Patents by Inventor Robert Graham Clark
Robert Graham Clark has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12052245Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.Type: GrantFiled: May 9, 2023Date of Patent: July 30, 2024Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
-
Publication number: 20240223569Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.Type: ApplicationFiled: March 12, 2024Publication date: July 4, 2024Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
-
Patent number: 11962599Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.Type: GrantFiled: May 9, 2023Date of Patent: April 16, 2024Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
-
Publication number: 20230388302Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.Type: ApplicationFiled: May 9, 2023Publication date: November 30, 2023Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
-
Publication number: 20230336561Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.Type: ApplicationFiled: May 9, 2023Publication date: October 19, 2023Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
-
Patent number: 11695776Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.Type: GrantFiled: February 16, 2021Date of Patent: July 4, 2023Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
-
Patent number: 11695765Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.Type: GrantFiled: January 6, 2021Date of Patent: July 4, 2023Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
-
Patent number: 11539754Abstract: Techniques are disclosed for generating network security policies for different versions of a component of an application deployed in a computing environment where the different versions have potentially different network requirements and the different versions operate together at the same time in the computing environment. The disclosed techniques include capabilities for enabling different versions of a component of a containerized application to co-exist at the same time on different computing nodes in a cluster of nodes in a containerized environment that deploys and executes the application. The techniques additionally include capabilities for enabling different network policies to be generated for the different versions of the component, where each component has potentially different network requirements. The techniques provide a mechanism to create precise, per-component network policies, while respecting the overall coarse-grained policies of the containerized application.Type: GrantFiled: December 16, 2020Date of Patent: December 27, 2022Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Olgierd Stanislaw Pieczul, Robert Graham Clark, Nitin Srinivasa Rao Jami
-
Patent number: 11444837Abstract: Techniques are disclosed for network policy verification system that can obtain a set of connectivity paths of a containerized environment that individually indicate connections between pairs of containers. Identify a first container and a second container of a pair based at least in part on a connectivity path. Determine a network policy corresponding to the connectivity path that indicates an expected result of that particular connection. A connection can be initiated between the two containers. The result may be presented at a user device based at least in part on identifying that the result is different from the expected result indicated by the network policy corresponding to the connectivity path.Type: GrantFiled: February 26, 2021Date of Patent: September 13, 2022Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Subaru Arthur Ueno, Robert Graham Clark
-
Patent number: 11444838Abstract: Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system.Type: GrantFiled: July 19, 2021Date of Patent: September 13, 2022Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Olgierd Stanislaw Pieczul, Robert Graham Clark
-
Publication number: 20220278900Abstract: Techniques are disclosed for network policy verification system that can obtain a set of connectivity paths of a containerized environment that individually indicate connections between pairs of containers. Identify a first container and a second container of a pair based at least in part on a connectivity path. Determine a network policy corresponding to the connectivity path that indicates an expected result of that particular connection. A connection can be initiated between the two containers. The result may be presented at a user device based at least in part on identifying that the result is different from the expected result indicated by the network policy corresponding to the connectivity path.Type: ApplicationFiled: February 26, 2021Publication date: September 1, 2022Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Subaru Arthur Ueno, Robert Graham Clark
-
Publication number: 20220263835Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.Type: ApplicationFiled: February 16, 2021Publication date: August 18, 2022Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
-
Publication number: 20220247639Abstract: Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system.Type: ApplicationFiled: July 19, 2021Publication date: August 4, 2022Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Robert Graham Clark
-
Publication number: 20220217139Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.Type: ApplicationFiled: January 6, 2021Publication date: July 7, 2022Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
-
Publication number: 20220191248Abstract: Techniques are disclosed for generating network security policies for different versions of a component of an application deployed in a computing environment where the different versions have potentially different network requirements and the different versions operate together at the same time in the computing environment. The disclosed techniques include capabilities for enabling different versions of a component of a containerized application to co-exist at the same time on different computing nodes in a cluster of nodes in a containerized environment that deploys and executes the application. The techniques additionally include capabilities for enabling different network policies to be generated for the different versions of the component, where each component has potentially different network requirements. The techniques provide a mechanism to create precise, per-component network policies, while respecting the overall coarse-grained policies of the containerized application.Type: ApplicationFiled: December 16, 2020Publication date: June 16, 2022Applicant: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Robert Graham Clark, Nitin Srinivasa Rao Jami
-
Patent number: 11102076Abstract: Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system.Type: GrantFiled: February 4, 2021Date of Patent: August 24, 2021Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Robert Graham Clark
-
Patent number: 10951637Abstract: Examples relate to distributed detection of malicious cloud actors. In some examples, outgoing cloud packets from the cloud server are intercepted and processed to determine if a preliminary threshold is exceeded, where the outgoing cloud packets are used to identify a customer. At this stage, a potential outgoing intrusion event of a number of potential outgoing intrusion events is generated when the preliminary threshold is exceeded. The potential outgoing intrusions events are used to update an aggregate log, where the aggregate log tracks a customer subset of the cloud servers that is associated with the customer. In response to analyzing the aggregate log to determine that cloud traffic by the customer to the destination address exceeds an intrusion threshold, a notification of malicious activity by the customer is provided, wherein the intrusion threshold is satisfied at a higher cloud activity level than the preliminary threshold.Type: GrantFiled: August 28, 2014Date of Patent: March 16, 2021Assignee: Suse LLCInventor: Robert Graham Clark
-
Patent number: 10389693Abstract: Examples described herein include receiving a key request from a requestor, determining a validity of the key request, and sending the key to the requestor based on the determination of the validity of the key request. In some examples, the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition.Type: GrantFiled: August 23, 2016Date of Patent: August 20, 2019Assignee: Hewlett Packard Enterprise Development LPInventors: Robert Graham Clark, Timothy John Kelsey, Bryan Stephenson, Douglas Chivers
-
Publication number: 20180063101Abstract: Examples described herein include receiving a key request from a requestor, determining a validity of the key request, and sending the key to the requestor based on the determination of the validity of the key request. In some examples, the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition.Type: ApplicationFiled: August 23, 2016Publication date: March 1, 2018Inventors: Robert Graham Clark, Timothy John Kelsey, Bryan Stephenson, Douglas Chivers
-
Publication number: 20170244738Abstract: Examples relate to distributed detection of malicious cloud actors. In some examples, outgoing cloud packets from the cloud server are intercepted and processed to determine if a preliminary threshold is exceeded, where the outgoing cloud packets are used to identify a customer. At this stage, a potential outgoing intrusion event of a number of potential outgoing intrusion events is generated when the preliminary threshold is exceeded. The potential outgoing intrusions events are used to update an aggregate log, where the aggregate log tracks a customer subset of the cloud servers that is associated with the customer. In response to analyzing the aggregate log to determine that cloud traffic by the customer to the destination address exceeds an intrusion threshold, a notification of malicious activity by the customer is provided, wherein the intrusion threshold is satisfied at a higher cloud activity level than the preliminary threshold.Type: ApplicationFiled: August 28, 2014Publication date: August 24, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventor: Robert Graham CLARK