Search Patents
  • Publication number: 20100329461
    Abstract: A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted net work requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled net work supporting WPA anchor an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks The detection component identities a type of an available wireless network.
    Type: Application
    Filed: March 13, 2009
    Publication date: December 30, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Jean-Pierre Duplessis, Sean Lyndersay, Anton Krantz, Mohammad S. Alam, Ashwin Palekar, Timothy M. Moore
  • Patent number: 9037704
    Abstract: A monitoring server receives the latest monitored data and corresponding monitoring time from monitoring devices connected to the server at a specified time interval. The monitoring server records monitored data of each monitoring item and the corresponding monitoring time to a pointed node of a device data list, and adds the monitored data and the corresponding monitoring time, which are recorded in the pointed node of the device data list, into a monitored data list. When a web server requests real-time monitored data, corresponding monitored data is read from the device data list and sent to the web server. When the web server requests historical monitored data of an designated period, corresponding monitored data of the designated period is read from the monitored data list and sent to the web server.
    Type: Grant
    Filed: July 9, 2012
    Date of Patent: May 19, 2015
    Assignees: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD., HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: Chung-I Lee, Yi-Guo Wang, Kuan-Chiao Peng, Jian Huang, Yi-Ming Lu
  • Patent number: 7870243
    Abstract: A service level agreement between a network service provider and a network user may require that specified service metrics or parameters be maintained within predetermined limits. To reduce the chance those limits (and the service level agreement) will be violated, the service metric is sampled periodically over successive sampling intervals. The mean value and the standard deviation of the set of samples obtained during the most recent sampling interval are used to screen out unreliable data. If the set of samples satisfies the reliability screening, the set is used in combination with past acceptable sets to determine the trend in the sampled service metric. If the trend is toward a violation, the time of the violation is predicted based on the assumption the current trend will continue. If the predicted time of violation is sufficiently near the current time, an alert is sent to the service provider to permit the service provider to initiate anticipatory corrective action.
    Type: Grant
    Filed: April 11, 2000
    Date of Patent: January 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Glenn Clement Aikens, Siu Hung Choy, Shawn Allen Clymer, Douglas Ronald Duer, Richard Arthur Franck
  • Patent number: 8296424
    Abstract: Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions.
    Type: Grant
    Filed: August 24, 2010
    Date of Patent: October 23, 2012
    Assignee: OPNET Technologies, Inc.
    Inventors: Patrick J. Malloy, Dana Znamova, Alain J. Cohen, Antoine Dunn, John W. Strohm, Abbas Haider Ali, Russell Mark Elsner
  • Patent number: 8055766
    Abstract: Methods for providing a user state file enabling interactions between virtual and real world identities include determining a real world identity of a user and determining a virtual world identity of the user. An associated user designation is provided for a first and a second associated user. A real world identity and/or a virtual world identity is determined for the associated users. The first associated user has at least a real world identity and the second associated user has at least a virtual world identity. A communication history is established between the user and the first and second associated users, the communication history including communications in the real world and/or the virtual world. The user state file is generated based on the determined real world and virtual world identities of the user and the associated users and the communication history between the user and the associated users.
    Type: Grant
    Filed: February 15, 2008
    Date of Patent: November 8, 2011
    Assignee: Sony Ericsson Mobile Communications AB
    Inventors: L. Scott Bloebaum, Justin Pierce
  • Publication number: 20080034083
    Abstract: A system and method to facilitate automatic identification of event classification errors in a network are described. Session data containing events logged by a user entity over a network in a predetermined period of time is retrieved from one or more event logs. Each event is further parsed to generate one or more event units. A frequency parameter of co-occurrence of the event units within each event of the session data is further determined and at least one session distance is determined among the events based on the frequency parameter. At least one classification distance is further retrieved from a data storage module, such as, for example, a database or a datastore, the one or more classification distances representing a relation between the events and corresponding classification categories within the database or datastore. Each session distance is further compared to each retrieved classification distance to ascertain event classification errors within the database or datastore.
