Patents by Inventor Walter Tuvell

Walter Tuvell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9197578
    Abstract: A method may include receiving, in a first server from a second server, a request for a service of a network by a device; sending, from the first server to the second server, a response to the request for the service to permit access to the service; and sending state information about the response to a third server for storage in a database.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: November 24, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Walter Tuvell, Oliver Tavakoli, Thomas C. Porcher
  • Publication number: 20140115160
    Abstract: A method may include receiving, in a first server from a second server, a request for a service of a network by a device; sending, from the first server to the second server, a response to the request for the service to permit access to the service; and sending state information about the response to a third server for storage in a database.
    Type: Application
    Filed: December 23, 2013
    Publication date: April 24, 2014
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Walter TUVELL, Oliver TAVAKOLI, Thomas C. PORCHER
  • Patent number: 8619798
    Abstract: A method may include receiving, in a first server from a second server, a request for a service of a network by a device; sending, from the first server to the second server, a response to the request for the service to permit access to the service; and sending state information about the response to a third server for storage in a database.
    Type: Grant
    Filed: October 31, 2011
    Date of Patent: December 31, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Walter Tuvell, Oliver Tavakoli, Thomas C Porcher
  • Publication number: 20120042029
    Abstract: A method may include receiving, in a first server from a second server, a request for a service of a network by a device; sending, from the first server to the second server, a response to the request for the service to permit access to the service; and sending state information about the response to a third server for storage in a database.
    Type: Application
    Filed: October 31, 2011
    Publication date: February 16, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Walter Tuvell, Oliver Tavakoli, Thomas C. Porcher
  • Patent number: 8072990
    Abstract: A method may include receiving, in a first server from a second server, a request for a service of a network by a device; sending, from the first server to the second server, a response to the request for the service to permit access to the service; and sending state information about the response to a third server for storage in a database.
    Type: Grant
    Filed: April 20, 2007
    Date of Patent: December 6, 2011
    Assignee: Juniper Networks, Inc.
    Inventors: Walter Tuvell, Oliver Tavakoli, Thomas C. Porcher
  • Patent number: 7415606
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Grant
    Filed: October 24, 2005
    Date of Patent: August 19, 2008
    Assignee: Microsoft Corporation
    Inventors: Walter Tuvell, Nimisha Asthagiri
  • Patent number: 7171001
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Grant
    Filed: October 24, 2005
    Date of Patent: January 30, 2007
    Assignee: Microsoft Corporation
    Inventors: Walter Tuvell, Nimisha Asthagiri
  • Publication number: 20060050869
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Application
    Filed: October 24, 2005
    Publication date: March 9, 2006
    Applicant: Groove Networks, Inc.
    Inventors: Walter Tuvell, Nimisha Asthagiri
  • Publication number: 20060041752
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Application
    Filed: October 24, 2005
    Publication date: February 23, 2006
    Applicant: Groove Networks, Inc.
    Inventors: Walter Tuvell, Nimisha Asthagiri
  • Publication number: 20060036862
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Application
    Filed: October 24, 2005
    Publication date: February 16, 2006
    Applicant: Groove Networks, Inc.
    Inventors: Walter Tuvell, Nimisha Asthagiri
  • Patent number: 6986046
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Grant
    Filed: May 12, 2000
    Date of Patent: January 10, 2006
    Assignee: Groove Networks, Incorporated
    Inventors: Walter Tuvell, Nimisha Asthagiri