Patents by Inventor Douglas Wiemer

Douglas Wiemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8544098
    Abstract: Security vulnerability information aggregation techniques are disclosed. Vulnerability information associated with one or more security vulnerabilities is obtained from multiple sources and aggregated into respective unified vulnerability definitions for the one or more security vulnerabilities. Aggregation may involve format conversion, content aggregation, or both in some embodiments. Unified vulnerability definitions may be distributed to vulnerability information consumers in accordance with consumer-specific policies. Storage of vulnerability information received from the sources may allow the aggregation process to be performed on existing vulnerability information “retro-actively”. Related data structures and Graphical User Interfaces (GUIs) are also disclosed.
    Type: Grant
    Filed: March 2, 2006
    Date of Patent: September 24, 2013
    Assignee: Alcatel Lucent
    Inventors: Christophe Gustave, Stanley TaiHai Chow, Douglas Wiemer
  • Patent number: 8438643
    Abstract: Information system service-level security risk analysis systems, methods, and Graphical User Interfaces are disclosed. Assets of an information system that have relationships with a service provided by the information system are identified, and at least one security risk to the service is determined by analyzing security vulnerabilities associated with the identified assets. A consolidated representation of the service is provided, and includes an indication of the determined security risk(s) and an indication of a relationship between the service and at least one of the identified assets. The security risk indication may include indications of multiple security parameters. Security risks may be represented differently depending on whether they arise from a security vulnerability of an asset that has a relationship with the service or a security vulnerability of an asset that has a relationship with the service only through a relationship with an asset that has a relationship with the service.
    Type: Grant
    Filed: March 2, 2006
    Date of Patent: May 7, 2013
    Assignee: Alcatel Lucent
    Inventors: Douglas Wiemer, Christophe Gustave, Stanley TaiHai Chow, Bradley Kenneth McFarlane
  • Patent number: 8204720
    Abstract: Graph-based modeling apparatus and techniques are disclosed. Based on a model including model nodes that represent components of a modeled system, operational dependencies between model nodes, and model edges that interconnect the nodes and represent relationships between the components in the modeled system, subset computations are performed to compute subsets of the model nodes that can impact operational dependencies between other model nodes. When the model changes, a determination is made as to whether an incremental subset computation should be performed for one or more particular operational dependencies between model nodes in the changed model, and if so, an incremental subset computation is performed. Otherwise, a full subset computation or no subset computation might be performed. In this manner, model changes are considered on a case-by-case basis to determine an extent, if any, to which subsets should be re-computed.
    Type: Grant
    Filed: June 1, 2007
    Date of Patent: June 19, 2012
    Assignee: Alcatel Lucent
    Inventors: Douglas Wiemer, Mohammed Riyas Valiyapalathingal, Louie Kwan, Jennifer Li, Stanley TaiHai Chow
  • Patent number: 8095984
    Abstract: Systems and methods of associating security vulnerabilities and assets, and related Graphical User Interfaces (GUIs) and data structures, are disclosed. A definition of a security vulnerability, which includes multiple asset characteristics such as an asset platform that may be exploited via the security vulnerability and an asset platform that is affected when the exploited asset platform is exploited via the security vulnerability, is compared with definitions of one or more assets of an information system. An association between the security vulnerability and an asset is made if the definition of the asset includes a first asset characteristic of the security vulnerability definition and either the definition of the asset or the definition of another asset that has a relationship with the asset includes a second asset characteristic of the security vulnerability definition. The security vulnerability definition may also identify an asset platform that protects against the vulnerability.
    Type: Grant
    Filed: March 2, 2006
    Date of Patent: January 10, 2012
    Assignee: Alcatel Lucent
    Inventors: Bradley Kenneth McFarlane, Douglas Wiemer, Kevin McNamee
  • Patent number: 8020207
    Abstract: A malware detection and response system based on traffic pattern anomalies detection is provided, whereby packets associated with a variety of protocols on each port of a network element are counted distinctly for each direction. Such packets include: ARP requests, TCP/SYN requests and acknowledgements, TCP/RST packets, DNS/NETBEUI name lookups, out-going ICMP packets, UDP packets, etc. When a packet causes an individual count or combination of counts to exceed a threshold, appropriate action is taken. The system can be incorporated into the fast path, that is, the data plane, enabling communications systems such as switches, routers, and DSLAMs to have built-in security at a very low cost.
