Patents by Inventor Cyrus J. Durgin
Cyrus J. Durgin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11489827Abstract: Systems, methods, and computer-readable media for operating a dedicated virtual machine host cluster within cloud computing infrastructure are described herein. In one embodiment, an instance principal certificate that includes a virtual network identifier for a dedicated virtual network for the cluster is retrieved by a host computing device. The instance principal certificate is authenticated by the host against a switch to grant access of the host to a virtual network indicated by the virtual network identifier through a network interface card of the host. A virtual function of the network interface card of the host is allocated to a guest virtual machine. The guest virtual machine is launched in the host with the virtual function as a network device of the guest virtual machine.Type: GrantFiled: November 9, 2020Date of Patent: November 1, 2022Assignee: Oracle International CorporationInventors: Bradley P. Knotwell, Jagwinder S. Brar, David D. Becker, Cyrus J. Durgin, Matthew G. Ryanczak
-
Publication number: 20210058388Abstract: Systems, methods, and computer-readable media for operating a dedicated virtual machine host cluster within cloud computing infrastructure are described herein. In one embodiment, an instance principal certificate that includes a virtual network identifier for a dedicated virtual network for the cluster is retrieved by a host computing device. The instance principal certificate is authenticated by the host against a switch to grant access of the host to a virtual network indicated by the virtual network identifier through a network interface card of the host. A virtual function of the network interface card of the host is allocated to a guest virtual machine. The guest virtual machine is launched in the host with the virtual function as a network device of the guest virtual machine.Type: ApplicationFiled: November 9, 2020Publication date: February 25, 2021Inventors: Bradley P. KNOTWELL, Jagwinder S. BRAR, David D. BECKER, Cyrus J. DURGIN, Matthew G. RYANCZAK
-
Patent number: 10862816Abstract: Systems, methods, and other embodiments associated with cloud computing cluster isolation with strong authentication and automatic configuration deployment are described. In one embodiment, a method includes, in response to receiving an authentication frame through the uncontrolled port, (i) extracting data from the authentication frame for performing authentication, and (ii) parsing the authentication frame to identify a piggybacked virtual network identifier that functions as an instruction to create an isolated connection. If the authentication was successful and the piggybacked virtual network identifier was identified, creating the isolated connection between the controlled port and a virtual network that is identified by the piggybacked virtual network identifier.Type: GrantFiled: October 8, 2018Date of Patent: December 8, 2020Assignee: Oracle International CorporationInventors: Jagwinder S. Brar, David D. Becker, Cyrus J. Durgin, Matthew G. Ryanczak
-
Publication number: 20200112515Abstract: Systems, methods, and other embodiments associated with cloud computing cluster isolation with strong authentication and automatic configuration deployment are described. In one embodiment, a method includes, in response to receiving an authentication frame through the uncontrolled port, (i) extracting data from the authentication frame for performing authentication, and (ii) parsing the authentication frame to identify a piggybacked virtual network identifier that functions as an instruction to create an isolated connection. If the authentication was successful and the piggybacked virtual network identifier was identified, creating the isolated connection between the controlled port and a virtual network that is identified by the piggybacked virtual network identifier.Type: ApplicationFiled: October 8, 2018Publication date: April 9, 2020Inventors: Jagwinder S. BRAR, David D. BECKER, Cyrus J. DURGIN, Matthew G. RYANCZAK
-
Publication number: 20180219757Abstract: Methods and systems for implementing a link layer path latency protocol (LLPLP) to monitor per-hop path latency are provided. According to one embodiment, a LLPLP message of a first type, including multiple hop records corresponding to multiple hops in a unique set of hops derived from all possible paths between a start node and an end node within the private network, is sent to a source node specified by a first hop record of the multiple hop records. Receipt of the LLPLP message by a source node specified in one or more hop records causes the source node to send one or more LLPLP messages of the first type to corresponding destination nodes. Receipt of the LLPLP message by a destination node specified in one or more hop records causes the destination node to calculate and return latency measurements for the appropriate hops via LLPLP messages of a second type.Type: ApplicationFiled: January 30, 2017Publication date: August 2, 2018Applicant: Fortinet, Inc.Inventors: Kelly A. Wanser, Cyrus J. Durgin
-
Patent number: 9252947Abstract: A secure key distribution server (SKDS) determines the identity of a requesting server without use of a shared secret by resolving the fully qualified domain name (FQDN) to a network address and comparing it with the network address of a key request. A credential string may also be used as part of the identification. Once identity is established, keys may be securely distributed. The SKDS may also be implemented in a peer-to-peer configuration.Type: GrantFiled: July 19, 2013Date of Patent: February 2, 2016Assignee: Amazon Technologies, Inc.Inventors: Jacob Beacham, Jesper M. Johansson, Cyrus J. Durgin
-
