Patents by Inventor Scott A. Blomquist
Scott A. Blomquist has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9473373Abstract: A method for storing a plurality of packets includes receiving a packets from a network, applying a hash function to values of one or more fields in the packet so as define a hash key and to select a storage bucket from a plurality of buckets, and adding the packet to the storage bucket. A bucket record associated with the storage bucket includes a flow index determined based on the values of the one or more fields in the packet.Type: GrantFiled: April 4, 2013Date of Patent: October 18, 2016Assignee: Viavi Solutions, Inc.Inventors: Thomas Henry, Scott A. Blomquist
-
Patent number: 9276853Abstract: The invention relates to a method and apparatus for efficient storing and retrieval of captured data packets. The packets are parsed to extract flow defining parameters such as source and destination addresses, the extracted addresses are hashed and the address hash numbers are reversibly combined, for example concatenated in a pre-defined order of their values to obtain a single hash index for a flow. The packets are then saved in a packet store in accordance and/or association with their hash index. The packets may be efficiently retrieved based on the two addresses or on a single network address.Type: GrantFiled: April 9, 2013Date of Patent: March 1, 2016Assignee: Viavi Solutions Inc.Inventor: Scott A. Blomquist
-
Publication number: 20140250514Abstract: Systems and methods to tell apart computers and humans using image recognition task having a dynamic graphical arrangement of randomly selected images. The images can be arranged as a grid or matrix for presentation on a device display for authentication of a user as human. The kinds of graphical images can be derived from a selected category for the image recognition task. A series of randomly generated access codes corresponding to the images can be displayed with the images. The user may enter the access codes corresponding to images from the selected category. An authentication server can compare the access code entry to an authentication reference code corresponding to the particular arrangement of images. The selection of images, their arrangement and their corresponding access codes, may dynamically change in between verification sessions.Type: ApplicationFiled: September 17, 2013Publication date: September 4, 2014Inventors: Scott A. Blomquist, Chad Blomquist, Koesmanto Bong, John Whitlock
-
Patent number: 8621578Abstract: Systems and methods to tell apart computers and humans using image recognition task having a dynamic graphical arrangement of randomly selected images. The images can be arranged as a grid or matrix for presentation on a device display for authentication of a user as human. The kinds of graphical images can be derived from a selected category for the image recognition task. A series of randomly generated access codes corresponding to the images can be displayed with the images. The user may enter the access codes corresponding to images from the selected category. An authentication server can compare the access code entry to an authentication reference code corresponding to the particular arrangement of images. The selection of images, their arrangement and their corresponding access codes, may dynamically change in between verification sessions.Type: GrantFiled: December 10, 2008Date of Patent: December 31, 2013Assignee: Confident Technologies, Inc.Inventors: Scott A. Blomquist, Chad Blomquist, Koesmanto Bong, Christopher Lee, John Whitlock
-
Publication number: 20130266014Abstract: The invention relates to a method and apparatus for efficient storing and retrieval of captured data packets. The packets are parsed to extract flow defining parameters such as source and destination addresses, the extracted addresses are hashed and the address hash numbers are reversibly combined, for example concatenated in a pre-defined order of their values to obtain a single hash index for a flow. The packets are then saved in a packet store in accordance and/or association with their hash index. The packets may be efficiently retrieved based on the two addresses or on a single network address.Type: ApplicationFiled: April 9, 2013Publication date: October 10, 2013Inventor: Scott A. BLOMQUIST
-
Patent number: 8055700Abstract: A system or method that extends a communication test/measurement agent by providing the communication test/measurement agent with built-in functionality to allow a central communication test/measurement system to generically communicate with and operate the agent, and by providing the communication test/measurement agent with built-in functionality to allow the agent to automatically recognize and dynamically incorporate plugins that are specific to different types of communication interfaces and which allow the network test/measurement system to communicate with the respective different types of communication interfaces.Type: GrantFiled: October 31, 2003Date of Patent: November 8, 2011Assignee: JDS Uniphase CorporationInventors: Merlin A. Rhoda, Scott A. Blomquist
-
Publication number: 20110184804Abstract: A system and method for queuing a user's selection of a good or service. In a preferred embodiment a user is presented with a dynamic matrix of images during a user identity authentication session. At least one image advertising the good or service is presented within the matrix. The user's performs an action to select the good or service and generates a request to select the good or service. The request to select the good or service is queued at either the user's computer or by an authentication server. Upon authentication of the user's identity, the user's request and identity credential are transmitted to the merchant from the authenticating identity provider and the purchase or rental transaction is completed without requiring the user to authenticate to or directly access the merchant server system.Type: ApplicationFiled: May 2, 2008Publication date: July 28, 2011Applicant: Vidoop, LLCInventors: James L. Sontag, Scott A. Blomquist