    Type: Grant
    Filed: January 23, 2007
    Date of Patent: September 13, 2011
    Assignee: ALCATEL LUCENT
    Inventors: Stanley TaiHai Chow, Jean-Marc Robert, Kevin McNamee, Douglas Wiemer, Bradley Kenneth McFarlane
  • Publication number: 20110197278
    Abstract: A malware detection and response system based on traffic pattern anomalies detection is provided, whereby packets associated with a variety of protocols on each port of a network element are counted distinctly for each direction. Such packets include: ARP requests, TCP/SYN requests and acknowledgements, TCP/RST packets, DNS/NETBEUI name lookups, out-going ICMP packets, UDP packets, etc. When a packet causes an individual count or combination of counts to exceed a threshold, appropriate action is taken. The system can be incorporated into the fast path, that is, the data plane, enabling communications systems such as switches, routers, and DSLAMs to have built-in security at a very low cost.
    Type: Application
    Filed: January 23, 2007
    Publication date: August 11, 2011
    Applicant: ALCATEL LUCENT
    Inventors: Stanley TaiHai Chow, Jean-Marc Robert, Kevin McNamee, Douglas Wiemer, Bradley Kenneth McFarlane
  • Publication number: 20090013404
    Abstract: When the processing resources of a host system are occupied beyond a trigger point by incoming requests, that host system issues a cool-it message that is broadcast throughout the network, eventually reaching edge routers that, in response to the message, throttle the traffic that they pass into the network. The throttling is applied in increasing amounts with increasing traffic volumes received at the edge routers. The cool-it messages are authenticated to ensure that they are not being used as instruments of a DoS attack. This mechanism also works to control legitimate network congestion, and it does not block users from a host system that is under attack.
    Type: Application
    Filed: July 5, 2007
    Publication date: January 8, 2009
    Applicant: ALCATEL LUCENT
    Inventors: Stanley TaiHai Chow, Douglas Wiemer, Jean-Marc Robert
  • Publication number: 20080300834
    Abstract: Graph-based modeling apparatus and techniques are disclosed. Based on a model including model nodes that represent components of a modeled system, operational dependencies between model nodes, and model edges that interconnect the nodes and represent relationships between the components in the modeled system, subset computations are performed to compute subsets of the model nodes that can impact operational dependencies between other model nodes. When the model changes, a determination is made as to whether an incremental subset computation should be performed for one or more particular operational dependencies between model nodes in the changed model, and if so, an incremental subset computation is performed. Otherwise, a full subset computation or no subset computation might be performed. In this manner, model changes are considered on a case-by-case basis to determine an extent, if any, to which subsets should be re-computed.
    Type: Application
    Filed: June 1, 2007
    Publication date: December 4, 2008
    Inventors: Douglas Wiemer, Mohammed Riyas Valiyapalathingal, Louie Kwan, Jennifer Li, Stanley TaiHai Chow
  • Publication number: 20070109015
    Abstract: Switched integrated circuit connection architectures and techniques are disclosed. An integrated circuit includes connection segments and switching elements operatively coupled to the connection segments. Any of multiple switchable connections to a functional module of the integrated circuit can be established, as needed, by the switching elements through the connection segments. Protocol termination points associated with functional modules of the integrated circuit may be addressable in an address space that is used on an external connection outside the integrated circuit. An external protocol used on such an external connection may also be supported internally in the integrated circuit by the protocol termination points.
    Type: Application
    Filed: November 15, 2005
    Publication date: May 17, 2007
    Inventors: Gordon Hanes, Douglas Wiemer
  • Publication number: 20070067848
    Abstract: Security vulnerability information aggregation techniques are disclosed. Vulnerability information associated with one or more security vulnerabilities is obtained from multiple sources and aggregated into respective unified vulnerability definitions for the one or more security vulnerabilities. Aggregation may involve format conversion, content aggregation, or both in some embodiments. Unified vulnerability definitions may be distributed to vulnerability information consumers in accordance with consumer-specific policies. Storage of vulnerability information received from the sources may allow the aggregation process to be performed on existing vulnerability information “retro-actively”. Related data structures and Graphical User Interfaces (GUIs) are also disclosed.