Patent number: 9178866Abstract: Techniques for user authentication are disclosed. In some situations, the techniques include receiving, from a client device, an authentication request to access a network resource, the request including a user identifier, obtaining a security credential associated with the user identifier contained in the received request, generating an authorization code based on the obtained security credential, providing to the client device instructions to obtain first information corresponding to the generated authorization code, receiving, from the client device, the first information provided in response to the provided instructions, and, when the first information received from the client device corresponds to at least a portion of the generated authorization code, authorizing the client device to access the network resource.Type: GrantFiled: December 1, 2014Date of Patent: November 3, 2015Assignee: Amazon Technologies, Inc.Inventors: Dominique I. Brezinski, Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue
-
Publication number: 20150089616Abstract: Techniques for user authentication are disclosed. In some situations, the techniques include receiving, from a client device, an authentication request to access a network resource, the request including a user identifier, obtaining a security credential associated with the user identifier contained in the received request, generating an authorization code based on the obtained security credential, providing to the client device instructions to obtain first information corresponding to the generated authorization code, receiving, from the client device, the first information provided in response to the provided instructions, and, when the first information received from the client device corresponds to at least a portion of the generated authorization code, authorizing the client device to access the network resource.Type: ApplicationFiled: December 1, 2014Publication date: March 26, 2015Inventors: Dominique I. Brezinski, Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue
-
Patent number: 8925062Abstract: Techniques for user authentication are disclosed. In some situations, the techniques include receiving, from a client device, an authentication request to access a network resource, the request including a user identifier, obtaining a security credential associated with the user identifier contained in the received request, generating an authorization code based on the obtained security credential, providing to the client device instructions to obtain first information corresponding to the generated authorization code, receiving, from the client device, the first information provided in response to the provided instructions, and, when the first information received from the client device corresponds to at least a portion of the generated authorization code, authorizing the client device to access the network resource.Type: GrantFiled: November 14, 2013Date of Patent: December 30, 2014Assignee: Amazon Technologies, Inc.Inventors: Dominique I. Brezinski, Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue
-
Patent number: 8848922Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: November 26, 2012Date of Patent: September 30, 2014Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Patent number: 8676795Abstract: A plurality of phrases may be extracted from documents associated with one or more document sources. The plurality of phrases may be filtered and processed to determine a frequency in which the plurality of phrases appear in the documents and/or a number of the document sources in which each phrase appears. A weight may be assigned to each of the phrases and, based at least in part on the assigned weight, a visual representation of the plurality of phrases may be presented. The visual representation may be dynamically updated based at least in part on an updated frequency or an updated total number of document sources associated with any one of the plurality of phrases.Type: GrantFiled: August 4, 2011Date of Patent: March 18, 2014Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, George N. Stathakopoulos, Dominique I. Brezinski, Emilia S. Buneci, Martin M. O'Reilly, Lane R. LaRue, Benjamin S. Kirzhner
-
Patent number: 8613066Abstract: Techniques for user authentication are disclosed. In some situations, the techniques include receiving, from a client device, an authentication request to access a network resource, the request including a user identifier, obtaining a security credential associated with the user identifier contained in the received request, generating an authorization code based on the obtained security credential, providing to the client device instructions to obtain first information corresponding to the generated authorization code, receiving, from the client device, the first information provided in response to the provided instructions, and, when the first information received from the client device corresponds to at least a portion of the generated authorization code, authorizing the client device to access the network resource.Type: GrantFiled: December 30, 2011Date of Patent: December 17, 2013Assignee: Amazon Technologies, Inc.Inventors: Dominique I. Brezinski, Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue
-
Patent number: 8539231Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: August 14, 2012Date of Patent: September 17, 2013Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Patent number: 8321925Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: February 17, 2009Date of Patent: November 27, 2012Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Patent number: 8245037Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: February 17, 2009Date of Patent: August 14, 2012Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin