Patents by Inventor Michael P. Hammer
Michael P. Hammer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9648516Abstract: A data replication system of a communication network is disclosed. According to one embodiment, the data replication system includes a replication gateway node and a replication control system. The replication gateway node is configured to create a first replication tunnel between a first gateway node and the replication gateway node and a second replication tunnel between the replication gateway node and a second gateway node. The replication gateway node replicates data streams between the first gateway node and the second gateway and delivers the replicated data stream to a management node for further analysis.Type: GrantFiled: September 16, 2014Date of Patent: May 9, 2017Assignee: Yaana Technologies, LLCInventors: David Grootwassink, Rajesh Puri, Michael P. Hammer, Ashok P. Magadum
-
Patent number: 9572037Abstract: A system and method for defending a mobile network from a fraud committed via GTP is disclosed. According to one embodiment, a computer-implemented method includes receiving receives information associated with a GTP request from a serving node to a gateway node in a mobile network. The information associated with the GTP request is a GTP control plane request or a CDR associated with the GTP request. The information associated with a GTP request is examined, and parameters contained in the information associated with the GTP request are analyzed. It is determined that the GTP request is a fraudulent GTP request if the parameters do not belong to an authorized subscriber of the mobile network. A GTP tunnel associated with the fraudulent GTP request is denied, an established fraudulent GTP tunnel is deleted, or network traffic established by a fraudulent GTP tunnel is redirected to a monitoring node.Type: GrantFiled: March 16, 2015Date of Patent: February 14, 2017Inventors: Rajesh Puri, Michael P. Hammer, David Grottwassink
-
Publication number: 20160323178Abstract: Systems and methods for scalable and iterative deep packet inspection for communication networks are disclosed. According to one embodiment, a system comprises a home network and a visitor network in communication with the home network over an Internetwork packet exchange. The visitor network may have an intercept area with an intercept probe, a local packet data network gateway (PGW) and a local proxy-call session control function (P-CSCF). The system further includes a diameter edge agent that monitors signaling traffic in the visitor network passing to and from the home network. The system also has a targeting system in communication with the diameter edge agent that redirects the signaling traffic from the home PGW to the visiting PGW.Type: ApplicationFiled: April 29, 2016Publication date: November 3, 2016Applicant: Yaana Technologies, Inc.Inventors: Michael P. Hammer, David Grootwassink, Rajesh Puri
-
Publication number: 20160277934Abstract: A system and method for defending a mobile network from a fraud committed via GTP is disclosed. According to one embodiment, a computer-implemented method includes receiving receives information associated with a GTP request from a serving node to a gateway node in a mobile network. The information associated with the GTP request is a GTP control plane request or a CDR associated with the GTP request. The information associated with a GTP request is examined, and parameters contained in the information associated with the GTP request are analyzed. It is determined that the GTP request is a fraudulent GTP request if the parameters do not belong to an authorized subscriber of the mobile network. A GTP tunnel associated with the fraudulent GTP request is denied, an established fraudulent GTP tunnel is deleted, or network traffic established by a fraudulent GTP tunnel is redirected to a monitoring node.Type: ApplicationFiled: March 16, 2015Publication date: September 22, 2016Applicant: Yaana Technologies, LLCInventors: Rajesh Puri, Michael P. Hammer, David Grottwassink
-
Patent number: 9450836Abstract: In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first service provider, the first request being of a first type. The system also includes at least one processor configured to determine a first set of configuration parameters from a first policy associated with the first service provider in response to receiving the first request. The at least one processor also causes a node associated with the first service provider to provide the first service in response to receiving the first request using the first set of configuration parameters.Type: GrantFiled: December 21, 2012Date of Patent: September 20, 2016Assignee: Cisco Technology, Inc.Inventors: Michael P. Hammer, Ashish Dalela, Monique J. Morrow, Peter C. Tomsu
-
Patent number: 9413860Abstract: A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link.Type: GrantFiled: June 27, 2014Date of Patent: August 9, 2016Assignee: CISCO TECHNOLOGY, INC.Inventors: Kevin D. Shatzkamer, Ashish Dalela, Monique J. Morrow, Peter Christian Tomsu, Michael P. Hammer, Vojislav Vucetic
-
Publication number: 20160212778Abstract: A data replication system of a communication network is disclosed. According to one embodiment, the data replication system includes a replication gateway node and a replication control system located in one or more of a visited network and a home network. The replication gateway node is configured to create a first replication tunnel between a first gateway node and the replication gateway node and a second replication tunnel between the replication gateway node and a second gateway node. The replication gateway node replicates data streams between the first gateway node and the second gateway and delivers the replicated data stream to a management node for further analysis.Type: ApplicationFiled: January 15, 2016Publication date: July 21, 2016Inventors: David Grootwassink, Rajesh Puri, Michael P. Hammer