    Type: Application
    Filed: March 2, 2006
    Publication date: March 22, 2007
    Inventors: Christophe Gustave, Stanley Chow, Douglas Wiemer
  • Publication number: 20070067846
    Abstract: Systems and methods of associating security vulnerabilities and assets, and related Graphical User Interfaces (GUIs) and data structures, are disclosed. A definition of a security vulnerability, which includes multiple asset characteristics such as an asset platform that may be exploited via the security vulnerability and an asset platform that is affected when the exploited asset platform is exploited via the security vulnerability, is compared with definitions of one or more assets of an information system. An association between the security vulnerability and an asset is made if the definition of the asset includes a first asset characteristic of the security vulnerability definition and either the definition of the asset or the definition of another asset that has a relationship with the asset includes a second asset characteristic of the security vulnerability definition. The security vulnerability definition may also identify an asset platform that protects against the vulnerability.
    Type: Application
    Filed: March 2, 2006
    Publication date: March 22, 2007
    Applicant: Alcatel
    Inventors: Bradley McFarlane, Douglas Wiemer, Kevin McNamee
  • Publication number: 20070067845
    Abstract: The invention is directed to providing threat and risk analysis for a network that has a high degree of inter-relationships and interdependencies among the assets comprising it, using a “cut set” enumeration method. The identified cut sets are used as the basis to the threat and risk analysis, since each cut set may affect the traffic between two dependent assets in the network, and thereby affect the security state of the dependent assets themselves. The affected security state may be confidentiality, integrity, availability, or other network or security relevant parameter.
    Type: Application
    Filed: September 22, 2005
    Publication date: March 22, 2007
    Applicant: ALCATEL
    Inventors: Douglas Wiemer, Jean-Marc Robert, Bradley McFarlane, Christophe Gustave, Stanley Chow, Jian Tang
  • Publication number: 20070067847
    Abstract: Information system service-level security risk analysis systems, methods, and Graphical User Interfaces are disclosed. Assets of an information system that have relationships with a service provided by the information system are identified, and at least one security risk to the service is determined by analyzing security vulnerabilities associated with the identified assets. A consolidated representation of the service is provided, and includes an indication of the determined security risk(s) and an indication of a relationship between the service and at least one of the identified assets. The security risk indication may include indications of multiple security parameters. Security risks may be represented differently depending on whether they arise from a security vulnerability of an asset that has a relationship with the service or a security vulnerability of an asset that has a relationship with the service only through a relationship with an asset that has a relationship with the service.
    Type: Application
    Filed: March 2, 2006
    Publication date: March 22, 2007
    Applicant: Alcatel
    Inventors: Douglas Wiemer, Christophe Gustave, Stanley Chow, Bradley McFarlane
  • Patent number: 4675804
    Abstract: A variable gain integrator for controlling the response time of a controlled device so as to control a condition. The condition is sensed and compared to a set point to determine an error representing the difference therebetween. The difference is integrated by the variable gain integrator, the output of which is used to control the controlled device. The control system monitors the rate of change of the sensed condition. When the rate of condition change is less than a reference, the gain of the integrator is increased to decrease the response time of the controlled device.
    Type: Grant
    Filed: April 21, 1986
    Date of Patent: June 23, 1987
    Assignee: Sundstrand Corporation
    Inventor: Douglas Wiemer
  • Patent number: 4673031
    Abstract: A variable speed integrator for controlling the response time of a valve which regulates the amount of coolant flowing to a heat exchanger so as to control the temperature of the cooled substance output from the exchanger. The temperature of the cooled substance is sensed and compared to a set point temperature to determine an error temperature representing the difference between the sensed and set point temperatures. The error temperature is integrated by the variable speed integrator, the output of which is used to drive the valve into position. The control system monitors the rate of change of the sensed temperature to determine a low system gain. When the rate of temperature change indicates a low gain system, the gain of the integrator is increased to decrease the response time of the valve.
    Type: Grant
    Filed: November 1, 1983
    Date of Patent: June 16, 1987
    Assignee: Sundstrand Corporation
    Inventor: Douglas Wiemer