Patents by Inventor Richard Groves

Richard Groves has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240039891
    Abstract: A method and system for mitigating a threat associated with network data packets are provided. The method commences with receiving, by an authentication server, a request for access to a server from a client. The method further includes authenticating the client by the authentication server. The authentication includes providing an authentication token to the client. The method continues with receiving, by a mitigation device, from the client, at least one network packet directed to the server. The at least one network packet embeds the authentication token. The method further includes validating, by the mitigation device, authenticity of the authentication token and selectively forwarding, based on the validation, the at least one network packet to the server. The authentication token is independently generated by the authentication server, the mitigation device, and the server using a shared token generation algorithm based on a hash salt value.
    Type: Application
    Filed: October 10, 2023
    Publication date: February 1, 2024
    Applicant: A10 Networks, Inc.
    Inventors: Yutun (Tony) Tseng, Ahmed Abdelhalim, Vernon Richard Groves, Ching-Wen Huang
  • Patent number: 11884885
    Abstract: A process is provided for producing a liquid hydrocarbon material suitable for use as a fuel or as a blending component in a fuel. The process includes co-processing a pyrolysis oil derived from a waste plastic raw material and a biorenewable feedstock comprising triglycerides in a catalytic cracking process in a presence of a solid catalyst at catalytic cracking conditions to provide a cracking product. The cracking product may be fractionated to provide at least one of a gasoline fraction and a middle distillate fraction.
    Type: Grant
    Filed: July 20, 2022
    Date of Patent: January 30, 2024
    Inventors: Tengfei Liu, Joel Edward Schmidt, Richard Grove, Hye-Kyung Cho Timken
  • Patent number: 11818097
    Abstract: A method and system for mitigating a threat associated with network data packets are provided. The method commences with receiving, by an authentication server, a request for access to a server from a client. The method further includes authenticating the client by the authentication server. The authentication includes providing an authentication token to the client. The method continues with receiving, by a mitigation device, from the client, at least one network packet directed to the server. The at least one network packet embeds the authentication token. The method further includes validating, by the mitigation device, authenticity of the authentication token and selectively forwarding, based on the validation, the at least one network packet to the server. The authentication token is independently generated by the authentication server, the mitigation device, and the server using a shared token generation algorithm based on a hash salt value.
    Type: Grant
    Filed: April 25, 2021
    Date of Patent: November 14, 2023
    Inventors: Yutun (Tony) Tseng, Ahmed Abdelhalim, Vernon Richard Groves, Ching-Wen Huang
  • Publication number: 20230085274
    Abstract: A process is provided for producing a liquid hydrocarbon material suitable for use as a fuel or as a blending component in a fuel. The process includes co-processing a pyrolysis oil derived from a waste plastic raw material and a biorenewable feedstock comprising triglycerides in a catalytic cracking process in a presence of a solid catalyst at catalytic cracking conditions to provide a cracking product. The cracking product may be fractionated to provide at least one of a gasoline fraction and a middle distillate fraction.
    Type: Application
    Filed: July 20, 2022
    Publication date: March 16, 2023
    Inventors: Tengfei LIU, Joel Edward SCHMIDT, Richard GROVE, Hye-Kyung Cho TIMKEN
  • Publication number: 20230068800
    Abstract: Snowplow blades and cutting edge systems for snowplow blades are described herein. The cutting edge systems include a backing plate coupled to a bottom portion of a moldboard of the snowplow blade and a plurality of cutting edge segments each configured to be slidably mounted to the front surface of the backing plate. The backing plate has, for each of the blade segments, a central opening, a first slot positioned on a first side of the central opening and a second slot positioned on a second side of the central opening. Each cutting edge segment includes a blade segment, a compression member and a retainer plate.
    Type: Application
    Filed: August 25, 2022
    Publication date: March 2, 2023
    Inventors: Ryan Frey, Richard Grove, Marvin Martin, Leon Martin
  • Publication number: 20220345459
    Abstract: A method and system for mitigating a threat associated with network data packets are provided. The method commences with receiving, by an authentication server, a request for access to a server from a client. The method further includes authenticating the client by the authentication server. The authentication includes providing an authentication token to the client. The method continues with receiving, by a mitigation device, from the client, at least one network packet directed to the server. The at least one network packet embeds the authentication token. The method further includes validating, by the mitigation device, authenticity of the authentication token and selectively forwarding, based on the validation, the at least one network packet to the server. The authentication token is independently generated by the authentication server, the mitigation device, and the server using a shared token generation algorithm based on a hash salt value.
    Type: Application
    Filed: April 25, 2021
    Publication date: October 27, 2022
    Inventors: Yutun (Tony) Tseng, Ahmed Abdelhalim, Vernon Richard Groves, Ching-Wen Huang
  • Patent number: 11477218
    Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: October 18, 2022
    Inventors: Vernon Richard Groves, Vishnu Vasanth Radja, Diptanshu Purwar, Micheal Thompson
  • Patent number: 11115481
    Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, in response to the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: September 7, 2021
    Assignee: A10 Networks, Inc.
    Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
  • Publication number: 20210152576
    Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.
    Type: Application
    Filed: January 4, 2021
    Publication date: May 20, 2021
    Inventors: Vernon Richard Groves, Vishnu Vasanth Radja, Diptanshu Purwar, Micheal Thompson
  • Patent number: 10947458
    Abstract: A process is provided for upgrading a renewable feedstock. The process includes introducing the renewable feedstock into a fluid catalytic cracking (FCC) reactor unit operating under catalytic cracking conditions and comprising a circulating inventory of an equilibrium catalyst composition; removing a portion of the equilibrium catalyst inventory from the FCC reactor unit while replacing all the equilibrium catalyst removed from the unit with a spent catalyst to obtain a composite circulating catalyst within the FCC reactor unit; and contacting the composite circulating catalyst with the renewable feedstock in the FCC reactor unit under a steady state environment to provide a product stream comprising cracked products.
