Patents by Inventor Flemming Stig Andreasen
Flemming Stig Andreasen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10305931Abstract: In one embodiment, a primary server receives, from a client device, a first request to mitigate an external attack on the client device. The primary server sends, to a plurality of secondary servers, a second request to mitigate the external attack, wherein each one of the plurality of secondary servers has associated mitigation resources, and receives from at least one of the plurality of secondary servers an indication that it has mitigation resources capable of mitigating the external attack. The primary server sends, to the client device, a list including the secondary servers having mitigation resources capable of mitigating the attack, and receives, from the client device, an indication that a subset of the list is selected to mitigate the external attack. In response, the primary server sends a request for mitigation services to one of the secondary servers in the subset selected to mitigate the external attack.Type: GrantFiled: October 19, 2016Date of Patent: May 28, 2019Assignee: Cisco Technology, Inc.Inventors: K Tirumaleswar Reddy, Daniel G. Wing, Flemming Stig Andreasen, Michael David Geller
-
Publication number: 20180109555Abstract: In one embodiment, a primary server receives, from a client device, a first request to mitigate an external attack on the client device. The primary server sends, to a plurality of secondary servers, a second request to mitigate the external attack, wherein each one of the plurality of secondary servers has associated mitigation resources, and receives from at least one of the plurality of secondary servers an indication that it has mitigation resources capable of mitigating the external attack. The primary server sends, to the client device, a list including the secondary servers having mitigation resources capable of mitigating the attack, and receives, from the client device, an indication that a subset of the list is selected to mitigate the external attack. In response, the primary server sends a request for mitigation services to one of the secondary servers in the subset selected to mitigate the external attack.Type: ApplicationFiled: October 19, 2016Publication date: April 19, 2018Inventors: K Tirumaleswar Reddy, Daniel G. Wing, Flemming Stig Andreasen, Michael David Geller
-
Patent number: 8214879Abstract: A system for enforcing policy in a communication network includes a policy server which is operable to receive a request to invoke an application, receive a policy profile for a network user, and decide a proper allocation of network users based on the policy profile, the application, and available network resources. The policy server is further operable to communicate with a non-SIP application. The system also includes a network resource manager operably associated with the policy server and operable to monitor available network in the resources in the communication network. In addition, the network resource manager is functional to allocate network resource amongst a plurality of network users. The system also contains an application control point which is operably associated with the policy server and operable to communicate with a SIP application. The system is operable to use policy peering between the home and visited network to enable user-specific policies to be enforced while roaming.Type: GrantFiled: August 31, 2011Date of Patent: July 3, 2012Assignee: Cisco Technology, Inc.Inventors: Flemming Stig Andreasen, Jonathan D. Rosenberg
-
Publication number: 20110314161Abstract: A system for enforcing policy in a communication network includes a policy server which is operable to receive a request to invoke an application, receive a policy profile for a network user, and decide a proper allocation of network users based on the policy profile, the application, and available network resources. The policy server is further operable to communicate with a non-SIP application. The system also includes a network resource manager operably associated with the policy server and operable to monitor available network in the resources in the communication network. In addition, the network resource manager is functional to allocate network resource amongst a plurality of network users. The system also contains an application control point which is operably associated with the policy server and operable to communicate with a SIP application. The system is operable to use policy peering between the home and visited network to enable user-specific policies to be enforced while roaming.Type: ApplicationFiled: August 31, 2011Publication date: December 22, 2011Applicant: Cisco Technology, Inc.Inventors: Flemming Stig Andreasen, Jonathan D. Rosenberg
-
Patent number: 8042148Abstract: A system for enforcing policy in a communication network includes a policy server which is operable to receive a request to invoke an application, receive a policy profile for a network user, and decide a proper allocation of network users based on the policy profile, the application, and available network resources. The policy server is further operable to communicate with a non-SIP application. The system also includes a network resource manager operably associated with the policy server and operable to monitor available network in the resources in the communication network. In addition, the network resource manager is functional to allocate network resource amongst a plurality of network users. The system also contains an application control point which is operably associated with the policy server and operable to communicate with a SIP application. The system is operable to use policy peering between the home and visited network to enable user-specific policies to be enforced while roaming.Type: GrantFiled: February 6, 2007Date of Patent: October 18, 2011Assignee: Cisco Technology, Inc.Inventors: Flemming Stig Andreasen, Jonathan D. Rosenberg
-
