Patents by Inventor Mauricio Sanchez

Mauricio Sanchez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080270606
    Abstract: Embodiments of the invention may include network devices, systems, and methods, including executable instructions and/or logic, for remote client remediation. One method includes identifying a client needing remediation, tunnel-encapsulating packets originating from the client during remediation, and forwarding the tunnel-encapsulated packets to a remote remediation functionality different from an original destination address of the packets and having membership in a remediation VLAN different from the original VLAN.
    Type: Application
    Filed: April 30, 2007
    Publication date: October 30, 2008
    Inventors: Mark Gooch, Bruce E. LaVigne, Mauricio Sanchez, Steven G. Jorgensen, Alan R. Albrecht
  • Publication number: 20080212579
    Abstract: Network devices, systems, and methods are provided for packet processing. One network device includes a network chip having a number of network ports for the device. The network chip includes logic to select original data packets, based on a set of criteria, received from or destined to a particular port on the device and to tunnel the selected data packets to a second network device having a different destination address to that of the selected data packets.
    Type: Application
    Filed: March 1, 2007
    Publication date: September 4, 2008
    Inventors: Bruce E. LaVigne, Mark Gooch, Alan R. Albrecht, Mauricio Sanchez, Steven G. Jorgensen
  • Publication number: 20080196100
    Abstract: Network devices, systems, and methods are described that cause a particular port on a first network device to send data packets from the particular port on the first network device to an intrusion system (IS) on a second network device.
    Type: Application
    Filed: February 14, 2007
    Publication date: August 14, 2008
    Inventors: Sajeev Madhavan, Mauricio Sanchez
  • Publication number: 20060250954
    Abstract: A method for controlling data connections of host devices in a network includes creating a record of the number of attempted data connections from a host device through a connection device and the time of the most recent data connection attempt from the host device through the connection device. The difference between the current time that data from the host device is received by the connection device and the recorded time of the most recent data connection attempt by the host device is determined. Data is forwarded to its destination address if the difference between the current time and the recorded time is greater than a predetermined threshold time.
    Type: Application
    Filed: May 3, 2005
    Publication date: November 9, 2006
    Inventors: Edward Mulrane, Mauricio Sanchez
  • Publication number: 20060059558
    Abstract: One embodiment disclosed relates to a method of proactive containment of network security attacks. Filtering parameters corresponding to a specific system vulnerability are determined. These parameters are distributed to network infrastructure components, and the network infrastructure components examine packets using these parameters to detect occurrence of an attack. Once an attack is detected, the network infrastructure components take action to inhibit the attack. Other embodiments are also disclosed.
    Type: Application
    Filed: September 15, 2004
    Publication date: March 16, 2006
    Inventors: John Selep, Mauricio Sanchez
  • Publication number: 20050265233
    Abstract: One embodiment disclosed relates to a network device that includes at least one port to connect to a network and at least one throttle that limits a rate of connections made from the device. An auto-adaptive thresholding mechanism determines a threshold for the throttle. The mechanism may be tunable to various aggressiveness levels. Another embodiment disclosed relates to a network apparatus including multiple ports capable of making connections and multiple throttle instantiations. Each throttle instantiation is associated with a port or group of ports. Threshold levels for each throttle instantiation are independently set. The ports may be physical ports or may be logical ports.
    Type: Application
    Filed: May 28, 2004
    Publication date: December 1, 2005
    Inventors: William Johnson, Mauricio Sanchez
  • Publication number: 20050195748
    Abstract: Systems, methods, and device are provided for network and network device management. One method embodiment includes receiving information associated with a network device. The method further includes analyzing the network information using a Kalman filter.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 8, 2005
    Inventor: Mauricio Sanchez
  • Publication number: 20050124836
    Abstract: The present invention is directed to a method of dissolving a gaseous hydrocarbon into a liquid hydrocarbon to re-circulate gaseous components, which have separated from the liquid fuel mixture, back into the liquid fuel mixture, as well as, a method for making batch or continuous process amounts of mixed hydrocarbon fuels. The mixed hydrocarbon fuel is produced by introducing a volume of a liquid hydrocarbon into a vessel, and introducing a volume of a gaseous hydrocarbon into the vessel by bubbling the gaseous hydrocarbon into the liquid hydrocarbon at a gravitational low point of the vessel such that the bubbled gaseous hydrocarbon is dissolved into the liquid hydrocarbon to produce a liquid fuel solution. The vessel may be a mixing tank from which the liquid fuel is pumped into a vehicle fuel tank, or the vessel may be the vehicle fuel tank.
    Type: Application
    Filed: October 25, 2004
    Publication date: June 9, 2005
    Inventors: William Sutton, Carlos Borras, Mauricio Sanchez, Richard Mallinson
  • Publication number: 20040156506
    Abstract: A method of responding to a request for a key of a first length is provided. According to the method, the request for the key of the first length is received. Moreover, it is determined whether any one of a plurality of cached keys satisfies the request. If any one of the plurality of cached keys satisfies the request, a cached key of the first length is selected. Also, the selected cached key is removed from the plurality of cached keys. Thus, in response to the request, the selected cached key of the first length is provided.
    Type: Application
    Filed: February 10, 2003
    Publication date: August 12, 2004
    Inventor: Mauricio Sanchez