Patents by Inventor Sape Jurrien Mullender

Sape Jurrien Mullender has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190342354
    Abstract: Techniques for provisioning multicast chains in a cloud-based environment are described herein. In an embodiment, an orchestration system sends a particular model of a distributed computer program application comprising one or more sources, destinations, and virtualized appliances for initiation by one or more host computers to a software-defined networking (SDN) controller. The SDN controller determines one or more locations for the virtualized appliances and generates a particular updated model of the distributed computer program application, the updated model comprising the one or more locations for the virtualized appliances. The SDN controller sends the updated model of the distributed computer program application to the orchestration system.
    Type: Application
    Filed: May 1, 2018
    Publication date: November 7, 2019
    Inventors: Hendrikus GP Bosch, Jeffrey Napper, Andre Surcouf, Alessandro Duminuco, Subhasri Dhesikan, Sape Jurriën Mullender
  • Patent number: 10469379
    Abstract: A method is provided in one example embodiment and may include determining at a parent content node that a plurality of recipient content nodes are to receive a same content; generating, based on a determination that the same content is available at the parent content node, a multi-delivery header comprising a plurality of identifiers, wherein each identifier of the plurality of identifiers indicates each recipient content node that is to receive the same content; appending the multi-delivery header to one or more packets of an Internet Protocol (IP) flow associated with the same content; and transmitting packets for the IP flow to each of the plurality of the recipient content nodes.
    Type: Grant
    Filed: February 17, 2017
    Date of Patent: November 5, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Hendrikus G. P. Bosch, Sape Jurriën Mullender, Keith Burns, Jeffrey Napper, William Mark Townsley, Alessandro Duminuco, Andre Surcouf, Ijsbrand Wijnands, Humberto J. La Roche
  • Patent number: 10361969
    Abstract: An example method is provided in one example embodiment and may include configuring a measurement indication for a packet; forwarding the packet through a service chain comprising one or more service functions; recording measurement information for the packet as it is forwarded through the service chain; and managing capacity for the service chain based, at least in part, on the measurement information. In some cases, the method can include determining end-to-end measurement information for the service chain using the recorded measurement information. In some cases, managing capacity for the service chain can further include identifying a particular service function as a bottleneck service function for the service chain; and increasing capacity for the bottleneck service. In various instances, increasing capacity for the bottleneck service can include at least one of: instantiating additional instances of the bottleneck service; and instantiating additional instances of the service chain.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: July 23, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Hendrikus G. P. Bosch, Jeffrey Napper, Surendra M. Kumar, Alessandro Duminuco, Sape Jurriën Mullender, Humberto J. La Roche, Louis Gwyn Samuel, Frank Brockners, Shwetha Subray Bhandari
  • Patent number: 10313118
    Abstract: In one embodiment, a method comprises: receiving, by a requestor device in a data network, authentication request parameters for generating a secured request for a data object, the authentication request parameters comprising a shared encryption key and a prescribed update time interval value; generating, by the requestor device, the secured request based on generating a reduced-resolution time value by dividing a current device timestamp value of the requestor device by the prescribed update time interval value, and encrypting the reduced-resolution time value using the shared encryption key; and outputting, by the requestor device, the secured request specifying an object name identifying the data object and the encrypted reduced-resolution time value, enabling a content supplier device to authenticate the secured request based on determining whether the reduced-resolution time value, multiplied by the prescribed update time interval, substantially matches a corresponding timestamp value of the content supp
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: June 4, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sape Jurriën Mullender, Hendrikus Bosch, David Lake
  • Patent number: 10218704
    Abstract: Aspects of the embodiments are directed to systems, methods, and computer program products embodied at a server managing a resource for providing access to a resource in a distributed network. Embodiments include receiving a request from a client for access to a resource, the request comprising a named capability identifying the resource and identifying a server managing the resource; determining, from the named capability, whether the client is authorized to access the resource identified by the named capability; and granting access to the resource named by the named capability based on the named capability received with the request.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: February 26, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sape Jurriën Mullender, Hendrikus G. P. Bosch, Louis Gwyn Samuel
  • Publication number: 20180367621
    Abstract: In one embodiment, secure service chaining can be implemented efficiently for content delivery systems. An orchestrator can determine a service chain for processing a request from a client for content. The orchestrator can determine a capability identifying nodes of the service chain. The orchestrator can then transmit, to the client, a redirect message having the capability, wherein the redirect message redirects the request to a first node of the service chain. The nodes of the service chain can verify the capability and carry out the service chain. Service functions can be applied to the traffic flow associated with delivering the content to the user.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 20, 2018
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Sape Jurriën Mullender, Hendrikus G. P. Bosch, Alessandro Duminuco, Jeffrey Napper
  • Publication number: 20180302877
