Patents by Inventor Ricky K. Lowe
Ricky K. Lowe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8560693Abstract: A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index.Type: GrantFiled: October 25, 2007Date of Patent: October 15, 2013Assignee: Extreme Networks, Inc.Inventors: Wei Wang, Hui Zhang, Erik De La Iglesia, Ricky K. Lowe, Kiet Tran, Mark Aaron Wallace
-
Patent number: 8412838Abstract: Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with categories of service. An association engine uses the key to obtain one or more matching entries from the database, and derive therefrom the desired category of service for the resource request. A cookie engine derives cookie information from a cookie located in the resource request. A session engine derives session information from a session identifier located in a handshake message associated with the resource request. The desired category of service, the cookie information, and the session information are each useful for allocating a resource to the resource request.Type: GrantFiled: October 26, 2007Date of Patent: April 2, 2013Assignee: Extreme NetworksInventors: Wei Wang, Miguel Gomez, Liang Liu, Ricky K. Lowe, Kiet Tran
-
Patent number: 7814204Abstract: Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with categories of service. An association engine uses the key to obtain one or more matching entries from the database, and derive therefrom the desired category of service for the resource request. A cookie engine derives cookie information from a cookie located in the resource request. A session engine derives session information from a session identifier located in a handshake message associated with the resource request. The desired category of service, the cookie information, and the session information are each useful for allocating a resource to the resource request.Type: GrantFiled: April 1, 2002Date of Patent: October 12, 2010Assignee: Extreme Networks, Inc.Inventors: Wei Wang, Miguel Gomez, Liang Liu, Ricky K. Lowe, Kiet Tran
-
Patent number: 7584262Abstract: A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index.Type: GrantFiled: February 12, 2002Date of Patent: September 1, 2009Assignee: Extreme NetworksInventors: Wei Wang, Hui Zhang, Erik De La Iglesia, Ricky K. Lowe, Kiet Tran, Mark Aaron Wallace
-
Patent number: 7447777Abstract: Systems and related methods are described for handling one or more resource requests. A protocol engine receives a resource request in accordance with a prescribed protocol, and a classification engine determines a desired class of service for the request. An analysis engine optionally analyzes the request, and, responsive thereto, determines a desired sub-class of service for the request. A policy engine then allocates a resource to the request responsive to one or both of the desired class of service, and the desired sub-class of service.Type: GrantFiled: February 11, 2002Date of Patent: November 4, 2008Assignee: Extreme NetworksInventors: Ratinder Paul Singh Ahuja, Susan Carrie, Chien C. Chou, Erik De La Iglesia, Miguel Gomez, Liang Liu, Ricky K. Lowe, Rahoul Puri, Kiet Tran, Mark Aaron Wallace, Wei Wang, Todd E. Wayne, Hui Zhang
-
Patent number: 7251634Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.Type: GrantFiled: July 9, 2004Date of Patent: July 31, 2007Assignee: Cisco Technology, Inc.Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu
-
Patent number: 7010700Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.Type: GrantFiled: August 13, 2001Date of Patent: March 7, 2006Assignee: Cisco Technology, Inc.Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu
-
Patent number: 6298444Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.Type: GrantFiled: January 28, 2000Date of Patent: October 2, 2001Assignee: Cisco Technology, Inc.Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu
-
Patent number: 6119231Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.Type: GrantFiled: October 31, 1997Date of Patent: September 12, 2000Assignee: Cisco Technologies, Inc.Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu