Patents by Inventor Edmund J. Gurney, III
Edmund J. Gurney, III has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230362207Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.Type: ApplicationFiled: July 14, 2023Publication date: November 9, 2023Applicant: Arbor Networks, Inc.Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
-
Patent number: 11743301Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.Type: GrantFiled: November 17, 2021Date of Patent: August 29, 2023Assignee: Arbor Networks, Inc.Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
-
Publication number: 20230156044Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.Type: ApplicationFiled: November 17, 2021Publication date: May 18, 2023Applicant: Arbor Networks, Inc.Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
-
Patent number: 10701076Abstract: A network agent includes an ingress port in data communication with a network traffic source for receiving network traffic entering a network and an egress port in data communication with the ingress port and a protection device included in the network. The egress port is configured to transmit network traffic received from the ingress port to a network device included in the network. A processing device receives from a protection device included in the network blacklist addresses determined by the protection device to be a threat to the network, and maintains a blacklist that includes the received blacklist addresses. A physical layer device compares the network layer source address of a packet of the network traffic received by the ingress port to the blacklist and forwards the packet to the egress port only if the packet's source address is not included in the blacklist.Type: GrantFiled: January 14, 2016Date of Patent: June 30, 2020Assignee: Arbor Networks, Inc.Inventor: Edmund J. Gurney, III
-
Publication number: 20170208083Abstract: A network agent includes an ingress port in data communication with a network traffic source for receiving network traffic entering a network and an egress port in data communication with the ingress port and a protection device included in the network. The egress port is configured to transmit network traffic received from the ingress port to a network device included in the network. A processing device receives from a protection device included in the network blacklist addresses determined by the protection device to be a threat to the network, and maintains a blacklist that includes the received blacklist addresses. A physical layer device compares the network layer source address of a packet of the network traffic received by the ingress port to the blacklist and forwards the packet to the egress port only if the packet's source address is not included in the blacklist.Type: ApplicationFiled: January 14, 2016Publication date: July 20, 2017Applicant: Arbor Networks, Inc.Inventor: Edmund J. Gurney, III
-
Patent number: 8819670Abstract: A computing device prompts a user to supply installation parameters for joint installation of an operating system and core software on a server device, and stores, in a memory, the installation parameters received from the user. The computing device provides, to the server device, instructions to install an image of the operating system directly to volumes for the core software, where the instructions require input of installation parameters during the installation. The computing device also receives, from the server device and during the operating system installation, requests for the installation parameters. The computing device sends, to the server device, the stored installation parameters that are responsive to the requests for the installation parameters.Type: GrantFiled: March 31, 2010Date of Patent: August 26, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Matthew R. Braun, Edmund J. Gurney, III
-
Publication number: 20110246981Abstract: A computing device prompts a user to supply installation parameters for joint installation of an operating system and core software on a server device, and stores, in a memory, the installation parameters received from the user. The computing device provides, to the server device, instructions to install an image of the operating system directly to volumes for the core software, where the instructions require input of installation parameters during the installation. The computing device also receives, from the server device and during the operating system installation, requests for the installation parameters. The computing device sends, to the server device, the stored installation parameters that are responsive to the requests for the installation parameters.Type: ApplicationFiled: March 31, 2010Publication date: October 6, 2011Applicant: Verizon Patent and Licensing, Inc.Inventors: Matthew R. Braun, Edmund J. Gurney, III