Patents by Inventor Patrick Mahan

Patrick Mahan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7388836
    Abstract: A method for communicating data in a network environment is provided that includes receiving one or more packets for establishing a communication session in a network and determining which of the packets should be delayed. A selected one or more of the packets are delayed for a designated time interval in order to extend a roundtrip time (RTT) parameter associated with the selected packets. The selected packets are communicated after the time interval has expired.
    Type: Grant
    Filed: March 7, 2003
    Date of Patent: June 17, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Randall R. Stewart, Peter Lei, Patrick Mahan
  • Patent number: 7257840
    Abstract: Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. An ACK message or dummy segment is sent to verify the authenticity of the data in the re-assembly buffer, and to help discard spurious data faster. These approaches involve the sender in detection of spurious data, and make improved use of mechanisms for processing ACK messages that are native to typical TCP implementations. The latter approach may be implemented without modification of the sender's TCP implementation. Further, the receiver's TCP implementation maintains compatibility with RFC 793.
    Type: Grant
    Filed: March 30, 2004
    Date of Patent: August 14, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Anantha Ramaiah, Randall Stewart, Peter Lei, Patrick Mahan
  • Patent number: 7114181
    Abstract: Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. A first approach provides for dropping received segments that carry ACK values smaller than the next unacknowledged sequence number expected minus the maximum window size. This approach helps keep spurious injected segments out of the TCP re-assembly buffer. In a second approach, heuristics are used to examine the sequence number of a newly arrived segment, and when the sequence number is the next expected, then the newly arrived segment is used and the contents of the re-assembly buffer are not considered. Further, if the data payload of the newly arrived segment overlaps in sequential order with segments already in the re-assembly buffer, the overlapped segments in the re-assembly buffer are considered spurious and are discarded. Thus, this approach helps remove spurious data from the re-assembly buffer if the first approach somehow fails to prevent the data from entering the re-assembly buffer.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: September 26, 2006
    Assignee: Cisco Technology, Inc.
    Inventors: Anantha Ramaiah, Randall Stewart, Peter Lei, Patrick Mahan
  • Publication number: 20050160293
    Abstract: Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. An ACK message or dummy segment is sent to verify the authenticity of the data in the re-assembly buffer, and to help discard spurious data faster. These approaches involve the sender in detection of spurious data, and make improved use of mechanisms for processing ACK messages that are native to typical TCP implementations. The latter approach may be implemented without modification of the sender's TCP implementation. Further, the receiver's TCP implementation maintains compatibility with RFC 793.
    Type: Application
    Filed: March 30, 2004
    Publication date: July 21, 2005
    Inventors: Anantha Ramaiah, Randall Stewart, Peter Lei, Patrick Mahan
  • Publication number: 20050160478
    Abstract: Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. A first approach provides for dropping received segments that carry ACK values smaller than the next unacknowledged sequence number expected minus the maximum window size. This approach helps keep spurious injected segments out of the TCP re-assembly buffer. In a second approach, heuristics are used to examine the sequence number of a newly arrived segment, and when the sequence number is the next expected, then the newly arrived segment is used and the contents of the re-assembly buffer are not considered. Further, if the data payload of the newly arrived segment overlaps in sequential order with segments already in the re-assembly buffer, the overlapped segments in the re-assembly buffer are considered spurious and are discarded. Thus, this approach helps remove spurious data from the re-assembly buffer if the first approach somehow fails to prevent the data from entering the re-assembly buffer.
    Type: Application
    Filed: March 2, 2004
    Publication date: July 21, 2005
    Inventors: Anantha Ramaiah, Randall Stewart, Peter Lei, Patrick Mahan
  • Publication number: 20040174816
    Abstract: A method for communicating data in a network environment is provided that includes receiving one or more packets for establishing a communication session in a network and determining which of the packets should be delayed. A selected one or more of the packets are delayed for a designated time interval in order to extend a roundtrip time (RTT) parameter associated with the selected packets. The selected packets are communicated after the time interval has expired.
    Type: Application
    Filed: March 7, 2003
    Publication date: September 9, 2004
    Applicant: Cisco Technology, Inc.
    Inventors: Randall R. Stewart, Peter Lei, Patrick Mahan