Patents by Inventor Robert T. Bell
Robert T. Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9717106Abstract: In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.Type: GrantFiled: May 13, 2016Date of Patent: July 25, 2017Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Larry William Truesdale
-
Patent number: 9621355Abstract: A client application of a device queries/interrogates a secure device identity module of the device to obtain a device identifier of the device and a signed string generated by the security device identity module using a private key unique to the device. The client application of the device sends to an authorization server a request containing the device identifier and the signed string. Depending on an authentication result obtained for the device based on the device identity, the authorization server sends to the device an access token that enables the client application to access a resource.Type: GrantFiled: October 1, 2015Date of Patent: April 11, 2017Assignee: Cisco Technology, Inc.Inventors: Steven R. Ochmanski, David C. White, Jr., Robert T. Bell
-
Publication number: 20170099148Abstract: A client application of a device queries/interrogates a secure device identity module of the device to obtain a device identifier of the device and a signed string generated by the security device identity module using a private key unique to the device. The client application of the device sends to an authorization server a request containing the device identifier and the signed string. Depending on an authentication result obtained for the device based on the device identity, the authorization server sends to the device an access token that enables the client application to access a resource.Type: ApplicationFiled: October 1, 2015Publication date: April 6, 2017Inventors: Steven R. Ochmanski, David C. White, JR., Robert T. Bell
-
Publication number: 20160255666Abstract: In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.Type: ApplicationFiled: May 13, 2016Publication date: September 1, 2016Inventors: Robert T. Bell, Larry William Truesdale
-
Patent number: 9363108Abstract: In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The processor may be operable to form a pairing with the wireless device based on a unique identifier of the wireless device. The unique identifier may be received from the wireless device. The unique identifier may identify the wireless device in the pairing. The processor may be operable to receive user data associated with the unique identifier from a database. The processor may be operable to initiate configuration of an IP telephony service, where the configuration based, at least in part, on the user data.Type: GrantFiled: June 5, 2008Date of Patent: June 7, 2016Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Larry William Truesdale
-
Patent number: 9264422Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.Type: GrantFiled: April 8, 2014Date of Patent: February 16, 2016Assignee: Cisco Technology, Inc.Inventors: Plamen Nedeltchev, Robert T. Bell, Max Pritikin
-
Patent number: 9241066Abstract: In one embodiment, a secure computer telephony integration (CTI) connection is established between a call analysis and/or screening device and a call control agent. The call analysis device sniffs secure media packets between the endpoints and receives CTI events from the call control agent via the secure CTI connection. The device correlates the CTI events with the secure media packets, enabling the device to decrypt the packets to perform voice quality troubleshooting or call screening in real-time.Type: GrantFiled: August 22, 2006Date of Patent: January 19, 2016Assignee: Cisco Technology, Inc.Inventors: Annie Wong, Shisen Chang, Robert T. Bell, Eddie B. Soliman
-
Patent number: 9147074Abstract: The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time.Type: GrantFiled: May 24, 2011Date of Patent: September 29, 2015Assignee: Cisco Technology, Inc.Inventors: Anthony H. Grieco, Chirag K. Shroff, Robert T. Bell
-
Patent number: 9065834Abstract: A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable to a state-based terminal, that translates at least one stateless signaling message received from the stateless client to at least one state-based signaling message for presentation to the state-based terminal thereby facilitating a media stream communications session between the stateless client and the state-based terminal over an Internet Protocol (IP)-based network.Type: GrantFiled: April 19, 2010Date of Patent: June 23, 2015Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Paul S. Hahn, Michael H. McClung, Richard B. Platt
-
Patent number: 8976968Abstract: Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint. A secure channel is established between the key distribution point and an intercepting point. The intercepting endpoint may be determined to be authorized to intercept the secure communication session. The key is provided to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, where the key provides the intercepting endpoint with access to intercept the secure communication session.Type: GrantFiled: May 8, 2012Date of Patent: March 10, 2015Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Subbiah Kandasamy, Daniel G. Wing
-
