Patents by Inventor Steven Gribble

Steven Gribble has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240113989
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Application
    Filed: December 12, 2023
    Publication date: April 4, 2024
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Patent number: 11870711
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: January 9, 2024
    Assignee: Google LLC
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Publication number: 20230137493
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Application
    Filed: December 29, 2022
    Publication date: May 4, 2023
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Patent number: 11575618
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: February 7, 2023
    Assignee: Google LLC
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Publication number: 20210243138
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Application
    Filed: April 21, 2021
    Publication date: August 5, 2021
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Patent number: 11018994
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: May 25, 2021
    Assignee: Google LLC
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Patent number: 10798022
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for switch virtualization by a switch proxy controller. In an aspect, a method includes receiving, by a switch proxy controller, a first request from a first switch fabric, where the first request indicates a first identifier that identifies the first request from other requests from the first switch fabric, generating a second request that indicates a second identifier that identifies the second request from other requests sent from the switch proxy controller to a switch, providing the second request to the switch, receiving, by the switch proxy controller, a first reply that indicates the second identifier indicated in the second request, generating, based on the second identifier indicated in the first reply, a second reply that indicates the first identifier, and selecting the first switch fabric to receive the second reply based on the second identifier.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: October 6, 2020
    Assignee: Google LLC
    Inventors: Horia Vlad Balan, Amin Vahdat, Vinay Kumar Bannai, Zhehua Wu, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Lorenzo Vicisano, David Zats
  • Publication number: 20190173807
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for switch virtualization by a switch proxy controller. In an aspect, a method includes receiving, by a switch proxy controller, a first request from a first switch fabric, where the first request indicates a first identifier that identifies the first request from other requests from the first switch fabric, generating a second request that indicates a second identifier that identifies the second request from other requests sent from the switch proxy controller to a switch, providing the second request to the switch, receiving, by the switch proxy controller, a first reply that indicates the second identifier indicated in the second request, generating, based on the second identifier indicated in the first reply, a second reply that indicates the first identifier, and selecting the first switch fabric to receive the second reply based on the second identifier.
    Type: Application
    Filed: January 22, 2019
    Publication date: June 6, 2019
    Inventors: Horia Vlad Balan, Amin Vahdat, Vinay Kumar Bannai, Zhehua Wu, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Lorenzo Vicisano, David Zats
  • Publication number: 20190173805
    Abstract: Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
    Type: Application
    Filed: February 1, 2019
    Publication date: June 6, 2019
    Inventors: Horia Vlad Balan, Zengbin Zhang, Amin Vahdat, Vinay Kumar Bannai, Alexander Jinhon Lin, Anvesh Komuravelli, Steven Gribble, Andrew DeBock Ferguson, Muhammad Mukarram Tariq, Joon Ong, Alvaro Martinez Echevarria
  • Patent number: 9531752
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: December 27, 2016
    Assignee: University of Washington
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 9489523
    Abstract: Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a user may obtain reliable, explicit evidence that no files have been accessed after a device's loss. A user may also disable future file access after a device's loss, even in the absence of device network connectivity. In one embodiment, files are encrypted locally but the encryption keys are stored remotely, so that an audit server is queried for encryption keys to access protected files. By configuring the audit server to refuse to return a particular file's key, the user can prevent new accesses after the device is lost.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: November 8, 2016
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Tadayoshi Kohno, Roxana Geambasu, Henry Levy, Steven Gribble
  • Publication number: 20150326607
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Application
    Filed: April 22, 2015
    Publication date: November 12, 2015
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 9043913
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: May 26, 2015
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Publication number: 20130198522
    Abstract: Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a user may obtain reliable, explicit evidence that no files have been accessed after a device's loss. A user may also disable future file access after a device's loss, even in the absence of device network connectivity. In one embodiment, files are encrypted locally but the encryption keys are stored remotely, so that an audit server is queried for encryption keys to access protected files. By configuring the audit server to refuse to return a particular file's key, the user can prevent new accesses after the device is lost.
    Type: Application
    Filed: April 8, 2011
    Publication date: August 1, 2013
    Inventors: Tadayoshi Kohno, Roxana Geambasu, Henry Levy, Steven Gribble
  • Publication number: 20130014259
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Application
    Filed: June 4, 2012
    Publication date: January 10, 2013
    Applicant: University of Washington through its Center for Commercialization
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 8196205
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Grant
    Filed: June 26, 2006
    Date of Patent: June 5, 2012
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 7836303
    Abstract: A Web browsing system using a browser operating system (BOS), which provides a trusted software layer on which Web browsers execute. The BOS runs the client-side component of each Web application (e.g., on-line banking, and Web mail) in its own virtual machine, which provides strong isolation between Web services and the user's local resources. Web publishers can thus limit the scope of their Web applications by specifying the URLs and other resources that their browsers are allowed to access, which limits the harm that can be caused by a compromised browser. Web applications are treated as first-class objects that users explicitly install and manage, giving them explicit knowledge about and control over downloaded content and code. An initial embodiment implemented using Linux and the Xen virtual machine monitor has been shown to prevent or contain about 87% of the vulnerabilities that have been identified in a conventional web browser environment.
    Type: Grant
    Filed: December 9, 2005
    Date of Patent: November 16, 2010
    Assignee: University of Washington
    Inventors: Henry M. Levy, Steven Gribble, Jacob Gorm Hansen, Richard S. Cox
  • Publication number: 20070260702
    Abstract: Applications and services are accessed over the Web without requiring any modification to the currently available code for such applications. Virtual machines (VMs) can each be associated with one or more pre-configured and pre-installed software applications and hosted by Web sites. A VM is accessed and run when a user of a client computing device selects a Web object for the VM in a browser program. A plug-in in the browser reads a configuration file for the selected VM from a server and requests a server-side controller daemon to launch the VM on the server. The plug-in then opens a remote desktop connection to the VM, which is displayed as an embedded window in the Web page on the browser program. The user can then interact with and use the VM and its provided application software and services from within the browser program.
    Type: Application
    Filed: September 15, 2006
    Publication date: November 8, 2007
    Applicant: University of Washington
    Inventors: David Richardson, Brian Bershad, Steven Gribble, Henry Levy
  • Publication number: 20070174915
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Application
    Filed: June 26, 2006
    Publication date: July 26, 2007
    Applicant: University of Washington
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Publication number: 20070136579
    Abstract: A Web browsing system using a browser operating system (BOS), which provides a trusted software layer on which Web browsers execute. The BOS runs the client-side component of each Web application (e.g., on-line banking, and Web mail) in its own virtual machine, which provides strong isolation between Web services and the user's local resources. Web publishers can thus limit the scope of their Web applications by specifying the URLs and other resources that their browsers are allowed to access, which limits the harm that can be caused by a compromised browser. Web applications are treated as first-class objects that users explicitly install and manage, giving them explicit knowledge about and control over downloaded content and code. An initial embodiment implemented using Linux and the Xen virtual machine monitor has been shown to prevent or contain about 87% of the vulnerabilities that have been identified in a conventional web browser environment.
    Type: Application
    Filed: December 9, 2005
    Publication date: June 14, 2007
    Applicant: University of Washington
    Inventors: Henry Levy, Steven Gribble, Jacob Hansen, Richard Cox