1
Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey: Methods and systems for enabling a tunnel between two computers on a network. Openreach, Finnegan Henderson Farabow Garrett & Dunner L, October 7, 2003: US06631416 (238 worldwide citation)

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the add ...


2
Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro: Methods and system for providing network services using at least one processor interfacing a base network. Corente, Finnegan Henderson Farabow Garrett & Dunner, February 20, 2007: US07181766 (135 worldwide citation)

Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate ...


3
Mark Tuomenoksa, John Keane, Bob Larson, Christopher Macey: Methods and systems for partners in virtual networks. Corente, Finnegan Henderson Farabow Garrett & Dunner, April 11, 2006: US07028333 (126 worldwide citation)

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and the second processors. In one embodiment, the additional processor may provide a set of names that includes the name of the second proces ...


4
John Keane, Neil R Brutman, Michael J Harris, Christopher Macey: Methods and systems for enabling communication between a processor and a network operations center. Corente, Finnegan Henderson Farabow Garrett & Dunner, August 1, 2006: US07085854 (112 worldwide citation)

Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors. The additional processor may determine a first virtual address that identifies the first processor i ...


5
John Keane, Christopher Macey: Methods and systems for managing virtual addresses for virtual networks. Corente, Finnegan Henderson Farabow Garrett & Dunner, February 7, 2006: US06996628 (106 worldwide citation)

Methods and systems are provided for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor. In one embodiment, the at the at least one additional processor may determine a first v ...


6
Samuel Bendinelli, John Keane, Christopher Macey: Methods and systems for hairpins in virtual networks. Corente, Finnegan Henderson Farabow Garrett & Dunner L, May 16, 2006: US07047424 (64 worldwide citation)

Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional ...


7
John Keane, Christopher Macey, Samuel Bendinelli: Methods and systems for firewalling virtual private networks. Corente, Finnegan Henderson Farabow Garrett & Dunner, May 12, 2009: US07533409 (62 worldwide citation)

Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for ro ...


8
Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto: Method and system for managing and configuring virtual private networks. Corente, Finnegan Henderson Farabow Garrett & Dunner, February 20, 2007: US07181542 (50 worldwide citation)

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the fi ...


9
John Keane, Christopher Macey: Methods and systems for resolving addressing conflicts based on tunnel information. Corente, Finnegan Henderson Farabow Garrett & Dunner, July 1, 2008: US07395354 (4 worldwide citation)

Methods and systems are provided for resolving an addressing conflict between a first processor in a first network and a second processor in a second network. When an addressing conflict is detected between a first address of the first processor and a second address of the second processor, tunnel i ...


10
John Keane, Christopher Macey: Methods and systems for resolving addressing conflicts based on tunnel information. Finnegan Henderson Farabow Garrett & Dunner, August 21, 2003: US20030158962-A1

Methods and systems are provided for resolving an addressing conflict between a first processor in a first network and a second processor in a second network. When an addressing conflict is detected between a first address of the first processor and a second address of the second processor, tunnel i ...