Patents by Inventor Steven A. Pettit

Steven A. Pettit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7855972
    Abstract: The present invention provides a method and system for controlling usage of network resources on a communications network. The method comprising acts of: (a) creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition; and (b) creating one or more service abstractions associated with a user of the communication network, each service abstraction representing a named set of one or more of the packet rules. In some embodiments one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one or more packet rules, and possibly one or more service abstractions.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: December 21, 2010
    Assignee: Enterasys Networks, Inc.
    Inventors: Steven A. Pettit, John Roese, Paula Jane Dunigan, James Richmond
  • Patent number: 6892309
    Abstract: A user's usage of network resources is controlled, after the user has been authenticated, without using any network resources beyond the user's entry point to the network. Packet rules may be provisioned to the user's entry point to the network, and the packet rules may be applied to each packet received from the user before any network resources beyond the entry point are used. These packet rules may be associated with an identity of the user and then provisioned to the user's entry point in response to the user being authenticated. Usage of network resources of a communications network by a user beyond a network device of the communications network that serves as the user's entry point to the communications network is controlled. The port module of the network device is configured with one or more packet rules corresponding to an identity of the user.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: May 10, 2005
    Assignee: Enterasys Networks, Inc.
    Inventors: James Richmond, Paula Jane Dunigan, David L. Kjendal, Steven A. Pettit
  • Publication number: 20030154380
    Abstract: A user's usage of network resources is controlled, after the user has been authenticated, without using any network resources beyond the user's entry point to the network. Packet rules may be provisioned to the user's entry point to the network, and the packet rules may be applied to each packet received from the user before any network resources beyond the entry point are used. These packet rules may be associated with an identity of the user and then provisioned to the user's entry point in response to the user being authenticated. Usage of network resources of a communications network by a user beyond a network device of the communications network that serves as the user's entry point to the communications network is controlled. The port module of the network device is configured with one or more packet rules corresponding to an identity of the user.
    Type: Application
    Filed: February 8, 2002
    Publication date: August 14, 2003
    Inventors: James Richmond, Paula Jane Dunigan, David L. Kjendal, Steven A. Pettit
  • Publication number: 20030152035
    Abstract: Usage of network resources on a communications network is controlled by creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition, and creating one or more service abstractions, each service abstraction representing a named set of one or more of the packet rules. Further, one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one more packet rules, and possibly one or more service abstractions. These role abstractions and service abstractions may be stored and distributed to network devices on the communications network.
    Type: Application
    Filed: February 8, 2002
    Publication date: August 14, 2003
    Inventors: Steven A. Pettit, John Roese, Paul Jane Dunigan, James Richmond