Patents by Inventor John A. Roese

John A. Roese has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10887212
    Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.
    Type: Grant
    Filed: August 5, 2014
    Date of Patent: January 5, 2021
    Assignee: Extreme Networks, Inc.
    Inventors: David E. Frattura, Richard W. Graham, John Roese
  • Patent number: 10382279
    Abstract: A method, article of manufacture, and apparatus for creating dynamically composed compute nodes from disaggregated hardware components is discussed. These components may be dynamically allocated from resource pools to the compute nodes.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: August 13, 2019
    Inventors: John Roese, Kenneth Durazzo, Stephen Todd
  • Publication number: 20150381426
    Abstract: A method, article of manufacture, and apparatus for creating dynamically composed compute nodes from disaggregated hardware components is discussed. These components may be dynamically allocated from resource pools to the compute nodes.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: John Roese, Kenneth Durazzo, Stephen Todd
  • Publication number: 20150378706
    Abstract: A method, article of manufacture, and apparatus for installing software on disaggregated hardware components are discussed. The disaggregated components may be grouped into a dynamically composed compute node. The compute node may be presented as a virtual computer, and the software may be installed on that virtual computer.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: John Roese, Kenneth Durazzo, Stephen Todd
  • Publication number: 20150120916
    Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.
    Type: Application
    Filed: August 5, 2014
    Publication date: April 30, 2015
    Inventors: David E. Frattura, Richard W. Graham, John Roese
  • Patent number: 8819213
    Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.
    Type: Grant
    Filed: August 19, 2005
    Date of Patent: August 26, 2014
    Assignee: Extreme Networks, Inc.
    Inventors: David E. Frattura, Richard W. Graham, John Roese
  • Patent number: 8239960
    Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: August 7, 2012
    Assignee: Enterasys Networks, Inc.
    Inventors: David E. Frattura, Richard W. Graham, John Roese
  • Patent number: 7945945
    Abstract: A method, computer readable medium, and system for acquiring address block information for an attached function that initiates network access on a distributed computing network. Additional policy information in acquired concerning the attached function. One or more access policies are set based, at least in part, on the address block information and the additional policy information.
    Type: Grant
    Filed: August 8, 2005
    Date of Patent: May 17, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: Richard Graham, John Roese
  • Patent number: 7936770
    Abstract: A method and apparatus are provided that allows for the representation of a larger number of classes of network traffic and logical queues than is physically available on a per port basis within a network device. A number of logical queues, whose number can match the number of classes of network traffic a network device handles, may be supported across an aggregated set of ports even though the network device has fewer physical queues per port than there are classes of network traffic. The method and apparatus improve the management of network traffic sensitive to time delay and jitter, and further facilitates the operation of these applications in a simultaneous or near simultaneous manner.
    Type: Grant
    Filed: March 8, 2006
    Date of Patent: May 3, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: David E. Frattura, Richard Graham, John Roese
  • Patent number: 7855972
    Abstract: The present invention provides a method and system for controlling usage of network resources on a communications network. The method comprising acts of: (a) creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition; and (b) creating one or more service abstractions associated with a user of the communication network, each service abstraction representing a named set of one or more of the packet rules. In some embodiments one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one or more packet rules, and possibly one or more service abstractions.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: December 21, 2010
    Assignee: Enterasys Networks, Inc.
    Inventors: Steven A. Pettit, John Roese, Paula Jane Dunigan, James Richmond
  • Publication number: 20100268933
    Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the minor destination point.
    Type: Application
    Filed: March 26, 2010
    Publication date: October 21, 2010
    Applicant: Enterasys Networks, Inc.
    Inventors: David E. FRATTURA, Richard W. Graham, John Roese
  • Patent number: 7690040
    Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.
    Type: Grant
    Filed: March 8, 2005
    Date of Patent: March 30, 2010
    Assignee: Enterasys Networks, Inc.
    Inventors: David E. Frattura, Richard W. Graham, John Roese
  • Patent number: 7581249
    Abstract: A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies.
    Type: Grant
    Filed: November 14, 2003
    Date of Patent: August 25, 2009
    Assignee: Enterasys Networks, Inc.
    Inventors: Richard Bussiere, Mark Townsend, Steven Pettit, David Harrington, John Roese, Richard Graham
  • Publication number: 20060277187
    Abstract: A computer-implemented method and computer program product for providing data that includes location-based access control information concerning a data relay device located within a network infrastructure. The data relay device is loaded with one or more features, such that the one or more features loaded are dependent, at least in part, upon the location-based access control information.
    Type: Application
    Filed: August 15, 2006
    Publication date: December 7, 2006
    Inventors: John Roese, Richard Graham, David Frattura, David Harrington
  • Publication number: 20060120671
    Abstract: A connector assembly, configured to releasably couple a socket assembly, includes zero or more data conductors. An optical pathway is configured to: receive an optical signal from an optical light source positioned within the socket assembly; and provide at least a portion of the optical signal to an optical light target positioned within the socket assembly.
    Type: Application
    Filed: November 8, 2005
    Publication date: June 8, 2006
    Inventors: Richard Graham, John Roese
  • Publication number: 20060059163
    Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.
    Type: Application
    Filed: August 19, 2005
    Publication date: March 16, 2006
    Applicant: Enterasys Networks, Inc.
    Inventors: David Frattura, Richard Graham, John Roese
  • Publication number: 20060048142
    Abstract: A system and method for rapidly responding to triggering events or activities in a network system. The system includes a policy enforcement function, a policy manager function, and one or more network devices of the network system. The policy enforcement function includes one or more installed policy sets and/or policy enforcement rule sets suitably responsive to triggering events or activities. Upon detection of a trigger, the policy manager function analyzes the trigger and selects one or more appropriate policy sets and/or policy enforcement rule sets deemed to be responsive to the trigger. Each set has a unique rapid response identifier. The policy manager function signals for implementation of the one or more policy and/or rule sets, based on one or more rapid response identifiers, which are enforced through the policy enforcement function. The policy enforcement function may be a part of one or more of the one or more network infrastructure devices for implementing the policy change.
    Type: Application
    Filed: September 2, 2004
    Publication date: March 2, 2006
    Inventors: John Roese, Richard Graham, David Harrington, James Richmond
  • Publication number: 20060036730
    Abstract: A method, computer readable medium, and system for acquiring address block information for an attached function that initiates network access on a distributed computing network. Additional policy information in acquired concerning the attached function. One or more access policies are set based, at least in part, on the address block information and the additional policy information.
    Type: Application
    Filed: August 8, 2005
    Publication date: February 16, 2006
    Inventors: Richard Graham, John Roese
  • Publication number: 20050278565
    Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.
    Type: Application
    Filed: March 8, 2005
    Publication date: December 15, 2005
    Applicant: Enterasys Networks, Inc.
    Inventors: David Frattura, Richard Graham, John Roese
  • Publication number: 20050108568
    Abstract: A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies.
    Type: Application
    Filed: November 14, 2003
    Publication date: May 19, 2005
    Applicant: Enterasys Networks, Inc.
    Inventors: Richard Bussiere, Mark Townsend, Steven Pettit, David Harrington, John Roese, Richard Graham