Patents by Inventor David Allen Dennerline

David Allen Dennerline has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190327347
    Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.
    Type: Application
    Filed: July 1, 2019
    Publication date: October 24, 2019
    Applicant: International Business Machines Corporation
    Inventors: Gregory Lyle Galloway, Paul Coccoli, David Allen Dennerline, Steven Ashley Mazur
  • Patent number: 10382591
    Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Gregory Lyle Galloway, Paul Coccoli, Jr., David Allen Dennerline, Steven Ashley Mazur
  • Publication number: 20160105469
    Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.
    Type: Application
    Filed: October 13, 2014
    Publication date: April 14, 2016
    Inventors: Gregory Lyle Galloway, Paul Coccoli, JR., David Allen Dennerline, Steven Ashley Mazur
  • Patent number: 8677473
    Abstract: Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted.
    Type: Grant
    Filed: November 18, 2008
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: David Allen Dennerline, Hubertus Franke, David Paul LaPotin, Terry Lee Nelms, II, Hao Yu
  • Patent number: 8006303
    Abstract: Intrusion protection. A first packet en route to a first destination is received. A first value representing a benefit for analyzing the first packet for intrusions in relation to a cost for analyzing the first packet for intrusions is automatically determined. An automatic determination is made that the first value is sufficiently high to warrant an analysis of the first packet for intrusions, and in response, the first packet is analyzed for intrusions. If the analysis of the first packet for intrusions indicates an intrusion, the first packet is discarded without forwarding the first packet to the first destination. A second packet en route to a second destination is received. A second value representing a benefit for analyzing the second packet for intrusions in relation to a cost for analyzing the second packet for intrusions is automatically determined.
    Type: Grant
    Filed: June 7, 2007
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: David Allen Dennerline, Terry Lee Nelms, II, Bernard Paul Palmer, Jr.
  • Publication number: 20100125900
    Abstract: Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted.
    Type: Application
    Filed: November 18, 2008
    Publication date: May 20, 2010
    Inventors: David Allen Dennerline, Hubertus Franke, David Paul LaPotin, Terry Lee Nelms, II, Hao Yu