    Abstract: A method is provided in one example embodiment and may include receiving, by a mobility management frontend, an attach request for a user equipment (UE) to attach the UE to a core network slice type for a mobile core Software Defined Network (SDN) infrastructure, wherein a plurality of core network slice types are available for the mobile core SDN infrastructure to receive traffic from a plurality of UEs; determining a particular core network slice type within the mobile core SDN infrastructure to serve the UE based on subscriber information associated with the UE; selecting a particular slice instance of the particular core network slice type to receive traffic for the UE; and forwarding traffic for the UE between a Radio Access Network (RAN) and the particular slice instance by the mobility management frontend.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 18, 2018
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Hendrikus G. P. Bosch, Humberto J. La Roche, Aeneas Sean Dodd-Noble, Sape Jurriën Mullender, Timothy P. Stammers, Konstantin Livanos
  • Patent number: 10063468
    Abstract: Particular embodiments described herein provide for a communication system that can be configured for receiving, at a network element, a flow offload decision for a first service node. The flow offload decision can include a portion of a service chain for processing a flow and updating next hop flow based routing information for the flow. A next hop in the flow can insert flow specific route information in its routing tables to bypass a packet forwarder serving the service that offloaded the flow in the reverse direction.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: August 28, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Hendrikus G. P. Bosch, Sape Jurriën Mullender, Jeffrey Napper, Surendra M. Kumar, Alessandro Duminuco
  • Publication number: 20180241671
    Abstract: A method is provided in one example embodiment and may include determining at a parent content node that a plurality of recipient content nodes are to receive a same content; generating, based on a determination that the same content is available at the parent content node, a multi-delivery header comprising a plurality of identifiers, wherein each identifier of the plurality of identifiers indicates each recipient content node that is to receive the same content; appending the multi-delivery header to one or more packets of an Internet Protocol (IP) flow associated with the same content; and transmitting packets for the IP flow to each of the plurality of the recipient content nodes.
    Type: Application
    Filed: February 17, 2017
    Publication date: August 23, 2018
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Hendrikus G. P. Bosch, Sape Jurriën Mullender, Keith Burns, Jeffrey Napper, William Mark Townsley, Alessandro Duminuco, Andre Surcouf, Ijsbrand Wijnands, Humberto J. La Roche
  • Publication number: 20180124053
    Abstract: In one embodiment, a method comprises: receiving, by a requestor device in a data network, authentication request parameters for generating a secured request for a data object, the authentication request parameters comprising a shared encryption key and a prescribed update time interval value; generating, by the requestor device, the secured request based on generating a reduced-resolution time value by dividing a current device timestamp value of the requestor device by the prescribed update time interval value, and encrypting the reduced-resolution time value using the shared encryption key; and outputting, by the requestor device, the secured request specifying an object name identifying the data object and the encrypted reduced-resolution time value, enabling a content supplier device to authenticate the secured request based on determining whether the reduced-resolution time value, multiplied by the prescribed update time interval, substantially matches a corresponding timestamp value of the content supp
    Type: Application
    Filed: October 27, 2016
    Publication date: May 3, 2018
    Inventors: SAPE JURRIËN MULLENDER, HENDRIKUS BOSCH, DAVID LAKE
  • Publication number: 20180103037
    Abstract: Aspects of the embodiments are directed to systems, methods, and computer program products embodied at a server managing a resource for providing access to a resource in a distributed network. Embodiments include receiving a request from a client for access to a resource, the request comprising a named capability identifying the resource and identifying a server managing the resource; determining, from the named capability, whether the client is authorized to access the resource identified by the named capability; and granting access to the resource named by the named capability based on the named capability received with the request.
    Type: Application
    Filed: October 6, 2016
    Publication date: April 12, 2018
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Sape Jurriën Mullender, Hendrikus G. P. Bosch, Louis Gwyn Samuel
  • Publication number: 20180063018
    Abstract: An example method is provided in one example embodiment and may include configuring a measurement indication for a packet; forwarding the packet through a service chain comprising one or more service functions; recording measurement information for the packet as it is forwarded through the service chain; and managing capacity for the service chain based, at least in part, on the measurement information. In some cases, the method can include determining end-to-end measurement information for the service chain using the recorded measurement information. In some cases, managing capacity for the service chain can further include identifying a particular service function as a bottleneck service function for the service chain; and increasing capacity for the bottleneck service. In various instances, increasing capacity for the bottleneck service can include at least one of: instantiating additional instances of the bottleneck service; and instantiating additional instances of the service chain.
    Type: Application
    Filed: August 30, 2016
    Publication date: March 1, 2018
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Hendrikus G. P. Bosch, Jeffrey Napper, Surendra M. Kumar, Alessandro Duminuco, Sape Jurriën Mullender, Humberto J. La Roche, Louis Gwyn Samuel, Frank Brockners, Shwetha Subray Bhandari
  • Publication number: 20170208011
    Abstract: An example method is provided in one example embodiment and may include receiving traffic associated with at least one of a mobile network and a Gi-Local Area Network (Gi-LAN), wherein the traffic comprises one or more packets; determining a classification of the traffic to a service chain, wherein the service chain comprises one or more service functions associated at least one of one or more mobile network services and one or more Gi-LAN services; routing the traffic through the service chain; and routing the traffic to a network using one of a plurality of egress interfaces, wherein each egress interface of the plurality of egress interfaces is associated with at least one of the one or more mobile network services and the one or more Gi-LAN services.