    Type: Application
    Filed: August 1, 2006
    Publication date: February 7, 2008
    Inventor: Joshua M. Koran
  • Patent number: 7797186
    Abstract: The invention records real-time radio and television listener data utilizing automated, interactive questions and radio and television broadcast audio segments recorded by telephone, including wireless cell phones. Telephone users are asked to hold their phone in the direction of any broadcast audio they are hearing or listening to. Streaming program audio directly from radio and television broadcasts is matched to the program audio recorded from telephone users using computer audio matching technology. When an audio match is made, recorded data will automatically populate an alpha/numeric database creating a record including fields for identifying the radio or TV station, time of recording, the phone user's 10 digit telephone number and demographic information on the listener. Demographics may be obtained prior to the call or by automated interactive questioning, during a call, with the phone user responding to questions verbally or by pushing appropriate keys on the telephone keypad.
    Type: Grant
    Filed: September 26, 2006
    Date of Patent: September 14, 2010
    Inventor: Donnelly Andrew Dybus
  • Patent number: 8972530
    Abstract: A content delivery network (CDN) service provider extends a content delivery network to gather information on atomically identifiable web clients (called “user agents”) as such computer-implemented entities interact with the CDN across different domains being managed by the CDN service provider. The data system tracks user agents, preferably via cookies, although one or more passive techniques may be used. A user agent may be a cookie-able device having a cookie store. As the user agent navigates across sites, a CDN-specific unique identifier used by the system to correlate user agents is generated. Preferably, the unique identifier is stored as an encrypted cookie. The unique identifier represents one user agent (and, thus, one cookie-able device's store). The system tracks user agent behavior on and across customer sites that are served by the CDN, and these behaviors are classified into identifiable “segments” that may be used to create a profile.
    Type: Grant
    Filed: August 25, 2012
    Date of Patent: March 3, 2015
    Assignee: Akamai Technologies, Inc.
    Inventors: Michael M. Afergan, F. Thomson Leighton, Timothy P. Johnson, Brian J. Mancuso, Ken G. Iwamoto
  • Patent number: 11831520
    Abstract: In general, the disclosure describes techniques for dynamic application service level agreement (SLA) metric generation, distribution, and intent-based Software-Defined Wide Area Network (SD-WAN) link selection. For instance, a network device may determine a metric associated with an application or application-group. The network device may send the metric to a controller, and in response may receive from the controller a recommended SLA metric associated with the application or application-group. The network device may also compute an intent-based SLA metric based on the recommended SLA metric, one or more characteristics of one or more links connected to the network device, and a user configured intent model that defines a tolerance level to apply the recommended SLA metric. The network device may select, based on the intent-based SLA metric, a path to send traffic from the application or application-group.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: November 28, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Thyagarajan S. Pasupathy, Sankar Ramanoorthi, Radhakrishnan G, Saurav Shaw, Mohan Thangavel, Vaibhav Belliappa, Nagaraja Manikkar Shenoy
  • Patent number: 7269636
    Abstract: A computer network (20) includes a first processor (22) for maintaining a Web page (34) having an embedded first code module (36) and accessible through a Web address (38). A second processor (24) supports a Web browser (52) for downloading the Web page (34) and executing the first code module (36). When executed, the first code module (36) issues a first command (93) to retrieve a second code module (90) from a server system (26). The server system (26) includes a database (68) having a service response (162, 176, 186) associated with the Web address (38). A processor (62) assembles the second code module (90) having the service response (162, 176, 186). When the second code module is retrieved, the first code module (36) issues a second command (106) to initiate execution of the second code module (90) to provide added function to the Web page (34).
    Type: Grant
    Filed: July 1, 2003
    Date of Patent: September 11, 2007
    Assignee: Modavox, Inc.
    Inventors: Charles P. McCollum, Andrew L. Burgess, Jr.
  • Patent number: 8045564
    Abstract: Mechanisms are disclosed for detecting protocols independently of the ports used by streams associated with the protocols or applications that may send out such streams. The detecting may entail using a content filter that is hosted on a networking stack, where the content filter may be composed of a stream buffer and handlers for detecting the protocols. The handlers may be further used to modify streams incoming to a port or streams outgoing from an application. The handlers can modify the streams in a variety of ways, including reading, inserting, replacing, deleting, and completing data in the streams according to some policy criteria, such as those set by parental controls. Individual handlers may be selected from a plurality or set of handlers so that they can be matched up to the appropriate streams.
