Congestion of the administrative packets indicates that a potential attack exists. The method also includes discarding a portion of the plurality of administrative packets if it is declared that the congestion of the administrative packets exists. The portion of the plurality of packets is sufficient to ensure that a remaining portion of the plurality of packets transmitted is not more than a maximum administrative packet bandwidth limit and, if the plurality of administrative packets present a sufficient offered load, not less than a minimum administrative packet bandwidth guarantee.
    Type: Grant
    Filed: February 27, 2003
    Date of Patent: April 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: Brian E. Carpenter, Clark D. Jeffries, Andreas Kind, Michael S. Siegel
  • Patent number: 8004970
    Abstract: The present invention provides for congestion and flow control for a data transmission between computers in a network (e.g., a lossless network) by repeatedly setting a transmission rate for the data transmission at predetermined time intervals. Under the present invention, a ratio of a current occupancy to a maximum occupancy of a queue used for the data transmission is provided (e.g., the ratio can be calculated under the present invention, or obtained as input from an external source). The queue can be that of the receiving computer or of any component (e.g., a switch) that resides in the path of the data transmission. In any event, once the ratio is known, the present invention will set the transmission rate for the data transmission based on a comparison of the ratio to at least one threshold.
    Type: Grant
    Filed: August 30, 2005
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: Hoyt E. Bowen, Jr., Mircea Gusat, Clark D. Jeffries
  • Patent number: 8005989
    Abstract: The classification system of a network device includes a cache in which a mapping between predefined characteristics of TCP/IP packets and associated actions are stored in response to the first “Frequent Flyer” packet in of a session. Selected characteristics from subsequent received packets of that session are correlated with the predefined characteristics and the stored actions are applied to the received packets if the selected characteristics and the predefined characteristics match, thus reducing the processing required for subsequent packets. The packets selected for caching may be data packets. For mismatched characteristics, the full packet search of the classification system is used to determine the action to apply to the received packet.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: Everett A. Corl, Jr., Gordon T. Davis, Clark D. Jeffries, Natarajan Vaidhyanathan, Colin B. Verrilli
  • Patent number: 7937355
    Abstract: The present invention relates to a method and computer system device for applying a plurality of rules to data packets within a network computer system. A filter rule decision tree is updated by adding or deleting a rule. If deleting a filter rule then the decision tree is provided to a network data plane processor with an incremental delete of the filter rule. If adding a filter rule then either providing an incremental insertion of the filter rule to the decision tree or rebuilding the first decision tree into a second decision tree responsive to comparing a parameter to a threshold. In one embodiment the parameter and thresholds relate to depth values of the tree filter rule chained branches. In another the parameter and thresholds relate to a total count of rule additions since a building of the relevant tree.
    Type: Grant
    Filed: December 3, 2008
    Date of Patent: May 3, 2011
    Assignee: International Business Machines Corporation
    Inventors: Everett A. Corl, Jr., Gordon T. Davis, Clark D. Jeffries
  • Patent number: 7930740
    Abstract: A router includes a relatively low bandwidth communication connection to a small computer, a relatively high bandwidth communication connection to a communication network; and a processing unit for executing in the router a set of permit rules for permitting flow of communication packets with respect to the connections for user initiated sessions, the permit rules including a default rule for discarding all packets with respect to the small computer in traffic not pertaining to sessions initiated by the small computer.
    Type: Grant
    Filed: July 7, 2005
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: John F. Davis, Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
  • Patent number: 7855966
    Abstract: A codec detects congestion in a packet network and responds via a session control protocol to re-negotiate codec-type and/or parameters with the receiving codec to reduce bit rate for supporting a session. Once the connection and session are established, encoded packets start flowing between the two codecs. A control entity sends and receives network congestion control packets periodically in the session. The congestion control packets provide a “heartbeat” signal to the receiving codec. When the network is not congested, all “heartbeat” packets will be passed through the network. As network congestion increases, routers within the network discard excess packets to prevent network failure. The codecs respond to the missing packets by slowing down the bit rate or proceeding to renegotiate a lower bit rate via the session control protocol. If there are no missing packets, the codecs detect if the session is operating at the highest bit rate, and if not, re-negotiate a higher bit rate.
