Patents by Inventor Samuel Bendinelli
Samuel Bendinelli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7533409Abstract: Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for routing the first packet, a second packet encapsulated within the first packet is detected. In the first packet, information for routing the second packet is identified based on which a second set of rules for processing the second packet and an index are determined. The second packet is then filtered based on the index, the second set of rules, and the information for routing the second packet. In addition, the index is associated with any additional packets encapsulated within the second packet. The additional packets are also filtered based on the index and the second set of rules.Type: GrantFiled: January 16, 2003Date of Patent: May 12, 2009Assignee: Corente, Inc.Inventors: John Keane, Christopher Macey, Samuel Bendinelli
-
Patent number: 7181542Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The at least one additional processor determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: GrantFiled: March 22, 2001Date of Patent: February 20, 2007Assignee: Corente, Inc.Inventors: Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto
-
Patent number: 7181766Abstract: Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate from the network operations center, and a base address that is routable in the base network. The network operations center may provide through the base network code and information for self-configuring the first processor as a gateway that interfaces the base network at the base address. The first processor may execute the provided code to self-configure itself as the gateway based on the provided information.Type: GrantFiled: April 11, 2001Date of Patent: February 20, 2007Assignee: Corente, Inc.Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro
-
Patent number: 7047424Abstract: Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional processor may determine whether the first and second processors mutually consent to enabling a hairpin between the first and second processors. The first processor may be provided with a first information identifying the hairpin and the second processor may be provided with a second information identifying the hairpin, when the additional processor may determine that the first and second processors mutually consent to the hairpin. Moreover, a first information flow may be established from the first processor to the hairpin based on the provided first information, and a second information flow may be established from the second processor to the hairpin based on the provided second information.Type: GrantFiled: April 11, 2001Date of Patent: May 16, 2006Assignee: Corente, Inc.Inventors: Samuel Bendinelli, John Keane, Christopher Macey
-
Patent number: 6631416Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the additional processor. Further, the additional processor may receive information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: GrantFiled: April 11, 2001Date of Patent: October 7, 2003Assignee: Openreach Inc.Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey
-
Publication number: 20030131263Abstract: Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for routing the first packet, a second packet encapsulated within the first packet is detected. In the first packet, information for routing the second packet is identified based on which a second set of rules for processing the second packet and an index are determined. The second packet is then filtered based on the index, the second set of rules, and the information for routing the second packet. In addition, the index is associated with any additional packets encapsulated within the second packet. The additional packets are also filtered based on the index and the second set of rules.Type: ApplicationFiled: January 16, 2003Publication date: July 10, 2003Applicant: Opeanreach, Inc.Inventors: John Keane, Christopher Macey, Samuel Bendinelli
-
Publication number: 20020053031Abstract: Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional processor may determine whether the first and second processors mutually consent to enabling a hairpin between the first and second processors. The first processor may be provided with a first information identifying the hairpin and the second processor may be provided with a second information identifying the hairpin, when the additional processor may determine that the first and second processors mutually consent to the hairpin. Moreover, a first information flow may be established from the first processor to the hairpin based on the provided first information, and a second information flow may be established from the second processor to the hairpin based on the provided second information.Type: ApplicationFiled: April 11, 2001Publication date: May 2, 2002Inventors: Samuel Bendinelli, John Keane, Christopher Macey
-
Publication number: 20020029276Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the additional processor. Further, the additional processor may receive information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The additional processor may determine a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: ApplicationFiled: April 11, 2001Publication date: March 7, 2002Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Chistopher Macey
-
Publication number: 20020026503Abstract: Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate from the network operations center, and a base address that is routable in the base network. The network operations center may provide through the base network code and information for self-configuring the first processor as a gateway that interfaces the base network at the base address. The first processor may execute the provided code to self-configure itself as the gateway based on the provided information.Type: ApplicationFiled: April 11, 2001Publication date: February 28, 2002Inventors: Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro
-
Publication number: 20020023210Abstract: Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the first processor to enabling a tunnel between the first processor and the second processor and receives information indicating a consent on behalf of the second processor to enabling a tunnel between the second processor and the first processor. The at least one additional processor determines a first virtual address for the first processor and a second virtual address for the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network.Type: ApplicationFiled: March 22, 2001Publication date: February 21, 2002Inventors: Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto