Search Patents
-
Publication number: 20100329461Abstract: A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted net work requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled net work supporting WPA anchor an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks The detection component identities a type of an available wireless network.Type: ApplicationFiled: March 13, 2009Publication date: December 30, 2010Applicant: MICROSOFT CORPORATIONInventors: Jean-Pierre Duplessis, Sean Lyndersay, Anton Krantz, Mohammad S. Alam, Ashwin Palekar, Timothy M. Moore
-
Patent number: 9037704Abstract: A monitoring server receives the latest monitored data and corresponding monitoring time from monitoring devices connected to the server at a specified time interval. The monitoring server records monitored data of each monitoring item and the corresponding monitoring time to a pointed node of a device data list, and adds the monitored data and the corresponding monitoring time, which are recorded in the pointed node of the device data list, into a monitored data list. When a web server requests real-time monitored data, corresponding monitored data is read from the device data list and sent to the web server. When the web server requests historical monitored data of an designated period, corresponding monitored data of the designated period is read from the monitored data list and sent to the web server.Type: GrantFiled: July 9, 2012Date of Patent: May 19, 2015Assignees: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD., HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Chung-I Lee, Yi-Guo Wang, Kuan-Chiao Peng, Jian Huang, Yi-Ming Lu
-
Patent number: 7870243Abstract: A service level agreement between a network service provider and a network user may require that specified service metrics or parameters be maintained within predetermined limits. To reduce the chance those limits (and the service level agreement) will be violated, the service metric is sampled periodically over successive sampling intervals. The mean value and the standard deviation of the set of samples obtained during the most recent sampling interval are used to screen out unreliable data. If the set of samples satisfies the reliability screening, the set is used in combination with past acceptable sets to determine the trend in the sampled service metric. If the trend is toward a violation, the time of the violation is predicted based on the assumption the current trend will continue. If the predicted time of violation is sufficiently near the current time, an alert is sent to the service provider to permit the service provider to initiate anticipatory corrective action.Type: GrantFiled: April 11, 2000Date of Patent: January 11, 2011Assignee: International Business Machines CorporationInventors: Glenn Clement Aikens, Siu Hung Choy, Shawn Allen Clymer, Douglas Ronald Duer, Richard Arthur Franck
-
Patent number: 8296424Abstract: Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions.Type: GrantFiled: August 24, 2010Date of Patent: October 23, 2012Assignee: OPNET Technologies, Inc.Inventors: Patrick J. Malloy, Dana Znamova, Alain J. Cohen, Antoine Dunn, John W. Strohm, Abbas Haider Ali, Russell Mark Elsner
-
Patent number: 8055766Abstract: Methods for providing a user state file enabling interactions between virtual and real world identities include determining a real world identity of a user and determining a virtual world identity of the user. An associated user designation is provided for a first and a second associated user. A real world identity and/or a virtual world identity is determined for the associated users. The first associated user has at least a real world identity and the second associated user has at least a virtual world identity. A communication history is established between the user and the first and second associated users, the communication history including communications in the real world and/or the virtual world. The user state file is generated based on the determined real world and virtual world identities of the user and the associated users and the communication history between the user and the associated users.Type: GrantFiled: February 15, 2008Date of Patent: November 8, 2011Assignee: Sony Ericsson Mobile Communications ABInventors: L. Scott Bloebaum, Justin Pierce
-
Publication number: 20080034083Abstract: A system and method to facilitate automatic identification of event classification errors in a network are described. Session data containing events logged by a user entity over a network in a predetermined period of time is retrieved from one or more event logs. Each event is further parsed to generate one or more event units. A frequency parameter of co-occurrence of the event units within each event of the session data is further determined and at least one session distance is determined among the events based on the frequency parameter. At least one classification distance is further retrieved from a data storage module, such as, for example, a database or a datastore, the one or more classification distances representing a relation between the events and corresponding classification categories within the database or datastore. Each session distance is further compared to each retrieved classification distance to ascertain event classification errors within the database or datastore.Type: ApplicationFiled: August 1, 2006Publication date: February 7, 2008Inventor: Joshua M. Koran
-
Patent number: 7797186Abstract: The invention records real-time radio and television listener data utilizing automated, interactive questions and radio and television broadcast audio segments recorded by telephone, including wireless cell phones. Telephone users are asked to hold their phone in the direction of any broadcast audio they are hearing or listening to. Streaming program audio directly from radio and television broadcasts is matched to the program audio recorded from telephone users using computer audio matching technology. When an audio match is made, recorded data will automatically populate an alpha/numeric database creating a record including fields for identifying the radio or TV station, time of recording, the phone user's 10 digit telephone number and demographic information on the listener. Demographics may be obtained prior to the call or by automated interactive questioning, during a call, with the phone user responding to questions verbally or by pushing appropriate keys on the telephone keypad.Type: GrantFiled: September 26, 2006Date of Patent: September 14, 2010Inventor: Donnelly Andrew Dybus
-
Patent number: 8972530Abstract: A content delivery network (CDN) service provider extends a content delivery network to gather information on atomically identifiable web clients (called “user agents”) as such computer-implemented entities interact with the CDN across different domains being managed by the CDN service provider. The data system tracks user agents, preferably via cookies, although one or more passive techniques may be used. A user agent may be a cookie-able device having a cookie store. As the user agent navigates across sites, a CDN-specific unique identifier used by the system to correlate user agents is generated. Preferably, the unique identifier is stored as an encrypted cookie. The unique identifier represents one user agent (and, thus, one cookie-able device's store). The system tracks user agent behavior on and across customer sites that are served by the CDN, and these behaviors are classified into identifiable “segments” that may be used to create a profile.Type: GrantFiled: August 25, 2012Date of Patent: March 3, 2015Assignee: Akamai Technologies, Inc.Inventors: Michael M. Afergan, F. Thomson Leighton, Timothy P. Johnson, Brian J. Mancuso, Ken G. Iwamoto
-
Patent number: 11831520Abstract: In general, the disclosure describes techniques for dynamic application service level agreement (SLA) metric generation, distribution, and intent-based Software-Defined Wide Area Network (SD-WAN) link selection. For instance, a network device may determine a metric associated with an application or application-group. The network device may send the metric to a controller, and in response may receive from the controller a recommended SLA metric associated with the application or application-group. The network device may also compute an intent-based SLA metric based on the recommended SLA metric, one or more characteristics of one or more links connected to the network device, and a user configured intent model that defines a tolerance level to apply the recommended SLA metric. The network device may select, based on the intent-based SLA metric, a path to send traffic from the application or application-group.Type: GrantFiled: March 30, 2021Date of Patent: November 28, 2023Assignee: Juniper Networks, Inc.Inventors: Thyagarajan S. Pasupathy, Sankar Ramanoorthi, Radhakrishnan G, Saurav Shaw, Mohan Thangavel, Vaibhav Belliappa, Nagaraja Manikkar Shenoy
-
Patent number: 7269636Abstract: A computer network (20) includes a first processor (22) for maintaining a Web page (34) having an embedded first code module (36) and accessible through a Web address (38). A second processor (24) supports a Web browser (52) for downloading the Web page (34) and executing the first code module (36). When executed, the first code module (36) issues a first command (93) to retrieve a second code module (90) from a server system (26). The server system (26) includes a database (68) having a service response (162, 176, 186) associated with the Web address (38). A processor (62) assembles the second code module (90) having the service response (162, 176, 186). When the second code module is retrieved, the first code module (36) issues a second command (106) to initiate execution of the second code module (90) to provide added function to the Web page (34).Type: GrantFiled: July 1, 2003Date of Patent: September 11, 2007Assignee: Modavox, Inc.Inventors: Charles P. McCollum, Andrew L. Burgess, Jr.
-
Patent number: 8045564Abstract: Mechanisms are disclosed for detecting protocols independently of the ports used by streams associated with the protocols or applications that may send out such streams. The detecting may entail using a content filter that is hosted on a networking stack, where the content filter may be composed of a stream buffer and handlers for detecting the protocols. The handlers may be further used to modify streams incoming to a port or streams outgoing from an application. The handlers can modify the streams in a variety of ways, including reading, inserting, replacing, deleting, and completing data in the streams according to some policy criteria, such as those set by parental controls. Individual handlers may be selected from a plurality or set of handlers so that they can be matched up to the appropriate streams.Type: GrantFiled: January 5, 2006Date of Patent: October 25, 2011Assignee: Microsoft CorporationInventors: Aaron Culbreth, Brian L. Trenbeath, Keumars A. Ahdieh, Peter M. Wiest, Roger H. Wynn, Stan D. Pennington
-
Patent number: 8958308Abstract: A method of operating an access network including a plurality of data connections (19) between end-user devices (12, 14, 16, 18) and an aggregation transceiver device (20) at which the connections (19) are aggregated for onward connection through the access network, the method comprising storing a plurality of different profiles, each profile specifying values for parameters associated with each connection (19); and, for each connection, obtaining connection data relating to a monitoring period, said monitoring period comprising a plurality of shorter periods, said connection data comprising, for each of said shorter periods, an indication of whether said connection has experienced instability during said shorter period, and an indication of user activity on said connection during said shorter period; monitoring the performance of the connection in dependence on said connection data; selecting one of said stored profiles to be applied to the connection in dependence on the results of said monitoring; and applType: GrantFiled: September 30, 2011Date of Patent: February 17, 2015Assignee: British Telecommunications Public Limited CompanyInventors: John Wolsey Cook, Philip Anthony Everett, Christopher Marcus Croot, Ashley Pickering
-
Patent number: 8010663Abstract: A computationally implemented method includes, but is not limited to acquiring subjective user state data including data indicating incidence of at least a first subjective user state associated with a first user and data indicating incidence of at least a second subjective user state associated with a second user; acquiring objective occurrence data including data indicating incidence of at least a first objective occurrence and data indicating incidence of at least a second objective occurrence; and correlating the subjective user state data with the objective occurrence data. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: March 25, 2009Date of Patent: August 30, 2011Assignee: The Invention Science Fund I, LLCInventors: Shawn P. Firminger, Jason Garms, Edward K. Y. Jung, Chris D. Karkanias, Eric C. Leuthardt, Royce A. Levien, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene, Kristin M. Tolle, Lowell L. Wood, Jr.
-
Patent number: 8301786Abstract: Network devices, computer-readable media, and other embodiments associated with packet inspection are described. Packet inspection may be performed on data packets associated with a session, where a session can include multiple data channels and associated control channels that have been bound together. A session may be associated with an identity. Various policies may be associated with that identity. As packet inspection occurs, it can be determined whether policies are being violated on a per identity basis. If a policy is being violated, then an action may be selectively performed. The action performed may affect a single channel in the session or may affect the whole session. Different identities may have different policies. Example actions include dropping a session, throttling a session, monitoring a session, controlling the number of channels associated with a session, dropping a channel, throttling a channel, monitoring a channel, and other actions.Type: GrantFiled: February 10, 2010Date of Patent: October 30, 2012Assignee: Cisco Technology, Inc.Inventors: Praveenkumar Reguraman, Rajasekhar Manam, Sridar Kandaswamy, Abhijit V. Warkhedi
-
Patent number: 6021436Abstract: A method for polling a plurality heterogeneous computer systems remote from a host is provided. The method has the host containing first and second memory locations. In the first location the current day's collected information is stored. In a second location historical data compiled over a predetermined period of time is stored. The system has the host initially polling all of the plurality of heterogeneous computer systems concurrently to determine if they are active. If it is determined that a particular computer system is active, the system then runs through a series of commands to obtain desired information from the plurality of hosts. The host obtains the particular operating system and the particular version of each operating system that is running on each one of the plurality of heterogeneous computers. Once this information is obtained the host then can run certain specific commands for each particular operating system revision to ascertain additional information.Type: GrantFiled: May 9, 1997Date of Patent: February 1, 2000Assignee: EMC CorporationInventor: Brian Garrett
