Category:Vincent E. Parla of North Hampton NH (US)
Jump to navigation
Jump to search
Contents
Vincent E. Parla of North Hampton NH (US)
Executive Summary
Vincent E. Parla of North Hampton NH (US) is an inventor who has filed 31 patents. Their primary areas of innovation include {Virtual private networks} (6 patents), {Proxies} (5 patents), based on web technology, e.g. hypertext transfer protocol [HTTP] (5 patents), and they have worked with companies such as Cisco Technology, Inc. (31 patents). Their most frequent collaborators include (8 collaborations), (8 collaborations), (7 collaborations).
Patent Filing Activity
Technology Areas
List of Technology Areas
- H04L63/0272 ({Virtual private networks}): 6 patents
- H04L63/0281 ({Proxies}): 5 patents
- H04L67/02 (based on web technology, e.g. hypertext transfer protocol [HTTP]): 5 patents
- G06F2221/033 (Indexing scheme relating to): 4 patents
- G06F21/552 ({involving long-term monitoring or reporting}): 4 patents
- H04L12/4633 ({Interconnection of networks using encapsulation techniques, e.g. tunneling}): 3 patents
- H04L63/0236 ({Filtering by address, protocol, port number or service, e.g. IP-address or URL}): 3 patents
- H04L63/029 ({Firewall traversal, e.g. tunnelling or, creating pinholes}): 3 patents
- H04L67/141 (Setup of application sessions (admission control or resource allocation in data switching networks): 3 patents
- H04L63/1416 ({Event detection, e.g. attack signature detection}): 3 patents
- H04L63/20 ({for managing network security; network security policies in general (filtering policies): 3 patents
- G06F21/54 (by adding security routines or objects to programs): 3 patents
- G06F21/577 ({Assessing vulnerabilities and evaluating computer system security}): 3 patents
- G06F8/433 ({Dependency analysis; Data or control flow analysis}): 3 patents
- H04L67/561 (Adding application-functional data or data for application control, e.g. adding metadata): 2 patents
- H04L12/4641 ({Virtual LANs, VLANs, e.g. virtual private networks [VPN] (LAN interconnection over a bridge based backbone): 2 patents
- H04L45/42 (Centralised routing): 2 patents
- H04L45/66 ({Layer 2 routing, e.g. in Ethernet based MAN's}): 2 patents
- H04L61/103 (across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]): 2 patents
- H04L61/4511 (using domain name system [DNS]): 2 patents
- H04L63/0435 ({for providing a confidential data exchange among entities communicating through data packet networks}): 2 patents
- H04L67/101 (based on network conditions): 2 patents
- H04L67/1012 (based on compliance of requirements or conditions with available server resources): 2 patents
- H04L67/562 (Brokering proxy services): 2 patents
- H04L63/0254 ({Stateful filtering}): 2 patents
- H04L63/1425 ({Traffic logging, e.g. anomaly detection}): 2 patents
- H04L63/083 ({using passwords (cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code): 2 patents
- H04L47/726 (Reserving resources in multiple paths to be used simultaneously (by balancing the load): 2 patents
- H04L67/2871 (TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION (arrangements common to telegraphic and telephonic communication): 1 patents
- H04L67/146 (Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding): 1 patents
- H04L63/0823 ({using certificates (cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates): 1 patents
- H04L63/0428 ({wherein the data content is protected, e.g. by encrypting or encapsulating the payload}): 1 patents
- H04L63/1491 ({for detecting or protecting against malicious traffic}): 1 patents
- H04L12/66 (TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION (arrangements common to telegraphic and telephonic communication): 1 patents
- H04L63/08 ({for authentication of entities (cryptographic mechanisms or cryptographic arrangements for entity authentication): 1 patents
- H04L63/0485 ({Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up}): 1 patents
- H04L63/166 ({Implementing security features at a particular protocol layer}): 1 patents
- H04L63/205 ({involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved (negotiation of communication capabilities): 1 patents
- H04L47/125 (by balancing the load, e.g. traffic engineering): 1 patents
- H04L47/2416 (Real-time traffic): 1 patents
- H04L47/29 ({using a combination of thresholds}): 1 patents
- H04L47/528 ({Minimum bandwidth guarantee}): 1 patents
- H04L47/11 (Identifying congestion): 1 patents
