Patents by Inventor Richard Groves
Richard Groves has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10479943Abstract: Disclosed herein is a method for making diesel, gasoline and LPG comprising coprocessing a petroleum-derived feedstock with up to 50 wt. %, relative to the total weight of the feedstocks, of a lipid-containing feedstock in the presence of a catalyst under fluidized catalyst cracking conditions. Also disclosed herein is a method for making a diesel fuel or a combined diesel and gasoline fuel by injecting up to 50 wt. %, relative to the total weight of the feedstocks, of a lipid-containing feedstock to a stripper or a riser quench downstream from a petroleum derived feedstock injection point in a fluid catalytic cracking unit.Type: GrantFiled: August 17, 2018Date of Patent: November 19, 2019Assignee: Chevron U.S.A. Inc.Inventors: Tengfei Liu, Mingting Xu, Charles Guthrie, Richard Grove, Mike Maholland
-
Publication number: 20190207978Abstract: A security platform running on a server includes (a) protocol stacks each configured to receive and to transmit IP data packets over a network interface, wherein the protocol stacks have predetermined performance characteristics that are different from each other and wherein each protocol stack includes one or more program interfaces to allow changes to its performance characteristics; (b) application programs each configured to receive and transmit payloads of the IP data packets, wherein at least two of the application programs are customized to handle different content types in the payloads and wherein each application program accesses the program interface of at least one protocol stack to tune performance characteristics of the protocol stack; (c) classifiers configured to inspect at a given time IP data packets then received in the network interface to select one of the protocol stack and one of the application programs to service the data packets; and (d) a control program to load and run the selectedType: ApplicationFiled: December 28, 2017Publication date: July 4, 2019Applicant: A10 Networks, Inc.Inventors: Micheal Thompson, Richard Groves
-
Publication number: 20190116204Abstract: Provided are methods and systems for mitigating a distributed denial of service (DDoS) event. The method may commence with sending a request to a health monitor concerning a state of a network. The method may continue with attributing a lack of response to the request from the health monitor to be an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. The collapsible virtual data circuit may be designed to collapse in response to the DDoS event in the network. The method may include redirecting the network data traffic associated with the collapsible virtual data circuit based on the indication of the collapse of the collapsible virtual data circuit.Type: ApplicationFiled: December 14, 2018Publication date: April 18, 2019Inventors: Micheal Thompson, Vernon Richard Groves
-
Patent number: 10187423Abstract: Provided are methods and systems for mitigating a DDoS event. The method may comprise receiving an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. In response to the received indication of the collapse, the collapse may be attributed to the DDoS event. Furthermore, the method may comprise redirecting the network data traffic to one or more DDoS mitigation services. The method may further comprise mitigating the DDoS event by the one or more DDoS mitigation services.Type: GrantFiled: December 21, 2017Date of Patent: January 22, 2019Assignee: A10 Networks, Inc.Inventors: Micheal Thompson, Vernon Richard Groves
-
Patent number: 10091073Abstract: Passive monitoring of a large-scale network using multiple tiers of ordinary network switches, as opposed to purpose-built network monitoring hardware, is accomplished by initially providing network communications to an initial tier of monitoring switches, either from existing switches that copy frames and provide them to the monitoring switches, or from network taps to which the monitoring switches are connected. The initial tier of monitoring switches comprises flow tables that initially simply drop all frames provided to those switches and, subsequently, when specific network issues arise, they are modified to include a specification particular frame criteria whose frames are either forwarded to subsequent tiers of monitoring switches, or statistics regarding those frames are collected. Subsequent tiers of monitoring switches receive frames from the initial tier and direct them to one or more appropriate analysis computing devices.Type: GrantFiled: June 6, 2016Date of Patent: October 2, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Vernon Richard Groves, Justin W. Scott, Dylan Greene
-
