Patents by Inventor Paul Gleichauf

Paul Gleichauf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8595817
    Abstract: Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security functions among network elements and systems. In one technique, a network element comprises security function modules. Systems toward which the network element forwards data packets also comprise security function modules. A particular security function module on the network element begins in a state of deactivation. The network element determines whether a corresponding security function module on one of the systems is functioning in a satisfactory manner. If not, then the network element activates the particular security function module. While activated, the particular security function module may perform at least some of the security function operations that the corresponding security function module would have performed if the corresponding security function module was satisfactory.
    Type: Grant
    Filed: August 1, 2006
    Date of Patent: November 26, 2013
    Assignee: Cisco Technology, Inc.
    Inventor: Paul Gleichauf
  • Patent number: 8156230
    Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    Type: Grant
    Filed: March 22, 2011
    Date of Patent: April 10, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
  • Patent number: 8127412
    Abstract: A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the v
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: March 6, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Paul Gleichauf, Mark Bakke, Timothy Kuik, David Thompson, Xiaoxue Ma
  • Patent number: 8121043
    Abstract: An approach for managing the consumption of resources uses adaptive random sampling to decrease the collection of flow statistical data as the consumption of resources increases. When a packet is received from a network, a determination is made whether the packet belongs to an existing flow, for which flow statistical data is being collected, or to a new flow. If the packet belongs to an existing flow, then the flow statistical data for the existing flow is updated to reflect the packet. If the packet belongs to the new flow, then a sampling probability is used to determine whether the new flow is to be sampled. The sampling probability is determined, at least in part, upon a current usage of resources.
    Type: Grant
    Filed: August 19, 2005
    Date of Patent: February 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Xiaoxue Ma, Paul Gleichauf, Ganesh Sadasivan, Sunil Khaunte, Paul Aitken
  • Publication number: 20110173295
    Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    Type: Application
    Filed: March 22, 2011
    Publication date: July 14, 2011
    Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
  • Patent number: 7949766
    Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    Type: Grant
    Filed: June 21, 2006
    Date of Patent: May 24, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
  • Publication number: 20100257599
    Abstract: Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security functions among network elements and systems. In one technique, a network element comprises security function modules. Systems toward which the network element forwards data packets also comprise security function modules. A particular security function module on the network element begins in a state of deactivation. The network element determines whether a corresponding security function module on one of the systems is functioning in a satisfactory manner. If not, then the network element activates the particular security function module. While activated, the particular security function module may perform at least some of the security function operations that the corresponding security function module would have performed if the corresponding security function module was satisfactory.
    Type: Application
    Filed: August 1, 2006
    Publication date: October 7, 2010
    Inventor: Paul Gleichauf
  • Publication number: 20080244747
    Abstract: A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the v
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Paul Gleichauf, Mark Bakke, Timothy Kuik, David Thompson, Xiaoxue Ma
  • Publication number: 20070112683
    Abstract: A method and system for managing payment for a license for a licensed product is provided. The method includes the use of regulations to enforce payment for the license that is issued to a client. The license is issued to the client by a license manager. The license manager informs the client if payment for the license is due. The client is instructed to make payment for the license by including payment for license in auditing functions of an auditor. Thereafter, the access expiration date of the licensed product is extended. The auditing functions include verification of the compliance of the client with the regulations. Thereafter, the client makes payment for the license.
    Type: Application
    Filed: November 16, 2005
    Publication date: May 17, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Paul Gleichauf
  • Publication number: 20070041331
    Abstract: An approach for managing the consumption of resources uses adaptive random sampling to decrease the collection of flow statistical data as the consumption of resources increases. When a packet is received from a network, a determination is made whether the packet belongs to an existing flow, for which flow statistical data is being collected, or to a new flow. If the packet belongs to an existing flow, then the flow statistical data for the existing flow is updated to reflect the packet. If the packet belongs to the new flow, then a sampling probability is used to determine whether the new flow is to be sampled. The sampling probability is determined, at least in part, upon a current usage of resources.
    Type: Application
    Filed: August 19, 2005
    Publication date: February 22, 2007
    Inventors: Xiaoxue Ma, Paul Gleichauf, Ganesh Sadasivan, Sunil Khaunte, Paul Aitken
  • Publication number: 20070011272
    Abstract: An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    Type: Application
    Filed: June 21, 2006
    Publication date: January 11, 2007
    Inventors: Mark Bakke, Timothy Kuik, David Thompson, Paul Gleichauf, Xiaoxue Ma
  • Publication number: 20060217923
    Abstract: A policy-based approach for managing the export of network flow statistical data uses constraints and prioritization to select flow data to be exported by flow monitoring processes. According to the approach, a flow monitoring process monitors a plurality of flows at an observation point. The flow monitoring process generates flow statistical data for the plurality of flows. Policy data is made available to the flow monitoring process and includes constraint data and priority data. The constraint data indicates usage constraints for one or more resources available to the flow monitoring process. The priority data indicates a desired priority of flow attributes. The flow monitoring process uses the policy data to select one or more flows from the plurality of flows, such that the resource usage constraints are satisfied. The flow monitoring process exports a portion of the flow statistical data that corresponds to the selected one or more flows.
    Type: Application
    Filed: March 23, 2005
    Publication date: September 28, 2006
    Inventors: Xiaoxue Ma, Paul Gleichauf, Paul Atkins
  • Publication number: 20030149869
    Abstract: An approach for securely transmitting and storing data is described. A sending host generates a truly random sequence of characters as a keystream that may serve as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to result in creating ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host. The receiving host decrypts the ciphertext by applying the keystream to the ciphertext using bitwise exclusive-OR. The separately routed paths may be established using MPLS labeling or strict route options. The keystream may be pre-computed and sent to the receiving host asynchronously for caching at the receiving host; the receiving host may then replace cached keystream with recovered plaintext as the ciphertext is decrypted, thereby achieving savings in storage. Security of the system lies in the truly random nature of the keystream and the use of physically separate routing paths for keystream and ciphertext.
    Type: Application
    Filed: February 1, 2002
    Publication date: August 7, 2003
    Inventor: Paul Gleichauf