-
Publication number: 20160150403Abstract: A system and method for transmitting a secure message is disclosed. According to one embodiment, a method includes providing a request for one or more attributes associated with a phone number for a recipient mobile device, generating a key based on the one or more attributes, receiving an encrypted message for a recipient mobile device, where the encrypted message is encrypted based on the key, requesting the one or more attributes from the recipient mobile device, receiving the one or more attributes from the recipient mobile device, regenerating the key based on the one or more attributes received from the recipient mobile device, decrypting the encrypted message based on the regenerated key, and delivering the decrypted message to the recipient mobile device.Type: ApplicationFiled: November 21, 2014Publication date: May 26, 2016Inventors: Rajesh Puri, David Grootwassink, Michael P. Hammer
-
Publication number: 20160105787Abstract: A system and method for discovering user equipment in a network is disclosed. According to one embodiment, a discovery proxy periodically scans an access router that serves a target user equipment and collects an address assignment record of the target user equipment via the access router. The discovery proxy passes the address assignment record to a discovery server, and the discovery server identifies a location of the target user equipment based on the address assignment record of the target user equipment.Type: ApplicationFiled: October 10, 2014Publication date: April 14, 2016Inventors: Michael P. Hammer, David Grottwassink, Rajesh Puri, Vaibhav Sharma
-
Patent number: 9253089Abstract: In one embodiment, a method includes receiving a first packet sent by a first node. The packet includes a first Layer 3 source address, a first Layer 3 destination address, a first Layer 2 source hardware identifier, a first Layer 2 destination hardware identifier, and a first path identifier. The first path identifier is situated between a Layer 2 header of the first packet and a Layer 3 header of the first packet. The method includes automatically determining a first port of the first network element associated with a second node. The second node is associated with the first Layer 2 destination hardware identifier. A second path identifier is automatically determined based on the first port. The first packet is prevented from being delivered to the second node in response to determining that the first path identifier and the second path identifier are different.Type: GrantFiled: December 18, 2014Date of Patent: February 2, 2016Assignee: Cisco Technology, Inc.Inventors: Michael P. Hammer, Ashish Dalela, Monique J. Morrow, Peter C. Tomsu
-
Publication number: 20150281344Abstract: A method and system for enabling peer-to-peer (P2P) communication between a first device and a second device is disclosed. According to one embodiment, a P2P communication system includes a first peer agent serving a first peer, a second peer agent serving a second peer, and a rendezvous server. The rendezvous server updates a first IP address for the first peer agent to the second peer agent and a second IP address for the second peer agent to the first peer agent. The first peer agent and the second peer agent communicate with the rendezvous server by dropping and retrieving a plurality of dead-drop packages. A first dead-drop package of the plurality of dead-drop packages comprises a first alias that is known only to the first peer and the second peer. A second dead-drop package of the plurality of dead-drop packages comprises a second alias that is different from the first alias.Type: ApplicationFiled: September 17, 2014Publication date: October 1, 2015Inventors: David Grootwassink, Rajesh Puri, Michael P. Hammer
-
Publication number: 20150245249Abstract: A data replication system of a communication network is disclosed. According to one embodiment, the data replication system includes a replication gateway node and a replication control system. The replication gateway node is configured to create a first replication tunnel between a first gateway node and the replication gateway node and a second replication tunnel between the replication gateway node and a second gateway node. The replication gateway node replicates data streams between the first gateway node and the second gateway and delivers the replicated data stream to a management node for further analysis.Type: ApplicationFiled: September 16, 2014Publication date: August 27, 2015Inventors: David Grootwassink, Rajesh Puri, Michael P. Hammer
-
Publication number: 20150229617Abstract: A system and method for metadata analysis and collection with privacy is disclosed. According to one embodiment, a trusted third party (TTP) system generates and transmits authorization keys to a government agency (GA) system and a communication service provider (CSP) system. The TTP system receives index records referencing records of subscribers from the CSP system and ingests the index records received from the CSP system. The TTP system receives a target index request from the GA system and sends a metadata record request to the CSP system based on the target index request. The CSP system sends metadata records to the TTP system, and the TTP system delivers the metadata records to the GA system. The metadata records are encrypted with encryption keys shared between the GA system and the CSP system such that the TTP system cannot decrypt the metadata records.Type: ApplicationFiled: February 11, 2015Publication date: August 13, 2015Inventors: Rajesh Puri, David Grootwassink, Michael P. Hammer
