Patents by Inventor Morris J. Katz

Morris J. Katz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9503460
    Abstract: A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application; identifying whether the endpoint is operating in an enterprise environment; determining whether the application is trusted based on metadata associated with the application; and provisioning a tunnel for data traffic associated with the application. In more detailed implementations, the tunnel can be provisioned if the application is trusted and the endpoint is outside of an enterprise environment. In addition, the tunnel can be provisioned if the application is untrusted and the endpoint is within an enterprise environment.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: November 22, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Philip J. S. Gladstone, Morris J. Katz
  • Patent number: 8571600
    Abstract: Described in example embodiments herein are techniques that combine at least two network (communication) technologies (such as protocols, signaling methods, etc.) and limit when a wireless device employs one of the technologies. In an example embodiment, a passive technology, such as a Radio Frequency Identification (RFID) technology, can be employed to determine whether a certain network technology is available.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: October 29, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Shantanu Sarkar, Roger Chi-yee Cheung, Morris J. Katz
  • Patent number: 8515411
    Abstract: Described in example embodiments herein are techniques that combine at least two network (communication) technologies (such as protocols, signaling methods, etc.) and limit when a wireless device employs one of the technologies. In an example embodiment, a passive technology, such as a Radio Frequency Identification (RFID) technology, can be employed to determine whether a certain network technology is available.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: August 20, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Shantanu Sarkar, Roger Chi-yee Cheung, Morris J. Katz
  • Publication number: 20130097318
    Abstract: A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application; identifying whether the endpoint is operating in an enterprise environment; determining whether the application is trusted based on metadata associated with the application; and provisioning a tunnel for data traffic associated with the application. In more detailed implementations, the tunnel can be provisioned if the application is trusted and the endpoint is outside of an enterprise environment. In addition, the tunnel can be provisioned if the application is untrusted and the endpoint is within an enterprise environment.
    Type: Application
    Filed: October 13, 2011
    Publication date: April 18, 2013
    Inventors: Philip J.S. Gladstone, Morris J. Katz
  • Publication number: 20130023261
    Abstract: Described in example embodiments herein are techniques that combine at least two network (communication) technologies (such as protocols, signaling methods, etc.) and limit when a wireless device employs one of the technologies. In an example embodiment, a passive technology, such as a Radio Frequency Identification (RFID) technology, can be employed to determine whether a certain network technology is available.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 24, 2013
    Inventors: Shantanu SARKAR, Roger Chi-yee Cheung, Morris J. Katz
  • Publication number: 20110212746
    Abstract: Described in example embodiments herein are techniques that combine at least two network (communication) technologies (such as protocols, signaling methods, etc.) and limit when a wireless device employs one of the technologies. In an example embodiment, a passive technology, such as a Radio Frequency Identification (RFID) technology, can be employed to determine whether a certain network technology is available.
    Type: Application
    Filed: February 26, 2010
    Publication date: September 1, 2011
    Inventors: Shantanu SARKAR, Roger Chi-yee Cheung, Morris J. Katz