Patents by Inventor Jeffrey B. Cates

Jeffrey B. Cates has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8612602
    Abstract: A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.
    Type: Grant
    Filed: March 17, 2012
    Date of Patent: December 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
  • Patent number: 8606925
    Abstract: A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.
    Type: Grant
    Filed: April 4, 2011
    Date of Patent: December 10, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
  • Patent number: 8539548
    Abstract: A hierarchical administrative system centrally controls configuration of network security policy for a group of information handling systems (IHSs) by multiple tier levels of administration. The highest tier level of administration builds policies that fulfill IT security policy intent. Higher level administrators may scope subordinate administrators to a group of IHSs or a single IHS. Higher level administrators may allow subordinate administrators to perform system specific customization of the policy based on permissions that the higher level administrator grants. Customization may include completing partially-built rule conditions with IP address and port, completing partially-built rule actions, and adding or deleting rules based on IHS unique applications or security requirements. A security enforcement tool may enforce customizations of network security policy.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: September 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Linwood H. Overby, Jr., Kimberly T. Bailey, Jeffrey B. Cates, Mark T. Wright
  • Publication number: 20120254441
    Abstract: A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.
    Type: Application
    Filed: March 17, 2012
    Publication date: October 4, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
  • Publication number: 20120254438
    Abstract: A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.
    Type: Application
    Filed: April 4, 2011
    Publication date: October 4, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kimberly T. Bailey, Jeffrey B. Cates, Diane I. Shannon, Mark T. Wright
  • Patent number: 7895646
    Abstract: A self-adjusting Internet Key Exchange (IKE) daemon negotiation throttle minimizes retransmission processing during Security Association (SA) negotiation requests. The self-adjusting IKE daemon receives a request for a new negotiation to be performed by a negotiation system; determines if the negotiation system is in congestion; and if the negotiation system is determined to be in congestion: determines if a token is available in a token bucket; and if a token is available in the token bucket, removes the token from the token bucket; and performs the new negotiation.
    Type: Grant
    Filed: May 25, 2006
    Date of Patent: February 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey B. Cates, Wuchieh J. Jong, Scott C. Moonen, Keith J. Welter
  • Publication number: 20070277232
    Abstract: The present invention provides an Internet Key Exchange (IKE) daemon self-adjusting negotiation throttle for minimizing retransmission processing during Security Association (SA) negotiation requests. A method in accordance with an embodiment of the present invention includes: receiving a request for a new negotiation to be performed by a negotiation system; determining if the negotiation system is in congestion; and if the negotiation system is determined to be in congestion: determining if a token is available in a token bucket; and if a token is available in the token bucket, removing the token from the token bucket; and performing the new negotiation.
    Type: Application
    Filed: May 25, 2006
    Publication date: November 29, 2007
    Inventors: Jeffrey B. Cates, Wuchieh J. Jong, Scott C. Moonen, Keith J. Welter