Patents by Inventor Owen Friel
Owen Friel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250013766Abstract: This disclosure describes techniques for allowing an organization to manage user identities. In some examples, the management of user identities may be serverless. In some examples, serverless identity management may be enabled through a distributed application on user devices of the organization. The application may generate and/or store information related to the user identities on the user devices. Serverless identity management may further include storing at least some of the information at a location that is easily accessible to the user devices, such as a cloud computing location, while maintaining security for private data. Serverless identity management may therefore provide an organization with greater operational flexibility.Type: ApplicationFiled: September 17, 2024Publication date: January 9, 2025Inventors: Owen Friel, Richard Lee Barnes
-
Patent number: 12105817Abstract: This disclosure describes techniques for allowing an organization to manage user identities. In some examples, the management of user identities may be serverless. In some examples, serverless identity management may be enabled through a distributed application on user devices of the organization. The application may generate and/or store information related to the user identities on the user devices. Serverless identity management may further include storing at least some of the information at a location that is easily accessible to the user devices, such as a cloud computing location, while maintaining security for private data. Serverless identity management may therefore provide an organization with greater operational flexibility.Type: GrantFiled: July 16, 2021Date of Patent: October 1, 2024Assignee: Cisco Technology, Inc.Inventors: Owen Friel, Richard Lee Barnes
-
Patent number: 11601808Abstract: This technology uses a bootstrap key (“BSK”) to securely onboard a computing device to a network. A unique BSK associated with an onboarding computing device is used to verify for various deployment models (1) that the computing device has proof the computing device is connecting to the correct wired or wireless network and (2) that the network has proof the computing device is trusted. The BSK may be an associated BSK or an embedded BSK. A computing device receives a signed voucher from the manufacturer authorized signing authority (“MASA”) before the computing device may onboard to a network. The MASA will issue a voucher to a Bootstrapping Remote Secure Key Infrastructure (“BRSKI”) registrar if the registrar proves knowledge of the computing device's BSK to the MASA or the registrar has an established trust relationship with the MASA.Type: GrantFiled: August 31, 2020Date of Patent: March 7, 2023Assignee: Cisco Technology, Inc.Inventors: Eliot Lear, Owen Friel, Max Pritikin
-
Publication number: 20230016036Abstract: This disclosure describes techniques for allowing an organization to manage user identities. In some examples, the management of user identities may be serverless. In some examples, serverless identity management may be enabled through a distributed application on user devices of the organization. The application may generate and/or store information related to the user identities on the user devices. Serverless identity management may further include storing at least some of the information at a location that is easily accessible to the user devices, such as a cloud computing location, while maintaining security for private data. Serverless identity management may therefore provide an organization with greater operational flexibility.Type: ApplicationFiled: July 16, 2021Publication date: January 19, 2023Inventors: Owen Friel, Richard Lee Barnes
-
Patent number: 11533179Abstract: In one embodiment, an endpoint in a network sends a Session Initiation Protocol (SIP) registration request to a device. The device generates a first key using information included in the SIP registration request. The device also writes the first key to a storage location accessible by a Traversal Using Relays around Network address translators (TURN) server. The endpoint generates a second key based on the information included in the SIP registration request. The endpoint sends an allocate request to the TURN server that includes the second key. The TURN server authenticates the endpoint based in part by comparing the second key to the first key. The endpoint receives an allocate response from the TURN server, after the TURN server authenticates the endpoint.Type: GrantFiled: August 13, 2020Date of Patent: December 20, 2022Assignee: Cisco Technology, Inc.Inventors: Ollie Fagan, John Costello, Owen Friel, Andrew West
-
