Patents by Inventor Richard Groves
Richard Groves has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240039891Abstract: A method and system for mitigating a threat associated with network data packets are provided. The method commences with receiving, by an authentication server, a request for access to a server from a client. The method further includes authenticating the client by the authentication server. The authentication includes providing an authentication token to the client. The method continues with receiving, by a mitigation device, from the client, at least one network packet directed to the server. The at least one network packet embeds the authentication token. The method further includes validating, by the mitigation device, authenticity of the authentication token and selectively forwarding, based on the validation, the at least one network packet to the server. The authentication token is independently generated by the authentication server, the mitigation device, and the server using a shared token generation algorithm based on a hash salt value.Type: ApplicationFiled: October 10, 2023Publication date: February 1, 2024Applicant: A10 Networks, Inc.Inventors: Yutun (Tony) Tseng, Ahmed Abdelhalim, Vernon Richard Groves, Ching-Wen Huang
-
Patent number: 11884885Abstract: A process is provided for producing a liquid hydrocarbon material suitable for use as a fuel or as a blending component in a fuel. The process includes co-processing a pyrolysis oil derived from a waste plastic raw material and a biorenewable feedstock comprising triglycerides in a catalytic cracking process in a presence of a solid catalyst at catalytic cracking conditions to provide a cracking product. The cracking product may be fractionated to provide at least one of a gasoline fraction and a middle distillate fraction.Type: GrantFiled: July 20, 2022Date of Patent: January 30, 2024Inventors: Tengfei Liu, Joel Edward Schmidt, Richard Grove, Hye-Kyung Cho Timken
-
Patent number: 11818097Abstract: A method and system for mitigating a threat associated with network data packets are provided. The method commences with receiving, by an authentication server, a request for access to a server from a client. The method further includes authenticating the client by the authentication server. The authentication includes providing an authentication token to the client. The method continues with receiving, by a mitigation device, from the client, at least one network packet directed to the server. The at least one network packet embeds the authentication token. The method further includes validating, by the mitigation device, authenticity of the authentication token and selectively forwarding, based on the validation, the at least one network packet to the server. The authentication token is independently generated by the authentication server, the mitigation device, and the server using a shared token generation algorithm based on a hash salt value.Type: GrantFiled: April 25, 2021Date of Patent: November 14, 2023Inventors: Yutun (Tony) Tseng, Ahmed Abdelhalim, Vernon Richard Groves, Ching-Wen Huang
-
Publication number: 20230085274Abstract: A process is provided for producing a liquid hydrocarbon material suitable for use as a fuel or as a blending component in a fuel. The process includes co-processing a pyrolysis oil derived from a waste plastic raw material and a biorenewable feedstock comprising triglycerides in a catalytic cracking process in a presence of a solid catalyst at catalytic cracking conditions to provide a cracking product. The cracking product may be fractionated to provide at least one of a gasoline fraction and a middle distillate fraction.Type: ApplicationFiled: July 20, 2022Publication date: March 16, 2023Inventors: Tengfei LIU, Joel Edward SCHMIDT, Richard GROVE, Hye-Kyung Cho TIMKEN
-
Publication number: 20230068800Abstract: Snowplow blades and cutting edge systems for snowplow blades are described herein. The cutting edge systems include a backing plate coupled to a bottom portion of a moldboard of the snowplow blade and a plurality of cutting edge segments each configured to be slidably mounted to the front surface of the backing plate. The backing plate has, for each of the blade segments, a central opening, a first slot positioned on a first side of the central opening and a second slot positioned on a second side of the central opening. Each cutting edge segment includes a blade segment, a compression member and a retainer plate.Type: ApplicationFiled: August 25, 2022Publication date: March 2, 2023Inventors: Ryan Frey, Richard Grove, Marvin Martin, Leon Martin
-
Publication number: 20220345459Abstract: A method and system for mitigating a threat associated with network data packets are provided. The method commences with receiving, by an authentication server, a request for access to a server from a client. The method further includes authenticating the client by the authentication server. The authentication includes providing an authentication token to the client. The method continues with receiving, by a mitigation device, from the client, at least one network packet directed to the server. The at least one network packet embeds the authentication token. The method further includes validating, by the mitigation device, authenticity of the authentication token and selectively forwarding, based on the validation, the at least one network packet to the server. The authentication token is independently generated by the authentication server, the mitigation device, and the server using a shared token generation algorithm based on a hash salt value.Type: ApplicationFiled: April 25, 2021Publication date: October 27, 2022Inventors: Yutun (Tony) Tseng, Ahmed Abdelhalim, Vernon Richard Groves, Ching-Wen Huang
-
Patent number: 11477218Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.Type: GrantFiled: January 4, 2021Date of Patent: October 18, 2022Inventors: Vernon Richard Groves, Vishnu Vasanth Radja, Diptanshu Purwar, Micheal Thompson
-
Patent number: 11115481Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, in response to the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.Type: GrantFiled: March 2, 2020Date of Patent: September 7, 2021Assignee: A10 Networks, Inc.Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
-
Publication number: 20210152576Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.Type: ApplicationFiled: January 4, 2021Publication date: May 20, 2021Inventors: Vernon Richard Groves, Vishnu Vasanth Radja, Diptanshu Purwar, Micheal Thompson
-
Patent number: 10947458Abstract: A process is provided for upgrading a renewable feedstock. The process includes introducing the renewable feedstock into a fluid catalytic cracking (FCC) reactor unit operating under catalytic cracking conditions and comprising a circulating inventory of an equilibrium catalyst composition; removing a portion of the equilibrium catalyst inventory from the FCC reactor unit while replacing all the equilibrium catalyst removed from the unit with a spent catalyst to obtain a composite circulating catalyst within the FCC reactor unit; and contacting the composite circulating catalyst with the renewable feedstock in the FCC reactor unit under a steady state environment to provide a product stream comprising cracked products.Type: GrantFiled: March 18, 2020Date of Patent: March 16, 2021Assignee: CHEVRON U.S.A. INC.Inventors: Tengfei Liu, Mingting Xu, Kandaswamy Jothimurugesan, Richard Grove, Michael K. Maholland, Michelle Young, Winnie Lieu, Cameron McCord
