Patents by Inventor Mark C. Powers

Mark C. Powers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8200960
    Abstract: A computer system that communicates cryptographic resource utilization information while processing data packets is described. During operation, the system receives a first data packet and generates a second data packet by performing a cryptographic transformation on the first data packet. Next, the system appends auxiliary information to the second data packet. This auxiliary information includes information associated with cryptographic resource utilization during the cryptographic transformation. Then, the system provides the second data packet including the auxiliary information.
    Type: Grant
    Filed: October 20, 2006
    Date of Patent: June 12, 2012
    Assignee: Oracle America, Inc.
    Inventors: Kais Belgaied, Mark C. Powers, Bhargava K. Yenduri, Darrin P. Johnson
  • Patent number: 7373504
    Abstract: A method for performing a cryptographic function including calling into an encryption framework to perform the cryptographic function, wherein calling into the encryption framework comprises sending a request to perform the cryptographic function from a kernel consumer, and processing the request and returning the result to the kernel consumer, wherein processing the request comprises determining whether the request is synchronous or asynchronous, and determining which cryptographic provider to use to perform the cryptographic function.
    Type: Grant
    Filed: March 18, 2004
    Date of Patent: May 13, 2008
    Assignee: Sun Microsystems, Inc.
    Inventors: Kais Belgaied, Mark C. Powers, Bhargava K. Yenduri, Nicolas G. Droux, Paul J. Sangster, Darren J. Moffat, Gary W. Winiger
  • Publication number: 20080098215
    Abstract: A computer system that communicates cryptographic resource utilization information while processing data packets is described. During operation, the system receives a first data packet and generates a second data packet by performing a cryptographic transformation on the first data packet. Next, the system appends auxiliary information to the second data packet. This auxiliary information includes information associated with cryptographic resource utilization during the cryptographic transformation. Then, the system provides the second data packet including the auxiliary information.
    Type: Application
    Filed: October 20, 2006
    Publication date: April 24, 2008
    Inventors: Kais Belgaied, Mark C. Powers, Bhargava K. Yenduri, Darrin P. Johnson