Patents by Inventor Paul Gleichauf
Paul Gleichauf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8595817Abstract: Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security functions among network elements and systems. In one technique, a network element comprises security function modules. Systems toward which the network element forwards data packets also comprise security function modules. A particular security function module on the network element begins in a state of deactivation. The network element determines whether a corresponding security function module on one of the systems is functioning in a satisfactory manner. If not, then the network element activates the particular security function module. While activated, the particular security function module may perform at least some of the security function operations that the corresponding security function module would have performed if the corresponding security function module was satisfactory.Type: GrantFiled: August 1, 2006Date of Patent: November 26, 2013Assignee: Cisco Technology, Inc.Inventor: Paul Gleichauf
-
Patent number: 8156230Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.Type: GrantFiled: March 22, 2011Date of Patent: April 10, 2012Assignee: Cisco Technology, Inc.Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
-
Patent number: 8127412Abstract: A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vType: GrantFiled: March 30, 2007Date of Patent: March 6, 2012Assignee: Cisco Technology, Inc.Inventors: Paul Gleichauf, Mark Bakke, Timothy Kuik, David Thompson, Xiaoxue Ma
-
Patent number: 8121043Abstract: An approach for managing the consumption of resources uses adaptive random sampling to decrease the collection of flow statistical data as the consumption of resources increases. When a packet is received from a network, a determination is made whether the packet belongs to an existing flow, for which flow statistical data is being collected, or to a new flow. If the packet belongs to an existing flow, then the flow statistical data for the existing flow is updated to reflect the packet. If the packet belongs to the new flow, then a sampling probability is used to determine whether the new flow is to be sampled. The sampling probability is determined, at least in part, upon a current usage of resources.Type: GrantFiled: August 19, 2005Date of Patent: February 21, 2012Assignee: Cisco Technology, Inc.Inventors: Xiaoxue Ma, Paul Gleichauf, Ganesh Sadasivan, Sunil Khaunte, Paul Aitken
-
Publication number: 20110173295Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.Type: ApplicationFiled: March 22, 2011Publication date: July 14, 2011Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
-
Patent number: 7949766Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.Type: GrantFiled: June 21, 2006Date of Patent: May 24, 2011Assignee: Cisco Technology, Inc.Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
-
Publication number: 20100257599Abstract: Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security functions among network elements and systems. In one technique, a network element comprises security function modules. Systems toward which the network element forwards data packets also comprise security function modules. A particular security function module on the network element begins in a state of deactivation. The network element determines whether a corresponding security function module on one of the systems is functioning in a satisfactory manner. If not, then the network element activates the particular security function module. While activated, the particular security function module may perform at least some of the security function operations that the corresponding security function module would have performed if the corresponding security function module was satisfactory.Type: ApplicationFiled: August 1, 2006Publication date: October 7, 2010Inventor: Paul Gleichauf
-
Publication number: 20080244747Abstract: A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vType: ApplicationFiled: March 30, 2007Publication date: October 2, 2008Inventors: Paul Gleichauf, Mark Bakke, Timothy Kuik, David Thompson, Xiaoxue Ma
-
Publication number: 20070112683Abstract: A method and system for managing payment for a license for a licensed product is provided. The method includes the use of regulations to enforce payment for the license that is issued to a client. The license is issued to the client by a license manager. The license manager informs the client if payment for the license is due. The client is instructed to make payment for the license by including payment for license in auditing functions of an auditor. Thereafter, the access expiration date of the licensed product is extended. The auditing functions include verification of the compliance of the client with the regulations. Thereafter, the client makes payment for the license.Type: ApplicationFiled: November 16, 2005Publication date: May 17, 2007Applicant: Cisco Technology, Inc.Inventor: Paul Gleichauf
-
Publication number: 20070041331Abstract: An approach for managing the consumption of resources uses adaptive random sampling to decrease the collection of flow statistical data as the consumption of resources increases. When a packet is received from a network, a determination is made whether the packet belongs to an existing flow, for which flow statistical data is being collected, or to a new flow. If the packet belongs to an existing flow, then the flow statistical data for the existing flow is updated to reflect the packet. If the packet belongs to the new flow, then a sampling probability is used to determine whether the new flow is to be sampled. The sampling probability is determined, at least in part, upon a current usage of resources.Type: ApplicationFiled: August 19, 2005Publication date: February 22, 2007Inventors: Xiaoxue Ma, Paul Gleichauf, Ganesh Sadasivan, Sunil Khaunte, Paul Aitken
-
Publication number: 20070011272Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.Type: ApplicationFiled: June 21, 2006Publication date: January 11, 2007Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
-
Publication number: 20060217923Abstract: A policy-based approach for managing the export of network flow statistical data uses constraints and prioritization to select flow data to be exported by flow monitoring processes. According to the approach, a flow monitoring process monitors a plurality of flows at an observation point. The flow monitoring process generates flow statistical data for the plurality of flows. Policy data is made available to the flow monitoring process and includes constraint data and priority data. The constraint data indicates usage constraints for one or more resources available to the flow monitoring process. The priority data indicates a desired priority of flow attributes. The flow monitoring process uses the policy data to select one or more flows from the plurality of flows, such that the resource usage constraints are satisfied. The flow monitoring process exports a portion of the flow statistical data that corresponds to the selected one or more flows.Type: ApplicationFiled: March 23, 2005Publication date: September 28, 2006Inventors: Xiaoxue Ma, Paul Gleichauf, Paul Atkins
-
Publication number: 20030149869Abstract: An approach for securely transmitting and storing data is described. A sending host generates a truly random sequence of characters as a keystream that may serve as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to result in creating ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host. The receiving host decrypts the ciphertext by applying the keystream to the ciphertext using bitwise exclusive-OR. The separately routed paths may be established using MPLS labeling or strict route options. The keystream may be pre-computed and sent to the receiving host asynchronously for caching at the receiving host; the receiving host may then replace cached keystream with recovered plaintext as the ciphertext is decrypted, thereby achieving savings in storage. Security of the system lies in the truly random nature of the keystream and the use of physically separate routing paths for keystream and ciphertext.Type: ApplicationFiled: February 1, 2002Publication date: August 7, 2003Inventor: Paul Gleichauf