Patent number: 8943310Abstract: According to one embodiment of the present invention, a method of establishing a digital certificate on an endpoint includes establishing a connection between a proxy function module and the endpoint. The proxy function module is remotely located from the endpoint and operable to communicate with the endpoint and a certificate authority. Authentication information is generated at the endpoint. A portion of the authentication information is transmitted to the proxy function module. The proxy function module obtains a digital certificate based on the portion of the authentication information. The digital certificate is received at the endpoint from the proxy function module.Type: GrantFiled: January 25, 2005Date of Patent: January 27, 2015Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Douglas Q. Dexter
-
Patent number: 8856504Abstract: Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure.Type: GrantFiled: June 7, 2010Date of Patent: October 7, 2014Assignee: Cisco Technology, Inc.Inventors: Fabio R. Maino, Pere Monclus, David A. McGrew, Robert T. Bell, Steven Joseph Rich
-
Publication number: 20140223530Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.Type: ApplicationFiled: April 8, 2014Publication date: August 7, 2014Applicant: Cisco Technology, Inc.Inventors: Plamen Nedeltchev, Robert T. Bell, Max Pritikin
-
Patent number: 8774407Abstract: An example method is provided and includes providing an encrypted image to a central processing unit of an integrated circuit and decrypting the encrypted image using a cryptographic key element. The cryptographic key element is embedded within the integrated circuit. The method also includes evaluating the decrypted image in order to verify its authenticity, and executing the decrypted image if the decrypted image is successfully verified. In more particular embodiments, the verification includes utilizing an executable and linkable format (ELF) to signify that encryption has been enabled for at least a portion of the encrypted image. A processor within the integrated circuit can be provided with the cryptographic key element that corresponds to a product family of devices. The method can also include providing a corresponding image of the decrypted image to an external memory of the integrated circuit.Type: GrantFiled: August 25, 2010Date of Patent: July 8, 2014Assignee: Cisco Technology, Inc.Inventors: Mark W. Eklund, Jared B. Pendleton, Richard Brian Livingston, Robert T. Bell, Steven Joseph Rich
-
Patent number: 8732279Abstract: In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile.Type: GrantFiled: August 18, 2006Date of Patent: May 20, 2014Assignee: Cisco Technology, Inc.Inventors: Plamen Nedeltchev, Robert T. Bell, Max Pritikin
-
Patent number: 8700916Abstract: A device specific key is generated within an electronic device by providing a challenge to a physically unclonable function (PUF) structure integrated within the electronic device, where the PUF structure outputs a specific response based upon a specific challenge provided to the PUF structure. The PUF response is provided to a cryptographic module integrated within the electronic device, and a device specific key is generated by the cryptographic module utilizing a cryptographic key generation algorithm. The device specific key is generated based upon a combination of input data including the PUF response and data that is specific to the electronic device.Type: GrantFiled: December 2, 2011Date of Patent: April 15, 2014Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Catherine Leslie Kilcrease, Amar Chand Amar, Jan L. Dukes-Schlossberg
-
Patent number: 8488775Abstract: A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file.Type: GrantFiled: December 7, 2010Date of Patent: July 16, 2013Assignee: Cisco Technology, Inc.Inventors: Shmuel Shaffer, Labhesh Patel, Robert T. Bell, Shantanu Sarkar
-
Publication number: 20130142329Abstract: A device specific key is generated within an electronic device by providing a challenge to a physically unclonable function (PUF) structure integrated within the electronic device, where the PUF structure outputs a specific response based upon a specific challenge provided to the PUF structure. The PUF response is provided to a cryptographic module integrated within the electronic device, and a device specific key is generated by the cryptographic module utilizing a cryptographic key generation algorithm. The device specific key is generated based upon a combination of input data including the PUF response and data that is specific to the electronic device.Type: ApplicationFiled: December 2, 2011Publication date: June 6, 2013Applicant: CISCO TECHNOLOGY, INC.Inventors: Robert T. Bell, Catherine Leslie Kilcrease, Amar Chand Amar, Jan L. Dukes-Schlossberg
-
Publication number: 20120303941Abstract: The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time.Type: ApplicationFiled: May 24, 2011Publication date: November 29, 2012Inventors: ANTHONY H. GRIECO, CHIRAG K. SHROFF, ROBERT T. BELL
-
Patent number: 8312263Abstract: According to one embodiment of the present invention, a method of updating a certificate trust list on a first endpoint includes receiving an initial certificate trust list at the first endpoint. The initial certificate trust list includes authentication data for at least a second endpoint. Digitally signed information is received at the first endpoint and authentication is initiated against the authentication data for the at least a second endpoint. The authentication occurs only if the digital signature is complementary to the authentication data for the at least a second endpoint. After successful authentication, the initial certificate trust list is updated with the information to yield an updated certificate trust list.Type: GrantFiled: January 25, 2005Date of Patent: November 13, 2012Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Douglas Q. Dexter