Patents by Inventor James Kleinsteiber

James Kleinsteiber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8621567
    Abstract: A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: December 31, 2013
    Assignee: Brocade Communications Systems, Inc.
    Inventors: James Kleinsteiber, Richard L. Hammons, Dilip Gunawardena, Hung Nguyen, Shankar Balasubramanian, Vidya Renganararayanan
  • Patent number: 7873984
    Abstract: A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fiber Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: January 18, 2011
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Richard L. Hammons, James Kleinsteiber, Hung Nguyen, Shankar Balasubramanian, Vidya Renganarayanan
  • Publication number: 20080072309
    Abstract: A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service.
    Type: Application
    Filed: September 24, 2007
    Publication date: March 20, 2008
    Applicant: BROCADE COMMUNICATIONS SYSTEMS, INC.
    Inventors: JAMES KLEINSTEIBER, Richard Hammons, Dilip Gunawardena, Hung Nguyen, Shankar Balasubramanian, Vidya Renganararayanan
  • Patent number: 7243367
    Abstract: A method and system for starting up a network or network device with particular discussion regarding Fibre Channel networks and switches. The method and system relate to powering on or re-starting a plurality of Fibre Channel switching devices, each of those devices having ports. The system generally calls for the selection of a priority threshold that relates to the importance of tasks in fabric formation. Some embodiments of the system exploit a port authentication procedure to separate the execution of tasks higher in priority than the threshold from tasks lower in priority than the threshold.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: July 10, 2007
    Assignee: Brocade Communications Systems, Inc.
    Inventors: James Kleinsteiber, Richard L. Hammons, Shankar Balasubramanian
  • Patent number: 7036013
    Abstract: A secure and distributed time service is discussed for use in a network. In particular, the invention relates to Fiber Channel networks and the secure distribution of time service using a push model. In order to distribute time on a push model, one entity assumes responsibility for time in the network. Other entities in the network receive periodic time updates and check the validity of their own time by gauging the elapsed time since the previous time update. The time service is secured using by applying a unique combination of encryption techniques.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: April 25, 2006
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Vidya Renganarayanan, Richard L. Hammons, James Kleinsteiber
  • Publication number: 20060080727
    Abstract: A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fibre Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
    Type: Application
    Filed: November 8, 2005
    Publication date: April 13, 2006
    Inventors: Richard Hammons, James Kleinsteiber, Hung Nguyen, Shankar Balasubramanian, Vidya Renganarayanan
  • Publication number: 20060064743
    Abstract: A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fibre Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
    Type: Application
    Filed: November 8, 2005
    Publication date: March 23, 2006
    Inventors: Richard Hammons, James Kleinsteiber, Hung Nguyen, Shankar Balasubramanian, Vidya Renganarayanan
  • Publication number: 20060059540
    Abstract: A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fibre Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
    Type: Application
    Filed: November 8, 2005
    Publication date: March 16, 2006
    Inventors: Richard Hammons, James Kleinsteiber, Hung Nguyen, Shankar Balasubramanian, Vidya Renganarayanan
  • Publication number: 20060005233
    Abstract: A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service.
    Type: Application
    Filed: August 5, 2005
    Publication date: January 5, 2006
    Applicant: Brocade Communications Systems, Inc.
    Inventors: James Kleinsteiber, Richard Hammons, Hung Nguyen, Shankar Balasubramanian, Vidya Renganararayanan
  • Publication number: 20050268091
    Abstract: A secure and distributed time service is discussed for use in a network. In particular, the invention relates to Fibre Channel networks and the secure distribution of time service using a push model. In order to distribute time on a push model, one entity assumes responsibility for time in the network. Other entities in the network receive periodic time updates and check the validity of their own time by gauging the elapsed time since the previous time update. The time service is secured using by applying a unique combination of encryption techniques.
    Type: Application
    Filed: June 3, 2005
    Publication date: December 1, 2005
    Applicant: Brocade Communications Systems
    Inventors: Vidya Renganarayanan, Richard Hammons, James Kleinsteiber
  • Publication number: 20030163727
    Abstract: A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fibre Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 28, 2003
    Applicant: Brocade Communications Systems, Inc.
    Inventors: Richard L. Hammons, James Kleinsteiber, Hung Nguyen, Shankar Balasubramanian, Vidya Renganarayanan
  • Publication number: 20030163682
    Abstract: A method and system for starting up a network or network device with particular discussion regarding Fibre Channel networks and switches. The method and system relate to powering on or re-starting a plurality of Fibre Channel switching devices, each of those devices having ports. The system generally calls for the selection of a priority threshold that relates to the importance of tasks in fabric formation. Some embodiments of the system exploit a port authentication procedure to separate the execution of tasks higher in priority than the threshold from tasks lower in priority than the threshold.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 28, 2003
    Applicant: Brocade Communications Systems, Inc.
    Inventors: James Kleinsteiber, Richard L. Hammons, Shankar Balasubramanian
  • Publication number: 20030163692
    Abstract: A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 28, 2003
    Applicant: Brocade Communications Systems, Inc.
    Inventors: James Kleinsteiber, Richard L. Hammons, Dilip Gunawardena, Hung Nguyen, Shankar Balasubramanian, Vidya Renganararayanan
  • Publication number: 20030158971
    Abstract: A secure and distributed time service is discussed for use in a network. In particular, the invention relates to Fibre Channel networks and the secure distribution of time service using a push model. In order to distribute time on a push model, one entity assumes responsibility for time in the network. Other entities in the network receive periodic time updates and check the validity of their own time by gauging the elapsed time since the previous time update. The time service is secured using by applying a unique combination of encryption techniques.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 21, 2003
    Applicant: Brocade Communications Systems, Inc.
    Inventors: Vidya Renganarayanan, Richard L. Hammons, James Kleinsteiber
  • Publication number: 20030120915
    Abstract: A method and system for authenticating devices in a network with particular discussion regarding Fibre Channel networks and switches. The method and system relate to mutual authentication between two connected ports. Generally, such two ports are connected by a medium dedicated exclusively to those ports. The method and system involve the exchange of authenticating information between the ports including host switch information, various encode or decode information, and secreting technique information such as encryption key information. Varying embodiments allow for full mutual authentication between two ports with a two, three or four phase exchange. Furthermore, by employing the authentication processes multiple times, full switching devices may be mutually authenticated.
    Type: Application
    Filed: January 31, 2002
    Publication date: June 26, 2003
    Applicant: Brocade Communications Systems, Inc.
    Inventors: James Kleinsteiber, Richard L. Hammons, Dilip Gunawardena, Shankar Balasubramanian