    Type: Grant
    Filed: February 7, 2006
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Youssef Abdelilah, Gordon T. Davis, Jeffrey H. Derby, Dongming Hwang, Clark D. Jeffries, Malcolm S. Ware, Hua Ye
  • Patent number: 7738376
    Abstract: A flow control method and system including an algorithm for deciding to transmit an arriving packet into a processing queue or to discard it, or, in the case of instructions or packets that must not be discarded, a similar method and system for deciding at a service event to transmit an instruction or packet into a processing queue or to skip the service event. The transmit probability is increased or decreased in consideration of minimum and maximum limits for each flow, aggregate limits for sets of flows, relative priority among flows, queue occupancy, and rate of change of queue occupancy. The effects include protection of flows below their minimum rates, correction of flows above their maximum rates, and, for flows between minimum and maximum rates, reduction of constituent flows of an aggregate that is above its aggregate maximum. Practice of the invention results in low queue occupancy during steady congestion.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: June 15, 2010
    Assignee: International Business Machines Corporation
    Inventors: Garesh Balakrishnan, John P. Chalmers, Clark D. Jeffries, Jitesh R. Nair, Larry W. Nicholson, Ravinder K. Sabhikhi, Raj K. Singh
  • Patent number: 7734776
    Abstract: A detection and response system that generates an Alert if unauthorized scanning is detected on a computer network that includes a look-up table to record state value corresponding to the sequence in which SYN, SYN/ACK and RST packets are observed. A set of algorithms executed on a processing engine adjusts the state value in response to observing the packets. When the state value reaches a predetermined value indicating that all three packets have been seen, the algorithm generates an Alert.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: June 8, 2010
    Assignee: International Business Machines Corporation
    Inventors: Alan D. Boulanger, Robert W. Danford, Kevin D. Himberger, Clark D. Jeffries, Raj K. Singh
  • Patent number: 7719423
    Abstract: System and method for tracking inventory of a multiplicity of products. First RFID tags are associated with respective products or groups of products. Second Active RFID tags are associated with respective first containers for the multiplicity products. A third Active RFID tag is associated with a second container for the first containers. First RFID tags broadcast their respective identifications. Second Active RFID tags hash the identities of the first RFID tags within their respective first containers and broad their hashed values. Third Active RFID tag hash the hashed values broadcast by the second Active RFID tags. An expected value is compared to a result of the third Active RFID tag hashing the hashed values broadcast by the second Active RFID tags.
    Type: Grant
    Filed: February 22, 2008
    Date of Patent: May 18, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
  • Patent number: 7711781
    Abstract: A technique for tracking one or more thresholds relating to the blocking of a particular screen name used on an IM system is disclosed. If the number of people who have blocked a particular screen name reaches a threshold amount, a determination is made that the screen name is being used by a spimmer or other bothersome person, and disciplinary action can be taken. In a preferred embodiment, the email address associated with a user name of a suspected spimmer is identified and all screen names associated with that email address are also subjected to disciplinary action, if desired. Thus, an IM company can suspend all screen names of a spimmer that are tied to the same email address, even though not all (or even none) of the screen names individually have reached a threshold level for discipline/suspension.
    Type: Grant
    Filed: November 9, 2004
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventors: John F. Davis, Kevin D. Himberger, Clark D. Jeffries, Mohammad Peyravian
  • Patent number: 7710874
    Abstract: A process control method and system including partitioning transmit decisions and certain measurements into one logical entity (Data Plane) and partitioning algorithm computation to update transmit probabilities into a second logical entity (Control Plane), the two entities periodically communicating fresh measurements from Data Plane to Control Plane and adjusted transmit probabilities from Control Plane to Data Plane. The transmit probability may be used in transmit/discard decisions of packets or instructions exercised at every arrival of a packet or instruction. In an alternative embodiment, the transmit probability may be used in transmit/delay decisions of awaiting instructions or packets exercised at every service event.
