Patents by Inventor KEVIN PIAZZA
KEVIN PIAZZA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8996657Abstract: A proxy consolidates multiple TCP requests from clients into one TCP connection between a proxy and server. A persistent TCP connection is opened between the proxy and server, and a connection request is received from a client at the proxy. A unique identifier is registered for the client, and the server is signaled over the persistent connection to register the unique identifier. A client connection is established between the client and proxy responsive to the connection request. A content request is received from the client over the client connection. The unique identifier is prepended to the content request, the prepended content request is forwarded to the server, and prepended content is received from the server. The identifier and the content are extracted from the prepended content, and a client and a client connection are identified that correspond to the extracted identifier. The extracted content is returned to the corresponding client.Type: GrantFiled: August 18, 2011Date of Patent: March 31, 2015Assignee: Canon Kabushiki KaishaInventors: Basant Verma, Kevin Piazza, Weichin Lo Hsu
-
Patent number: 8965298Abstract: A method for establishing communication between a plurality of devices, including obtaining communication protocols that the plurality of devices support, determining which of the communication protocols are common to each the plurality of devices, determining operational parameters that are associated with each of the common communication protocols, indicating which of the common communication protocols and associated operational parameters can be used to establish communication between the plurality of devices, determining whether the plurality of devices can communicate with each other using the common communication protocols, and establishing communication between the plurality of devices using at least one of the common communication protocols.Type: GrantFiled: September 24, 2010Date of Patent: February 24, 2015Assignee: Canon Kabushiki KaishaInventors: Kevin Piazza, Don Hideyasu Matsubayashi, Hung Khei Huang, Dariusz Dusberger
-
Patent number: 8869291Abstract: A markup language document is generated and stored within a network, the network including a client, and one or more storage locations. A markup language document is generated, and policy information is accessed, wherein the policy information defines a content-filtering policy, a security policy and a storage location policy for the markup language document. A portion of the markup language document that is subject to security is determined, based on the content-filtering policy as defined in the policy information. A storage location is identified for storage of the markup language document from among the one or more storage locations, based on the storage location policy as defined in the policy information. Security is applied to the determined portion of the markup language document based on the security policy as defined in the policy information. The markup language document is stored on the identified storage location.Type: GrantFiled: April 8, 2011Date of Patent: October 21, 2014Assignee: Canon Kabushiki KaishaInventors: Yeongtau Louis Tsao, Kevin Piazza
-
Patent number: 8667574Abstract: Virtually extending the functionality of a network device to a server is provided. A virtual device which virtually represents functionality of the network device is created. An association is stored between the network device and a user or a group for the network device. A determination is made as to whether the network device and the user or the group for the network device correspond to a local network or to a disparate network, based on the stored association. A network address for the virtual device is assigned based on the determination. Functionality of the network device is accessed via the virtual device, using the assigned network address for the virtual device.Type: GrantFiled: May 10, 2010Date of Patent: March 4, 2014Assignee: Canon Kabushiki KaishaInventors: Kevin Piazza, Don Matsubayashi
-
Patent number: 8447977Abstract: The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token.Type: GrantFiled: December 9, 2008Date of Patent: May 21, 2013Assignee: Canon Kabushiki KaishaInventors: Royce Slick, Don Matsubayashi, Kevin Piazza, Dariusz Dusberger, Neil Iwamoto
-
Publication number: 20120260156Abstract: A markup language document is generated and stored within a network, the network including a client, and one or more storage locations. A markup language document is generated, and policy information is accessed, wherein the policy information defines a content-filtering policy, a security policy and a storage location policy for the markup language document. A portion of the markup language document that is subject to security is determined, based on the content-filtering policy as defined in the policy information. A storage location is identified for storage of the markup language document from among the one or more storage locations, based on the storage location policy as defined in the policy information. Security is applied to the determined portion of the markup language document based on the security policy as defined in the policy information. The markup language document is stored on the identified storage location.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: CANON KABUSHIKI KAISHAInventors: Yeongtau Louis Tsao, Kevin Piazza
-
