Patents by Inventor Franklin A. Gruber
Franklin A. Gruber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7849197Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: April 16, 2008Date of Patent: December 7, 2010Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 7711830Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: April 16, 2008Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 7461152Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: GrantFiled: March 31, 2004Date of Patent: December 2, 2008Assignee: International Business Machines CorporationInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080222298Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob RIchard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080215676Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Publication number: 20080215738Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: April 16, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Joseph Bird, Bob Richard Cernohous, Christopher Thomas Gloe, Franklin A. Gruber, Scott Jon Prunty
-
Patent number: 7401354Abstract: IP security is provided in a virtual private network using network address translation (NAT) by performing one or a combination of the three types of VPN NAT, including VPN NAT type a outbound source IP NAT, VPN NAT type c inbound source IP NAT, and VPN NAT type d inbound destination IP NAT. This involves dynamically generating NAT rules and associating them with the manual or dynamically generated (IKE) Security Associations, before beginning IP security that uses the Security Associations. Then, as IP Sec is performed on outbound and inbound datagrams, the NAT function is also performed.Type: GrantFiled: March 12, 2003Date of Patent: July 15, 2008Assignee: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Patent number: 6993037Abstract: A communication network includes a plurality of nodes, selectively including a client, a remote gateway Internet service provider, the Internet, a local enterprise gateway, and an enterprise internal network. A local coincident endpoint is established at the local gateway for an outer connection with a remote node and an inner connection with the same or a different remote node. Nested traffic received at the gateway on the outer connection is decapsulated and then source-in NATed. Traffic received at the gateway for transmission on the outer connection is first source-in NATed, and then encapsulated for communication on the outer connection.Type: GrantFiled: March 21, 2001Date of Patent: January 31, 2006Assignee: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Patent number: 6978308Abstract: A communication network includes a plurality of nodes, selectively including a client, a remote gateway Internet service provider, the Internet, a local enterprise gateway, and an enterprise internal network. A local coincident endpoint is established at a first node for an outer connection with a remote node and an inner connection with a different remote node. The nodes participate in negotiations on the outer connection to set up the inner connection as a secure connection. Thereafter, responsive to communications on the inner connection, the first node establishes links to the outer connection selectively to receive or send communications double nested on the outer connection.Type: GrantFiled: March 21, 2001Date of Patent: December 20, 2005Assignee: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Publication number: 20050240648Abstract: An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications.Type: ApplicationFiled: March 31, 2004Publication date: October 27, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Bird, Bob Cernohous, Christopher Gloe, Franklin Gruber, Scott Prunty
-
Publication number: 20050050179Abstract: A method, apparatus and computer program product are provided for implementing enhanced proxy Address Resolution Protocol (ARP) for Virtual Internet protocol (IP) addresses. A Virtual Internet protocol (IP) interface requiring proxy ARP is identified and a proxy agent for the Virtual Internet protocol (IP) interface is dynamically selected. An IP address for the Virtual Internet protocol (IP) interface is added to an address list of a physical adapter for the selected proxy agent. Utilizing the physical adapter for the selected proxy agent, the added IP address for the Virtual Internet protocol (IP) interface is broadcast with a media access control (MAC) address of the physical adapter for the selected proxy agent.Type: ApplicationFiled: August 28, 2003Publication date: March 3, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary Diehl, Franklin Gruber, Daniel Vega
-
Patent number: 6717949Abstract: An address management system and method. ADDRESS statements and HIDE rule statements are processed to generate a file of masquerade rules for associating subsets of internal addresses among a plurality of public addresses. Responsive to these masquerade rules, network address translation is performed for incoming and outgoing IP datagrams. IP Network Address Translation (NAT) and IP Filtering functions provide firewall-type capability to a gateway system, such as the IBM AS/400 system. A customer's system administrator specifies specific NAT and Filtering rules (via the AS/400 Operational Navigator GUI). A type of NAT, called masquerade NAT, defines a many-to-one mapping in such a way as to allow the ‘many’ to specify subsets of IP addresses. This allows traffic separation, which improves throughput to and from external networks (e.g. the Internet), and also improves flexibility in IP address management.Type: GrantFiled: August 31, 1998Date of Patent: April 6, 2004Assignee: International Business Machines CorporationInventors: Edward B. Boden, Wesley A. Brzozowski, Franklin A. Gruber, Donald A. Palermo, Michael D. Williams
-
Patent number: 6631414Abstract: A system and method for dedicating an externally configurable modem under system software control at a local peer for communication with one, single, predetermined remote peer, thereby providing the equivalent of a dedicate line by operating a single modem at the local node. The modem to be dedicated to the predetermined, single remote node is initialized to answer mode and reconfigured to originate mode when needed. The process of configuring the modem of the local node establishes a point-to-point protocol (PPP) route for establishing a physical connection path to the remote node.Type: GrantFiled: August 31, 1998Date of Patent: October 7, 2003Assignee: International Business Machines CorporationInventors: Mark C. Bullock, Glenn W. Davis, Franklin A. Gruber
-
Patent number: 6615357Abstract: IP security is provided in a virtual private network using network address translation (NAT) by performing one or a combination-of the three types of VPN NAT, including VPN NAT type a outbound source IP NAT, VPN NAT type c inbound source IP NAT, and VPN NAT type d inbound destination IP NAT. This involves dynamically generating NAT rules and associating them with the manual or dynamically generated (IKE) Security Associations, before beginning IP security that uses the Security Associations. Then, as IP Sec is performed on outbound and inbound datagrams, the NAT function is also performed.Type: GrantFiled: January 29, 1999Date of Patent: September 2, 2003Assignee: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Publication number: 20030149899Abstract: IP security is provided in a virtual private network using network address translation (NAT) by performing one or a combination of the three types of VPN NAT, including VPN NAT type a outbound source IP NAT, VPN NAT type c inbound source IP NAT, and VPN NAT type d inbound destination IP NAT. This involves dynamically generating NAT rules and associating them with the manual or dynamically generated (IKE) Security Associations, before beginning IP security that uses the Security Associations. Then, as IP Sec is performed on outbound and inbound datagrams, the NAT function is also performed.Type: ApplicationFiled: March 12, 2003Publication date: August 7, 2003Applicant: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Publication number: 20020136210Abstract: A communication network includes a plurality of nodes, selectively including a client, a remote gateway Internet service provider, the Internet, a local enterprise gateway, and an enterprise internal network. A local coincident endpoint is established at the local gateway for an outer connection with a remote node and an inner connection with the same or a different remote node. Nested traffic received at the gateway on the outer connection is decapsulated and then source-in NATed. Traffic received at the gateway for transmission on the outer connection is first source-in NATed, and then encapsulated for communication on the outer connection.Type: ApplicationFiled: March 21, 2001Publication date: September 26, 2002Applicant: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Publication number: 20020138623Abstract: A communication network includes a plurality of nodes, selectively including a client, a remote gateway Internet service provider, the Internet, a local enterprise gateway, and an enterprise internal network. A local coincident endpoint is established at a first node for an outer connection with a remote node and an inner connection with a different remote node. The nodes participate in negotiations on the outer connection to set up the inner connection as a secure connection. Thereafter, responsive to communications on the inner connection, the first node establishes links to the outer connection selectively to receive or send communications double nested on the outer connection.Type: ApplicationFiled: March 21, 2001Publication date: September 26, 2002Applicant: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber
-
Publication number: 20020032778Abstract: Communications between peer nodes interconnected over a single line in a point-to-point dial up network. During an a job initialization phase, a dial-on-demand (DOD) job which includes a data queue is registered, a DOD interface created, a modem initialized to answer calls, and the DOD job is waited on the data queue. During an originate session phase responsive to a start session request, a data packet for communication to a dedicated remote peer is received and loaded into the data queue; the modem dials the remote node and a connection is activated over which the data packet is transferred to the remote node. During a session end phase, the connection is deactivated; the modem is initialized to answer calls; and the DOD job waited on the data queue for an incoming call or a start session request.Type: ApplicationFiled: August 31, 1998Publication date: March 14, 2002Inventors: MARK C. BULLOCK, GLENN W. DAVIS, FRANKLIN A. GRUBER
-
Patent number: 6330562Abstract: A data model for abstracting customer-defined VPN security policy information. By employing this model, a VPN node (computer system existing in a Virtual Private Network) can gather policy configuration information for itself through a GUY, or some distributed policy source, store this information in a system-defined database, and use this information to dynamically negotiate, create, delete, and maintain secure connections at the IP level with other VPN nodes.Type: GrantFiled: January 29, 1999Date of Patent: December 11, 2001Assignee: International Business Machines CorporationInventors: Edward B. Boden, Franklin A. Gruber, Mark J. Melville, Frank V. Paxhia, Michael D. Williams