Patents by Inventor Robert K. Vaterlaus
Robert K. Vaterlaus has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10467420Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters.Type: GrantFiled: January 29, 2015Date of Patent: November 5, 2019Assignee: Micro Focus LLCInventors: Steven D. Burnett, Terence Spies, Luther W. Martin, Robert K. Vaterlaus, Matthew J. Pauker
-
Patent number: 9749301Abstract: A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web services interface such as a simple object access protocol interface on the program computing equipment makes a corresponding remote cryptographic function call to a web services interface such as a simple object access protocol interface at a cryptographic web service over a communications network such as the internet. At the cryptographic web service, a cryptographic engine implements cryptographic operations such as encryption and decryption operations. After successful authentication of the calling program, the cryptographic engine produces results for the remotely cryptographic function and returns the results to the program over the communications network.Type: GrantFiled: September 4, 2015Date of Patent: August 29, 2017Assignee: Voltage Security, Inc.Inventors: Robert K. Vaterlaus, Matthew J. Pauker, Guido Appenzeller
-
Patent number: 9600263Abstract: First and second controllers implemented on computing equipment may be used to control switches in a network. The switches may forward network packets between end hosts. The second controller may identify first and second redundant partitions of switches in the network that are each coupled to all of the end hosts. The first controller may instruct the first partition to install software while the second partition forwards network traffic and may instruct the second partition to install software while the first partition forwards network traffic. The first controller may install the software while the second controller is active and the second controller may install the software while the first controller is active. In this way, the switches and controllers may be provided with an uninterrupted software upgrade and packets may be forwarded between end hosts during the software upgrade without introducing packet loss or other noticeable reductions in network performance.Type: GrantFiled: July 21, 2014Date of Patent: March 21, 2017Assignee: Big Switch Networks, Inc.Inventors: Michael Stolarchuk, Carl D. Roth, Alok Shankar, Robert K. Vaterlaus, Srinivasan Ramasubramanian, Andreas Wundsam, Robert W. Sherwood, Rajneesh Bajpai
-
Patent number: 9264295Abstract: A network of switches that forwards network packets between end hosts may be controlled by a controller. The controller may maintain information that identifies subsets of the end hosts that are associated with respective broadcast domains. The controller may configure the switches in the network to identify broadcast network packets and to forward the broadcast network packets to the controller. The controller may identify which broadcast domain is associated with a received broadcast network packet based on information such as source information retrieved from the broadcast network packet. The controller may identify switches that are coupled to the end hosts of a broadcast domain associated with the received broadcast network packet. The controller may forward the broadcast network packet to the identified switches through network control paths and may direct the identified switches to forward the broadcast network packet to end hosts of the associated broadcast domain.Type: GrantFiled: March 2, 2012Date of Patent: February 16, 2016Assignee: Big Switch Networks, Inc.Inventors: Robert W. Sherwood, Robert Edward Adams, Daniel E. Talayco, Robert K. Vaterlaus, Omar Baldonado
-
Publication number: 20160019044Abstract: First and second controllers implemented on computing equipment may be used to control switches in a network. The switches may forward network packets between end hosts. The second controller may identify first and second redundant partitions of switches in the network that are each coupled to all of the end hosts. The first controller may instruct the first partition to install software while the second partition forwards network traffic and may instruct the second partition to install software while the first partition forwards network traffic. The first controller may install the software while the second controller is active and the second controller may install the software while the first controller is active. In this way, the switches and controllers may be provided with an uninterrupted software upgrade and packets may be forwarded between end hosts during the software upgrade without introducing packet loss or other noticeable reductions in network performance.Type: ApplicationFiled: July 21, 2014Publication date: January 21, 2016Inventors: Michael Stolarchuk, Carl D. Roth, Alok Shankar, Robert K. Vaterlaus, Srinivasan Ramasubramanian, Andreas Wundsam, Robert W. Sherwood, Rajneesh Bajpai
-
