Patents by Inventor Sherry Krell

Sherry Krell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160226715
    Abstract: Multi-virtualization scheme selection can include determining a number of virtualization schemes between a number of nodes. Multi-virtualization scheme selection can also include analyzing a number of properties of communication between the number of nodes. Furthermore, multi-virtualization scheme selection can include selecting a virtualization scheme for the communication between the number of nodes based on the number of properties of the communication.
    Type: Application
    Filed: September 16, 2013
    Publication date: August 4, 2016
    Inventors: Rajeev GROVER, Sherry KRELL, Praveen YALAGANDULA
  • Patent number: 9356932
    Abstract: A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is determined. A portion of a control policy corresponding to the network layer and the user traffic is accessed. Then, the portion is sent to a security device associated with the network layer, the portion being configured to be applied by the security device to the network layer and the user traffic.
    Type: Grant
    Filed: January 30, 2009
    Date of Patent: May 31, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Sherry Krell, Rebecca M. Ballesteros, Adrian Cowham, John M. Green
  • Patent number: 9032478
    Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
    Type: Grant
    Filed: January 29, 2009
    Date of Patent: May 12, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
  • Patent number: 8291483
    Abstract: A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network; a user-defined network security policy for the firewall component to define constraints on data flows permitted by the network device; and a failsafe protocol to enable remote control of the device independent of the user-defined network security policy and the firewall filter.
    Type: Grant
    Filed: April 30, 2007
    Date of Patent: October 16, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Sherry Krell, James Smith
  • Publication number: 20120110461
    Abstract: A headless appliance includes a network chassis management interface determiner configured to determine a network chassis management interface. The headless appliance is configured to be disposed in a network chassis. The headless appliance also includes a management interface command mapping configured to associate commands of the network chassis management interface to commands of a headless appliance management interface.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventors: Adrian COWHAM, Sherry Krell, Serge Zelenov
  • Publication number: 20110289551
    Abstract: A method of dynamically applying a control policy to a network is described. A network layer of a plurality of network layers associated with user traffic is determined. A portion of a control policy corresponding to the network layer and the user traffic is accessed. Then, the portion is sent to a security device associated with the network layer, the portion being configured to be applied by the security device to the network layer and the user traffic.
    Type: Application
    Filed: January 30, 2009
    Publication date: November 24, 2011
    Inventors: Sherry Krell, Rebecca M. Ballesteros, Adrian Cowham, John M. green
  • Publication number: 20110289557
    Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
    Type: Application
    Filed: January 29, 2009
    Publication date: November 24, 2011
    Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
  • Publication number: 20080271135
    Abstract: A remote network device having a network security policy, includes: a firewall component embedded within the network device to filter data flow with a network; a user-defined network security policy for the firewall component to define constraints on data flows permitted by the network device; and a failsafe protocol to enable remote control of the device independent of the user-defined network security policy and the firewall filter.
    Type: Application
    Filed: April 30, 2007
    Publication date: October 30, 2008
    Inventors: Sherry Krell, James Smith
  • Publication number: 20050036610
    Abstract: Disclosed are systems and methods for seeding a random number generator, comprising retrieving a first data block from a memory; initially seeding the random number generator using the first data block as a seed; retrieving a number generated by the random number generator; mapping the number to a memory address in the memory using a mathematical function; retrieving a successive data block from the memory address; and successively seeding the random number generator with a combination of the seed and the successive data block such that the combination of the seed and the successive data block becomes a resulting seed.
    Type: Application
    Filed: August 1, 2003
    Publication date: February 17, 2005
    Inventors: Sherry Krell, Sergey Gerasimov