Patents by Inventor Robert Zeljko

Robert Zeljko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240314053
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: May 23, 2024
    Publication date: September 19, 2024
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Bhuvangyan Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Publication number: 20240214291
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: February 29, 2024
    Publication date: June 27, 2024
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Bhuvangyan Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Publication number: 20240089189
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: November 20, 2023
    Publication date: March 14, 2024
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Bhuvangyan Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Patent number: 11824750
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Grant
    Filed: January 10, 2022
    Date of Patent: November 21, 2023
    Assignee: Workspot, Inc.
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Publication number: 20220131779
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Application
    Filed: January 10, 2022
    Publication date: April 28, 2022
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Patent number: 11223547
    Abstract: A system and a method are disclosed for managing information technology (IT) infrastructure. Client devices interact with applications of an enterprise that may be hosted in data centers of the enterprise or as software as a service (SaaS) applications. An IT management system receives session information from client devices. The session information describes interactions of client devices with applications, for example, response time of applications for each interaction. The IT management system analyzes the session information received from various client devices to identify issues with IT infrastructure. The IT management system generates warning messages describing the issues identified and sends them for review, for example, by a system administrator.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: January 11, 2022
    Assignee: Workspot, Inc.
    Inventors: Puneet Chawla, Robert Zeljko, Amitabh Sinha, Abhijeet Kumar, Christopher N. Thomas, Yatin Vasavada
  • Patent number: 9426182
    Abstract: A system and method are disclosed for adaptive authentication. An access control system stores policies for an enterprise, where each policy specifies a type of access control. The type of access control includes one or more security rules, which may specify authentication procedures, allowable behaviors, or both. The access control system stores a mapping from contexts of requests to interact with applications and access control policies. When a user requests access to an application associated with the enterprise via a client, the access control system receives the context of the request. The access control system selects an access control policy for the context of the request. The access control system sends access control information from the access control policy selected to the client. The client interacts with the user to perform the authentication.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: August 23, 2016
    Assignee: Workspot, Inc.
    Inventors: Robert Zeljko, Puneet Chawla, Christopher N. Thomas, Amitabh Sinha, Yatin Vasavada, Abhijeet Kumar, Guang Yuan Li
  • Publication number: 20130276060
    Abstract: Described herein are systems and methods for fallback operation within WLANs that rely on remote authentication procedures. When a primary network node authentication process fails, fallback access control parameters associated with a secondary network node authentication process are exchanged between a network node and an authentication server, wherein the secondary network node authentication process allows the network node to access other resources of a computer network.
    Type: Application
    Filed: June 4, 2004
    Publication date: October 17, 2013
    Inventors: Ulrich Wiedmann, Terrance L. Lillie, Richard P. Sneiderman, Christian Wiedmann, Robert Zeljko
  • Patent number: 8555344
    Abstract: Described herein are systems and methods for fallback operation within WLANs that rely on remote authentication procedures. When a primary network node authentication process fails, fallback access control parameters associated with a secondary network node authentication process are exchanged between a network node and an authentication server, wherein the secondary network node authentication process allows the network node to access other resources of a computer network.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: October 8, 2013
    Assignee: McAfee, Inc.
    Inventors: Ulrich Wiedmann, Terrance L. Lillie, Richard P. Sneiderman, Christian Wiedmann, Robert Zeljko
  • Patent number: 8310955
    Abstract: As part of a wireless access point configuration process, a computer network is probed and each previously unprogrammed wireless access point on the network is programmed by transmitting wireless network configuration parameters thereto using a software agent residing on a node of the computer network.
    Type: Grant
    Filed: March 23, 2011
    Date of Patent: November 13, 2012
    Assignee: McAfee, Inc.
    Inventors: Ulrich Wiedmann, Terrance L. Lillie, Richard P. Sneiderman, Christian Wiedmann, Robert Zeljko
  • Patent number: 8068441
    Abstract: As part of a wireless access point configuration process, a computer network is probed and each previously unprogrammed wireless access point on the network is programmed by transmitting wireless network configuration parameters thereto using a software agent residing on a node of the computer network.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: November 29, 2011
    Assignee: McAfee, Inc.
    Inventors: Ulrich Wiedmann, Terrance L. Lillie, Richard P. Sneiderman, Christian Wiedmann, Robert Zeljko
  • Patent number: 8019082
    Abstract: Methods and apparatus for the automated configuration of 802.1x clients in wireless computer networks are described. In one embodiment, a wireless network client for a wireless network is configured automatically, by providing (using a software driver installed at either the network client or a remote server) network configuration information to a software client of the wireless network client.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: September 13, 2011
    Assignee: McAfee, Inc.
