Patents by Inventor Richard Guzik

Richard Guzik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230356996
    Abstract: A method of deploying a water intake device in a fuel storage tank involves providing a water intake device having an elongate flow structure including at least one flexible flow tube and an elongate substrate adjacent to the flow tube, wherein the substrate provides a semi-rigid characteristic that allows the elongate flow structure to be guided. Another step of the method involves providing a guide tube having a straight portion and an arcuate portion at a distal end of the guide tube. Another step of the method involves installing the guide tube generally vertically into a fuel storage tank with the arcuate portion directed toward a desired guidance direction. Another step of the method involves moving the elongate flow structure of the water intake device through the guide tube into a deployed position.
    Type: Application
    Filed: July 13, 2023
    Publication date: November 9, 2023
    Inventors: Richard GUZIK, Diane SINOSKY, James BEVINS
  • Patent number: 11634316
    Abstract: A fuel storage and supply arrangement serves as a source of fuel to be dispensed via at least one fuel dispenser in a fuel dispensing environment. The arrangement comprises a storage tank for containing a quantity of the fuel. A pump assembly draws the fuel from the storage tank providing the fuel under pressure to a fuel supply line. A fuel conditioning assembly includes a housing having a storage volume, a housing inlet receiving the fuel under pressure created by the pump assembly, a housing outlet through which fuel exits the housing, and a housing port through which fuel can be drawn into the housing. A vacuum source in fluid communication with the housing outlet is operative to selectively apply a vacuum to the outlet of the housing so that liquid can be drawn into the housing via the port. A water intake device is in fluid communication with the housing port. The water intake device has at least one inlet situated adjacent to a bottom of the fuel storage tank.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: April 25, 2023
    Assignee: Veeder-Root Company
    Inventors: Richard Guzik, Diane Sinosky, James Bevins
  • Publication number: 20220402749
    Abstract: A water intake device for use in a fuel storage tank comprises an elongate flow structure including a plurality of flexible flow tubes having respective first ends of different lengths and a second end at a common location. A header manifold is in fluid communication with the second ends of the flow tubes, the header manifold having a single connection port. In addition, the header manifold is configured to allow flow between the flow tubes and the connection port.
    Type: Application
    Filed: August 24, 2022
    Publication date: December 22, 2022
    Inventors: Richard GUZIK, Diane SINOSKY, James BEVINS
  • Patent number: 11356413
    Abstract: The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of advantageous use cases. One exemplary use case involves providing a fast path at network speeds using SDN by routing network traffic to bypass a security appliance once the security appliance determines that the security appliance no longer needs to inspect the network traffic. Another exemplary use case involves remote provisioning of security zones.
    Type: Grant
    Filed: February 21, 2020
    Date of Patent: June 7, 2022
    Assignee: McAfee, LLC
    Inventors: Geoffrey Howard Cooper, John Richard Guzik
  • Publication number: 20220098026
    Abstract: A fuel storage and supply arrangement serves as a source of fuel to be dispensed via at least one fuel dispenser in a fuel dispensing environment. The arrangement comprises a storage tank for containing a quantity of the fuel. A pump assembly draws the fuel from the storage tank providing the fuel under pressure to a fuel supply line. A fuel conditioning assembly includes a housing having a storage volume, a housing inlet receiving the fuel under pressure created by the pump assembly, a housing outlet through which fuel exits the housing, and a housing port through which fuel can be drawn into the housing. A vacuum source in fluid communication with the housing outlet is operative to selectively apply a vacuum to the outlet of the housing so that liquid can be drawn into the housing via the port. A water intake device is in fluid communication with the housing port. The water intake device has at least one inlet situated adjacent to a bottom of the fuel storage tank.
    Type: Application
    Filed: September 29, 2021
    Publication date: March 31, 2022
    Inventors: Richard Guzik, Diane Sinosky, James Bevins
  • Patent number: 10826916
    Abstract: Systems, methods, and apparatuses enable agent-less network traffic interception using an overlay network. The system creates an inspection namespace on a server computer and clones namespace properties of a default namespace on the server computer to the inspection namespace. The system creates an overlay network in the inspection namespace connecting the server computer to a security service. The system creates a namespace bridge between the default namespace and the inspection namespace to pass server traffic between the namespaces. The system then transmits server traffic to the security service using the overlay network and an encapsulation protocol.
    Type: Grant
    Filed: September 17, 2018
    Date of Patent: November 3, 2020
    Assignee: SHIELDX NETWORKS, INC.
    Inventors: Manuel Nedbal, Ratinder Paul Singh Ahuja, John Richard Guzik
  • Publication number: 20200195610
    Abstract: The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of advantageous use cases. One exemplary use case involves providing a fast path at network speeds using SDN by routing network traffic to bypass a security appliance once the security appliance determines that the security appliance no longer needs to inspect the network traffic. Another exemplary use case involves remote provisioning of security zones.
    Type: Application
    Filed: February 21, 2020
    Publication date: June 18, 2020
    Applicant: McAfee, LLC
    Inventors: Geoffrey Howard Cooper, John Richard Guzik
  • Patent number: 10652210
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: May 12, 2020
    Assignee: McAfee, LLC
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 10642982
    Abstract: Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: May 5, 2020
    Assignee: SHIELDX NETWORKS, INC.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel, John Richard Guzik
  • Publication number: 20200092307
    Abstract: Systems, methods, and apparatuses enable agent-less network traffic interception using an overlay network. The system creates an inspection namespace on a server computer and clones namespace properties of a default namespace on the server computer to the inspection namespace. The system creates an overlay network in the inspection namespace connecting the server computer to a security service. The system creates a namespace bridge between the default namespace and the inspection namespace to pass server traffic between the namespaces. The system then transmits server traffic to the security service using the overlay network and an encapsulation protocol.
    Type: Application
    Filed: September 17, 2018
    Publication date: March 19, 2020
    Inventors: Manuel Nedbal, Ratinder Paul Singh Ahuja, John Richard Guzik
  • Patent number: 10587576
    Abstract: The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of advantageous use cases. One exemplary use case involves providing a fast path at network speeds using SDN by routing network traffic to bypass a security appliance once the security appliance determines that the security appliance no longer needs to inspect the network traffic. Another exemplary use case involves remote provisioning of security zones.
    Type: Grant
    Filed: December 10, 2013
    Date of Patent: March 10, 2020
    Assignee: McAfee, LLC
    Inventors: Geoffrey Howard Cooper, John Richard Guzik
  • Patent number: 10404838
    Abstract: Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to systems and methods for selecting microservices to process protocol data streams. For example, a method is disclosed, which calls for receiving a protocol packet, the protocol packet comprising a sequence number, generating a difference by subtracting a protocol message base from the sequence number, generating a first quotient by dividing the difference by a protocol common message length, generating a second value using the first quotient, determining a Transmission Control Protocol (TCP) reassembly resource using the generated second value, and transmitting the protocol packet to the determined TCP reassembly resource.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: September 3, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Elanthiraiyan Ammoor Anbalagan, Lee Chik Cheung, Sumanth Gangashanaiah, John Richard Guzik
  • Publication number: 20190138728
    Abstract: Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
    Type: Application
    Filed: July 2, 2018
    Publication date: May 9, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel, John Richard Guzik
  • Publication number: 20180189494
    Abstract: Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
    Type: Application
    Filed: December 30, 2016
    Publication date: July 5, 2018
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel, John Richard Guzik
  • Patent number: 10013550
    Abstract: Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: July 3, 2018
    Assignee: SHIELDX NETWORKS, INC.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel, John Richard Guzik
  • Publication number: 20180115635
    Abstract: Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to systems and methods for selecting microservices to process protocol data streams. For example, a method is disclosed, which calls for receiving a protocol packet, the protocol packet comprising a sequence number, generating a difference by subtracting a protocol message base from the sequence number, generating a first quotient by dividing the difference by a protocol common message length, generating a second value using the first quotient, determining a Transmission Control Protocol (TCP) reassembly resource using the generated second value, and transmitting the protocol packet to the determined TCP reassembly resource.
    Type: Application
    Filed: October 21, 2016
    Publication date: April 26, 2018
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Elanthiraiyan Ammoor Anbalagan, Lee Chik Cheung, Sumanth Gangashanaiah, John Richard Guzik
  • Patent number: 9882876
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: May 28, 2016
    Date of Patent: January 30, 2018
    Assignee: McAfee, LLC
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20170374030
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: August 24, 2017
    Publication date: December 28, 2017
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20160352683
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: May 28, 2016
    Publication date: December 1, 2016
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20160205071
    Abstract: The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of advantageous use cases. One exemplary use case involves providing a fast path at network speeds using SDN by routing network traffic to bypass a security appliance once the security appliance determines that the security appliance no longer needs to inspect the network traffic. Another exemplary use case involves remote provisioning of security zones.
    Type: Application
    Filed: December 10, 2013
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Howard COOPER, John Richard GUZIK