Publication number: 20180124104Abstract: Provided are methods and systems for mitigating a DDoS event. The method may comprise receiving an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. In response to the received indication of the collapse, the collapse may be attributed to the DDoS event. Furthermore, the method may comprise redirecting the network data traffic to one or more DDoS mitigation services. The method may further comprise mitigating the DDoS event by the one or more DDoS mitigation services.Type: ApplicationFiled: December 21, 2017Publication date: May 3, 2018Inventors: Micheal Thompson, Vernon Richard Groves
-
Publication number: 20180083997Abstract: Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.Type: ApplicationFiled: November 16, 2017Publication date: March 22, 2018Inventors: Rajkumar Jalan, Vernon Richard Groves
-
Patent number: 9860271Abstract: Provided are methods and systems for mitigating a DDoS event. The method may comprise receiving an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. In response to the received indication of the collapse, the collapse may be attributed to the DDoS event. Furthermore, the method may comprise redirecting the network data traffic to one or more DDoS mitigation services. The method may further comprise mitigating the DDoS event by the one or more DDoS mitigation services.Type: GrantFiled: December 28, 2015Date of Patent: January 2, 2018Assignee: A10 NETWORKS, INC.Inventors: Micheal Thompson, Vernon Richard Groves
-
Patent number: 9843599Abstract: Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.Type: GrantFiled: April 5, 2017Date of Patent: December 12, 2017Assignee: A10 NETWORKS, INC.Inventors: Rajkumar Jalan, Vernon Richard Groves
-
Publication number: 20170208082Abstract: Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.Type: ApplicationFiled: April 5, 2017Publication date: July 20, 2017Inventors: Rajkumar Jalan, Vernon Richard Groves
-
Patent number: 9621575Abstract: Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.Type: GrantFiled: December 29, 2014Date of Patent: April 11, 2017Assignee: A10 Networks, Inc.Inventors: Rajkumar Jalan, Vernon Richard Groves
-
Publication number: 20170048356Abstract: Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a session between a client and a server. The TCP state for the predetermined times is stored to a database. A request to apply a predetermined policy to the session is received by a transaction processing unit and, based on the request, a session request associated with the session between the client and the server is sent to an access control unit. The session request is processed by the access control unit based on the TCP state and according to the predetermined policy.Type: ApplicationFiled: August 12, 2015Publication date: February 16, 2017Inventors: Micheal Thompson, Martin Grimm, Vernon Richard Groves, Rajkumar Jalan
-
Publication number: 20160380827Abstract: In response to communications between one or more given networks and one or more other networks, a network protection appliance discovers one or more computing resources of the one or more given networks from a plurality of protocol layers of the received communications. The network protection appliance also gleans properties of the one or more discovered computing resources of the one or more given networks from the plurality of protocol layers of the received communications. The network protection appliance maps the gleaned properties of the one or more discovered computing resources of the one or more given networks to a plurality of network protection policies. The network protection appliance also determines an applicable network protection policy for processing a corresponding received communication from the mapping of the gleaned properties of the one or more discovered given computing resources of the one or more given networks to the plurality of network protection policies.Type: ApplicationFiled: June 23, 2015Publication date: December 29, 2016Inventors: Vernon Richard GROVES, Eric CHOU, Bill BENETTI
-
Publication number: 20160285705Abstract: Passive monitoring of a large-scale network using multiple tiers of ordinary network switches, as opposed to purpose-built network monitoring hardware, is accomplished by initially providing network communications to an initial tier of monitoring switches, either from existing switches that copy frames and provide them to the monitoring switches, or from network taps to which the monitoring switches are connected. The initial tier of monitoring switches comprises flow tables that initially simply drop all frames provided to those switches and, subsequently, when specific network issues arise, they are modified to include a specification particular frame criteria whose frames are either forwarded to subsequent tiers of monitoring switches, or statistics regarding those frames are collected. Subsequent tiers of monitoring switches receive frames from the initial tier and direct them to one or more appropriate analysis computing devices.Type: ApplicationFiled: June 6, 2016Publication date: September 29, 2016Inventors: Vernon Richard Groves, Justin W. Scott, Dylan Greene
-
