Patents by Inventor Ricky K. Lowe

Ricky K. Lowe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8560693
    Abstract: A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index.
    Type: Grant
    Filed: October 25, 2007
    Date of Patent: October 15, 2013
    Assignee: Extreme Networks, Inc.
    Inventors: Wei Wang, Hui Zhang, Erik De La Iglesia, Ricky K. Lowe, Kiet Tran, Mark Aaron Wallace
  • Patent number: 8412838
    Abstract: Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with categories of service. An association engine uses the key to obtain one or more matching entries from the database, and derive therefrom the desired category of service for the resource request. A cookie engine derives cookie information from a cookie located in the resource request. A session engine derives session information from a session identifier located in a handshake message associated with the resource request. The desired category of service, the cookie information, and the session information are each useful for allocating a resource to the resource request.
    Type: Grant
    Filed: October 26, 2007
    Date of Patent: April 2, 2013
    Assignee: Extreme Networks
    Inventors: Wei Wang, Miguel Gomez, Liang Liu, Ricky K. Lowe, Kiet Tran
  • Patent number: 7814204
    Abstract: Systems and methods are described for analyzing the content of resource requests. A tokenizer parses the resource request and derives a key therefrom. A database associates values of the key with categories of service. An association engine uses the key to obtain one or more matching entries from the database, and derive therefrom the desired category of service for the resource request. A cookie engine derives cookie information from a cookie located in the resource request. A session engine derives session information from a session identifier located in a handshake message associated with the resource request. The desired category of service, the cookie information, and the session information are each useful for allocating a resource to the resource request.
    Type: Grant
    Filed: April 1, 2002
    Date of Patent: October 12, 2010
    Assignee: Extreme Networks, Inc.
    Inventors: Wei Wang, Miguel Gomez, Liang Liu, Ricky K. Lowe, Kiet Tran
  • Patent number: 7584262
    Abstract: A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index.
    Type: Grant
    Filed: February 12, 2002
    Date of Patent: September 1, 2009
    Assignee: Extreme Networks
    Inventors: Wei Wang, Hui Zhang, Erik De La Iglesia, Ricky K. Lowe, Kiet Tran, Mark Aaron Wallace
  • Patent number: 7447777
    Abstract: Systems and related methods are described for handling one or more resource requests. A protocol engine receives a resource request in accordance with a prescribed protocol, and a classification engine determines a desired class of service for the request. An analysis engine optionally analyzes the request, and, responsive thereto, determines a desired sub-class of service for the request. A policy engine then allocates a resource to the request responsive to one or both of the desired class of service, and the desired sub-class of service.
    Type: Grant
    Filed: February 11, 2002
    Date of Patent: November 4, 2008
    Assignee: Extreme Networks
    Inventors: Ratinder Paul Singh Ahuja, Susan Carrie, Chien C. Chou, Erik De La Iglesia, Miguel Gomez, Liang Liu, Ricky K. Lowe, Rahoul Puri, Kiet Tran, Mark Aaron Wallace, Wei Wang, Todd E. Wayne, Hui Zhang
  • Patent number: 7251634
    Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: July 31, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu
  • Patent number: 7010700
    Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.
    Type: Grant
    Filed: August 13, 2001
    Date of Patent: March 7, 2006
    Assignee: Cisco Technology, Inc.
    Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu
  • Patent number: 6298444
    Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.
    Type: Grant
    Filed: January 28, 2000
    Date of Patent: October 2, 2001
    Assignee: Cisco Technology, Inc.
    Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu
  • Patent number: 6119231
    Abstract: A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols.
    Type: Grant
    Filed: October 31, 1997
    Date of Patent: September 12, 2000
    Assignee: Cisco Technologies, Inc.
    Inventors: Andrew L. Foss, Ricky K. Lowe, Johnson Wu