-
Patent number: 9021097Abstract: A method, system and computer program product for managing and deploying physical and virtual environments across multiple hardware platforms. A single unit, referred to herein as a cloud construction block, contains both the hardware and software components used to build a cloud computing environment. By having such a single unit contain both the hardware and software components needed to build a cloud computing environment, the user no longer needs to purchase and integrate different hardware and software components. Furthermore, the cloud construction block contains modular pieces of hardware, such as compute hardware, memory hardware, storage hardware and network hardware, that are integrated with management software configured to manage both the hardware and the cloud computing environment in a seamlessly integrated package. Since there is a single management system, the management software allows the user to manage the modular pieces of hardware via a single user interface.Type: GrantFiled: May 8, 2012Date of Patent: April 28, 2015Assignee: International Business Machines CorporationInventors: Rohith K. Ashok, Thomas M. Brey, Raymond J. Harrington, Matt R. Hogstrom, Matthew J. Sheard
-
Patent number: 8051477Abstract: State of security in a mobile communications network is communicated. Data regarding nature and severity of security events onboard at least one mobile platform is generated and processed. A message that includes the processed data is generated and transmitted periodically. The processed data makes up a security state vector that includes the number of security events detected since power-up of the mobile platform node, sum of highest severity security events since power-up or counter rollover, sum of the second highest severity security events detected since power-up or counter rollover, sum of the third highest severity security events detected since power-up or counter rollover, highest security event classification, second-highest security event classification, and third-highest security event classification. The processed data may be used in a network operations center to prioritize mobile platforms from which logged data should be retrieved for further investigation and monitoring.Type: GrantFiled: December 3, 2004Date of Patent: November 1, 2011Assignee: The Boeing CompanyInventors: Laurence I. Rockwell, Timothy M. Aldrich
-
Patent number: 7877353Abstract: A computer-implemented method and system is disclosed in which a network-based interaction environment includes a plurality of peer-to-peer nodes being able to communicate directly with each other using a peer-to-peer protocol and a peer-to-peer client application, the plurality of peer-to-peer nodes including a first peer-to-peer client and a second peer-to-peer client, a first peer-to-peer client application running on the first peer-to-peer client to maintain persistent buddy information on the first peer-to-peer client, the persistent buddy information including a buddy list identifying trusted peer-to-peer nodes of the plurality of peer-to-peer nodes, and a second peer-to-peer client application running on the second peer-to-peer client to maintain persistent reputation information on the second peer-to-peer client, the persistent reputation information including information related to the reputation of the first peer-to-peer client in the network-based interaction environment.Type: GrantFiled: December 28, 2006Date of Patent: January 25, 2011Assignee: eBay Inc.Inventors: Zahid N. Ahmed, Adrian Nicholas Cockcroft, Josep M. Ferrandiz, Neelakantan Sundaresan
-
Patent number: 7191252Abstract: Data security for e-mail or browser-input data operates on identified security sensitive words, characters or icons which are extracted leaving remainder data. Extracted data, in one system, is stored in a remote, extract store in a distributed computer system. Other methods attach an encrypted version of the extract to the email. The browser system operates with an extract store. Remainder data is sent to the addressee or designated web server. The addressee is permitted to retrieve the extracted data from said extract store only in the presence of a security clearance and hence, reconstruct the source e-mail or browser-input data with the extract data. In other systems, the addressee reconstructs the email by decryption and integration. Parsing rather than identifying critical words is an option. The browser method extracts data, facilitates the storage in an extract store, forwards the remainder data to a targeted destination.Type: GrantFiled: May 23, 2002Date of Patent: March 13, 2007Assignee: Digital Doors, Inc.Inventors: Ron M. Redlich, Martin A. Nemzow
-
Patent number: 10652112Abstract: Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with the packet classifications, encapsulate monitored packets with encapsulation headers including the tags to form encapsulated packets, and forward the encapsulated packets to tool VM platforms. Tool packet monitor applications operate within the tool VM platforms to receive the encapsulated packets, identify packet classifications associated with the tags, remove the encapsulation headers from the encapsulated packets, and forward de-encapsulated packets to network destinations based upon the packet classifications.Type: GrantFiled: November 3, 2016Date of Patent: May 12, 2020Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.Inventor: Kristopher Raney