Patent number: 9363152Abstract: Passive monitoring of a large-scale network using multiple tiers of ordinary network switches, as opposed to purpose-built network monitoring hardware, is accomplished by initially providing network communications to an initial tier of monitoring switches, either from existing switches that copy frames and provide them to the monitoring switches, or from network taps to which the monitoring switches are connected. The initial tier of monitoring switches comprises flow tables that initially simply drop all frames provided to those switches and, subsequently, when specific network issues arise, they are modified to include a specification particular frame criteria whose frames are either forwarded to subsequent tiers of monitoring switches, or statistics regarding those frames are collected. Subsequent tiers of monitoring switches receive frames from the initial tier and direct them to one or more appropriate analysis computing devices.Type: GrantFiled: June 11, 2012Date of Patent: June 7, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Vernon Richard Groves, Justin W. Scott, Dylan Greene
-
Publication number: 20160134655Abstract: Provided are methods and systems for mitigating a DDoS event. The method may comprise receiving an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. In response to the received indication of the collapse, the collapse may be attributed to the DDoS event. Furthermore, the method may comprise redirecting the network data traffic to one or more DDoS mitigation services. The method may further comprise mitigating the DDoS event by the one or more DDoS mitigation services.Type: ApplicationFiled: December 28, 2015Publication date: May 12, 2016Inventors: Micheal Thompson, Vernon Richard Groves
-
Publication number: 20160090421Abstract: The present invention relates to the dosing regiment for anti-CD20 antibody to treat various diseases.Type: ApplicationFiled: October 8, 2015Publication date: March 31, 2016Inventors: Frederick J. Derosier, Immanuel Freedman, Ole Graff, Richard A. Grove
-
Patent number: 8953600Abstract: Among other things, one or more techniques and/or systems are provided for routing telemetry data to one or more receivers. That is, telemetry data, such as activity data associated with a network device (e.g., a switch, a router, etc.), may be routed to one or more receivers in-flight (e.g., while the telemetry data is being processed by a network device, as opposed to being stored within a storage device for processing). In one example, telemetry data may be forked into a first telemetry data stream for a first receiver, a second telemetry data stream for a second receiver, and/or other telemetry data streams. Respective telemetry data streams may be formatted according to a receiver destination policy. In this way, one or more telemetry data streams, forked from the telemetry data in-flight, may be delivered to one or more receivers in-flight.Type: GrantFiled: September 14, 2012Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventor: Vernon Richard Groves, Jr.
-
Publication number: 20140310493Abstract: A method, system, and computer program product for migrating data across storages with dissimilar allocation sizes are provided in the illustrative embodiments. A determination is made of a minimum allocation unit size used for allocating space to a data at a source data storage device. A number of first minimum allocation units of a first minimum allocation unit size at a target data storage device is computed, wherein the number of first minimum allocation units can be completely occupied by a portion of the data. An amount of data left over after excluding the portion of the data from the data is computed. The portion of the data is migrated to the number of first minimum allocation units at the target. The amount of data left over is migrated to a second number of second minimum allocation units of a second minimum allocation unit size at the target.Type: ApplicationFiled: April 11, 2013Publication date: October 16, 2014Applicant: International Business Machines CorporationInventor: Richard Grove Pace
-
Publication number: 20140079057Abstract: Among other things, one or more techniques and/or systems are provided for routing telemetry data to one or more receivers. That is, telemetry data, such as activity data associated with a network device (e.g., a switch, a router, etc.), may be routed to one or more receivers in-flight (e.g., while the telemetry data is being processed by a network device, as opposed to being stored within a storage device for processing). In one example, telemetry data may be forked into a first telemetry data stream for a first receiver, a second telemetry data stream for a second receiver, and/or other telemetry data streams. Respective telemetry data streams may be formatted according to a receiver destination policy. In this way, one or more telemetry data streams, forked from the telemetry data in-flight, may be delivered to one or more receivers in-flight.Type: ApplicationFiled: September 14, 2012Publication date: March 20, 2014Applicant: Microsoft CorporationInventor: Vernon Richard Groves, JR.