-
Publication number: 20150103835Abstract: In one embodiment, a method includes receiving a first packet sent by a first node. The packet includes a first Layer 3 source address, a first Layer 3 destination address, a first Layer 2 source hardware identifier, a first Layer 2 destination hardware identifier, and a first path identifier. The first path identifier is situated between a Layer 2 header of the first packet and a Layer 3 header of the first packet. The method includes automatically determining a first port of the first network element associated with a second node. The second node is associated with the first Layer 2 destination hardware identifier. A second path identifier is automatically determined based on the first port. The first packet is prevented from being delivered to the second node in response to determining that the first path identifier and the second path identifier are different.Type: ApplicationFiled: December 18, 2014Publication date: April 16, 2015Inventors: Michael P. Hammer, Ashish Dalela, Monique J. Morrow, Peter C. Tomsu
-
Patent number: 8964641Abstract: A method is provided in example embodiments that include receiving a radio signal stream and segmenting the radio signal stream into segments. The segments may be packetized and transported in packets over a pseudowire in a packet-switched network. The radio signal stream can be reconstructed from the segments. In more particular embodiments, the pseudowire may be a multi-protocol label switching pseudowire or a layer 2 tunneling protocol pseudowire, for example. In yet other specific example embodiments, the radio signal stream may be received using a common public radio interface or a femtocell application programming interface.Type: GrantFiled: June 10, 2012Date of Patent: February 24, 2015Assignee: Cisco Technology, Inc.Inventors: Ashish Dalela, Michael P. Hammer, Kevin D. Shatzkamer, Monique J. Morrow, Peter Christian Tomsu, Vojislav Vucetic
-
Patent number: 8937953Abstract: In one embodiment, a method includes receiving a first packet sent by a first node. The packet includes a first Layer 3 source address, a first Layer 3 destination address, a first Layer 2 source hardware identifier, a first Layer 2 destination hardware identifier, and a first path identifier. The first path identifier is situated between a Layer 2 header of the first packet and a Layer 3 header of the first packet. The method includes automatically determining a first port of the first network element associated with a second node. The second node is associated with the first Layer 2 destination hardware identifier. A second path identifier is automatically determined based on the first port. The first packet is prevented from being delivered to the second node in response to determining that the first path identifier and the second path identifier are different.Type: GrantFiled: August 28, 2012Date of Patent: January 20, 2015Assignee: Cisco Technology, Inc.Inventors: Michael P. Hammer, Ashish Dalela, Monique J. Morrow, Peter C. Tomsu
-
Publication number: 20140307627Abstract: A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link.Type: ApplicationFiled: June 27, 2014Publication date: October 16, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Kevin D. Shatzkamer, Ashish Dalela, Monique J. Morrow, Peter Christian Tomsu, Michael P. Hammer, Vojislav Vucetic
-
Patent number: 8824478Abstract: A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link.Type: GrantFiled: December 23, 2011Date of Patent: September 2, 2014Assignee: Cisco Technology, Inc.Inventors: Kevin D. Shatzkamer, Ashish Dalela, Monique J. Morrow, Peter Christian Tomsu, Michael P. Hammer, Vojislav Vucetic
-
Publication number: 20140064275Abstract: In one embodiment, a method includes receiving a first packet sent by a first node. The packet includes a first Layer 3 source address, a first Layer 3 destination address, a first Layer 2 source hardware identifier, a first Layer 2 destination hardware identifier, and a first path identifier. The first path identifier is situated between a Layer 2 header of the first packet and a Layer 3 header of the first packet. The method includes automatically determining a first port of the first network element associated with a second node. The second node is associated with the first Layer 2 destination hardware identifier. A second path identifier is automatically determined based on the first port. The first packet is prevented from being delivered to the second node in response to determining that the first path identifier and the second path identifier are different.Type: ApplicationFiled: August 28, 2012Publication date: March 6, 2014Applicant: Cisco Technology, Inc.Inventors: Michael P. Hammer, Ashish Dalela, Monique J. Morrow, Peter C. Tomsu
-
Publication number: 20130329633Abstract: A method is provided in example embodiments that include receiving a radio signal stream and segmenting the radio signal stream into segments. The segments may be packetized and transported in packets over a pseudowire in a packet-switched network. The radio signal stream can be reconstructed from the segments. In more particular embodiments, the pseudowire may be a multi-protocol label switching pseudowire or a layer 2 tunneling protocol pseudowire, for example. In yet other specific example embodiments, the radio signal stream may be received using a common public radio interface or a femtocell application programming interface.Type: ApplicationFiled: June 10, 2012Publication date: December 12, 2013Inventors: Ashish Dalela, Michael P. Hammer, Kevin D. Shatzkamer, Monique J. Morrow, Peter Christian Tomsu, Vojislav Vucetic