Patent number: 7978599Abstract: A method and system to identify an overload state in a remote network device within a communications network in which a local network device can send at least one message to the remote network device. The method comprises detecting at least one message transmission timeout for the message sent from the local network device to the remote network device, the message transmission timeout corresponding to a retransmission of the message from the local network device to the remote network device. The number of message transmission timeouts for the message or several messages is counted, with the method further comprising comparing the number of message transmission timeouts to a predetermined timeout threshold so that an overload state for the remote network device can be inferred when the number of message transmission timeouts exceeds the predetermined timeout threshold.Type: GrantFiled: November 17, 2006Date of Patent: July 12, 2011Assignee: Cisco Technology, Inc.Inventors: Joseph Roy Stone, Flemming Stig Andreasen
-
Patent number: 7953867Abstract: In an example embodiment a method is provided which comprises initiating at an offerer endpoint an offer message in Session Description Protocol (SDP) format. Included in the offer message is an indication of a plurality of potential configurations which the offerer endpoint is capable of supporting. The offer message is sent to an answerer endpoint to allow capability negotiation between the offerer endpoint and the answerer endpoint in a manner that is backwards compatible with existing endpoints. In an example embodiment, the indication of the plurality of potential configurations comprises assigning a new attribute or value to an existing type of SDP identifier.Type: GrantFiled: January 29, 2007Date of Patent: May 31, 2011Assignee: Cisco Technology, Inc.Inventor: Flemming Stig Andreasen
-
Patent number: 7930386Abstract: In one embodiment, a method is illustrated as including receiving a data packet at a network device, and upshifting a Quality of Service (QoS) reservation, wherein the upshifting is based upon an observed increase type selected from the group consisting of an observed increase in network traffic, data packet size, and data packet frequency. In a further embodiment, a network device is illustrated as possessing a receiver to receive data packets, and an upshifter to upshift a Quality of Service (QoS) reservation, wherein the upshifter observes an increase type selected from the group consisting of an observed increase in network traffic, data packet size, and data packet frequency.Type: GrantFiled: February 9, 2007Date of Patent: April 19, 2011Assignee: Cisco Technology, Inc.Inventors: Brian Alan Davis, Joseph Roy Stone, Flemming Stig Andreasen, Michael Anthony Ramalho
-
Patent number: 7738383Abstract: In one embodiment, an endpoint sends messages containing Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN) requests to traceroute a path to the remote endpoint. The traceroute may be completed through security devices such as NATs and firewalls. Receipt of a STUN response from the remote endpoint signals that one of the traceroute packets reached the remote endpoint whereas the other traceroute packets have elicited error responses from intermediary, on-path routers, allowing these routers to be identified.Type: GrantFiled: December 21, 2006Date of Patent: June 15, 2010Assignee: Cisco Technology, Inc.Inventors: Daniel G. Wing, Flemming Stig Andreasen, David R. Oran
-
Publication number: 20080192763Abstract: In one embodiment, a method is illustrated as including receiving a data packet at a network device, and upshifting a Quality of Service (QoS) reservation, wherein the upshifting is based upon an observed increase type selected from the group consisting of an observed increase in network traffic, data packet size, and data packet frequency. In a further embodiment, a network device is illustrated as possessing a receiver to receive data packets, and an upshifter to upshift a Quality of Service (QoS) reservation, wherein the upshifter observes an increase type selected from the group consisting of an observed increase in network traffic, data packet size, and data packet frequency.Type: ApplicationFiled: February 9, 2007Publication date: August 14, 2008Applicant: Cisco Technology, Inc.Inventors: Brian Alan Davis, Joseph Roy Stone, Flemming Stig Andreasen, Michael Anthony Ramalho
-
Publication number: 20080151764Abstract: In one embodiment, an endpoint sends messages containing Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN) requests to traceroute a path to the remote endpoint. The traceroute may be completed through security devices such as NATs and firewalls. Receipt of a STUN response from the remote endpoint signals that one of the traceroute packets reached the remote endpoint whereas the other traceroute packets have elicited error responses from intermediary, on-path routers, allowing these routers to be identified.Type: ApplicationFiled: December 21, 2006Publication date: June 26, 2008Applicant: CISCO TECHNOLOGY, INC.Inventors: Daniel G. Wing, Flemming Stig Andreasen, David R. Oran
-
Publication number: 20080117816Abstract: A method and system to identify an overload state in a remote network device within a communications network in which a local network device can send at least one message to the remote network device. The method comprises detecting at least one message transmission timeout for the message sent from the local network device to the remote network device, the message transmission timeout corresponding to a retransmission of the message from the local network device to the remote network device. The number of message transmission timeouts for the message or several messages is counted, with the method further comprising comparing the number of message transmission timeouts to a predetermined timeout threshold so that an overload state for the remote network device can be inferred when the number of message transmission timeouts exceeds the predetermined timeout threshold.Type: ApplicationFiled: November 17, 2006Publication date: May 22, 2008Inventors: Joseph Roy Stone, Flemming Stig Andreasen