Patents by Inventor John McHale

John McHale has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8200526
    Abstract: A system for compiling and presenting data collection instruments associated with a plurality of stakeholder relationship causality models, managing data collection processes, conducting statistical tests, variable analytics and impacts calculations, and generating action plans and reports associated with a plurality of stakeholder experiences, stakeholder attitudes and stakeholder behavioral intentions for use in assessing the state of stakeholder relationships and planning for performance optimization, the system comprising: a) a user interface software module, b) a stakeholder model library, c) a variables database, d) a stakeholder profile database, e) an action plan library, f) a reports library, g) a language conversion engine, h) a stakeholder survey software module, i) a variable analytics software module, j) an impact calculation software module, k) an action plan generation software module, and l) a report generation software module.
    Type: Grant
    Filed: January 15, 2010
    Date of Patent: June 12, 2012
    Inventor: Raymond John McHale
  • Publication number: 20110173049
    Abstract: A system for compiling and presenting data collection instruments associated with a plurality of stakeholder relationship causality models, managing data collection processes, conducting statistical tests, variable analytics and impacts calculations, and generating action plans and reports associated with a plurality of stakeholder experiences, stakeholder attitudes and stakeholder behavioural intentions for use in assessing the state of stakeholder relationships and planning for performance optimisation, the system comprising: a) a user interface software module, b) a stakeholder model library, c) a variables database, d) a stakeholder profile database, e) an action plan library, f) a reports library, g) a language conversion engine, h) a stakeholder survey software module, i) a variable analytics software module, j) an impact calculation software module, k) an action plan generation software module, and l) a report generation software module.
    Type: Application
    Filed: January 15, 2010
    Publication date: July 14, 2011
    Inventor: Raymond John McHale
  • Patent number: 7454499
    Abstract: An active network defense system is provided that is operable to monitor and block traffic in an automated fashion. This active network defense system is placed in-line with respect to the packet traffic data flow as a part of the network infrastructure. In this configuration, inspection and manipulation of every passing packet is possible. An algorithmic filtering operation applies statistical threshold filtering to the data flow in order to identify threats existing across multiple sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify threats existing within individual sessions. Threatening packet traffic is blocked and threatening sessions are terminated. Suspicious traffic is extracted from the data flow for further examination with more comprehensive content matching as well as asset risk analysis. A flow control mechanism is provided to control passage rate for packets passing through the data flow.
    Type: Grant
    Filed: November 7, 2002
    Date of Patent: November 18, 2008
    Assignee: Tippingpoint Technologies, Inc.
    Inventors: Craig Cantrell, Marc Willebeek-LeMair, Dennis Cox, John McHale, Brian Smith, Donovan Kolbly
  • Patent number: 7454792
    Abstract: An active network defense system is provided that is operable to monitor and block traffic in an automated fashion. This active network defense system is placed in-line with respect to the packet traffic data flow as a part of the network infrastructure. In this configuration, inspection and manipulation of every passing packet is possible. An algorithmic filtering operation applies statistical threshold filtering to the data flow in order to identify threats existing across multiple sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify threats existing within individual sessions. Threatening packet traffic is blocked and threatening sessions are terminated. Suspicious traffic is extracted from the data flow for further examination with more comprehensive content matching as well as asset risk analysis. A flow control mechanism is provided to control passage rate for packets passing through the data flow.
    Type: Grant
    Filed: August 31, 2004
    Date of Patent: November 18, 2008
    Assignee: TippingPoint Technologies, Inc.
    Inventors: Craig Cantrell, Marc Willebeek-Lemair, Dennis Cox, John McHale, Brian Smith, Donovan Kolbly
  • Patent number: 7451489
    Abstract: An active network defense system is provided that is operable to monitor and block traffic in an automated fashion. This active network defense system is placed in-line with respect to the packet traffic data flow as a part of the network infrastructure. In this configuration, inspection and manipulation of every passing packet is possible. An algorithmic filtering operation applies statistical threshold filtering to the data flow in order to identify threats existing across multiple sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify threats existing within individual sessions. Threatening packet traffic is blocked and threatening sessions are terminated. Suspicious traffic is extracted from the data flow for further examination with more comprehensive content matching as well as asset risk analysis. A flow control mechanism is provided to control passage rate for packets passing through the data flow.
    Type: Grant
    Filed: August 31, 2004
    Date of Patent: November 11, 2008
    Assignee: TippingPoint Technologies, Inc.