    Type: Grant
    Filed: January 5, 2006
    Date of Patent: October 25, 2011
    Assignee: Microsoft Corporation
    Inventors: Aaron Culbreth, Brian L. Trenbeath, Keumars A. Ahdieh, Peter M. Wiest, Roger H. Wynn, Stan D. Pennington
  • Patent number: 8958308
    Abstract: A method of operating an access network including a plurality of data connections (19) between end-user devices (12, 14, 16, 18) and an aggregation transceiver device (20) at which the connections (19) are aggregated for onward connection through the access network, the method comprising storing a plurality of different profiles, each profile specifying values for parameters associated with each connection (19); and, for each connection, obtaining connection data relating to a monitoring period, said monitoring period comprising a plurality of shorter periods, said connection data comprising, for each of said shorter periods, an indication of whether said connection has experienced instability during said shorter period, and an indication of user activity on said connection during said shorter period; monitoring the performance of the connection in dependence on said connection data; selecting one of said stored profiles to be applied to the connection in dependence on the results of said monitoring; and appl
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: February 17, 2015
    Assignee: British Telecommunications Public Limited Company
    Inventors: John Wolsey Cook, Philip Anthony Everett, Christopher Marcus Croot, Ashley Pickering
  • Patent number: 8010663
    Abstract: A computationally implemented method includes, but is not limited to acquiring subjective user state data including data indicating incidence of at least a first subjective user state associated with a first user and data indicating incidence of at least a second subjective user state associated with a second user; acquiring objective occurrence data including data indicating incidence of at least a first objective occurrence and data indicating incidence of at least a second objective occurrence; and correlating the subjective user state data with the objective occurrence data. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: August 30, 2011
    Assignee: The Invention Science Fund I, LLC
    Inventors: Shawn P. Firminger, Jason Garms, Edward K. Y. Jung, Chris D. Karkanias, Eric C. Leuthardt, Royce A. Levien, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene, Kristin M. Tolle, Lowell L. Wood, Jr.
  • Patent number: 8301786
    Abstract: Network devices, computer-readable media, and other embodiments associated with packet inspection are described. Packet inspection may be performed on data packets associated with a session, where a session can include multiple data channels and associated control channels that have been bound together. A session may be associated with an identity. Various policies may be associated with that identity. As packet inspection occurs, it can be determined whether policies are being violated on a per identity basis. If a policy is being violated, then an action may be selectively performed. The action performed may affect a single channel in the session or may affect the whole session. Different identities may have different policies. Example actions include dropping a session, throttling a session, monitoring a session, controlling the number of channels associated with a session, dropping a channel, throttling a channel, monitoring a channel, and other actions.
    Type: Grant
    Filed: February 10, 2010
    Date of Patent: October 30, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Praveenkumar Reguraman, Rajasekhar Manam, Sridar Kandaswamy, Abhijit V. Warkhedi
  • Patent number: 6021436
    Abstract: A method for polling a plurality heterogeneous computer systems remote from a host is provided. The method has the host containing first and second memory locations. In the first location the current day's collected information is stored. In a second location historical data compiled over a predetermined period of time is stored. The system has the host initially polling all of the plurality of heterogeneous computer systems concurrently to determine if they are active. If it is determined that a particular computer system is active, the system then runs through a series of commands to obtain desired information from the plurality of hosts. The host obtains the particular operating system and the particular version of each operating system that is running on each one of the plurality of heterogeneous computers. Once this information is obtained the host then can run certain specific commands for each particular operating system revision to ascertain additional information.
