Patents by Inventor Guido Appenzeller

Guido Appenzeller has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10142160
    Abstract: A controller may fulfill hardware address requests that are sent by source end hosts in a network to discover hardware addresses of destination end hosts. The controller may use network topology information to determine how to process the hardware address requests. The controller may retrieve a requested hardware address from a database of end hosts. If the controller is able to retrieve the hardware address of a destination end host from the database of end hosts, the controller may provide the source end host with a reply packet that contains the requested hardware address. If the controller is unable to retrieve the requested hardware address, the controller may form request packets to discover the address of the second end host and/or to discover a packet forwarding path between the source end host and the destination end host.
    Type: Grant
    Filed: October 4, 2011
    Date of Patent: November 27, 2018
    Assignee: Big Switch Networks, Inc.
    Inventors: Robert Edward Adams, Daniel E. Talayco, Mandeep Singh Dhami, Shudong Zhou, Kanzhe Jiang, Guido Appenzeller
  • Patent number: 9749301
    Abstract: A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web services interface such as a simple object access protocol interface on the program computing equipment makes a corresponding remote cryptographic function call to a web services interface such as a simple object access protocol interface at a cryptographic web service over a communications network such as the internet. At the cryptographic web service, a cryptographic engine implements cryptographic operations such as encryption and decryption operations. After successful authentication of the calling program, the cryptographic engine produces results for the remotely cryptographic function and returns the results to the program over the communications network.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: August 29, 2017
    Assignee: Voltage Security, Inc.
    Inventors: Robert K. Vaterlaus, Matthew J. Pauker, Guido Appenzeller
  • Patent number: 9654380
    Abstract: A controller may control client switches in a network including client and non-client switches. The controller may maintain a link discovery table including entries that identify links between client switches. The controller may classify the links as direct or broadcast links. To classify links of the link discovery cable, the controller may direct client switches to send broadcast and directed discovery packets from switch ports. Client switches that receive the discovery packets from other client switches may forward the discovery packets to the controller. The controller may use the discovery packets to classify the links of the link discovery table. The controller may classify ports as broadcast or regular ports based on the classified links. Non-client broadcast domains of the network topology may be identified from the broadcast ports using the broadcast and direct links of the link discovery table.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: May 16, 2017
    Assignee: Big Switch Networks, Inc.
    Inventors: Srinivasan Ramasubramanian, Shudong Zhou, Daniel C. Hersey, Guido Appenzeller, Mandeep Singh Dhami
  • Patent number: 9413614
    Abstract: A controller may control client switches in a network including client and non-client switches. The controller may maintain a link discovery table including entries that identify links between client switches. The controller may classify the links as direct or broadcast links. To classify links of the link discovery table, the controller may direct client switches to send broadcast and directed discovery packets from switch ports. Client switches that receive the discovery packets from other client switches may forward the discovery packets to the controller. The controller may use the discovery packets to classify the links of the link discovery table. The controller may classify ports as broadcast or regular ports based on the classified links. Non-client broadcast domains of the network topology may be identified from the broadcast ports using the broadcast and direct links of the link discovery table.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: August 9, 2016
    Assignee: Big Switch Networks, Inc.
    Inventors: Srinivasan Ramasubramanian, Shudong Zhou, Daniel C. Hersey, Guido Appenzeller, Mandeep Singh Dhami
  • Patent number: 9374285
    Abstract: A controller may control client switches in a network including client and non-client switches. The controller may maintain a link discovery table including entries that identify links between client switches. The controller may classify the links as direct or broadcast links. To classify links of the link discovery table, the controller may direct client switches to send broadcast and directed discovery packets from switch ports. Client switches that receive the discovery packets from other client switches may forward the discovery packets to the controller. The controller may use the discovery packets to classify the links of the link discovery table. The controller may classify ports as broadcast or regular ports based on the classified links. Non-client broadcast domains of the network topology may be identified from the broadcast ports using the broadcast and direct links of the link discovery table.
    Type: Grant
    Filed: February 7, 2013
    Date of Patent: June 21, 2016
    Assignee: Big Switch Networks, Inc.
    Inventors: Srinivasan Ramasubramanian, Shudong Zhou, Daniel C. Hersey, Guido Appenzeller, Mandeep Singh Dhami
  • Publication number: 20150381585
    Abstract: A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web services interface such as a simple object access protocol interface on the program computing equipment makes a corresponding remote cryptographic function call to a web services interface such as a simple object access protocol interface at a cryptographic web service over a communications network such as the internet. At the cryptographic web service, a cryptographic engine implements cryptographic operations such as encryption and decryption operations. After successful authentication of the calling program, the cryptographic engine produces results for the remotely cryptographic function and returns the results to the program over the communications network.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventors: Robert K. Vaterlaus, Matthew J. Pauker, Guido Appenzeller
  • Patent number: 9185056
    Abstract: A network may include network switches with network switch ports that may be coupled to end hosts. The network switches may be controlled by a controller such as a controller server. Virtual switches may be formed using the controller from groups of the network switch ports and the end hosts. Each virtual switch may include virtual interfaces associated with end hosts or network switches. Virtual links may be formed that define network connections between the virtual interfaces and end hosts or between two virtual interfaces. Virtual network policies such as selective packet forwarding, packet dropping, packet redirection, packet modification, or packet logging may be implemented at selected virtual interfaces to control traffic through the communications network. The controller may translate the virtual network policies into network switch forwarding paths that satisfy the virtual network policies.
