Patents by Inventor Robert T. Bell

Robert T. Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9717106
    Abstract: In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: July 25, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Larry William Truesdale
  • Patent number: 9621355
    Abstract: A client application of a device queries/interrogates a secure device identity module of the device to obtain a device identifier of the device and a signed string generated by the security device identity module using a private key unique to the device. The client application of the device sends to an authorization server a request containing the device identifier and the signed string. Depending on an authentication result obtained for the device based on the device identity, the authorization server sends to the device an access token that enables the client application to access a resource.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: April 11, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Steven R. Ochmanski, David C. White, Jr., Robert T. Bell
  • Publication number: 20170099148
    Abstract: A client application of a device queries/interrogates a secure device identity module of the device to obtain a device identifier of the device and a signed string generated by the security device identity module using a private key unique to the device. The client application of the device sends to an authorization server a request containing the device identifier and the signed string. Depending on an authentication result obtained for the device based on the device identity, the authorization server sends to the device an access token that enables the client application to access a resource.
    Type: Application
    Filed: October 1, 2015
    Publication date: April 6, 2017
    Inventors: Steven R. Ochmanski, David C. White, JR., Robert T. Bell
  • Publication number: 20160255666
    Abstract: In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.
    Type: Application
    Filed: May 13, 2016
    Publication date: September 1, 2016
    Inventors: Robert T. Bell, Larry William Truesdale
  • Patent number: 9363108
    Abstract: In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.
    Type: Grant
    Filed: June 5, 2008
    Date of Patent: June 7, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Larry William Truesdale
  • Patent number: 9264422
    Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: February 16, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Plamen Nedeltchev, Robert T. Bell, Max Pritikin
  • Patent number: 9241066
    Abstract: In one embodiment, a secure computer telephony integration (CTI) connection is established between a call analysis and/or screening device and a call control agent. The call analysis device sniffs secure media packets between the endpoints and receives CTI events from the call control agent via the secure CTI connection. The device correlates the CTI events with the secure media packets, enabling the device to decrypt the packets to perform voice quality troubleshooting or call screening in real-time.
    Type: Grant
    Filed: August 22, 2006
    Date of Patent: January 19, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Annie Wong, Shisen Chang, Robert T. Bell, Eddie B. Soliman
  • Patent number: 9147074
    Abstract: The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time.
    Type: Grant
    Filed: May 24, 2011
    Date of Patent: September 29, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Anthony H. Grieco, Chirag K. Shroff, Robert T. Bell
  • Patent number: 9065834
    Abstract: A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable to a state-based terminal, that translates at least one stateless signaling message received from the stateless client to at least one state-based signaling message for presentation to the state-based terminal thereby facilitating a media stream communications session between the stateless client and the state-based terminal over an Internet Protocol (IP)-based network.
    Type: Grant
    Filed: April 19, 2010
    Date of Patent: June 23, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Paul S. Hahn, Michael H. McClung, Richard B. Platt
  • Patent number: 8976968
    Abstract: Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint. A secure channel is established between the key distribution point and an intercepting point. The intercepting endpoint may be determined to be authorized to intercept the secure communication session. The key is provided to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, where the key provides the intercepting endpoint with access to intercept the secure communication session.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: March 10, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Subbiah Kandasamy, Daniel G. Wing
  • Patent number: 8943310
    Abstract: According to one embodiment of the present invention, a method of establishing a digital certificate on an endpoint includes establishing a connection between a proxy function module and the endpoint. The proxy function module is remotely located from the endpoint and operable to communicate with the endpoint and a certificate authority. Authentication information is generated at the endpoint. A portion of the authentication information is transmitted to the proxy function module. The proxy function module obtains a digital certificate based on the portion of the authentication information. The digital certificate is received at the endpoint from the proxy function module.
    Type: Grant
    Filed: January 25, 2005
    Date of Patent: January 27, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Douglas Q. Dexter
  • Patent number: 8856504
    Abstract: Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure.
