Patents by Inventor Nicholas Read Leavy

Nicholas Read Leavy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9832134
    Abstract: One embodiment includes a firewall, intrusion prevention, or other device that automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with these packets (e.g., based on the reputation score of the source of a packet). In response to measured traffic, one embodiment automatically adjusts the range of reputation scores determining which packets are subjected to this rate limiting (e.g., which packets are possibly dropped), such as, but not limited to increase or decrease the measured traffic. For example, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic, and then when the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: November 28, 2017
    Assignee: Cisco Technology, Inc
    Inventors: Nicholas Read Leavy, James William Heary
  • Publication number: 20160253378
    Abstract: A system, computer-readable media, and methods are disclosed for searching a data stream for one or more regular expressions. The method can include receiving a data stream and a regular expression and parsing the regular expression to create a prefix portion and a suffix portion. The method can also include executing a first search of at least a portion of the data stream for the prefix portion using a first search algorithm, the first search algorithm being stored in a computer readable medium and executed by a processor. The method also include executing a second search of at least a portion of the data stream for the suffix portion using a second search algorithm, the second search algorithm being stored in a computer readable medium and executed by a processor. Further, the method includes determining whether the data stream contains the regular expression based on the first search and the second search.
    Type: Application
    Filed: February 26, 2015
    Publication date: September 1, 2016
    Inventors: Itay Marom, Hanoch Haim, Nicholas Read Leavy, Kobi Kobi Vaknin
  • Patent number: 9246676
    Abstract: Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be decrypted using a locker key. Encrypted data is received from a remote system, and embodiment determine that the received encrypted data can be decrypted using a private key recovered by decrypting the encrypted private key. A request is transmitted to the remote system for the locker key corresponding to the encrypted private key, and the requested locker key is received from the remote system. Embodiments decrypt the encrypted private key using the received locker key to recover the private key, and decrypt the encrypted data, using the private key.
    Type: Grant
    Filed: November 22, 2013
    Date of Patent: January 26, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Nicholas Read Leavy, Venkata Krishna Sashank Dara
  • Publication number: 20150149772
    Abstract: Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be decrypted using a locker key. Encrypted data is received from a remote system, and embodiment determine that the received encrypted data can be decrypted using a private key recovered by decrypting the encrypted private key. A request is transmitted to the remote system for the locker key corresponding to the encrypted private key, and the requested locker key is received from the remote system. Embodiments decrypt the encrypted private key using the received locker key to recover the private key, and decrypt the encrypted data, using the private key.
    Type: Application
    Filed: November 22, 2013
    Publication date: May 28, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Nicholas Read Leavy, Venkata Krishna Sashank Dara
  • Publication number: 20140313891
    Abstract: One embodiment includes a firewall, intrusion prevention, or other device that automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with these packets (e.g., based on the reputation score of the source of a packet). In response to measured traffic, one embodiment automatically adjusts the range of reputation scores determining which packets are subjected to this rate limiting (e.g., which packets are possibly dropped), such as, but not limited to increase or decrease the measured traffic. For example, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic, and then when the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Application
    Filed: June 30, 2014
    Publication date: October 23, 2014
    Applicant: Cisco Technology, Inc., a corporation of California
    Inventors: Nicholas Read Leavy, James William Heary
  • Patent number: 8797866
    Abstract: A firewall, intrusion prevention or other device automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with their source. When measured traffic increases beyond a desired amount, the range of reputation scores causing their associated packets to be subjected to this rate limiting is adjusted to throttle the measured traffic to fall within desired limits. In this manner, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic. When the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Grant
    Filed: February 12, 2010
    Date of Patent: August 5, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Nicholas Read Leavy, James William Heary
  • Publication number: 20110199902
    Abstract: A firewall, intrusion prevention or other device automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with their source. When measured traffic increases beyond a desired amount, the range of reputation scores causing their associated packets to be subjected to this rate limiting is adjusted to throttle the measured traffic to fall within desired limits. In this manner, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic. When the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Application
    Filed: February 12, 2010
    Publication date: August 18, 2011
    Applicant: Cisco Technology, Inc., a corporation of California
    Inventors: Nicholas Read Leavy, James William Heary