Patents by Inventor Rodrigo Laguisma

Rodrigo Laguisma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7505595
    Abstract: A system and method for decrypting all encrypted data packets captured from at least one of a plurality of access points in a wireless network. In the wireless network, each access point operates on its own channel, preferably using its own key or keyset. A profile is established containing all keysets for all access points. The profile is stored on the network in an encrypted form that can only be viewed through network analyzer software. The network analyzer software uses the profile to access all of the keys in use without an individual having to manually enter any key data into the analyzer software. The network analyzer can perform iterative decryption steps using all keysets in the profile until all encrypted data is decrypted.
    Type: Grant
    Filed: November 14, 2003
    Date of Patent: March 17, 2009
    Assignee: Finisar Corporation
    Inventors: Tong-Ming Lee, Rodrigo Laguisma, Manoj Vaddineni
  • Publication number: 20050108727
    Abstract: A system of and method for completing one or more parameters or network interface configurations in a task executed by an application program are disclosed. The system and method have particular application with application programs associated with network analyzers and similar network analysis tools for use in monitoring and diagnosing problem conditions in communications and storage networks. In accordance with one embodiment of the method, a task module is loaded into system memory of a computer system. Parameters or network interface configurations associated with the task module that are to be completed are identified. A resolution plan to complete each parameter or network interface configuration is created. The resolution plan is then executed in connection with assisting modules to complete for each parameter or network interface configuration. The completed parameters or network interface configurations are then input into the task module and the task module is executed.
    Type: Application
    Filed: October 14, 2004
    Publication date: May 19, 2005
    Inventors: David Bernstein, Robert Otis, Rodrigo Laguisma
  • Publication number: 20050097536
    Abstract: Methods for graphically displaying multiple task workflow run instances associated with execution of a software application is disclosed. The software application can be associated with, in one embodiment, a network analyzer for monitoring data transmissions in a communications network. A graphical user interface is employed to graphically depict a plurality of workflow run instances representing tasks executed by the software application. The workflow run instances are temporally arranged in a stacked configuration according to a Gantt chart design. A selector including a vertical selector bar and a selector block is movable over the workflow run instances to select one or more specified workflow run instance portions at a given time point. Once selected, data and other details relating to the selected workflow run instance portions are displayed.
    Type: Application
    Filed: September 13, 2004
    Publication date: May 5, 2005
    Inventors: David Bernstein, Rodrigo Laguisma
  • Publication number: 20050091361
    Abstract: A method of graphically depicting various network elements of a communications network in a virtual network topology via a graphical user interface (“GUI”) is disclosed. The virtual network topology depicts logical relationships between network components instead of merely depicting physical network component relationships. A system network subset and a monitoring network subset of the communications network are defined according to one layer N of the open system interconnection (“OSI”) layer model. Various logical links are established between the system network and the monitoring network. A virtual topology is defined that depicts the various logical links according to another OSI layer M. The virtual topology is displayed via a GUI that enables modification of the logical links to occur.
    Type: Application
    Filed: September 13, 2004
    Publication date: April 28, 2005
    Inventors: David Bernstein, Rodrigo Laguisma
  • Publication number: 20050071678
    Abstract: A system and method for decrypting all encrypted data packets captured from at least one of a plurality of access points in a wireless network. In the wireless network, each access point operates on its own channel, preferably using its own key or keyset. A profile is established containing all keysets for all access points. The profile is stored on the network in an encrypted form that can only be viewed through network analyzer software. The network analyzer software uses the profile to access all of the keys in use without an individual having to manually enter any key data into the analyzer software. The network analyzer can perform iterative decryption steps using all keysets in the profile until all encrypted data is decrypted.
    Type: Application
    Filed: November 14, 2003
    Publication date: March 31, 2005
    Inventors: Tong-Ming Lee, Rodrigo Laguisma, Manoj Vaddineni