-
Patent number: 10938783Abstract: Provided are methods and systems for cluster-based determination of signatures for detection of anomalous data traffic. An example method may include capturing, by a network module, data packets routed to a destination. The method may further include grouping, by at least one processor in communication with the network module, the data packets into clusters. The method may also include detecting, by the processor, an anomaly in the data packets and, in response to the detection, determining, by the processor and based on the clusters, one or more signatures associated with the data packets. The method may further include generating, by the processor and based on the signatures, one or more rules for allowing the data packets. The method may further include providing, by the processor, the one or more rules to a policy enforcement point associated with the destination.Type: GrantFiled: September 7, 2018Date of Patent: March 2, 2021Assignee: A10 Networks, Inc.Inventors: Micheal Thompson, Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
-
Patent number: 10911490Abstract: A security platform running on a server includes (a) protocol stacks each configured to receive and to transmit IP data packets over a network interface, wherein the protocol stacks have predetermined performance characteristics that are different from each other and wherein each protocol stack includes one or more program interfaces to allow changes to its performance characteristics; (b) application programs each configured to receive and transmit payloads of the IP data packets, wherein at least two of the application programs are customized to handle different content types in the payloads and wherein each application program accesses the program interface of at least one protocol stack to tune performance characteristics of the protocol stack; (c) classifiers configured to inspect at a given time IP data packets then received in the network interface to select one of the protocol stack and one of the application programs to service the data packets; and (d) a control program to load and run the selectedType: GrantFiled: December 28, 2017Date of Patent: February 2, 2021Assignee: A10 NETWORKS, INC.Inventors: Micheal Thompson, Richard Groves
-
Patent number: 10887342Abstract: Provided are methods and systems for mitigating a distributed denial of service (DDoS) event. The method may commence with sending a request to a health monitor concerning a state of a network. The method may continue with attributing a lack of response to the request from the health monitor to be an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. The collapsible virtual data circuit may be designed to collapse in response to the DDoS event in the network. The method may include redirecting the network data traffic associated with the collapsible virtual data circuit based on the indication of the collapse of the collapsible virtual data circuit.Type: GrantFiled: December 14, 2018Date of Patent: January 5, 2021Assignee: A10 Networks, Inc.Inventors: Micheal Thompson, Vernon Richard Groves
-
Patent number: 10887329Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.Type: GrantFiled: July 26, 2018Date of Patent: January 5, 2021Assignee: A10 Networks, Inc.Inventors: Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
-
Patent number: 10826777Abstract: In response to communications between one or more given networks and one or more other networks, a network protection appliance discovers one or more computing resources of the one or more given networks from a plurality of protocol layers of the received communications. The network protection appliance also gleans properties of the one or more discovered computing resources of the one or more given networks from the plurality of protocol layers of the received communications. The network protection appliance maps the gleaned properties of the one or more discovered computing resources of the one or more given networks to a plurality of network protection policies. The network protection appliance also determines an applicable network protection policy for processing a corresponding received communication from the mapping of the gleaned properties of the one or more discovered given computing resources of the one or more given networks to the plurality of network protection policies.Type: GrantFiled: June 23, 2015Date of Patent: November 3, 2020Assignee: A10 NETWORKS, INCORPORATEDInventors: Vernon Richard Groves, Eric Chou, Bill Benetti
-
Publication number: 20200204632Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, in response to the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.Type: ApplicationFiled: March 2, 2020Publication date: June 25, 2020Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
-
Patent number: 10581976Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, based on the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.Type: GrantFiled: August 12, 2015Date of Patent: March 3, 2020Assignee: A10 Networks, Inc.Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
-
Publication number: 20200036734Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.Type: ApplicationFiled: July 26, 2018Publication date: January 30, 2020Inventors: Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
-
Publication number: 20200036684Abstract: Provided are methods and systems for cluster-based determination of signatures for detection of anomalous data traffic. An example method may include capturing, by a network module, data packets routed to a destination. The method may further include grouping, by at least one processor in communication with the network module, the data packets into clusters. The method may also include detecting, by the processor, an anomaly in the data packets and, in response to the detection, determining, by the processor and based on the clusters, one or more signatures associated with the data packets. The method may further include generating, by the processor and based on the signatures, one or more rules for allowing the data packets. The method may further include providing, by the processor, the one or more rules to a policy enforcement point associated with the destination.Type: ApplicationFiled: September 7, 2018Publication date: January 30, 2020Inventors: Micheal Thompson, Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
-
Patent number: 10505964Abstract: Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.Type: GrantFiled: November 16, 2017Date of Patent: December 10, 2019Assignee: A10 Networks, Inc.Inventors: Rajkumar Jalan, Vernon Richard Groves