    Type: Grant
    Filed: June 7, 2010
    Date of Patent: October 7, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Fabio R. Maino, Pere Monclus, David A. McGrew, Robert T. Bell, Steven Joseph Rich
  • Publication number: 20140223530
    Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.
    Type: Application
    Filed: April 8, 2014
    Publication date: August 7, 2014
    Applicant: Cisco Technology, Inc.
    Inventors: Plamen Nedeltchev, Robert T. Bell, Max Pritikin
  • Patent number: 8774407
    Abstract: An example method is provided and includes providing an encrypted image to a central processing unit of an integrated circuit and decrypting the encrypted image using a cryptographic key element. The cryptographic key element is embedded within the integrated circuit. The method also includes evaluating the decrypted image in order to verify its authenticity, and executing the decrypted image if the decrypted image is successfully verified. In more particular embodiments, the verification includes utilizing an executable and linkable format (ELF) to signify that encryption has been enabled for at least a portion of the encrypted image. A processor within the integrated circuit can be provided with the cryptographic key element that corresponds to a product family of devices. The method can also include providing a corresponding image of the decrypted image to an external memory of the integrated circuit.
    Type: Grant
    Filed: August 25, 2010
    Date of Patent: July 8, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Mark W. Eklund, Jared B. Pendleton, Richard Brian Livingston, Robert T. Bell, Steven Joseph Rich
  • Patent number: 8732279
    Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.
    Type: Grant
    Filed: August 18, 2006
    Date of Patent: May 20, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Plamen Nedeltchev, Robert T. Bell, Max Pritikin
  • Patent number: 8700916
    Abstract: A device specific key is generated within an electronic device by providing a challenge to a physically unclonable function (PUF) structure integrated within the electronic device, where the PUF structure outputs a specific response based upon a specific challenge provided to the PUF structure. The PUF response is provided to a cryptographic module integrated within the electronic device, and a device specific key is generated by the cryptographic module utilizing a cryptographic key generation algorithm. The device specific key is generated based upon a combination of input data including the PUF response and data that is specific to the electronic device.
    Type: Grant
    Filed: December 2, 2011
    Date of Patent: April 15, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Catherine Leslie Kilcrease, Amar Chand Amar, Jan L. Dukes-Schlossberg
  • Patent number: 8488775
    Abstract: A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: July 16, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Shmuel Shaffer, Labhesh Patel, Robert T. Bell, Shantanu Sarkar
  • Publication number: 20130142329
    Abstract: A device specific key is generated within an electronic device by providing a challenge to a physically unclonable function (PUF) structure integrated within the electronic device, where the PUF structure outputs a specific response based upon a specific challenge provided to the PUF structure. The PUF response is provided to a cryptographic module integrated within the electronic device, and a device specific key is generated by the cryptographic module utilizing a cryptographic key generation algorithm. The device specific key is generated based upon a combination of input data including the PUF response and data that is specific to the electronic device.
    Type: Application
    Filed: December 2, 2011
    Publication date: June 6, 2013
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Robert T. Bell, Catherine Leslie Kilcrease, Amar Chand Amar, Jan L. Dukes-Schlossberg
  • Publication number: 20120303941
    Abstract: The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time.
    Type: Application
    Filed: May 24, 2011
    Publication date: November 29, 2012
    Inventors: ANTHONY H. GRIECO, CHIRAG K. SHROFF, ROBERT T. BELL
  • Patent number: 8312263
    Abstract: According to one embodiment of the present invention, a method of updating a certificate trust list on a first endpoint includes receiving an initial certificate trust list at the first endpoint. The initial certificate trust list includes authentication data for at least a second endpoint. Digitally signed information is received at the first endpoint and authentication is initiated against the authentication data for the at least a second endpoint. The authentication occurs only if the digital signature is complementary to the authentication data for the at least a second endpoint. After successful authentication, the initial certificate trust list is updated with the information to yield an updated certificate trust list.
    Type: Grant
    Filed: January 25, 2005
    Date of Patent: November 13, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Douglas Q. Dexter