Wakerly
John F. Wakerly, Oakbrook Terrace, IL US
Patent application number | Description | Published |
---|---|---|
20100100796 | ERROR DETECTING CODE FOR MULTI-CHARACTER, MULTI-LANE, MULTI-LEVEL PHYSICAL TRANSMISSION - A system (e.g., Fibre Channel Error Detecting Code (FC-EDC)) that maps the “standard” Hamming codes onto the bits of a 33-bit control block is provided. The system employs a “rotation” of the check positions in a two-dimensional parity-check matrix for the FC-EDC. The specification discloses a computer-implemented program to test further modifications and permutations of the “standard” distance-4 parity-check matrix to yield an FC-EDC with enhanced error-detecting properties, designed to detect the most likely errors in the known physical environment. By using a parity-check matrix with the “rotation” property, certain error-detecting properties of the parity-check matrix are ensured, and the computation time for searching for a matrix with enhanced error-detecting properties becomes much shorter. | 04-22-2010 |
20120131357 | POWERED DEVICE CLASSIFICATION IN A WIRED DATA TELECOMMUNICATIONS NETWORK - In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to verify that the PD is adapted to receive inline power, then a plurality of classification cycles are carried out to convey a series of inline power classes back to the PSE. The series of inline power classes may all be the same, in which case the PD is legacy equipment and is adapted to receive the power level corresponding to that class. If they are not all the same, information is thus conveyed to the PSE which may, for example, correspond to a specific power level to be applied or to other information. | 05-24-2012 |
20130057056 | POWERED DEVICE CLASSIFICATION IN A WIRED DATA TELECOMMUNICATIONS NETWORK - In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to verify that the PD is adapted to receive inline power, then a plurality of classification cycles are carried out to convey a series of inline power classes back to the PSE. The series of inline power classes may all be the same, in which case the PD is legacy equipment and is adapted to receive the power level corresponding to that class. If they are not all the same, information is thus conveyed to the PSE which may, for example, correspond to a specific power level to be applied or to other information. | 03-07-2013 |
20140108847 | POWERED DEVICE CLASSIFICATION IN A WIRED DATA TELECOMMUNICATIONS NETWORK - In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to verify that the PD is adapted to receive inline power, then a plurality of classification cycles are carried out to convey a series of inline power classes back to the PSE. The series of inline power classes may all be the same, in which case the PD is legacy equipment and is adapted to receive the power level corresponding to that class. If they are not all the same, information is thus conveyed to the PSE which may, for example, correspond to a specific power level to be applied or to other information. | 04-17-2014 |
John F. Wakerly, Glenview, IL US
Patent application number | Description | Published |
---|---|---|
20150128246 | METHODS AND APPARATUS FOR REDIRECTING ATTACKS ON A NETWORK - A system is disclosed for protecting a network against malicious attacks or attempts for unauthorized access. A network is connected to an external network by a number of firewalls. Inspectors detect packets blocked by the firewalls and some or all of the packets are detected to a labyrinth configured to emulated an operational network and response to the packets in order to engage an attacker. Blocked packets may be detected by comparing packets entering and exiting a firewall. Packets for which a corresponding packets are not received within a transit delay may be identified as blocked. Entering and exiting packets may be compared by comparing only header information. A central module may receive information from the inspectors and generate statistical information and generate instructions for the inspectors, such as blacklists of addresses known to be used by attackers. | 05-07-2015 |
Michael Wakerly, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20110113353 | IMPLEMENTING CUSTOMIZED CONTROL INTERFACES - Systems and techniques by which a single electronic device can implement a variety of customized control interfaces. The control interfaces can be tailored to specific operations performed the device which is controlled. In one aspect, computer-implemented methods for controlling a web-based application include providing, from a server, a web page that includes a web-based application and a uniform resource identifier specifying a control interface for the web-based application and transmitting the control interface specified by the uniform resource identifier to a client for use in controlling the one or more functions of the web-based application. The control interface is configured to permit a user to control one or more functions of the web-based application from a mobile device. | 05-12-2011 |
Michael John Wakerly, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20130073818 | SECURE APPLICATION DIRECTORY - This disclosure relates to storing a secure application directory within a contactless smart card. The contactless smart card include secure memory area for storing software applications and may include a default application directory for listing the software applications stored within the contactless smart card to an external card reader. A second application directory is stored with an access key and a listing of a second set of software applications within the same contactless smart card. The second application directory includes improved application directory entries, where each application directory entry includes an application identifier, a starting memory block byte value, and a size byte value for each of the second set of software applications. | 03-21-2013 |
20130334318 | SECURE APPLICATION DIRECTORY - This disclosure relates to storing a secure application directory within a contactless smart card. The contactless smart card include secure memory area for storing software applications and may include a default application directory for listing the software applications stored within the contactless smart card to an external card reader. A second application directory is stored with an access key and a listing of a second set of software applications within the same contactless smart card. The second application directory includes improved application directory entries, where each application directory entry includes an application identifier, a starting memory block byte value, and a size byte value for each of the second set of software applications. | 12-19-2013 |