Patents by Inventor Daniel L. Becker

Daniel L. Becker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8566941
    Abstract: A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: October 22, 2013
    Assignee: Red Hat, Inc.
    Inventors: John M. Suit, Vipul Sharma, Mark J. Yourcheck, Daniel L. Becker
  • Patent number: 8429748
    Abstract: Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description.
    Type: Grant
    Filed: November 27, 2009
    Date of Patent: April 23, 2013
    Assignee: Red Hat, Inc.
    Inventors: John M. Suit, Nathaniel R. Tabernero, Daniel L. Becker, Adam J. Keeton, Joshua Suereth
  • Patent number: 8243599
    Abstract: A method includes receiving a first capture time corresponding to a first time that a data packet is received at a first probe and a second capture time corresponding to a second time that the data packet is received at a second probe. The data packet is from existing network traffic transmitted over a data network. The first and second probes can be configured to capture the data packet in response to a capture instruction. The first capture time and second capture time are different and are used to calculate the latency of at least a portion of a data network.
    Type: Grant
    Filed: November 1, 2006
    Date of Patent: August 14, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Daniel L. Becker, Todd J. Lizambri, Choon B. Shim, Xiang Yu
  • Publication number: 20120167214
    Abstract: A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities.
    Type: Application
    Filed: February 29, 2012
    Publication date: June 28, 2012
    Applicant: Red Hat, Inc.
    Inventors: John M. Suit, Vipul Sharma, Mark J. Yourcheck, Daniel L. Becker
  • Patent number: 8191141
    Abstract: A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities.
    Type: Grant
    Filed: June 22, 2007
    Date of Patent: May 29, 2012
    Assignee: Red Hat, Inc.
    Inventors: John M Suit, Vipul Sharma, Mark I Yourcheck, Daniel L Becker
  • Publication number: 20100077078
    Abstract: Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description.
    Type: Application
    Filed: November 27, 2009
    Publication date: March 25, 2010
    Applicant: FORTISPHERE, INC.
    Inventors: John M. Suit, Nathaniel R. Tabernero, Daniel L. Becker, Adam J. Keeton, Joshua Suereth
  • Patent number: 7529200
    Abstract: A method and system for fast setup of group Voice over Internet Protocol (VoIP) communications. The method and system provide a lower VoIP signaling overhead and a faster setup-time of group calls such as N-way audio and/or audio-video conference calls. Multi-party VoIP connections are quickly set-up over one or more virtual communications channels established between plural network devices using a session layer application, one or more group transport layer ports and a broadcast destination network address.
    Type: Grant
    Filed: July 23, 2004
    Date of Patent: May 5, 2009
    Assignee: 3E Technologies International, Inc.
    Inventors: Christopher M. Schmidt, Daniel L. Becker, Patrick J. Foy
  • Publication number: 20080320592
    Abstract: A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: John M. Suit, Vipul Sharma, Mark J. Yourcheck, Daniel L. Becker
  • Publication number: 20080247331
    Abstract: A method includes receiving a first capture time corresponding to a first time that a data packet is received at a first probe and a second capture time corresponding to a second time that the data packet is received at a second probe. The data packet is from existing network traffic transmitted over a data network. The first and second probes can be configured to capture the data packet in response to a capture instruction. The first capture time and second capture time are different and are used to calculate the latency of at least a portion of a data network.
    Type: Application
    Filed: November 1, 2006
    Publication date: October 9, 2008
    Applicant: Cisco Systems, Inc.
    Inventors: Daniel L. BECKER, Todd J. LIZAMBRI, Choon B. SHIM, Xiang YU