Patents by Inventor Michele Goodwin

Michele Goodwin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160088001
    Abstract: A system for collaborative deep packet inspection in a network uses a coarse grain mechanism to perform deep packet inspection on sample packets sampled from a plurality of traffic flows received at a network device using a plurality of signatures and develop a profile of the network and a fine grain mechanism to perform real-time inspection of a traffic flow against a small set of the signatures that is updated based on the profile. The fine grain mechanism further enables at least one policy action to be applied to a traffic flow when the traffic flow matches one of the signatures in the set of signatures.
    Type: Application
    Filed: September 22, 2014
    Publication date: March 24, 2016
    Applicant: ALCATEL-LUCENT USA INC.
    Inventors: Chiang Yeh, Jeremy W. Touve, L. Michele Goodwin, Eric W. Tolliver
  • Patent number: 9172686
    Abstract: A method comprises an operation for facilitating authentication of a client device attempting to connect to a port of a network element. Facilitating authentication includes determining whether the client device is configured for being authenticated using a first authentication mechanism and, in response to determining that the client device is not configured for being authenticated using the first authentication mechanism, determining whether the client device is configured for being authenticated using at least one other authentication mechanism.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: October 27, 2015
    Assignee: Alcatel Lucent
    Inventors: Anthony Chow, Minka Nikolova, L. Michele Goodwin, Vincent Vermeulen
  • Patent number: 8199679
    Abstract: Example embodiments are directed to methods of configuring a virtual private local area network service for an enterprise. At least one method includes assigning a virtual private local area network instance to a first node within a network. A first node attempts to establish a label distribution protocol session between the first node and at least one other node within the network based on an interior gateway protocol map. The interior gateway protocol map identifies the at least one other node and nodes connected to the at least one other node. The virtual private local area network service is established based on the label distribution protocol sessions that are established.
    Type: Grant
    Filed: May 29, 2009
    Date of Patent: June 12, 2012
    Assignee: Alcatel Lucent
    Inventors: Andrew S. Lange, L. Michele Goodwin
  • Patent number: 8031630
    Abstract: Customer virtual local area networks (C-VLANs) connecting multiple LAN segments are set up through a provider network (12). Provider edge bridges (PEs) are coupled to customer edge bridges (CEs) to provide a transparent link between LAN segments. To determine whether a backdoor link is used in the C-VLAN topology, PEs monitor MAC address from a predetermined time after a TCN is received to determine if there are contradictory addresses or new addresses relative to the existing MAC address tables (or forwarding databases) that are indicative of a backdoor link. If so, an unlearning message is sent to bridges in the provider domain. In another embodiment, CEs set a snoop bit to indicate which TCNs must be snooped.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: October 4, 2011
    Assignee: Alcatel Lucent
    Inventors: David Elie-Dit-Cosaque, Girish Chiruvolu, Jessy Rouyer, Ljubisa Tancevski, Jean-Francois Cartier, Laurence Rose, L. Michele Goodwin
  • Publication number: 20110004918
    Abstract: A method comprises an operation for facilitating authentication of a client device attempting to connect to a port of a network element. Facilitating authentication includes determining whether the client device is configured for being authenticated using a first authentication mechanism and, in response to determining that the client device is not configured for being authenticated using the first authentication mechanism, determining whether the client device is configured for being authenticated using at least one other authentication mechanism.
    Type: Application
    Filed: September 28, 2007
    Publication date: January 6, 2011
    Inventors: Anthony Chow, Minka Nikolova, Michele Goodwin, Vincent Vermeulen
  • Publication number: 20100302973
    Abstract: Example embodiments are directed to methods of configuring a virtual private local area network service for an enterprise. At least one method includes assigning a virtual private local area network instance to a first node within a network. A first node attempts to establish a label distribution protocol session between the first node and at least one other node within the network based on an interior gateway protocol map. The interior gateway protocol map identifies the at least one other node and nodes connected to the at least one other node. The virtual private local area network service is established based on the label distribution protocol sessions that are established.
    Type: Application
    Filed: May 29, 2009
    Publication date: December 2, 2010
    Inventors: Andrew S. Lange, L. Michele Goodwin
  • Publication number: 20090144446
    Abstract: An exemplary method directs client devices client devices in a computing network to a remediation node. A subset of the client devices to receives remediation services is identified with a single common label. Upon determining that one of the client devices originating a communication request packet is identified by the single common label, processing the communication request packet by routing the communication request packet to a redirection server, and transmitting from the redirection server to the one client device a hypertext transfer protocol (HTTP) command specifying that the one client device redirect communications to the remediation node so that remediation services can be supplied to the one client device via the remediation node.
