Patents by Inventor John A. Roese
John A. Roese has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10887212Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.Type: GrantFiled: August 5, 2014Date of Patent: January 5, 2021Assignee: Extreme Networks, Inc.Inventors: David E. Frattura, Richard W. Graham, John Roese
-
Patent number: 10382279Abstract: A method, article of manufacture, and apparatus for creating dynamically composed compute nodes from disaggregated hardware components is discussed. These components may be dynamically allocated from resource pools to the compute nodes.Type: GrantFiled: June 30, 2014Date of Patent: August 13, 2019Inventors: John Roese, Kenneth Durazzo, Stephen Todd
-
Publication number: 20150381426Abstract: A method, article of manufacture, and apparatus for creating dynamically composed compute nodes from disaggregated hardware components is discussed. These components may be dynamically allocated from resource pools to the compute nodes.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: John Roese, Kenneth Durazzo, Stephen Todd
-
Publication number: 20150378706Abstract: A method, article of manufacture, and apparatus for installing software on disaggregated hardware components are discussed. The disaggregated components may be grouped into a dynamically composed compute node. The compute node may be presented as a virtual computer, and the software may be installed on that virtual computer.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: John Roese, Kenneth Durazzo, Stephen Todd
-
Publication number: 20150120916Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.Type: ApplicationFiled: August 5, 2014Publication date: April 30, 2015Inventors: David E. Frattura, Richard W. Graham, John Roese
-
Patent number: 8819213Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.Type: GrantFiled: August 19, 2005Date of Patent: August 26, 2014Assignee: Extreme Networks, Inc.Inventors: David E. Frattura, Richard W. Graham, John Roese
-
Patent number: 8239960Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.Type: GrantFiled: March 26, 2010Date of Patent: August 7, 2012Assignee: Enterasys Networks, Inc.Inventors: David E. Frattura, Richard W. Graham, John Roese
-
Patent number: 7945945Abstract: A method, computer readable medium, and system for acquiring address block information for an attached function that initiates network access on a distributed computing network. Additional policy information in acquired concerning the attached function. One or more access policies are set based, at least in part, on the address block information and the additional policy information.Type: GrantFiled: August 8, 2005Date of Patent: May 17, 2011Assignee: Enterasys Networks, Inc.Inventors: Richard Graham, John Roese
-
Patent number: 7936770Abstract: A method and apparatus are provided that allows for the representation of a larger number of classes of network traffic and logical queues than is physically available on a per port basis within a network device. A number of logical queues, whose number can match the number of classes of network traffic a network device handles, may be supported across an aggregated set of ports even though the network device has fewer physical queues per port than there are classes of network traffic. The method and apparatus improve the management of network traffic sensitive to time delay and jitter, and further facilitates the operation of these applications in a simultaneous or near simultaneous manner.Type: GrantFiled: March 8, 2006Date of Patent: May 3, 2011Assignee: Enterasys Networks, Inc.Inventors: David E. Frattura, Richard Graham, John Roese
-
Patent number: 7855972Abstract: The present invention provides a method and system for controlling usage of network resources on a communications network. The method comprising acts of: (a) creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition; and (b) creating one or more service abstractions associated with a user of the communication network, each service abstraction representing a named set of one or more of the packet rules. In some embodiments one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one or more packet rules, and possibly one or more service abstractions.Type: GrantFiled: February 8, 2002Date of Patent: December 21, 2010Assignee: Enterasys Networks, Inc.Inventors: Steven A. Pettit, John Roese, Paula Jane Dunigan, James Richmond
-
Publication number: 20100268933Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the minor destination point.Type: ApplicationFiled: March 26, 2010Publication date: October 21, 2010Applicant: Enterasys Networks, Inc.Inventors: David E. FRATTURA, Richard W. Graham, John Roese
-
Patent number: 7690040Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.Type: GrantFiled: March 8, 2005Date of Patent: March 30, 2010Assignee: Enterasys Networks, Inc.Inventors: David E. Frattura, Richard W. Graham, John Roese
-
Patent number: 7581249Abstract: A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies.Type: GrantFiled: November 14, 2003Date of Patent: August 25, 2009Assignee: Enterasys Networks, Inc.Inventors: Richard Bussiere, Mark Townsend, Steven Pettit, David Harrington, John Roese, Richard Graham
-
Publication number: 20060277187Abstract: A computer-implemented method and computer program product for providing data that includes location-based access control information concerning a data relay device located within a network infrastructure. The data relay device is loaded with one or more features, such that the one or more features loaded are dependent, at least in part, upon the location-based access control information.Type: ApplicationFiled: August 15, 2006Publication date: December 7, 2006Inventors: John Roese, Richard Graham, David Frattura, David Harrington
-
Publication number: 20060120671Abstract: A connector assembly, configured to releasably couple a socket assembly, includes zero or more data conductors. An optical pathway is configured to: receive an optical signal from an optical light source positioned within the socket assembly; and provide at least a portion of the optical signal to an optical light target positioned within the socket assembly.Type: ApplicationFiled: November 8, 2005Publication date: June 8, 2006Inventors: Richard Graham, John Roese
-
Publication number: 20060059163Abstract: The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination.Type: ApplicationFiled: August 19, 2005Publication date: March 16, 2006Applicant: Enterasys Networks, Inc.Inventors: David Frattura, Richard Graham, John Roese
-
Publication number: 20060048142Abstract: A system and method for rapidly responding to triggering events or activities in a network system. The system includes a policy enforcement function, a policy manager function, and one or more network devices of the network system. The policy enforcement function includes one or more installed policy sets and/or policy enforcement rule sets suitably responsive to triggering events or activities. Upon detection of a trigger, the policy manager function analyzes the trigger and selects one or more appropriate policy sets and/or policy enforcement rule sets deemed to be responsive to the trigger. Each set has a unique rapid response identifier. The policy manager function signals for implementation of the one or more policy and/or rule sets, based on one or more rapid response identifiers, which are enforced through the policy enforcement function. The policy enforcement function may be a part of one or more of the one or more network infrastructure devices for implementing the policy change.Type: ApplicationFiled: September 2, 2004Publication date: March 2, 2006Inventors: John Roese, Richard Graham, David Harrington, James Richmond
-
Publication number: 20060036730Abstract: A method, computer readable medium, and system for acquiring address block information for an attached function that initiates network access on a distributed computing network. Additional policy information in acquired concerning the attached function. One or more access policies are set based, at least in part, on the address block information and the additional policy information.Type: ApplicationFiled: August 8, 2005Publication date: February 16, 2006Inventors: Richard Graham, John Roese
-
Publication number: 20050278565Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.Type: ApplicationFiled: March 8, 2005Publication date: December 15, 2005Applicant: Enterasys Networks, Inc.Inventors: David Frattura, Richard Graham, John Roese
-
Publication number: 20050108568Abstract: A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies.Type: ApplicationFiled: November 14, 2003Publication date: May 19, 2005Applicant: Enterasys Networks, Inc.Inventors: Richard Bussiere, Mark Townsend, Steven Pettit, David Harrington, John Roese, Richard Graham