    Inventors: Ulrich Wiedmann, Terrance L. Lillie, Richard P. Sneiderman, Christian Wiedmann, Robert Zeljko
  • Patent number: 7822972
    Abstract: A system, method and computer program product are provided. Included is a bridge capable of communication with a non-wireless capable device and a wireless network. In use, such bridge incorporates security functionality for remotely and automatically securing the non-wireless capable device during use of the wireless network.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: October 26, 2010
    Assignee: McAfee, Inc.
    Inventors: Terrance L. Lillie, Christian Wiedmann, Robert Zeljko, Richard P. Sneiderman, Ulrich Wiedmann, Gigi C. Chu, Sean R. Lynch
  • Patent number: 7761710
    Abstract: A system, method and computer program product are provided. In use, a peer-to-peer wireless network is advertised utilizing a granting node. Further, a requesting node is provided for connecting to the peer-to-peer wireless network. Thereafter, such requesting node is redirected to a portal. To this end, a software application is capable of being downloaded to the requesting node via the peer-to-peer wireless network utilizing the portal.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: July 20, 2010
    Assignee: McAfee, Inc.
    Inventors: Terrance L. Lillie, Christian Wiedmann, Robert Zeljko, Richard P. Sneiderman, Ulrich Wiedmann, Gigi C. Chu, Sean R. Lynch
  • Patent number: 7757274
    Abstract: A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such human-perceptible hashes are then compared via an out-of-band communication channel. To this end, a second key may then be transmitted to the requesting node for providing access to a centrally-based wireless network.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: July 13, 2010
    Assignee: McAfee, Inc.
    Inventors: Terrance L. Lillie, Christian Wiedmann, Robert Zeljko, Richard P. Sneiderman, Ulrich Wiedmann, Gigi C. Chu, Sean R. Lynch
  • Patent number: 7673146
    Abstract: As part of a network node authentication process, a MAC address or other globally unique identifier of an access point through which the network node will access a computer network is transmitted in an EAP or other authentication message to an authentication server to uniquely identify the access point to the authentication server.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: March 2, 2010
    Assignee: McAfee, Inc.
    Inventors: Ulrich Wiedmann, Terrance L. Lillie, Richard P. Sneiderman, Christian Wiedmann, Robert Zeljko
  • Patent number: 7606370
    Abstract: A system, method and computer program product are provided. In use, a key is distributed to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network. Further, the key is automatically updated at the nodes in the wireless network based on predetermined criteria.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: October 20, 2009
    Assignee: McAfee, Inc.
    Inventors: Terrance L. Lillie, Christian Wiedmann, Robert Zeljko, Richard P. Sneiderman, Ulrich Wiedmann, Gigi C. Chu, Sean R. Lynch
  • Publication number: 20070233860
    Abstract: A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such human-perceptible hashes are then compared via an out-of-band communication channel. To this end, a second key may then be transmitted to the requesting node for providing access to a centrally-based wireless network.
    Type: Application
    Filed: February 21, 2006
    Publication date: October 4, 2007
    Inventors: Terrance Lillie, Christian Wiedmann, Robert Zeljko, Richard Sneiderman, Ulrich Wiedmann, Gigi Chu, Sean Lynch
  • Publication number: 20060251258
    Abstract: A system, method and computer program product are provided. In use, a key is distributed to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network. Further, the key is automatically updated at the nodes in the wireless network based on predetermined criteria.
    Type: Application
    Filed: February 21, 2006
    Publication date: November 9, 2006
    Inventors: Terrance Lillie, Christian Wiedmann, Robert Zeljko, Richard Sneiderman, Ulrich Wiedmann, Gigi Chu, Sean Lynch
  • Publication number: 20060233375
    Abstract: A system, method and computer program product are provided. In use, a peer-to-peer wireless network is advertised utilizing a granting node. Further, a requesting node is provided for connecting to the peer-to-peer wireless network. Thereafter, such requesting node is redirected to a portal. To this end, a software application is capable of being downloaded to the requesting node via the peer-to-peer wireless network utilizing the portal.
    Type: Application
    Filed: February 21, 2006
    Publication date: October 19, 2006
    Inventors: Terrance Lillie, Christian Wiedmann, Robert Zeljko, Richard Sneiderman, Ulrich Wiedmann, Gigi Chu, Sean Lynch