    Type: Application
    Filed: November 29, 2007
    Publication date: June 4, 2009
    Inventors: Joseph Olakangil, Paramesh Kailasam, Robert L. Sangroniz, Laurence Rose, L. Michele Goodwin, Jonathan Wong, Sahil Dighe, David Morgan, Stephen Clawson
  • Publication number: 20050278541
    Abstract: A user authentication service for a communication network authenticates local users before granting them access to personalized sets of network resources. Authentication agents on intelligent edge devices present users of associated end systems with log-in challenges. Information supplied by the users is forwarded to an authentication server for verification. If successfully verified, the authentication server returns to the agents authorized connectivity information and time restrictions for the particular authenticated users. The agents use the information to establish rules for filtering and forwarding network traffic originating from or destined for particular authenticated users during authorized time periods. An enhanced authentication server may be engaged if additional security is desired. The authorized connectivity information preferably includes identifiers of one or more virtual local area networks active in the network.
    Type: Application
    Filed: October 5, 2004
    Publication date: December 15, 2005
    Inventors: Michael See, John Bailey, Charles Panza, Yuri Pikover, Geoffrey Stone, Michele Goodwin, Robert Sangroniz
  • Publication number: 20050105560
    Abstract: The invention integrates a plurality of separate stack switches into a unified system of switches under a common configuration and management architecture. The switches, preferably stack switches, may be distributed throughout a local area network (LAN) and need not be co-located. One preferred embodiment supports fail-safe operations to minimize the disruption caused when a stack switch becomes inoperative. In another preferred embodiment, the stack switches are enabled with a system-wide address table and quality of service mapping matrix with which each switch can effectively provision system bandwidth.
    Type: Application
    Filed: December 31, 2003
    Publication date: May 19, 2005
    Inventors: Harpal Mann, Vincent Magret, Michele Goodwin, Eric Guinee, Ronan Guen
  • Publication number: 20040174828
    Abstract: Customer virtual local area networks (C-VLANs) connecting multiple LAN segments are set up through a provider network (12). Provider edge bridges (PEs) are coupled to customer edge bridges (CEs) to provide a transparent link between LAN segments. To determine whether a backdoor link is used in the C-VLAN topology, PEs monitor MAC address from a predetermined time after a TCN is received to determine if there are contradictory addresses or new addresses relative to the existing MAC address tables (or forwarding databases) that are indicative of a backdoor link. If so, an unlearning message is sent to bridges in the provider domain. In another embodiment, CEs set a snoop bit to indicate which TCNs must be snooped.
    Type: Application
    Filed: December 16, 2003
    Publication date: September 9, 2004
    Applicant: Alcatel
    Inventors: David Elie-Dit-Cosaque, Girish Chiruvolu, Jessy Rouyer, Ljubisa Tancevski, Jean-Francois Cartier, Laurence Rose, L. Michele Goodwin
  • Publication number: 20030067874
    Abstract: A switching node configuring different traffic management protocols via a single centralized set of policies. The switching node includes a central policy repository, a central policy engine, and a central management engine. The central policy repository stores a single set of policies used to manage a plurality of different traffic management protocols in a consistent and predictable manner. The different traffic management protocols may include QoS, NAT, ACL, and the like. The central policy engine evaluates inbound traffic flows based on the policies in the central policy repository, and configures one or more traffic management protocol entities based on a selected policy. The management engine configures and manages the single set of policies via a common set of commands helping to eliminate the danger of creating conflicting policies that may lead to unpredictable results.
    Type: Application
    Filed: April 22, 2002
    Publication date: April 10, 2003
    Inventors: Michael B. See, David Morgan, Stephen Clawson, L. Michele Goodwin
  • Publication number: 20020124107
    Abstract: VLAN Advertisement Protocol (VAP) is provided to a communication network as an inter-switch VLAN communication protocol. VAP is used to synchronize the VLAN membership databases stored on a switch to be synchronized with other switches in the network. VAP also provides a mechanism for automatically discovering other network nodes.
    Type: Application
    Filed: December 19, 2001
    Publication date: September 5, 2002
    Inventor: Michele Goodwin