Patents by Inventor Matthew Vick

Matthew Vick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230259352
    Abstract: Examples described herein relate to a network interface device. In some examples, the network interface device includes a network interface device that includes a network interface, a host interface, and multiple processors. In some examples, a first processor of the multiple processors is to execute a first control plane process and an embedded software update is to occur by: installation and execution of a second control plane process on the first processor and a third control plane process is to cause utilization of the second control plane process.
    Type: Application
    Filed: April 17, 2023
    Publication date: August 17, 2023
    Inventors: Kirill KAZATSKER, Keren GUY, Anjali Singhai JAIN, Matthew VICK, Jayaprakash SHANMUGAM
  • Publication number: 20230239368
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Application
    Filed: April 4, 2023
    Publication date: July 27, 2023
    Applicant: Intel Corporation
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Patent number: 11677851
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Grant
    Filed: September 24, 2021
    Date of Patent: June 13, 2023
    Assignee: Intel Corporation
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Publication number: 20220164237
    Abstract: Examples described herein relate to a packet processing device comprising a programmable packet processing pipeline that is logically partitioned into multiple domains including privileged and unprivileged domains. The multiple domains can span one or more stages of the programmable packet processing pipeline, wherein at least one stage is to perform match action operations.
    Type: Application
    Filed: February 8, 2022
    Publication date: May 26, 2022
    Inventors: Steven R. KING, Matthew VICK, Keren GUY
  • Publication number: 20220060555
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Application
    Filed: September 24, 2021
    Publication date: February 24, 2022
    Applicant: Intel Corporation
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Patent number: 11134132
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: September 28, 2021
    Assignee: Intel Corporation
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Publication number: 20190327323
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Application
    Filed: July 2, 2019
    Publication date: October 24, 2019
    Applicant: Intel Corporation
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Patent number: 10432745
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Grant
    Filed: January 24, 2018
    Date of Patent: October 1, 2019
    Assignee: Intel Corporation
    Inventors: Daniel Daly, John R. Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Publication number: 20180234516
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Application
    Filed: January 24, 2018
    Publication date: August 16, 2018
    Inventors: Daniel Daly, John R. Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Patent number: 9992212
    Abstract: Technologies for handling malicious activity of a virtual network driver include a network computing device on which a virtual machine is being executed and the virtual network driver is managing communication between the physical network interface controller and the virtual function network adapter. The network computing device is configured to monitor events handled by the virtual network driver to detect malicious activity and update one or more malicious event tracking variables corresponding to a type of malicious activity event detected. The network computing device is further configured to compare one or more of the malicious event tracking variables to a corresponding malicious event threshold and perform an action on the virtual function driver in response to a determination that one or more of the malicious event tracking variables indicates that the corresponding malicious event threshold has been violated. Other embodiments are described and claimed herein.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: June 5, 2018
    Assignee: Intel Corporation
    Inventors: James R. Hearn, Matthew Vick
  • Patent number: 9912774
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: March 6, 2018
    Assignee: Intel Corporation
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Publication number: 20170180273
    Abstract: Devices and techniques for accelerated packet processing are described herein. The device can match an action to a portion of a network data packet and accelerate the packet-processing pipeline for the network data packet through the machine by processing the action.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Inventors: Daniel Daly, John Fastabend, Matthew Vick, Brian J. Skerry, Marco Varlese, Jing Mark Chen, Danny Y. Zhou
  • Publication number: 20170134403
    Abstract: Technologies for handling malicious activity of a virtual network driver include a network computing device on which a virtual machine is being executed and the virtual network driver is managing communication between the physical network interface controller and the virtual function network adapter. The network computing device is configured to monitor events handled by the virtual network driver to detect malicious activity and update one or more malicious event tracking variables corresponding to a type of malicious activity event detected. The network computing device is further configured to compare one or more of the malicious event tracking variables to a corresponding malicious event threshold and perform an action on the virtual function driver in response to a determination that one or more of the malicious event tracking variables indicates that the corresponding malicious event threshold has been violated. Other embodiments are described and claimed herein.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 11, 2017
    Inventors: James R. Hearn, Matthew Vick