Publication number: 20120077442Abstract: A method for establishing communication between a plurality of devices, including obtaining communication protocols that the plurality of devices support, determining which of the communication protocols are common to each the plurality of devices, determining operational parameters that are associated with each of the common communication protocols, indicating which of the common communication protocols and associated operational parameters can be used to establish communication between the plurality of devices, determining whether the plurality of devices can communicate with each other using the common communication protocols, and establishing communication between the plurality of devices using at least one of the common communication protocols.Type: ApplicationFiled: September 24, 2010Publication date: March 29, 2012Applicant: CANON KABUSHIKI KAISHAInventors: Kevin Piazza, Don Hideyasu Matsubayashi, Hung Khei Huang, Dariusz Dusberger
-
Publication number: 20120054851Abstract: A proxy consolidates multiple TCP requests from clients into one TCP connection between a proxy and server. A persistent TCP connection is opened between the proxy and server, and a connection request is received from a client at the proxy. A unique identifier is registered for the client, and the server is signaled over the persistent connection to register the unique identifier. A client connection is established between the client and proxy responsive to the connection request. A content request is received from the client over the client connection. The unique identifier is prepended to the content request, the prepended content request is forwarded to the server, and prepended content is received from the server. The identifier and the content are extracted from the prepended content, and a client and a client connection are identified that correspond to the extracted identifier. The extracted content is returned to the corresponding client.Type: ApplicationFiled: August 18, 2011Publication date: March 1, 2012Applicant: CANON KABUSHIKI KAISHAInventors: Kevin Piazza, Weichin Lo Hsu, Basant Verma
-
Publication number: 20120054316Abstract: A proxy consolidates multiple TCP requests from clients into one TCP connection between a proxy and server. A persistent TCP connection is opened between the proxy and server, and a connection request is received from a client at the proxy. A unique identifier is registered for the client, and the server is signaled over the persistent connection to register the unique identifier. A client connection is established between the client and proxy responsive to the connection request. A content request is received from the client over the client connection. The unique identifier is prepended to the content request, the prepended content request is forwarded to the server, and prepended content is received from the server. The identifier and the content are extracted from the prepended content, and a client and a client connection are identified that correspond to the extracted identifier. The extracted content is returned to the corresponding client.Type: ApplicationFiled: September 1, 2010Publication date: March 1, 2012Applicant: CANON KABUSHIKI KAISHAInventors: Kevin Piazza, Weichin Lo Hsu, Basant Verma
-
Publication number: 20110276673Abstract: Virtually extending the functionality of a network device to a server is provided. A virtual device which is in communication with the network device and which virtually represents functionality of the network device receives a function request from the server. The function request corresponds to a function for the network device to perform. A manner to perform the function for the network device based on the function request is determined. The function corresponding to the function request is performed based on the determined manner.Type: ApplicationFiled: May 10, 2010Publication date: November 10, 2011Applicant: CANON KABUSHIKI KAISHAInventors: Kevin Piazza, Don Matsubayashi, Dariusz Dusberger
-
Publication number: 20110277028Abstract: Virtually extending the functionality of a network device to a server is provided. A virtual device which virtually represents functionality of the network device is created. An association is stored between the network device and a user or a group for the network device. A determination is made as to whether the network device and the user or the group for the network device correspond to a local network or to a disparate network, based on the stored association. A network address for the virtual device is assigned based on the determination. Functionality of the network device is accessed via the virtual device, using the assigned network address for the virtual device.Type: ApplicationFiled: May 10, 2010Publication date: November 10, 2011Applicant: CANON KABUSHIKI KAISHAInventors: Kevin Piazza, Don Matsubayashi
-
Publication number: 20100146275Abstract: The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token.Type: ApplicationFiled: December 9, 2008Publication date: June 10, 2010Applicant: Canon Kabushiki KaishaInventors: Royce Slick, Don Matsubayashi, Kevin Piazza, Dariusz Dusberger, Neil Iwamoto
-
Publication number: 20070146732Abstract: A method and system for generating a job profile set, the method and system comprising receiving identification information, receiving device information, retrieving at least one job profile based on the received identification information and the received device information, and generating a job profile set, wherein the generated job profile set includes the at least one job profile.Type: ApplicationFiled: December 20, 2006Publication date: June 28, 2007Applicant: CANON DEVELOPMENT AMERICAS, INC.Inventors: KEVIN PIAZZA, MARTIN MARTINEZ, CRAIG MAZZAGATTE, DON MATSUBAYASHI, STEVE MUTO, SUMITA KUMAR