-
Publication number: 20110047606Abstract: A system and method for managing a plurality of a user's authentication elements. In a preferred embodiment a user initiates a webpage browser session at a user website access device and activates a password manager program. The user's identity is authenticated to an authentication server and allowed to access a secure database comprising a plurality of website authentication elements. Thereafter, the user accesses a first secure website and the program determines the presence of a user authentication data field. When a user authentication data field is present the program instructs the authentication server to automatically transmit at least one of the authentication elements specific to the authentication data field of the first secure website to authenticate the user to the first website.Type: ApplicationFiled: September 17, 2008Publication date: February 24, 2011Inventors: Scott A. Blomquist, Chad Blomquist, Jim Zhen Luo, Benjamin Stover, Jason Allyn Grlicky, Samuel Wayne Alexander
-
Publication number: 20110047605Abstract: A system and method for verifying the identity of a user to a secure website. The user provides a server associated with the secure website with an account identifier, a biometric authentication element comprising a voice print and secret pass phrase, and contact information for a user communication device during the enrollment process. Upon subsequent attempts to access the secure website the user is prompted to provide an account identifier. Upon receipt of the account identifier, the server transmits a request for voice print and pass phrase samples to the user's communication device. The server receives the samples, compares them to the user's stored voice print and pass phrase and authenticates the user to the secure website if the sample voice print and sample pass phrase match the stored voice print and pass phrase sample. The server request may comprise a sponsored message.Type: ApplicationFiled: February 6, 2008Publication date: February 24, 2011Applicant: Vidoop, LLCInventors: James L. Sontag, Scott A. Blomquist
-
Publication number: 20100250937Abstract: A system and method for authorizing a user to a plurality of secure servers. Each server is adapted to store user information. The secure server receives a request for access to one of the plurality of secure servers from a first user device from a user possessing an authorized account identifier. An authentication server may intervene and request the user authenticate to the authentication server and transmit a client-side electronic lockbox stored at the first user device to the authentication server. The authentication server retrieves a key? corresponding to the received client-side lockbox and uses the key to decrypt an encrypted file contained within the lockbox. The decrypted file may contain authentication information that is forwarded to the secure server. The secure server grants the user access to the user's content stored thereon when the authentication information received from the authentication server corresponds to the authentication information stored at the secure server for the user.Type: ApplicationFiled: March 5, 2008Publication date: September 30, 2010Applicant: Vidoop, LLCInventors: Scott A. Blomquist, Chad Blomquist
-
Patent number: 7751385Abstract: Methods and systems for assigning participant identifying data to network transmission events. Participant identifying data and identifying data related to a network transmission event are provided to a predetermined (also referred to as central) monitoring location and stored in a database at the central monitoring location.Type: GrantFiled: August 25, 2004Date of Patent: July 6, 2010Assignee: JDS Uniphase CorporationInventors: John M. Monk, Timothy M. Bennett, Scott A. Blomquist
-
Patent number: 7719965Abstract: Methods and systems for coordinated monitoring of network transmission events. Predetermined information for the network transmission event is obtained at a first network location and the network transmission event predetermined information is provided to a predetermined monitoring location (or server). From the predetermined monitoring location, the predetermined information is provided to other network monitoring devices at one or more other network locations. At the one or more other network locations, the network transmission event, corresponding to the predetermined information obtained at the first location, is monitored. Network transmission event information, corresponding to the predetermined information obtained at the first location, is provided to the predetermined monitoring location from the first location and the other network locations. The monitoring of network transmission can be thereby coordinated.Type: GrantFiled: August 25, 2004Date of Patent: May 18, 2010Assignee: Agilent Technologies, Inc.Inventors: John M. Monk, Timothy M. Bennett, Scott A. Blomquist
-