    Inventors: Craig Cantrell, Marc Willebeek-Lemair, Dennis Cox, John McHale, Brian Smith, Donovan Kolbly
  • Patent number: 7359962
    Abstract: A network discovery functionality, intrusion detector functionality and firewalling functionality are integrated together to form a network security system presenting a self-deploying and self-hardening security defense for a network.
    Type: Grant
    Filed: April 30, 2002
    Date of Patent: April 15, 2008
    Assignee: 3Com Corporation
    Inventors: Marc Willebeek-LeMair, Craig Cantrell, Dennis Cox, John McHale, Brian Smith
  • Publication number: 20050141563
    Abstract: A communication system (500) includes a plurality of subscriber systems (510) coupled to a plurality of twisted pair data lines (520). Each subscriber system (510) has an availability guarantee value, which may specify a level of service for the subscriber system (510). A communication server (502) is coupled to the plurality of subscriber systems (510). The communication server (502) selectively couples a subscriber system (510), responsive to a request for service, to either a first modem pool (530) or a second modem pool (540) based on the availability guarantee value associated with the subscriber system (510). Communication server (502) can also provide a soft-termination state and dynamic network address allocation for subscriber systems (510).
    Type: Application
    Filed: February 16, 2005
    Publication date: June 30, 2005
    Inventors: John McHale, Robert Locklear, Robert Burke
  • Publication number: 20050044422
    Abstract: An active network defense system is provided that is operable to monitor and block traffic in an automated fashion. This active network defense system is placed in-line with respect to the packet traffic data flow as a part of the network infrastructure. In this configuration, inspection and manipulation of every passing packet is possible. An algorithmic filtering operation applies statistical threshold filtering to the data flow in order to identify threats existing across multiple sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify threats existing within individual sessions. Threatening packet traffic is blocked and threatening sessions are terminated. Suspicious traffic is extracted from the data flow for further examination with more comprehensive content matching as well as asset risk analysis. A flow control mechanism is provided to control passage rate for packets passing through the data flow.
    Type: Application
    Filed: August 31, 2004
    Publication date: February 24, 2005
    Inventors: Craig Cantrell, Marc Willebeek-Lemair, Dennis Cox, John McHale, Brian Smith, Donovan Kolbly
  • Publication number: 20050028013
    Abstract: An active network defense system is provided that is operable to monitor and block traffic in an automated fashion. This active network defense system is placed in-line with respect to the packet traffic data flow as a part of the network infrastructure. In this configuration, inspection and manipulation of every passing packet is possible. An algorithmic filtering operation applies statistical threshold filtering to the data flow in order to identify threats existing across multiple sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify threats existing within individual sessions. Threatening packet traffic is blocked and threatening sessions are terminated. Suspicious traffic is extracted from the data flow for further examination with more comprehensive content matching as well as asset risk analysis. A flow control mechanism is provided to control passage rate for packets passing through the data flow.
    Type: Application
    Filed: August 31, 2004
    Publication date: February 3, 2005
    Inventors: Craig Cantrell, Marc Willebeek-LeMair, Dennis Cox, John McHale, Brian Smith, Donovan Kolbly
  • Publication number: 20040093513
    Abstract: An active network defense system is provided that is operable to monitor and block traffic in an automated fashion. This active network defense system is placed in-line with respect to the packet traffic data flow as a part of the network infrastructure. In this configuration, inspection and manipulation of every passing packet is possible. An algorithmic filtering operation applies statistical threshold filtering to the data flow in order to identify threats existing across multiple sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify threats existing within individual sessions. Threatening packet traffic is blocked and threatening sessions are terminated. Suspicious traffic is extracted from the data flow for further examination with more comprehensive content matching as well as asset risk analysis. A flow control mechanism is provided to control passage rate for packets passing through the data flow.
    Type: Application
    Filed: November 7, 2002
    Publication date: May 13, 2004
    Applicant: TippingPoint Technologies, Inc.
    Inventors: Craig Cantrell, Marc Willebeek-LeMair, Dennis Cox, John McHale, Brian Smith, Donovan Kolbly
  • Publication number: 20030204632
    Abstract: A network discovery functionality, intrusion detector functionality and firewalling functionality are integrated together to form a network security system presenting a self-deploying and self-hardening security defense for a network.
    Type: Application
    Filed: April 30, 2002
    Publication date: October 30, 2003
    Applicant: TippingPoint Technologies, Inc.
    Inventors: Marc Willebeek-LeMair, Craig Cantrell, Dennis Cox, John McHale, Brian Smith