    Type: Grant
    Filed: May 9, 1997
    Date of Patent: February 1, 2000
    Assignee: EMC Corporation
    Inventor: Brian Garrett
  • Patent number: 9021097
    Abstract: A method, system and computer program product for managing and deploying physical and virtual environments across multiple hardware platforms. A single unit, referred to herein as a cloud construction block, contains both the hardware and software components used to build a cloud computing environment. By having such a single unit contain both the hardware and software components needed to build a cloud computing environment, the user no longer needs to purchase and integrate different hardware and software components. Furthermore, the cloud construction block contains modular pieces of hardware, such as compute hardware, memory hardware, storage hardware and network hardware, that are integrated with management software configured to manage both the hardware and the cloud computing environment in a seamlessly integrated package. Since there is a single management system, the management software allows the user to manage the modular pieces of hardware via a single user interface.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: April 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Rohith K. Ashok, Thomas M. Brey, Raymond J. Harrington, Matt R. Hogstrom, Matthew J. Sheard
  • Patent number: 8051477
    Abstract: State of security in a mobile communications network is communicated. Data regarding nature and severity of security events onboard at least one mobile platform is generated and processed. A message that includes the processed data is generated and transmitted periodically. The processed data makes up a security state vector that includes the number of security events detected since power-up of the mobile platform node, sum of highest severity security events since power-up or counter rollover, sum of the second highest severity security events detected since power-up or counter rollover, sum of the third highest severity security events detected since power-up or counter rollover, highest security event classification, second-highest security event classification, and third-highest security event classification. The processed data may be used in a network operations center to prioritize mobile platforms from which logged data should be retrieved for further investigation and monitoring.
    Type: Grant
    Filed: December 3, 2004
    Date of Patent: November 1, 2011
    Assignee: The Boeing Company
    Inventors: Laurence I. Rockwell, Timothy M. Aldrich
  • Patent number: 7877353
    Abstract: A computer-implemented method and system is disclosed in which a network-based interaction environment includes a plurality of peer-to-peer nodes being able to communicate directly with each other using a peer-to-peer protocol and a peer-to-peer client application, the plurality of peer-to-peer nodes including a first peer-to-peer client and a second peer-to-peer client, a first peer-to-peer client application running on the first peer-to-peer client to maintain persistent buddy information on the first peer-to-peer client, the persistent buddy information including a buddy list identifying trusted peer-to-peer nodes of the plurality of peer-to-peer nodes, and a second peer-to-peer client application running on the second peer-to-peer client to maintain persistent reputation information on the second peer-to-peer client, the persistent reputation information including information related to the reputation of the first peer-to-peer client in the network-based interaction environment.
    Type: Grant
    Filed: December 28, 2006
    Date of Patent: January 25, 2011
    Assignee: eBay Inc.
    Inventors: Zahid N. Ahmed, Adrian Nicholas Cockcroft, Josep M. Ferrandiz, Neelakantan Sundaresan
  • Patent number: 7191252
    Abstract: Data security for e-mail or browser-input data operates on identified security sensitive words, characters or icons which are extracted leaving remainder data. Extracted data, in one system, is stored in a remote, extract store in a distributed computer system. Other methods attach an encrypted version of the extract to the email. The browser system operates with an extract store. Remainder data is sent to the addressee or designated web server. The addressee is permitted to retrieve the extracted data from said extract store only in the presence of a security clearance and hence, reconstruct the source e-mail or browser-input data with the extract data. In other systems, the addressee reconstructs the email by decryption and integration. Parsing rather than identifying critical words is an option. The browser method extracts data, facilitates the storage in an extract store, forwards the remainder data to a targeted destination.
    Type: Grant
    Filed: May 23, 2002
    Date of Patent: March 13, 2007
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 10652112
    Abstract: Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with the packet classifications, encapsulate monitored packets with encapsulation headers including the tags to form encapsulated packets, and forward the encapsulated packets to tool VM platforms. Tool packet monitor applications operate within the tool VM platforms to receive the encapsulated packets, identify packet classifications associated with the tags, remove the encapsulation headers from the encapsulated packets, and forward de-encapsulated packets to network destinations based upon the packet classifications.
    Type: Grant
    Filed: November 3, 2016
    Date of Patent: May 12, 2020
    Assignee: KEYSIGHT TECHNOLOGIES SINGAPORE (SALES) PTE. LTD.
    Inventor: Kristopher Raney