Patents by Inventor David Mattes
David Mattes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240137319Abstract: A method and a network for routing data packet in a unified wide area network (WAN) is provided. The method includes encapsulating a data packet by an ingress aggregation router and forwarding the encapsulated data packet to an ingress backbone router. The encapsulated data packet includes a first label. The ingress backbone router selects an optimized traffic engineered tunnel and replaces the first label with the optimized traffic engineered tunnel and forwards the encapsulated data packet along the optimized traffic engineered tunnel.Type: ApplicationFiled: January 25, 2023Publication date: April 25, 2024Inventors: Paul David MATTES, Umesh KRISHNASWAMY, John Michael ABELN, Sonal KOTHARI, Paul-Andre C. BISSONNETTE, Pappula Prabhakar REDDY, Himanshu RAJ
-
Publication number: 20230401214Abstract: The current document is directed to graph databases and, in particular, to improvements in the operational efficiencies of, and the range of functionalities provided by, graph databases. One currently disclosed improvement provides for associating user-defined and developer-defined functions with node and relationship entities stored within the graph database. These entity-associated functions are executed in entity-associated execution environments provided to the entities during query execution. Another currently disclosed improvement provides text-replacement-based preprocessing of graph-database queries for increased clarity and for increasing the speed and accuracy with which the queries can be formulated.Type: ApplicationFiled: August 25, 2023Publication date: December 14, 2023Applicant: VMware, Inc.Inventors: Steve Venema, Paul Dennis Allen, Nandesh Guru, Andrew Armaneous, David Hanson, David Mattes
-
Patent number: 10178133Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: GrantFiled: August 7, 2017Date of Patent: January 8, 2019Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs
-
Patent number: 10038725Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: GrantFiled: May 16, 2016Date of Patent: July 31, 2018Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Publication number: 20180183834Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: ApplicationFiled: August 7, 2017Publication date: June 28, 2018Inventors: David Mattes, Ludwin Fuchs
-
Patent number: 9729580Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: GrantFiled: July 30, 2015Date of Patent: August 8, 2017Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs
-
Publication number: 20160261641Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: ApplicationFiled: May 16, 2016Publication date: September 8, 2016Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Patent number: 9344403Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: GrantFiled: March 11, 2014Date of Patent: May 17, 2016Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Publication number: 20160036861Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: ApplicationFiled: July 30, 2015Publication date: February 4, 2016Inventors: David Mattes, Ludwin Fuchs
-
Publication number: 20140282850Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: ApplicationFiled: March 11, 2014Publication date: September 18, 2014Applicant: ASGUARD NETWORKS, INC.Inventors: David Mattes, Ludwin Fuchs, Eric Artzt