Publication number: 20150381585Abstract: A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web services interface such as a simple object access protocol interface on the program computing equipment makes a corresponding remote cryptographic function call to a web services interface such as a simple object access protocol interface at a cryptographic web service over a communications network such as the internet. At the cryptographic web service, a cryptographic engine implements cryptographic operations such as encryption and decryption operations. After successful authentication of the calling program, the cryptographic engine produces results for the remotely cryptographic function and returns the results to the program over the communications network.Type: ApplicationFiled: September 4, 2015Publication date: December 31, 2015Inventors: Robert K. Vaterlaus, Matthew J. Pauker, Guido Appenzeller
-
Publication number: 20150143133Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters.Type: ApplicationFiled: January 29, 2015Publication date: May 21, 2015Inventors: Steven D. Burnett, Terence Spies, Luther W. Martin, Robert K. Vaterlaus, Matthew J. Pauker
-
Patent number: 9036636Abstract: A network of switches that forwards network packets between end hosts may be controlled by a controller. The controller may maintain information that identifies subsets of the end hosts that are associated with respective broadcast domains. The controller may use network topology information to determine which of the switches are coupled in a forwarding tree formed from network paths between the end hosts of a broadcast domain. The controller may be used to configure the switches with an identifier that identifies which broadcast domain is associated with each subset of end hosts. The controller may configure switches of a given forwarding tree that are coupled to end hosts of an associated broadcast domain to modify broadcast network packets received from the end hosts with the identifier and to forward the modified broadcast network packets along the forwarding tree exclusively to end hosts of the associated broadcast domain.Type: GrantFiled: February 6, 2012Date of Patent: May 19, 2015Assignee: Big Switch Networks, Inc.Inventors: Robert W. Sherwood, Robert Edward Adams, Daniel E. Talayco, Omar Baldonado, Robert K. Vaterlaus
-
Patent number: 8948375Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters.Type: GrantFiled: May 5, 2009Date of Patent: February 3, 2015Assignee: Voltage Security, Inc.Inventors: Steven D. Burnett, Terence Spies, Luther W. Martin, Robert K. Vaterlaus, Matthew J. Pauker
-
Patent number: 8416796Abstract: Network switches that are controlled by a controller server may contain ports through which network packets are received and forwarded. An architect may configure the controller server to create virtual switches. Each virtual switch may be formed from a subset of the ports of the network switches. The architect may assign administrators to the virtual switches. The administrators may configure the virtual switches. An administrator may use a command line interface to configure a virtual switch. The administrator may use commands such as a show port command, an access list command, a show access list command, and a membership rule command to manage the virtual switch. The controller server may prevent the administrator from logging on to virtual switches that have been assigned to other administrators.Type: GrantFiled: May 6, 2011Date of Patent: April 9, 2013Assignee: Big Switch Networks, Inc.Inventors: R. Kyle Forster, Omar Baldonado, Robert K. Vaterlaus, Guido Appenzeller
-
Publication number: 20120281698Abstract: Network switches that are controlled by a controller server may contain ports through which network packets are received and forwarded. An architect may configure the controller server to create virtual switches. Each virtual switch may be formed from a subset of the ports of the network switches. The architect may assign administrators to the virtual switches. The administrators may configure the virtual switches. An administrator may use a command line interface to configure a virtual switch. The administrator may use commands such as a show port command, an access list command, a show access list command, and a membership rule command to manage the virtual switch. The controller server may prevent the administrator from logging on to virtual switches that have been assigned to other administrators.Type: ApplicationFiled: May 6, 2011Publication date: November 8, 2012Inventors: R. Kyle Forster, Omar Baldonado, Robert K. Vaterlaus, Guido Appenzeller
-
Publication number: 20100284532Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters.Type: ApplicationFiled: May 5, 2009Publication date: November 11, 2010Inventors: Steven D. Burnett, Terence Spies, Luther W. Martin, Robert K. Vaterlaus, Matthew J. Pauker
-
Publication number: 20080178010Abstract: A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web services interface such as a simple object access protocol interface on the program computing equipment makes a corresponding remote cryptographic function call to a web services interface such as a simple object access protocol interface at a cryptographic web service over a communications network such as the internet. At the cryptographic web service, a cryptographic engine implements cryptographic operations such as encryption and decryption operations. After successful authentication of the calling program, the cryptographic engine produces results for the remotely cryptographic function and returns the results to the program over the communications network.Type: ApplicationFiled: January 15, 2008Publication date: July 24, 2008Inventors: Robert K. Vaterlaus, Matthew J. Pauker, Guido Appenzeller