Patent number: 11374981Abstract: This disclosure describes techniques for providing manufacturer usage description (MUD) solution to automatically update network access policy for client application software. The method may include embedding metadata in the application binary. The metadata may include MUD uniform resource identifiers (URIs) that may point to MUD files describing the application's network access requirements. The MUD files may be hosted by application vendor's MUD servers. The system may include a network policy server that is able discover the MUD URIs. The MUD URIs may be discovered based on extracting the MUD URIs from the metadata and/or being provision with the set of MUD URIs for trusted applications. The method may include enterprise wide policy and individual host policy for implementation of the MUD files.Type: GrantFiled: January 17, 2020Date of Patent: June 28, 2022Assignee: Cisco Technology, Inc.Inventors: Eliot Lear, Owen Friel
-
Publication number: 20220052850Abstract: In one embodiment, an endpoint in a network sends a Session Initiation Protocol (SIP) registration request to a device. The device generates a first key using information included in the SIP registration request. The device also writes the first key to a storage location accessible by a Traversal Using Relays around Network address translators (TURN) server. The endpoint generates a second key based on the information included in the SIP registration request. The endpoint sends an allocate request to the TURN server that includes the second key. The TURN server authenticates the endpoint based in part by comparing the second key to the first key. The endpoint receives an allocate response from the TURN server, after the TURN server authenticates the endpoint.Type: ApplicationFiled: August 13, 2020Publication date: February 17, 2022Inventors: Ollie Fagan, John Costello, Owen Friel, Andrew West
-
Publication number: 20210226995Abstract: This disclosure describes techniques for providing manufacturer usage description (MUD) solution to automatically update network access policy for client application software. The method may include embedding metadata in the application binary. The metadata may include MUD uniform resource identifiers (URIs) that may point to MUD files describing the application's network access requirements. The MUD files may be hosted by application vendor's MUD servers. The system may include a network policy server that is able discover the MUD URIs. The MUD URIs may be discovered based on extracting the MUD URIs from the metadata and/or being provision with the set of MUD URIs for trusted applications. The method may include enterprise wide policy and individual host policy for implementation of the MUD files.Type: ApplicationFiled: January 17, 2020Publication date: July 22, 2021Applicant: Cisco Technology, Inc.Inventors: Eliot Lear, Owen Friel
-
Publication number: 20200396608Abstract: This technology uses a bootstrap key (“BSK”) to securely onboard a computing device to a network. A unique BSK associated with an onboarding computing device is used to verify for various deployment models (1) that the computing device has proof the computing device is connecting to the correct wired or wireless network and (2) that the network has proof the computing device is trusted. The BSK may be an associated BSK or an embedded BSK. A computing device receives a signed voucher from the manufacturer authorized signing authority (“MASA”) before the computing device may onboard to a network. The MASA will issue a voucher to a Bootstrapping Remote Secure Key Infrastructure (“BRSKI”) registrar if the registrar proves knowledge of the computing device's BSK to the MASA or the registrar has an established trust relationship with the MASA.Type: ApplicationFiled: August 31, 2020Publication date: December 17, 2020Inventors: Eliot Lear, Owen Friel, Max Pritikin
-
Patent number: 10791462Abstract: This technology uses a bootstrap key (“BSK”) to securely onboard a computing device to a network. A unique BSK associated with an onboarding computing device is used to verify for various deployment models (1) that the computing device has proof the computing device is connecting to the correct wired or wireless network and (2) that the network has proof the computing device is trusted. The BSK may be an associated BSK or an embedded BSK. A computing device receives a signed voucher from the manufacturer authorized signing authority (“MASA”) before the computing device may onboard to a network. The MASA will issue a voucher to a Bootstrapping Remote Secure Key Infrastructure (“BRSKI”) registrar if the registrar proves knowledge of the computing device's BSK to the MASA or the registrar has an established trust relationship with the MASA.Type: GrantFiled: February 21, 2019Date of Patent: September 29, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Eliot Lear, Owen Friel, Max Pritikin
-