    Type: Grant
    Filed: September 20, 2011
    Date of Patent: November 10, 2015
    Assignee: Big Switch Networks, Inc.
    Inventors: Robert Edward Adams, Mandeep Singh Dhami, Daniel E. Talayco, Guido Appenzeller, R. Kyle Forster
  • Patent number: 9130870
    Abstract: A network may include switches that have controller clients that are controlled from one or more controller servers. Clusters of the switches that have the controller clients may be isolated from other clusters by switches without the controller clients. The controller server may use graph searches to identify the clusters. The controller server may use information on the cluster topology of switches containing controller clients along with information in per-switch forwarding databases to generate per-cluster forwarding databases. The controller server may use the per-cluster forwarding databases in generating flow tables for the network switches that direct the switches to forward packets along desired paths through the network.
    Type: Grant
    Filed: April 15, 2011
    Date of Patent: September 8, 2015
    Assignee: Big Switch Networks, Inc.
    Inventors: Edward R. Swierk, Guido Appenzeller
  • Patent number: 9001827
    Abstract: Network switches may be configured using flow tables. Flow table entries may contain header fields and associated actions. When a packet is received by a network switch, the network switch can compare fields in the packet to fields in the flow table entries and can take corresponding actions when matches are detected. A controller server can determine the topology of a network and can gather information on the capacities of network switches and other network switch capabilities. Based on this information and network configuration rules, the controller server can generate flow tables for the network switches that direct the switches to forward packets along desired paths through the network. The flow table entries for switches that are nearer the network core can be provided with more wildcarding than switches nearer the network edge. Traffic can be forwarded through encapsulation and deencapsulation engines to allow tunneling between isolated network domains.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: April 7, 2015
    Assignee: Big Switch Networks, Inc.
    Inventor: Guido Appenzeller
  • Patent number: 8996485
    Abstract: A user who is browsing the web may use a web site verification service to ascertain whether a web site that appears to be associated with a trusted entity is actually associated with that entity. The web site verification service retains the URL of an unauthenticated web site. The user types a text string naming the entity that the user believes should be associated with the web site into a text box. A database such as an internet search engine database or a database containing a list of trusted entities and their URLs may be queried using the user-supplied text string. The retained URL may be compared to the resulting list of URLs. If the retained URL does not match one of the URLs in the query results, the user may be warned that the web site does not appear to be associated with the trusted entity.
    Type: Grant
    Filed: March 21, 2005
    Date of Patent: March 31, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Sathvik Krishnamurthy, Guido Appenzeller, Matthew J. Pauker, Lucas C. Ryan, Terence Spies
  • Patent number: 8756289
    Abstract: Systems and methods are provided for using digital signatures to help distinguish legitimate email from known or trusted organizations from unsolicited email or forged email. Digital signatures may be used in an email body, mail header, or embedded links. The signatures may be verified by a recipient or internet service provider and may be used in conjunction with spam filtering applications.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: June 17, 2014
    Assignee: Voltage Security, Inc.
    Inventors: Guido Appenzeller, Timothy Y. Choi, Matthew J. Pauker
  • Patent number: 8627084
    Abstract: A system is provided that uses cryptographic techniques to support secure messaging between senders and recipients. A sender may encrypt a message for a recipient using the recipient's public key. The sender may send the encrypted message to the message address of a given recipient. A server may be used to decrypt the encrypted message for the recipient, so that the recipient need not install a decryption engine on the recipient's equipment.
    Type: Grant
    Filed: October 23, 2012
    Date of Patent: January 7, 2014
    Assignee: Voltage Security, Inc.
    Inventors: Matthew J. Pauker, Terence Spies, Rishi Kacker, Guido Appenzeller
  • Patent number: 8429232
    Abstract: Systems and methods are provided for using digital signatures to help distinguish legitimate email from known or trusted organizations from unsolicited email or forged email. Digital signatures may be used in an email body, mail header, or embedded links. The signatures may be verified by a recipient or internet service provider and may be used in conjunction with spam filtering applications.
    Type: Grant
    Filed: September 28, 2004
    Date of Patent: April 23, 2013
    Assignee: Voltage Security, Inc.
    Inventors: Guido Appenzeller, Timothy Y. Choi, Matthew J. Pauker
  • Patent number: 8416796
    Abstract: Network switches that are controlled by a controller server may contain ports through which network packets are received and forwarded. An architect may configure the controller server to create virtual switches. Each virtual switch may be formed from a subset of the ports of the network switches. The architect may assign administrators to the virtual switches. The administrators may configure the virtual switches. An administrator may use a command line interface to configure a virtual switch. The administrator may use commands such as a show port command, an access list command, a show access list command, and a membership rule command to manage the virtual switch. The controller server may prevent the administrator from logging on to virtual switches that have been assigned to other administrators.