    Type: Application
    Filed: June 2, 2016
    Publication date: July 20, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Hendrikus G.P. Bosch, Jeffrey Napper, Alessandro Duminuco, Humberto J. La Roche, Sape Jurriën Mullender, Surendra M. Kumar, Louis Gwyn Samuel, Bart A. Brinckman, Aeneas Sean Dodd-Noble, Luca Martini
  • Publication number: 20170208000
    Abstract: Particular embodiments described herein provide for a communication system that can be configured for receiving, at a network element, a flow offload decision for a first service node. The flow offload decision can include a portion of a service chain for processing a flow and updating next hop flow based routing information for the flow. A next hop in the flow can insert flow specific route information in its routing tables to bypass a packet forwarder serving the service that offloaded the flow in the reverse direction.
    Type: Application
    Filed: January 15, 2016
    Publication date: July 20, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Hendrikus Bosch, Sape Jurriën Mullender, Jeffrey Napper, Surendra M. Kumar, Alessandro Duminuco
  • Patent number: 9357014
    Abstract: A service-based networking capability is presented. The service-based networking capability replaces traditional networking connections between endpoints with service connections between endpoints. The service-based networking capability supports establishment and use of a service connection between endpoints, where the service connection between endpoints may be provided below the application layer and above the transport layer. The establishment and use of a service connection between endpoints may be provided using a connected services stack, which may include a connected services layer that is configured to operate below the application layer and above the transport layer.
    Type: Grant
    Filed: April 29, 2014
    Date of Patent: May 31, 2016
    Assignee: Alcatel Lucent
    Inventors: John Shamilian, Sape Jurrien Mullender
  • Publication number: 20150312352
    Abstract: A service-based networking capability is presented. The service-based networking capability replaces traditional networking connections between endpoints with service connections between endpoints. The service-based networking capability supports establishment and use of a service connection between endpoints, where the service connection between endpoints may be provided below the application layer and above the transport layer. The establishment and use of a service connection between endpoints may be provided using a connected services stack, which may include a connected services layer that is configured to operate below the application layer and above the transport layer.
    Type: Application
    Filed: April 29, 2014
    Publication date: October 29, 2015
    Applicant: ALCATEL LUCENT
    Inventors: John Shamilian, Sape Jurrien Mullender
  • Patent number: 8296584
    Abstract: Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is encrypted and a message authentication code is generated for the encrypted data block. A target address is determined for storage of the encrypted data block in a memory. The target address is then modified to permit in-line storage of the message authentication code with the encrypted data block in the memory, and the encrypted data block and the message authentication code are transferred to the memory for storage at the modified address. Illustrative embodiments of the techniques advantageously facilitate secure off-chip storage of data in a processing system.
    Type: Grant
    Filed: December 28, 2007
    Date of Patent: October 23, 2012
    Assignee: Alcatel Lucent
    Inventors: Peter Bosch, Hubert Rae McLellan, Jr., Sape Jurriën Mullender
  • Patent number: 7827326
    Abstract: In a processing system comprising a processor and a plurality of peripherals coupled to the processor, access privileges of a secure operating mode of the processor are delegated to at least a given one of the peripherals. The given peripheral is configured to store, in a secure portion of that peripheral, state information indicative of the processor being in a secure operating mode. The given peripheral is further configured to utilize the stored state information to allow the given peripheral to access at least one resource that is accessible to the processor in the secure operating mode but is not otherwise accessible to the given peripheral. The processing system may comprise, for example, a system on a chip, wherein the processor and peripherals are combined into a single integrated circuit.
    Type: Grant
    Filed: November 26, 2007
    Date of Patent: November 2, 2010
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Peter Bosch, Hubert Rae McLellan, Jr., Sape Jurriën Mullender
  • Publication number: 20090172416
    Abstract: Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is encrypted and a message authentication code is generated for the encrypted data block. A target address is determined for storage of the encrypted data block in a memory. The target address is then modified to permit in-line storage of the message authentication code with the encrypted data block in the memory, and the encrypted data block and the message authentication code are transferred to the memory for storage at the modified address. Illustrative embodiments of the techniques advantageously facilitate secure off-chip storage of data in a processing system.
    Type: Application
    Filed: December 28, 2007
    Publication date: July 2, 2009
    Inventors: Peter Bosch, Hubert Rae McLellan, JR., Sape Jurrien Mullender
  • Publication number: 20090138623
    Abstract: In a processing system comprising a processor and a plurality of peripherals coupled to the processor, access privileges of a secure operating mode of the processor are delegated to at least a given one of the peripherals. The given peripheral is configured to store, in a secure portion of that peripheral, state information indicative of the processor being in a secure operating mode. The given peripheral is further configured to utilize the stored state information to allow the given peripheral to access at least one resource that is accessible to the processor in the secure operating mode but is not otherwise accessible to the given peripheral. The processing system may comprise, for example, a system on a chip, wherein the processor and peripherals are combined into a single integrated circuit.
    Type: Application
    Filed: November 26, 2007
    Publication date: May 28, 2009
    Inventors: Peter Bosch, Hubert Rae McLellan, JR., Sape Jurrien Mullender