1
John J Roese, Richard W Graham, David Frattura, David Harrington: Location based data. Enterasys Networks, Holland & Knight, Brian J Colandreo, August 15, 2006: US07092943 (173 worldwide citation)

Data is provided with location-based access control information. Access to the data at a physical location is then limited according to the location-based access control information. A physical location of a device accessing the data can be determined, and the limiting of the access is then accordin ...


2
John J Roese, Richard W Graham, David Frattura, Roger P Durand, John Paul Gorsky, David Harrington: Locating devices in a data network. Enterasys Networks, Holland & Knight, Brian J Colandreo Esq, J Mitchell Herbert Jr, June 15, 2010: US07739402 (158 worldwide citation)

A system that associates physical locations with network-linked devices in a network to which such devices are connected. This system employs a variety of techniques for establishing device location. The system configuration can vary and can include any type of data network, including LANs, MANs, Wi ...


3
John J Roese, Richard W Graham, David Frattura, Anja A Allen, Brendan J Fee: Location discovery in a data network. Enterasys Networks, Holland & Knight, Brian J Colandreo, November 13, 2007: US07295556 (130 worldwide citation)

A method for location discovery in a data network includes receiving, at a first device, connection information from a neighboring network device and determining a physical location of the first device based on the connection information. The method can include receiving, at the first device, the ph ...


4
John J Roese, Richard W Graham: System and method for dynamic network policy management. Enterasys Networks, Verrill Dana, Chris A Caseiro, April 28, 2009: US07526541 (101 worldwide citation)

A system and method that provides dynamic network policy management. The system enables a network administrator to regulate usage of network services upon initiation of and throughout network sessions. The system employs a method of identifying selectable characteristics of attached functions to est ...


5
John J Roese, Richard W Graham, David Frattura, David Harrington: Verified device locations in a data network. Enterasys Networks, Holland & Knight, Brian J Colandreo Esq, October 20, 2009: US07606938 (53 worldwide citation)

One or more trusted network devices within a data network infrastructure determine a physical location of a client device requesting access to the data network infrastructure. A trusted physical location is generated and associated with the client device. The approach can include determining whether ...


6
John J Roese, Richard W Graham, David Frattura, Anja A Allen, Brendan J Fee: Location discovery in a data network. Enterasys Networks, Holland & Knight, Brian J Colandreo Esq, J Mitchell Herbert Jr, April 27, 2010: US07706369 (44 worldwide citation)

A method for location discovery in a data network includes receiving, at a first device, connection information from a neighboring network device and determining a physical location of the first device based on the connection information. The method can include receiving, at the first device, the ph ...


7
John J Roese, Richard W Graham, Roger P Durand, John Paul Gorsky: Using signal characteristics to determine the physical location of devices in a data network. Enterasys Networks, Holland & Knight, Brian J Colandreo Esq, J Mitchell Herbert Jr Esq, March 1, 2011: US07898977 (40 worldwide citation)

A method of determining a physical location of a device connected to a data network infrastructure including a plurality of connection points at different physical locations, the method including establishing a connection with the data network infrastructure via a cable-based transmission medium, wh ...


8
John J Roese, Richard W Graham: System and method for dynamic network policy management. Enterasys Networks, Verrill Dana, Chris A Caseiro, June 15, 2010: US07739372 (14 worldwide citation)

A system and method that provides dynamic network policy management. The system enables a network administrator to regulate usage of network services upon initiation of and throughout network sessions. The system employs a method of identifying selectable characteristics of attached functions to est ...


9
John J Roese, Richard W Graham, David Frattura, David Harrington: Location-based access control in a data network. Enterasys Networks, Holland & Knight, Brian J Colandreo Esq, Jeffrey T Placker Esq, March 3, 2015: US08972589 (5 worldwide citation)

A request for network access is received from a client device at a network entry device of a network infrastructure. The network infrastructure determines a physical location of the client device and determines authorization of the client device based on the physical location. The approach can inclu ...


10
Richard W Graham, John J Roese: System and method for dynamic distribution of intrusion signatures. Enterasys Networks, Verrill Dana, Chris A Caseiro, January 1, 2013: US08347375 (4 worldwide citation)

The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a library of signatures associated with a particular intrusion detection function. If the reported signature do ...