    Type: Grant
    Filed: May 6, 2011
    Date of Patent: April 9, 2013
    Assignee: Big Switch Networks, Inc.
    Inventors: R. Kyle Forster, Omar Baldonado, Robert K. Vaterlaus, Guido Appenzeller
  • Publication number: 20130070762
    Abstract: A network may include network switches with network switch ports that may be coupled to end hosts. The network switches may be controlled by a controller such as a controller server. Virtual switches may be formed using the controller from groups of the network switch ports and the end hosts. Each virtual switch may include virtual interfaces associated with end hosts or network switches. Virtual links may be formed that define network connections between the virtual interfaces and end hosts or between two virtual interfaces. Virtual network policies such as selective packet forwarding, packet dropping, packet redirection, packet modification, or packet logging may be implemented at selected virtual interfaces to control traffic through the communications network. The controller may translate the virtual network policies into network switch forwarding paths that satisfy the virtual network policies.
    Type: Application
    Filed: September 20, 2011
    Publication date: March 21, 2013
    Inventors: Robert Edward Adams, Mandeep Singh Dhami, Daniel E. Talayco, Guido Appenzeller, R. Kyle Forster
  • Patent number: 8353023
    Abstract: Systems and methods for managing email are provided. Some of the email may be encrypted using identity-based-encryption (IBE) techniques. When an incoming IBE-encrypted message for a recipient in an organization is received by a gateway at the organization, the gateway may request an IBE private key from an IBE private key generator. The IBE private key generator may generate the requested IBE private key for the gateway. The gateway may use an IBE decryption engine to decrypt the incoming message. The decrypted message can be scanned for viruses and spam and delivered to the recipient. Outgoing email messages can also be processed. If indicated by message attributes or information provided by a message sender, an outgoing message can be encrypted using an IBE encryption engine and the IBE public key of a desired recipient.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: January 8, 2013
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Guido Appenzeller
  • Publication number: 20120281698
    Abstract: Network switches that are controlled by a controller server may contain ports through which network packets are received and forwarded. An architect may configure the controller server to create virtual switches. Each virtual switch may be formed from a subset of the ports of the network switches. The architect may assign administrators to the virtual switches. The administrators may configure the virtual switches. An administrator may use a command line interface to configure a virtual switch. The administrator may use commands such as a show port command, an access list command, a show access list command, and a membership rule command to manage the virtual switch. The controller server may prevent the administrator from logging on to virtual switches that have been assigned to other administrators.
    Type: Application
    Filed: May 6, 2011
    Publication date: November 8, 2012
    Inventors: R. Kyle Forster, Omar Baldonado, Robert K. Vaterlaus, Guido Appenzeller
  • Patent number: 8301889
    Abstract: A system is provided that uses cryptographic techniques to support secure messaging between senders and recipients. A sender may encrypt a message for a recipient using the recipient's public key. The sender may send the encrypted message to the message address of a given recipient. A server may be used to decrypt the encrypted message for the recipient, so that the recipient need not install a decryption engine on the recipient's equipment.
    Type: Grant
    Filed: March 3, 2011
    Date of Patent: October 30, 2012
    Assignee: Voltage Security, Inc.
    Inventors: Matthew J. Pauker, Terence Spies, Rishi R. Kacker, Guido Appenzeller
  • Publication number: 20120155467
    Abstract: Network switches may be configured using flow tables. Flow table entries may contain header fields and associated actions. When a packet is received by a network switch, the network switch can compare fields in the packet to fields in the flow table entries and can take corresponding actions when matches are detected. A controller server can determine the topology of a network and can gather information on the capacities of network switches and other network switch capabilities. Based on this information and network configuration rules, the controller server can generate flow tables for the network switches that direct the switches to forward packets along desired paths through the network. The flow table entries for switches that are nearer the network core can be provided with more wildcarding than switches nearer the network edge. Traffic can be forwarded through encapsulation and deencapsulation engines to allow tunneling between isolated network domains.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Inventor: Guido Appenzeller
  • Patent number: 8171563
    Abstract: Systems and methods for secure messaging are provided. A sender may encrypt content and send the encrypted content to a recipient over a communications network. The encrypted content may be decrypted for the recipient using a remote decryption service. Encrypted message content may be placed into a markup language form. Encrypted content may be incorporated into the form as a hidden form element. Form elements for collecting recipient credential information such as username and password information may also be incorporated into the form. At the recipient, the recipient may use the form to provide recipient credential information to the remote decryption service. The recipient may also use the form to upload the encrypted content from the form to the decryption service. The decryption service may provide the recipient with access to a decrypted version of the uploaded content over the communications network.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: May 1, 2012
    Assignee: Voltage Security, Inc.
    Inventors: Matthew J. Pauker, Rishi R. Kacker, Terence Spies, Lucas C. Ryan, Guido Appenzeller