Patents by Inventor Kenneth B. Urquhart

Kenneth B. Urquhart has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240031455
    Abstract: The present disclosure relates to systems and methods for in-transit protocol translation. Specifically, various approaches are described for translating protocols for intermediate networks in a way by which there is no need of support for encapsulation/decapsulation at the end hosts and does not require any changes to end hosts or transit networks. Various embodiments include intercepting traffic between one or more source client devices and a transit network; detecting a first communication protocol used by the one or more source client devices in the traffic; translating the traffic from the first communication protocol to a second communication protocol; and forwarding the traffic to the transit network using the second communication protocol.
    Type: Application
    Filed: August 8, 2023
    Publication date: January 25, 2024
    Inventors: Arvind Nadendla, Kartik Kumar Chatnalli Deshpande Sridhar, Subramanian Srinivasan, Vipin Kumar, Kenneth B. Urquhart, Nathan Howe
  • Publication number: 20230422086
    Abstract: A method implemented via a cloud-based system for network slicing in a 5G network includes connecting with a device that connects to the 5G network, wherein the cloud-based system includes a plurality of nodes interconnected to one another and including one or more nodes integrated in a user plane of the 5G network; inline monitoring traffic between the device and destinations including any of the Internet, cloud services, private applications, edge compute, Multiaccess Edge Compute (MEC), public/private data centers, and public/private clouds; and enforcing bandwidth control, in the 5G network, to a defined Quality of Service for a slice associated with the device.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 28, 2023
    Inventors: Kartik Kumar Chatnalli Deshpande Sridhar, Arvind Nadendla, Kenneth B. Urquhart, Subramanian Srinivasan
  • Patent number: 11765593
    Abstract: A Multi-Access Edge Compute (MEC) system includes a plurality of compute resources including one or more processors configured to implement services; wherein the services include any of edge services, routing functions, and hosted services; and wherein the services further include cloud-based security services implemented in the MEC in conjunction with a cloud-based security system that includes a plurality of nodes and offers multi-tenant cloud-based security services, and wherein the cloud-based security services implemented in the MEC are for subscribers of a service provider associated with the MEC.
    Type: Grant
    Filed: July 9, 2021
    Date of Patent: September 19, 2023
    Assignee: Zscaler, Inc.
    Inventors: Nathan Howe, Kenneth B. Urquhart
  • Publication number: 20220286860
    Abstract: A Multi-Access Edge Compute (MEC) system includes a plurality of compute resources including one or more processors configured to implement services; wherein the services include any of edge services, routing functions, and hosted services; and wherein the services further include cloud-based security services implemented in the MEC in conjunction with a cloud-based security system that includes a plurality of nodes and offers multi-tenant cloud-based security services, and wherein the cloud-based security services implemented in the MEC are for subscribers of a service provider associated with the MEC.
    Type: Application
    Filed: July 9, 2021
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart
  • Publication number: 20220286894
    Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
  • Publication number: 20220286428
    Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for compute resources from User Equipment (UE); validating a user of the UE for the compute resources; responsive to the user being authorized, creating a connection between the UE and a destination of the compute resources; responsive to the user being unauthorized, rendering the compute resources as hidden from the UE. The steps can include utilizing a cloud-based system for control and signaling the connection.
    Type: Application
    Filed: October 1, 2021
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart
  • Publication number: 20220286912
    Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
  • Publication number: 20220286429
    Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE) via a Radio Access Network (RAN); determining a path to the workload; creating a tunnel to the workload; and steering the request to the workload via the tunnel that is independent of any underlying mobile network for the RAN. The tunnel can be encrypted and used on a per-application and per-session basis.
    Type: Application
    Filed: October 1, 2021
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart
  • Publication number: 20220286854
    Abstract: The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
  • Publication number: 20220286911
    Abstract: Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE); determining a type of traffic for the workflow and querying a machine learning engine based on the traffic type; informing the UE of how the workflow should be accessed; and receiving an updated request for the workflow and steering the traffic based on how the workflow should be steered. The steps can include receiving policy updates from a cloud-based system, related to how workloads should be steered.
    Type: Application
    Filed: October 1, 2021
    Publication date: September 8, 2022
    Inventors: Nathan Howe, Kenneth B. Urquhart
  • Patent number: 7386834
    Abstract: An editor or software engineering tool may be configured to represent program code as a doubly-linked list of lexical tokens and to maintain, coincident with an operation that modifies contents of the list, an undo object that identifies opposing end nodes of a sublist of one or more lexical tokens corresponding to a substring that is either inserted into or removed from the list by the operation. In this way, lexical tokens corresponding to an inserted substring can be readily and efficiently excised to restore a pre-insertion tokenized list state. Similarly, lexical tokens corresponding to a removed substring can be readily and efficiently reinstated to restore a pre-deletion tokenized list state. Advantageously, undo support once employed to restore a prior tokenized list state is symmetrically available to support redo operations.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: June 10, 2008
    Assignee: Sun Microsystems, Inc.
