Patents by Inventor Rebecca M. Ballesteros

Rebecca M. Ballesteros has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9356932
    Abstract: A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is determined. A portion of a control policy corresponding to the network layer and the user traffic is accessed. Then, the portion is sent to a security device associated with the network layer, the portion being configured to be applied by the security device to the network layer and the user traffic.
    Type: Grant
    Filed: January 30, 2009
    Date of Patent: May 31, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Sherry Krell, Rebecca M. Ballesteros, Adrian Cowham, John M. Green
  • Patent number: 9032478
    Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
    Type: Grant
    Filed: January 29, 2009
    Date of Patent: May 12, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
  • Publication number: 20110289551
    Abstract: A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is determined. A portion of a control policy corresponding to the network layer and the user traffic is accessed. Then, the portion is sent to a security device associated with the network layer, the portion being configured to be applied by the security device to the network layer and the user traffic.
    Type: Application
    Filed: January 30, 2009
    Publication date: November 24, 2011
    Inventors: Sherry Krell, Rebecca M. Ballesteros, Adrian Cowham, John M. green
  • Publication number: 20110289557
    Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
    Type: Application
    Filed: January 29, 2009
    Publication date: November 24, 2011
    Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti