Patents by Inventor Mark R. Murray
Mark R. Murray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8849967Abstract: Consistent with embodiments of the present invention, systems and methods are disclosed for operating an override boot sequence. In some embodiments, a system may be disclosed comprising a computing device; client software configured to boot the computing device to a normal state; a first memory associated with the computing device, wherein the client software is stored on the first memory; and a network interface in communication with a server. The server may be configured to transmit a sentry packet to the computing device. A bootloader program may be associated with the computing device, wherein the bootloader device may be configured to open the network interface port associated with the serve and monitor for the presence of the sentry packet. The bootloader program may be further configured to download a software application across the network and execute the software application instead of the client software.Type: GrantFiled: July 15, 2009Date of Patent: September 30, 2014Assignee: Cisco Technology, Inc.Inventors: Mark R. Murray, Phillip M. Hord
-
Patent number: 8504814Abstract: User terminal resilience to application elements may be provided. Upon initialization, a user terminal may detect elements associated with the user terminal's operation. The user terminal may load each of the elements in turn and determine whether the element causes a fault in the user terminal. Elements that result in a fault may be disabled from being loaded in the future.Type: GrantFiled: June 28, 2010Date of Patent: August 6, 2013Assignee: Cisco Technology, Inc.Inventor: Mark R. Murray
-
Patent number: 8108680Abstract: To prevent poaching of an Internet Protocol (IP) set top box (STB) asset or similar network computing device from one system operator to another, code executing in the IP STB not only authenticates downloaded software images using a public key provided in a serial-number assigned digital certificate, but also confirms that the serial number appears on a signed whitelist, or does not appear on a signed blacklist. The code executing in the STB further preferably enforces a rule that only the authority that signed the already-loaded whitelist/blacklist may replace it with a new list. Such a “sticky whitelist/blacklist” ensures that if the STB boots or resets in a new network, the existing authentication list will not be replaced by a list that is valid for a new or different network, and, as a result, that new software code images will not be authenticated.Type: GrantFiled: July 23, 2007Date of Patent: January 31, 2012Inventor: Mark R. Murray
-
Publication number: 20110016304Abstract: Consistent with embodiments of the present invention, systems and methods are disclosed for operating an override boot sequence. In some embodiments, a system may be disclosed comprising a computing device; client software configured to boot the computing device to a normal state; a first memory associated with the computing device, wherein the client software is stored on the first memory; and a network interface in communication with a server. The server may be configured to transmit a sentry packet to the computing device. A bootloader program may be associated with the computing device, wherein the bootloader device may be configured to open the network interface port associated with the serve and monitor for the presence of the sentry packet. The bootloader program may be further configured to download a software application across the network and execute the software application instead of the client software.Type: ApplicationFiled: July 15, 2009Publication date: January 20, 2011Inventors: Mark R. Murray, Phillip M. Hord
-
Publication number: 20100332816Abstract: User terminal resilience to application elements may be provided. Upon initialization, a user terminal may detect elements associated with the user terminal's operation. The user terminal may load each of the elements in turn and determine whether the element causes a fault in the user terminal. Elements that result in a fault may be disabled from being loaded in the future.Type: ApplicationFiled: June 28, 2010Publication date: December 30, 2010Applicant: CISCO TECHNOLOGY, INC.Inventor: Mark R. Murray
-
Publication number: 20100318731Abstract: Consistent with embodiments of the present invention, systems and methods are disclosed for operating an override boot sequence. In some embodiments, a system may comprise a computing device. The computing device may contain client software configured to boot the computing device to a normal state. The computing device may further contain a first memory, wherein the client software may be stored on the first memory. The system may further comprise an interface capable of communicating with a portable memory. The portable memory may contain an override application. The system may further comprise a bootloader program associated with the computing device, wherein the bootloader device may be configured to detect the presence of a connection of the portable memory and the interface. The bootloader program may further be configured to copy the override application to a second memory associated with the computing device and execute the override application instead of the client software.Type: ApplicationFiled: June 16, 2009Publication date: December 16, 2010Inventor: Mark R. Murray
-
Publication number: 20090031409Abstract: To prevent poaching of an Internet Protocol (IP) set top box (STB) asset or similar network computing device from one system operator to another, code executing in the IP STB not only authenticates downloaded software images using a public key provided in a serial-number assigned digital certificate, but also confirms that the serial number appears on a signed whitelist, or does not appear on a signed blacklist. The code executing in the STB further preferably enforces a rule that only the authority that signed the already-loaded whitelist/blacklist may replace it with a new list. Such a “sticky whitelist/blacklist” ensures that if the STB boots or resets in a new network, the existing authentication list will not be replaced by a list that is valid for a new or different network, and, as a result, that new software code images will not be authenticated.Type: ApplicationFiled: July 23, 2007Publication date: January 29, 2009Inventor: Mark R. Murray
-
Patent number: 5493648Abstract: A method for detecting high speed data received by a computer and for delaying displaying the receive data, thereby increase the microprocessor time devoted to receiving and storing the input data. Three parameters are utilized for determining when updating the display should be delayed because data input speed is high. First, if the input data is close to filling the computer's receive buffer, the data input speed is high. Second, if the data input port becomes idle, no more data is being input to the computer and the display may be updated. Third, if the display has not been updated recently, as indicated by a preset timer timing out, an update of the display is forced so that the user can verify that data is successfully being input. By varying and limiting the number of display updates, the microprocessor is allocated more time to store and process received data when the data input speed demands.Type: GrantFiled: March 23, 1993Date of Patent: February 20, 1996Assignee: Hayes Microcomputer Products, Inc.Inventors: Mark R. Murray, George W. Coleman
-
Patent number: 4700358Abstract: An improved modem is described which can selectably operate in a synchronous communications mode, an asynchronous data mode, and an asynchronous command mode. A processor 47 controls the operation of the modem, adds starting and ending flags and frame check sequences to transmitted data, searches for flags and sync characters in received data, adds and deletes start, stop and parity bits required for communications with the asynchronous communications element 18, and performs zero bit insertion and deletion for HDLC/SDLC communications. Processor 47 also controls and monitors the operating parameters of the modem engine 60.Type: GrantFiled: November 18, 1985Date of Patent: October 13, 1987Assignee: Hayes Microcomputer Products, Inc.Inventors: Jay P. Duncanson, Mark R. Murray