Publication number: 20100043062Abstract: The invention provides methods and systems for management of image-based password accounts. A password management account may be accessed by a user undergoing image-based authentication. The invention may allow a user to manage parameters relating to image-based authentication. The invention may also allow a user to manage authentication at one or more web site.Type: ApplicationFiled: September 17, 2008Publication date: February 18, 2010Inventors: Samuel Wayne Alexander, Scott A. Blomquist, Koesmanto Leka Bong, Jason Allyn Grlicky, Adam Paul Kuert, Christopher James Lee, Steven L. Osborn, II, James Luke Sontag, Benjamin Joel Stover
-
Publication number: 20090240578Abstract: The present invention is directed to a graphical image identity authentication system. In particular, the invention is directed to methods and systems for graphical security authentication and advertising. A security authentication system may receive advertisements from an advertising service company, process the advertisements to integrate them into the graphical image identity authentication system, and transmit the processed advertisement information back to the advertisement service company. The security authentication system may also monitor user interaction with the advertisements and transmit the logged information to the advertising service company.Type: ApplicationFiled: March 18, 2008Publication date: September 24, 2009Inventors: Christopher James Lee, James Luke Sontag, Scott A. Blomquist, Steven L. Osborn, Benjamin Joel Stover, Joel Norvell, Nicholas A. Davis
-
Publication number: 20060277002Abstract: A system and method for providing an electronic resort and presentation of measurements, such as calls in a telephone network. The system and method allow the selection of measurement attributes and measurement attribute values in which to view statistical graphs, provide the statistical graphs, and allow the selection of a part of one of the statistical graphs, for example a bar in a bar graph, to filter the measurements, such as calls, by that measurement attribute, such as establish cause and measurement attribute value, such as terminating conversational call. The system and method can further allow the filtering of measurements by the selected measurement attribute and selected measurement attribute value, the displaying of a new statistical graph, and the selection of a part of the new statistical graph. These steps could be repeated until selection is made to display the actual measurements from which the statistics have been gathered.Type: ApplicationFiled: June 1, 2005Publication date: December 7, 2006Inventors: Per Kangru, Scott Blomquist
-
Publication number: 20060271670Abstract: A system includes a plurality of distributed network analyzers, each of the distributed network analyzers configured to receive and filter network traffic from a single network link under test so that the network traffic is distributed across the plurality of distributed network analyzers and to capture data from the filtered network traffic. The system also includes a processing device receiving the captured data from the each of the plurality of distributed network analyzers, wherein the processing device includes software configured to interleave the received data to form a single stream of data from network traffic on the network link under test.Type: ApplicationFiled: May 31, 2005Publication date: November 30, 2006Inventors: Scott Blomquist, John Monk
-
Publication number: 20060258339Abstract: Systems and methods are provided for the management and analysis of detail records in a mobile telephony network, including the ability to store remotely and retrieve detail records given a specific call or a data session for signaling analysis in such networks. Computer program products which can execute such methods are also provided.Type: ApplicationFiled: May 12, 2005Publication date: November 16, 2006Inventors: Stephen Connelly, Scott Blomquist
-
Publication number: 20060224822Abstract: A system and method for analyzing incoming traffic from a computer network, for example, an Asynchronous Transfer Mode (ATM) network. The system and method can identify and tag data prior to filtering according to identifying information contained in the data. A look-up table implemented, for example, in a Content Addressable Memory (CAM), can be used to map tags to the identifying information, and to provide the tag based on the presence of the identifying information in the data.Type: ApplicationFiled: March 18, 2005Publication date: October 5, 2006Inventors: Scott Blomquist, Robert Ward
-
Publication number: 20060126665Abstract: A packet data capture apparatus, method and a computer readable medium having instructions recorded thereon, stream data packets in real time. The apparatus includes: a buffer, to store a plurality of data packets until transmission; a macro-packet transmitter, to prepare macro-packets from the stored plurality of packets and operate in a UDP mode that includes a predetermined re-transmit and flow control protocol; and a processor, to stream the macro-packets to a computer/server or storage device in real time and to retransmit respective macro-packets of the stream of macro-packets via the re-transmit and flow control protocol in accordance with a request from the computer/server.Type: ApplicationFiled: December 14, 2004Publication date: June 15, 2006Inventors: Robert Ward, Scott Blomquist
-
Publication number: 20060077954Abstract: Methods and systems for assigning participant identifying data to network transmission events. Participant identifying data and identifying data related to a network transmission event are provided to a predetermined (also referred to as central) monitoring location and stored in a database at the central monitoring location.Type: ApplicationFiled: August 25, 2004Publication date: April 13, 2006Inventors: John Monk, Timothy Bennett, Scott Blomquist