Patents by Inventor Valerie J. Young
Valerie J. Young has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11832142Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: GrantFiled: March 22, 2021Date of Patent: November 28, 2023Assignee: Intel CorporationInventors: Valerie J. Young, Kapil Sood
-
Patent number: 11533341Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.Type: GrantFiled: August 16, 2019Date of Patent: December 20, 2022Assignee: Intel CorporationInventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
-
Publication number: 20220132265Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: ApplicationFiled: March 22, 2021Publication date: April 28, 2022Inventors: Valerie J. Young, Kapil Sood
-
Patent number: 10959039Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: GrantFiled: August 6, 2019Date of Patent: March 23, 2021Assignee: Intel CorporationInventors: Valerie J. Young, Kapil Sood
-
Publication number: 20200204942Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: ApplicationFiled: August 6, 2019Publication date: June 25, 2020Inventors: Valerie J. Young, Kapil Sood
-
Publication number: 20200028880Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.Type: ApplicationFiled: August 16, 2019Publication date: January 23, 2020Inventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
-
Patent number: 10397280Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.Type: GrantFiled: January 31, 2017Date of Patent: August 27, 2019Assignee: Intel CorporationInventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
-
Patent number: 10375511Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: GrantFiled: February 20, 2018Date of Patent: August 6, 2019Assignee: Intel CorporationInventors: Valerie J. Young, Kapil Sood
-
Publication number: 20180279069Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: ApplicationFiled: February 20, 2018Publication date: September 27, 2018Inventors: Valerie J. Young, Kapil Sood
-
Patent number: 9900725Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: GrantFiled: July 29, 2016Date of Patent: February 20, 2018Assignee: Intel CorporationInventors: Valerie J. Young, Kapil Sood
-
Publication number: 20170142163Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.Type: ApplicationFiled: January 31, 2017Publication date: May 18, 2017Inventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
-
Publication number: 20170034643Abstract: Technologies for performing an automated application exchange negotiation in an operator network include an endpoint device, a mobile edge computing device, a core computing device, an application provider computing device, and a network operator computing device. The mobile edge computing device is configured to receive a request to access an application and/or service stored at the mobile edge computing device and/or the application provider computing device. The mobile edge computing device is further configured to initiate the automated application exchange negotiation between the application provider computing device and the network operator computing device to determine one or more terms of the negotiation, including one or more terms of a service level agreement (SLA). Other embodiments are described herein.Type: ApplicationFiled: July 29, 2016Publication date: February 2, 2017Inventors: Valerie J. Young, Kapil Sood
-
Patent number: 9560078Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.Type: GrantFiled: May 11, 2015Date of Patent: January 31, 2017Assignee: Intel CorporationInventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
-
Patent number: 9544347Abstract: Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided at the edge of a computer network (e.g., prior to a point where data is aggregated or routed by the network). Other embodiments are also disclosed.Type: GrantFiled: December 26, 2014Date of Patent: January 10, 2017Assignee: Intel CorporationInventors: Jeffrey G. Fedders, Matthew Adiletta, Valerie J. Young
-
Patent number: 9531777Abstract: Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided at the edge of a computer network (e.g., prior to a point where data is aggregated or routed by the network). Other embodiments are also disclosed.Type: GrantFiled: May 1, 2014Date of Patent: December 27, 2016Assignee: Intel CorporationInventors: Jeffrey G. Fedders, Matthew Adiletta, Valerie J. Young
-
Patent number: 9444865Abstract: Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided at the edge of a computer network (e.g., prior to a point where data is aggregated or routed by the network). Other embodiments are also disclosed.Type: GrantFiled: December 26, 2014Date of Patent: September 13, 2016Assignee: Intel CorporationInventors: Jeffrey G. Fedders, Matthew Adiletta, Valerie J. Young
-
Publication number: 20160226913Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.Type: ApplicationFiled: May 11, 2015Publication date: August 4, 2016Inventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
-
Publication number: 20150113038Abstract: Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided at the edge of a computer network (e.g., prior to a point where data is aggregated or routed by the network). Other embodiments are also disclosed.Type: ApplicationFiled: December 26, 2014Publication date: April 23, 2015Inventors: Jeffrey G. Fedders, Matthew Adiletta, Valerie J. Young
-
Publication number: 20140244792Abstract: Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided at the edge of a computer network (e.g., prior to a point where data is aggregated or routed by the network). Other embodiments are also disclosed.Type: ApplicationFiled: May 1, 2014Publication date: August 28, 2014Inventors: Jeffrey G. Fedders, Matthew Adiletta, Valerie J. Young
-
Patent number: 8737212Abstract: Methods and apparatus relating to distribution of intelligence across a network are described. In one embodiment, one or more content processors may be provided at the edge of a computer network (e.g., prior to a point where data is aggregated or routed by the network). Other embodiments are also disclosed.Type: GrantFiled: August 14, 2012Date of Patent: May 27, 2014Assignee: Intel CorporationInventors: Jeffrey G. Fedders, Matthew Adiletta, Valerie J. Young