- H04L47/827 ({Aggregation of resource allocation or reservation requests}): 1 patents
- H04L47/745 ({Reaction in network}): 1 patents
- G06F21/6245 ({Protecting personal data, e.g. for financial or medical purposes}): 1 patents
- H04L67/133 (Protocols for remote procedure calls [RPC]): 1 patents
- H04L67/56 (Provisioning of proxy services (store-and-forward switching systems in data switching networks): 1 patents
- H04L63/0853 ({using an additional device, e.g. smartcard, SIM or a different communication terminal (cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices): 1 patents
- H04L45/74 (Address processing for routing): 1 patents
- H04L69/165 (Combined use of TCP and UDP protocols; selection criteria therefor): 1 patents
- H04L69/166 (IP fragmentation; TCP segmentation): 1 patents
- H04L69/321 (Interlayer communication protocols or service data unit [SDU] definitions; Interfaces between layers): 1 patents
- G06F21/51 (at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability): 1 patents
- G06F21/53 (by executing in a restricted environment, e.g. sandbox or secure virtual machine): 1 patents
- G06F21/566 ({Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities}): 1 patents
- G06F8/75 (Structural analysis for program understanding): 1 patents
- H04L63/1433 ({Vulnerability analysis}): 1 patents
Companies
List of Companies
- Cisco Technology, Inc.: 31 patents
Collaborators
- Kyle Andrew Donald Mestery of Woodbury MN (US) (8 collaborations)
- Andrew Zawadowskiy of Hollis NH (US) (8 collaborations)
- Oleg Bessonov of Littleton MA (US) (7 collaborations)
- Thomas Szigeti (5 collaborations)
- Ashok Krishnaji Moghe of Pleasanton CA (US) (3 collaborations)
- Doron Levari of Newton MA (US) (2 collaborations)
- Tariq Ahmed Farhan of Cambridge MA (US) (2 collaborations)
- Siddhu Warrier (1 collaborations)
- Jason M Perry of Plymouth MA (US) (1 collaborations)
- Valentiu Vlad Santau of Littleton MA (US) (1 collaborations)
- Peter Davis of Wakefield MA (US) (1 collaborations)
- Andrzej Konrad Kielbasinski of Grafton MA (US) (1 collaborations)
- Nancy Patricia Cam-Winget of Mountain View CA (US) (1 collaborations)
- Ian James Wells of San Jose CA (US) (1 collaborations)
- Walter Hulick of Pearland TX (US) (1 collaborations)
- Ido Tamir of Boston MA (US) (1 collaborations)
- Adam Bragg of Hollis NH (US) (1 collaborations)
- Jason M. Perry of Plymouth MA (US) (1 collaborations)
Subcategories
This category has the following 2 subcategories, out of 2 total.
Pages in category "Vincent E. Parla of North Hampton NH (US)"
The following 10 pages are in this category, out of 10 total.
1
- 18122052. PRIORITIZATION OF INDIVIDUAL CHANNELS WITHIN MULTIPLEXED STREAMS FOR ZERO TRUST NETWORK ACCESS (ZTNA) simplified abstract (Cisco Technology, Inc.)
- 18122065. USING RELAYS AND AUTHORIZATION CHAINS TO REDUCE ATTACK SURFACE simplified abstract (Cisco Technology, Inc.)
- 18122074. DEPLOYING JUST IN TIME (JIT) DECEPTIONS AT SCALE IN NETWORKS simplified abstract (Cisco Technology, Inc.)
C
- Cisco Technology, Inc. (20240314115). USING RELAYS AND AUTHORIZATION CHAINS TO REDUCE ATTACK SURFACE simplified abstract
- Cisco technology, inc. (20240314115). USING RELAYS AND AUTHORIZATION CHAINS TO REDUCE ATTACK SURFACE simplified abstract
- Cisco technology, inc. (20240314167). DEPLOYING JUST IN TIME (JIT) DECEPTIONS AT SCALE IN NETWORKS simplified abstract
- Cisco technology, inc. (20240314192). PRIORITIZATION OF INDIVIDUAL CHANNELS WITHIN MULTIPLEXED STREAMS FOR ZERO TRUST NETWORK ACCESS (ZTNA) simplified abstract
- Cisco technology, inc. (20240430338). QUIC AND ANYCAST PROXY RESILIENCY
Categories:
- Kyle Andrew Donald Mestery of Woodbury MN (US)
- Andrew Zawadowskiy of Hollis NH (US)
- Oleg Bessonov of Littleton MA (US)
- Thomas Szigeti
- Ashok Krishnaji Moghe of Pleasanton CA (US)
- Doron Levari of Newton MA (US)
- Tariq Ahmed Farhan of Cambridge MA (US)
- Siddhu Warrier
- Jason M Perry of Plymouth MA (US)
- Valentiu Vlad Santau of Littleton MA (US)
- Peter Davis of Wakefield MA (US)
- Andrzej Konrad Kielbasinski of Grafton MA (US)
- Nancy Patricia Cam-Winget of Mountain View CA (US)
- Ian James Wells of San Jose CA (US)
- Walter Hulick of Pearland TX (US)
- Ido Tamir of Boston MA (US)
- Adam Bragg of Hollis NH (US)
- Jason M. Perry of Plymouth MA (US)
- Vincent E. Parla of North Hampton NH (US)
- Inventors
- Inventors filing patents with Cisco Technology, Inc.