    Type: Grant
    Filed: June 4, 2003
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ganesh Balakrishnan, Everett A. Corl, Jr., Clark D. Jeffries, Ravinder K. Sabhikhi, Michael S. Siegel, Raj K. Singh, Rama M. Yedavalli
  • Publication number: 20090254991
    Abstract: An intrusion detection system (IDS) comprises a network processor (NP) coupled to a memory unit for storing programs and data. The NP is also coupled to one or more parallel pattern detection engines (PPDE) which provide high speed parallel detection of patterns in an input data stream. Each PPDE comprises many processing units (PUs) each designed to store intrusion signatures as a sequence of data with selected operation codes. The PUs have configuration registers for selecting modes of pattern recognition. Each PU compares a byte at each clock cycle. If a sequence of bytes from the input pattern match a stored pattern, the identification of the PU detecting the pattern is outputted with any applicable comparison data. By storing intrusion signatures in many parallel PUs, the IDS can process network data at the NP processing speed. PUs may be cascaded to increase intrusion coverage or to detect long intrusion signatures.
    Type: Application
    Filed: December 14, 2008
    Publication date: October 8, 2009
    Applicant: International Business Machines Corporation
    Inventors: Marc A. Boulanger, Clark D. Jeffries, C. Marcel Kinard, Kerry A. Kravec, Ravinder K. Sabhikhi, Ali G. Saidi, Jan M. Slyfield, Pascal R. Tannhof
  • Patent number: 7594263
    Abstract: A communication network is operated by detecting an anomaly in the communication traffic at a plurality of nodes in a communication network. A first blocking measure A is independently applied at respective ones of the plurality of nodes to the anomalous traffic that stops the anomalous traffic. A second blocking measure B is independently determined at the respective ones of the plurality of nodes such that application of a logical combination of the first blocking measure A and the second blocking measure B to the anomalous traffic stops the anomalous traffic.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: September 22, 2009
    Assignee: International Business Machines Corporation
    Inventors: Alan Boulanger, Kevin Himberger, Clark D. Jeffries, John Ziraldo
  • Patent number: 7546281
    Abstract: A system for reducing the size of a database includes a memory in which the database configured in a ternary matrix array structure is stored. A processor executing at least one reduction algorithm scans the database tagging superfluous entries that are subsequently deleted. The tagging and deleting are done in such a way that the logical contents of the original database is unchanged, even though the size of the database is reduced.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: June 9, 2009
    Assignee: International Business Machines Corporation
    Inventors: Everett A. Corl, Jr., Clark D. Jeffries, Brooks Johnston, Plyush C. Patel, Jan Van Lunteren
  • Patent number: 7523494
    Abstract: Communication traffic is processed by detecting an anomaly in the communication traffic. A first blocking measure A is applied to the anomalous traffic that stops the anomalous traffic. A second blocking measure is determined such that application of a logical combination of the first blocking measure A and the second blocking measure to the anomalous traffic stops the anomalous traffic.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: April 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kevin Himberger, Clark D. Jeffries
  • Patent number: 7523470
    Abstract: A kernel based detection of keyboard logger applications is achieved by configuring a call interface to the kernel to characterize a system call pattern for processes accessing a keyboard. A monitor thread iteratively examines a plurality of threads to test open( ), read( ), write( ), and syscall( ) system routines for conditions indicative of presence of a keyboard logger application. A thread whose system call pattern is characterized by such conditions is marked as a keyboard logger.
    Type: Grant
    Filed: December 23, 2004
    Date of Patent: April 21, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: Joseph F. Garvey, Kevin Himberger, Clark D. Jeffries, Mohammad Peyravian