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: March 16, 2021
    Assignee: CHEVRON U.S.A. INC.
    Inventors: Tengfei Liu, Mingting Xu, Kandaswamy Jothimurugesan, Richard Grove, Michael K. Maholland, Michelle Young, Winnie Lieu, Cameron McCord
  • Patent number: 10938783
    Abstract: Provided are methods and systems for cluster-based determination of signatures for detection of anomalous data traffic. An example method may include capturing, by a network module, data packets routed to a destination. The method may further include grouping, by at least one processor in communication with the network module, the data packets into clusters. The method may also include detecting, by the processor, an anomaly in the data packets and, in response to the detection, determining, by the processor and based on the clusters, one or more signatures associated with the data packets. The method may further include generating, by the processor and based on the signatures, one or more rules for allowing the data packets. The method may further include providing, by the processor, the one or more rules to a policy enforcement point associated with the destination.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: March 2, 2021
    Assignee: A10 Networks, Inc.
    Inventors: Micheal Thompson, Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
  • Patent number: 10911490
    Abstract: A security platform running on a server includes (a) protocol stacks each configured to receive and to transmit IP data packets over a network interface, wherein the protocol stacks have predetermined performance characteristics that are different from each other and wherein each protocol stack includes one or more program interfaces to allow changes to its performance characteristics; (b) application programs each configured to receive and transmit payloads of the IP data packets, wherein at least two of the application programs are customized to handle different content types in the payloads and wherein each application program accesses the program interface of at least one protocol stack to tune performance characteristics of the protocol stack; (c) classifiers configured to inspect at a given time IP data packets then received in the network interface to select one of the protocol stack and one of the application programs to service the data packets; and (d) a control program to load and run the selected
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: February 2, 2021
    Assignee: A10 NETWORKS, INC.
    Inventors: Micheal Thompson, Richard Groves
  • Patent number: 10887342
    Abstract: Provided are methods and systems for mitigating a distributed denial of service (DDoS) event. The method may commence with sending a request to a health monitor concerning a state of a network. The method may continue with attributing a lack of response to the request from the health monitor to be an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. The collapsible virtual data circuit may be designed to collapse in response to the DDoS event in the network. The method may include redirecting the network data traffic associated with the collapsible virtual data circuit based on the indication of the collapse of the collapsible virtual data circuit.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: January 5, 2021
    Assignee: A10 Networks, Inc.
    Inventors: Micheal Thompson, Vernon Richard Groves
  • Patent number: 10887329
    Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: January 5, 2021
    Assignee: A10 Networks, Inc.
    Inventors: Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
  • Patent number: 10826777
    Abstract: In response to communications between one or more given networks and one or more other networks, a network protection appliance discovers one or more computing resources of the one or more given networks from a plurality of protocol layers of the received communications. The network protection appliance also gleans properties of the one or more discovered computing resources of the one or more given networks from the plurality of protocol layers of the received communications. The network protection appliance maps the gleaned properties of the one or more discovered computing resources of the one or more given networks to a plurality of network protection policies. The network protection appliance also determines an applicable network protection policy for processing a corresponding received communication from the mapping of the gleaned properties of the one or more discovered given computing resources of the one or more given networks to the plurality of network protection policies.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: November 3, 2020
    Assignee: A10 NETWORKS, INCORPORATED
    Inventors: Vernon Richard Groves, Eric Chou, Bill Benetti
  • Publication number: 20200204632
    Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, in response to the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.
    Type: Application
    Filed: March 2, 2020
    Publication date: June 25, 2020
    Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
  • Patent number: 10581976
    Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, based on the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: March 3, 2020
    Assignee: A10 Networks, Inc.
    Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
  • Publication number: 20200036734
    Abstract: Provided are methods and systems for cluster-based mitigation of a network attack. A method for cluster-based mitigation of a network attack may commence with detecting an unusual pattern in network data traffic associated with data sources. The method may further include extracting signature parameters associated with the network data traffic. The signature parameters may be indicative of the network attack. The method may continue with assigning importance weights to the signature parameters based on historical signature data to generate weighted signature parameters. The method may further include building a decision tree for the data sources based on the weighted signature parameters. The method may continue with creating an optimal number of clusters for the data sources based on an analysis of the decision tree. The method may further include selectively taking at least one mitigating action with regard to the data sources within the clusters.
    Type: Application
    Filed: July 26, 2018
    Publication date: January 30, 2020
    Inventors: Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
  • Publication number: 20200036684
    Abstract: Provided are methods and systems for cluster-based determination of signatures for detection of anomalous data traffic. An example method may include capturing, by a network module, data packets routed to a destination. The method may further include grouping, by at least one processor in communication with the network module, the data packets into clusters. The method may also include detecting, by the processor, an anomaly in the data packets and, in response to the detection, determining, by the processor and based on the clusters, one or more signatures associated with the data packets. The method may further include generating, by the processor and based on the signatures, one or more rules for allowing the data packets. The method may further include providing, by the processor, the one or more rules to a policy enforcement point associated with the destination.
    Type: Application
    Filed: September 7, 2018
    Publication date: January 30, 2020
    Inventors: Micheal Thompson, Vishnu Vasanth Radja, Vernon Richard Groves, Diptanshu Purwar
  • Patent number: 10505964
    Abstract: Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: December 10, 2019
    Assignee: A10 Networks, Inc.
    Inventors: Rajkumar Jalan, Vernon Richard Groves