Patents by Inventor Mark Ernest Quevedo

Mark Ernest Quevedo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11979457
    Abstract: Technology related to managing network services using multipath protocols is disclosed. In one example, a method includes intercepting a multipath protocol request from a requesting host for a connection to a service. The multipath protocol request is intercepted by an intermediary server. A target host different than the intermediary server can be selected to provide the service. A multipath protocol packet can be sent from the intermediary server to the requesting host. The multipath protocol packet can add a subflow of the connection using an address of the target host. The subflow can enable a path between the requesting host and the target host that does not traverse the intermediary server.
    Type: Grant
    Filed: November 6, 2020
    Date of Patent: May 7, 2024
    Assignee: F5, Inc.
    Inventor: Mark Ernest Quevedo
  • Patent number: 11632366
    Abstract: Technology related to multi-device authentication is disclosed. In one example, a method can include receiving a request from a requesting client device to access a secured server. A command can be sent to an authenticating device to capture environmental information in proximity to the authenticating device. The captured environmental information can be used to verify the requesting client device and the authenticating device are near each other. The received request can be forwarded to the secured server in response to verifying the requesting client device and the authenticating device are near each other.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: April 18, 2023
    Assignee: F5, Inc.
    Inventors: Yaniv Shemesh, Mark Ernest Quevedo
  • Patent number: 11625491
    Abstract: Technology related to managing network traffic with sensitive data is disclosed. In one example, a method can include performing a cryptographic transformation of sensitive data of a request from a requestor for a resource. A portion of the cryptographic transformation of the sensitive data of the request can be transmitted to a sensitive data server. One or more possible matches to the cryptographic transformation of the sensitive data of the request can be received from the sensitive data server. A match to the cryptographic transformation can be identified within the one of the one or more possible matches. In response to identifying the match, an access policy for the requestor or the resource can be changed.
    Type: Grant
    Filed: August 14, 2020
    Date of Patent: April 11, 2023
    Assignee: F5, Inc.
    Inventors: Mark Ernest Quevedo, Graham Rein Alderson
  • Patent number: 11444931
    Abstract: Technology related to managing name server data is disclosed. In one example, a method includes receiving a first request for data from a name server service. In response to determining that a locally stored version of the requested data is unreliable, a second request can be sent to a second service. The second service can be different from the name server service. A response from the second service can be authenticated. In response to authenticating the response from the second service, the locally stored version of the requested data can be returned to a client.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: September 13, 2022
    Assignee: F5, Inc.
    Inventor: Mark Ernest Quevedo
  • Publication number: 20220150303
    Abstract: Technology related to managing network services using multipath protocols is disclosed. In one example, a method includes intercepting a multipath protocol request from a requesting host for a connection to a service. The multipath protocol request is intercepted by an intermediary server. A target host different than the intermediary server can be selected to provide the service. A multipath protocol packet can be sent from the intermediary server to the requesting host. The multipath protocol packet can add a subflow of the connection using an address of the target host. The subflow can enable a path between the requesting host and the target host that does not traverse the intermediary server.
    Type: Application
    Filed: November 6, 2020
    Publication date: May 12, 2022
    Inventor: Mark Ernest Quevedo
  • Patent number: 10659368
    Abstract: Embodiments are directed towards managing communication over a network with a traffic management computer (TMC). If a network protocol associated with a network traffic is unknown, additional actions may be performed. Constant value recognition actions may be selected for one or more complex protocols. The one or more complex protocols may be the Teredo protocol, or another tunneling protocol. If constant value recognition conditions may be satisfied still further actions may be performed to determine the complex protocol. If a sufficient number of the action results are affirmative, one or more operations on the network traffic may be performed based on the complex protocol. And, the network traffic may be sent to a client or a server. Performing the operations on the network traffic may include providing an identity of another network protocol that may be encapsulated in the complex protocol.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: May 19, 2020
    Assignee: F5 Networks, Inc.
    Inventor: Mark Ernest Quevedo
  • Publication number: 20170208008
    Abstract: Embodiments are directed towards managing communication over a network with a traffic management computer (TMC). If a network protocol associated with a network traffic is unknown, additional actions may be performed. Constant value recognition actions may be selected for one or more complex protocols. The one or more complex protocols may be the Teredo protocol, or another tunneling protocol. If constant value recognition conditions may be satisfied still further actions may be performed to determine the complex protocol. If a sufficient number of the action results are affirmative, one or more operations on the network traffic may be performed based on the complex protocol. And, the network traffic may be sent to a client or a server. Performing the operations on the network traffic may include providing an identity of another network protocol that may be encapsulated in the complex protocol.
    Type: Application
    Filed: December 29, 2016
    Publication date: July 20, 2017
    Inventor: Mark Ernest Quevedo