Thomas J. Kelly - Fergus, CA Samuel H. McLane - Blue Bell PA, US Ronald Frederick - Mountain View CA, US Dharmendra Mohan - Sunnyvale CA, US Darrell G. Long - Austin TX, US
Assignee:
Blue Coat Systems, Inc. - Sunnyvale CA
International Classification:
H04L 9/32
US Classification:
713169, 713171
Abstract:
A first computer-based device is authenticated at a second computer-based device communicatively coupled thereto through use of a unique identifier and an encrypted token, each received from the first device. Following the authentication, configuration information for the first device is sent from the second device to the first device and the first device is authorized to join a network that includes the second device. Further, permissions related to the network may be granted to the first device.
Methods And Systems For Obtaining Url Filtering Information
A host computer system is categorized according to uniform resource locator (URL) information extracted from a digital certificate purportedly associated with said host. Thereafter, a secure communication session (e. g. , an SSL session) with said host may be granted or denied according to results of the categorizing. If granted, messages associated with the secure session may be tunneled through a proxy without decryption, or, in some cases, even though the secure communication session was authorized messages may be decrypted at the proxy.
Content Associative Caching Method For Web Applications
Wei Lu - Austin TX, US Jamshid Mahdavi - San Jose CA, US Darrell Long - Austin TX, US
International Classification:
G06F 15/16 G06F 12/08
US Classification:
709203, 711118, 711E12016
Abstract:
A cache logically disposed in a communication path between a client and a server receives a request for a content item and, in response thereto, requests from the server header information concerning the content item and an initial portion of data that makes up the content item. The cache then computes a first hashing value from the header information and a second hashing value from the initial portion of data. A content identifier is created by combining the first hashing value and the second hashing value. Using the content identifier, the cache determines whether a copy of the content item is stored by the cache; and, if so provides same to the client. Otherwise, the requests the content item from the server and, upon receipt thereof, provides it to the client.
System And Method For Distributing Heuristics To Network Intermediary Devices
Kevin Porter - Guelph, CA Thomas J. Kelly - Fergus, CA Marcin Lukasz Lizon - Waterloo, CA Darrell Long - Austin TX, US Eric Maki - Kitchener, CA Kim Tremblay - Kitchener, CA Jennifer Vance - Waterloo, CA
Assignee:
BLUE COAT SYSTEMS, INC. - Sunnyvale CA
International Classification:
G06F 15/173
US Classification:
709223
Abstract:
A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.
System And Method For Distributing Heuristics To Network Intermediary Devices
- Sunnyvale CA, US Thomas J. Kelly - Fergus, CA Marcin Lukasz Lizon - Waterloo, CA Darrell Long - Austin TX, US Eric Maki - Kitchener, CA Kim Tremblay - Kitchener, CA Jennifer Vance - Waterloo, CA
International Classification:
H04L 12/24 H04L 29/08
Abstract:
A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.
One Identity
President and General Manager, One Identity
Tigera, Inc. Dec 2016 - Jun 2017
Vice President Products
Ca Technologies Dec 2016 - Jun 2017
Svp, Security Product Management
Versa Networks Feb 2014 - Dec 2016
Vice President Products
Aerohive Networks Sep 2013 - Feb 2014
Cloud and Applications
Education:
The University of Texas at Austin 1984 - 1987
Bachelors, Bachelor of Science
Skills:
Go To Market Strategy Channel Sales Enablement Product Management Security Program Management Solution Selling Cloud Computing Strategy Software Development Network Security Cross Functional Team Leadership Integration Telecommunications Management Saas Networking Business Development Product Development Storage Product Lifecycle Management Leadership Professional Services Business Alliances Demand Generation Product Launch Pre Sales Partner Management Strategic Partnerships Channel Partners Sales Engineering Product Marketing Managed Services Messaging Start Ups Virtualization Software As A Service
East Side Elementary School Del Rio TX 1961-1964, Vanduser High School Vanduser MO 1964-1966, Will Rogers Elementary School Altus OK 1965-1966, Thurman Francis Middle School Smyrna TN 1968-1969
Community:
Ken Overbay, Rusty Wilfong, Linda Hickman, Janie Heffington, Pat Boggan, Melladi Tucker, Kimberly Houston, John Evans, Donna Davis, Sherry Jennings, Preston Frey
Biography:
I was mocking the principal and got my friend Linda expelled for laughing But Mary o...