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart
  • Publication number: 20040225997
    Abstract: An editor, software engineering tool or collection of such tools may be configured to encode (or employ an encoding of) an insertion point representation that identifies a particular token of a token-oriented representation and offset thereinto, together with at least some line-oriented coordinates. Efficient implementations of insert and remove operations that employ such a representation are described herein. Computational costs of such operations typically scale at worst with the size of fragments inserted into and/or removed from such a token-oriented representation, rather than with buffer size. Accordingly, such implementations are particularly well-suited to providing efficient support for programming tool environments in which a token stream is updated incrementally in correspondence with user edits.
    Type: Application
    Filed: May 6, 2003
    Publication date: November 11, 2004
    Applicant: Sun Microsystems, Inc.
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart
  • Publication number: 20040225998
    Abstract: An editor, software engineering tool or collection of such tools may be configured to encode (or employ an encoding of) an insertion point representation that identifies a particular token of a token-oriented representation and offset thereinto, together with at least some line-oriented coordinates. Such a tool (or tools) may be further configured to maintain, coincident with an operation that modifies contents of the token-oriented representation, an undo object that identifies pre-modification line demarcation state. Often, the pre-modification state also includes both a token coordinates and a line-coordinates representation of the insertion point and storage of pre-modification state in, or in association with, the undo object facilitates efficient implementation of a undo operation, e.g., generally without recomputation of a coordinate representation or line demarcation state, which would otherwise scale with buffer size.
    Type: Application
    Filed: May 6, 2003
    Publication date: November 11, 2004
    Applicant: Sun Microsystems, Inc.
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart
  • Publication number: 20040006763
    Abstract: An editor or other software engineering tool may be configured to represent program code as an ordered set of lexical tokens and to maintain, coincident with an operation that modifies contents of the set, an undo object that identifies a pre-modification state of an insertion point. Often, the pre-modification state includes both a token coordinates and a character coordinates representation of the insertion point and storage of pre-modification state in, or in association with, the undo object facilitates efficient implementation of a undo operation, e.g., generally without recomputation of a coordinate representation that would otherwise scale with buffer size. In this way, lexical tokens corresponding to an inserted substring can be readily and efficiently excised to restore a pre-insertion tokenized list and insertion point state. Similarly, lexical tokens corresponding to a removed substring can be readily and efficiently reinstated to restore a pre-deletion tokenized list and insertion point state.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 8, 2004
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart
  • Publication number: 20040006764
    Abstract: An editor or software engineering tool may be configured to represent program code as a doubly-linked list of lexical tokens and to maintain, coincident with an operation that modifies contents of the list, an undo object that identifies opposing end nodes of a sublist of one or more lexical tokens corresponding to a substring that is either inserted into or removed from the list by the operation. In this way, lexical tokens corresponding to an inserted substring can be readily and efficiently excised to restore a pre-insertion tokenized list state. Similarly, lexical tokens corresponding to a removed substring can be readily and efficiently reinstated to restore a pre-deletion tokenized list state. Advantageously, undo support once employed to restore a prior tokenized list state is symmetrically available to support redo operations.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 8, 2004
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart
  • Publication number: 20040003374
    Abstract: An editor, software engineering tool or collection of such tools may be configured to encode (or employ an encoding of) an insertion point in both token-coordinates and character-coordinates. Efficient implementations of insert, remove and replace operations that employ and maintain such a representation are described herein. Some realizations further maintain a total buffer size encoding consistent with each such operations. Computational costs of such operations typically scale at worst with the size of fragments inserted into and/or removed from such a token-oriented representation, rather than with buffer size. Accordingly, such implementations are particularly well-suited to providing efficient support for programming tool environments in which a token stream is updated incrementally in correspondence with user edits.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart
  • Publication number: 20040003373
    Abstract: An editor, software engineering tool or collection of such tools may be configured to encode (or employ an encoding of) an insertion point representation that identifies both a particular token of a token-oriented representation and a character offset thereinto. Efficient implementations of insert, remove and replace operations that employ such a representation are described herein. Computational costs of such operations typically scale at worst with the size of fragments inserted into and/or removed from such a token-oriented representation, rather than with buffer size. Accordingly, such implementations are particularly well-suited to providing efficient support for programming tool environments in which a token stream is updated incrementally in correspondence with user edits.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Michael L. Van De Vanter, Kenneth B. Urquhart