Publication number: 20200120502Abstract: This technology uses a bootstrap key (“BSK”) to securely onboard a computing device to a network. A unique BSK associated with an onboarding computing device is used to verify for various deployment models (1) that the computing device has proof the computing device is connecting to the correct wired or wireless network and (2) that the network has proof the computing device is trusted. The BSK may be an associated BSK or an embedded BSK. A computing device receives a signed voucher from the manufacturer authorized signing authority (“MASA”) before the computing device may onboard to a network. The MASA will issue a voucher to a Bootstrapping Remote Secure Key Infrastructure (“BRSKI”) registrar if the registrar proves knowledge of the computing device's BSK to the MASA or the registrar has an established trust relationship with the MASA.Type: ApplicationFiled: February 21, 2019Publication date: April 16, 2020Inventors: Eliot Lear, Owen Friel, Max Pritikin
-
Patent number: 9247070Abstract: Some known Contact Centers rely on a Network Level Router to determine which of a number of available Contact Centers should deal with a given contact. This decision is made by the NLR based on real time information provided by the Contact Centers. However, the format of such information is proprietary which means that the NLR must translate and collate this information. This invention seeks to use session initiation protocol (SIP) Presence for such information transfer which enables improved decision making and further enables additional functionality to be added to the Contact Center system. The invention provides a SIP enabled Contact Center (180, 190, 200) comprising a Contact Center server arranged to send SIP messages to one or more other SIP enabled nodes in a SIP communications network, said SIP messages comprising SIP presence information about the current state of the Contact Center.Type: GrantFiled: June 9, 2005Date of Patent: January 26, 2016Assignee: Avaya Inc.Inventors: Patrick Hession, John Costello, Owen Friel
-
Patent number: 7912209Abstract: Statistics relating to the operation of physical, logical and software components of a contact center are generated by or on behalf of the components themselves rather than by a statistics engine based on event notifications from the components. In this way, the locally generated statistical information can be communicated as part of presence information for such components. By subscribing to a presence service for presence information for the components of interest, a statistics service can collect the locally produced statistics coming from each component. This provides a less centralised, more dynamic and adaptable way of managing statistical information in a contact center and provides in addition alternative methods of generating alarms and alerts.Type: GrantFiled: December 21, 2005Date of Patent: March 22, 2011Assignee: Avaya Inc.Inventors: Tony McCormack, Neil O'Connor, Patrick Hession, Owen Friel
-
Publication number: 20100077082Abstract: Some known Contact Centers rely on a Network Level Router to determine which of a number of available Contact Centers should deal with a given contact. This decision is made by the NLR based on real time information provided by the Contact Centers. However, the format of such information is proprietary which means that the NLR must translate and collate this information. This invention seeks to use session initiation protocol (SIP) Presence for such information transfer which enables improved decision making and further enables additional functionality to be added to the Contact Center system. The invention provides a SIP enabled Contact Center (180, 190, 200) comprising a Contact Center server arranged to send SIP messages to one or more other SIP enabled nodes in a SIP communications network, said SIP messages comprising SIP presence information about the current state of the Contact Center.Type: ApplicationFiled: June 9, 2005Publication date: March 25, 2010Applicant: NORTEL NETWORKS LIMITEDInventors: Patrick Hession, Arik Elberse, John Costello, Owen Friel
-
Publication number: 20030046400Abstract: The present invention concerns packet-based communications networks in which gateways are used to direct communications between terminals. For example, H.323 based communications networks are one example of this type of communications network. One problem relates to how such gateways can be enabled to direct communications between terminals in such a way that takes into account cost information and/or the fact that telephone numbers (or other identifiers) are repeated in different parts of the communications network. This is addressed by providing a gatekeeper with cost information associated with each gateway. An originating gateway sends a request to the gatekeeper comprising a unique identifier of that originating gateway and an identifier for a destination terminal. The gatekeeper uses this information to provide a reply comprising a list of all possible gateways that can be used to contact the destination terminal or a single preferred gateway.Type: ApplicationFiled: August 22, 2001Publication date: March 6, 2003Inventors: Owen Friel, Peter G. Tarle, Douglas R. Zork, Francois Audet