Skolkovo Foundation Moscow/Menlo Park 2009 - 2014
Technical Reviewer - Computer Engineering
Sentinel Mission - B612 Foundation 2000 - 2014
Director - Treasurer - Founder Circle
U.s. Venture Partners 2000 - 2011
General Partner - Then Partner
Almaz Capital 2000 - 2011
General Partner
Sun Microsystems Dec 1987 - Dec 2000
Chief Network Officer
Skills:
Venture Capital Mobile Devices Strategic Partnerships Strategy Start Ups Networking Network Security Entrepreneurship Cloud Computing Operating Systems Saas Distributed Systems Semiconductors Application Servers Development Tools Mergers
Amit Gupta - Fremont CA Sriraman Venkataraman - London, GB Geoffrey Baehr - Menlo Park CA
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 1760
US Classification:
705 14, 709219
Abstract:
A method and apparatus for local advertising. Internet Service Providers (ISPs) or proxies owned by an ISP insert advertisements transmitted from a web host to a client. The advertisement may be stored in the proxys cache or may be retrieved from a web server for an advertiser. By providing the ISP with the ability to insert the advertisement, advertisements appear on small web sites that do not normally attract advertisers. Additionally, due to the number of advertisements placed by an ISP, small advertisers may have their advertisement appear in connection with frequently used web sites. One or more embodiments of the invention provide for an ISP to collect and store demographic information such as the users age, residence, credit history, etc. Additionally, stored information may include web sites the user has accessed, time spent on each web site, and any searches performed by the user. The profile information may be utilized by the proxy to conduct targeted advertising and to associate a cost with certain demographic information.
Method And Apparatus For Dynamic Proxy Insertion In Network Traffic Flow
Amit Gupta - Fremont CA Geoffrey Baehr - Menlo Park CA
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 1300
US Classification:
709238, 709242, 370235
Abstract:
In embodiments of the invention, a method and apparatus for dynamic proxy insertion in network traffic path is described. According to one or more embodiments of the invention, a request and/or response message may be modified to include one or more thru-proxy tags to identify a network (or traffic) node (e. g. , a proxy, server, or intermediary). For example, a request directed to a server or a response directed to a client may be altered to insert a plurality of intermediate or final destination designations. In so doing, a path of a request or response may be altered dynamically. A thru-proxy tag in a response may be inserted in a related request to identify a destination or node such that the request is sent to the destination in the thru-proxy tag before being sent to an origin server. Thru-proxy tags may be used to identify multiple and/or alternate destinations.
Amit Gupta - Fremont CA Geoffrey Baehr - Menlo Park CA
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 1200
US Classification:
711137, 711118, 711213
Abstract:
A client is given control over the pre-fetching of resources. The client may be, for example, resident on an electronic device such as a computer system that caches resources. The resources may be, for instance, web pages. Identifying property values that are intrinsically tied to the contents of the resources are used to determine whether resources are already resident within the cache prior to pre-fetching the resources. In addition, the client may request information regarding a resource to assist the client in determining whether to pre-fetch the resource. Such information may include the size of the resource and other information.
Method And Apparatus For Providing Secure Communication With A Relay In A Network
Ashar Aziz - Freemont CA Geoffrey Baehr - Menlo Park CA Germano Caronni - Sunnyvale CA Amit Gupta - Fremont CA Vipul Gupta - Fremont CA Glenn C. Scott - Mountain View CA
Methods and systems of the present invention include providing a connection between a first computer and a second computer by receiving, at a third computer, information regarding one of the first and second computers to facilitate establishment of a secure connection between the first computer and the second computer, creating a first end-to-end security link between the first computer and third computer, and creating a second end-to-end security link between the second computer and the third computer to establish the secure connection. The first and second computers could be a client and a server on the Internet, and these methods and systems can, for example, increase the possible number of new secure connections to the server. The third computer also permits processing of information transmitted between the client and server in the third computer. For example, the information could be reformatted or used in testing a process of one of the first and second computers.
Method And Apparatus For Dynamic Proxy Insertion In Network Traffic Flow
Amit Gupta - Fremont CA Geoffrey Baehr - Menlo Park CA
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 1300
US Classification:
709238, 709242, 709237, 370235, 370236
Abstract:
In embodiments of the invention, a method and apparatus for dynamic proxy insertion in network traffic path is described. According to one or more embodiments of the invention, a request and/or response message may be modified to include one or more thru-proxy tags to identify a network (or traffic) node (e. g. , a proxy, server, or intermediary). For example, a request directed to a server or a response directed to a client may be altered to insert a plurality of intermediate or final destination designations. In so doing, a path of a request or response may be altered dynamically. A thru-proxy tag in a response may be inserted in a related request to identify a destination or node such that the request is sent to the destination in the thru-proxy tag before being sent to an origin server. Thru-proxy tags may be used to identify multiple and/or alternate destinations.
Method And Apparatus For Processing Client Information
AMIT GUPTA - FREMONT CA, US SRIRAMAN VENKATRAMAN - LONDON, GB GEOFFREY BAEHR - MENLO PARK CA, US
International Classification:
G06F015/00
US Classification:
707/501100
Abstract:
A method and apparatus for processing user information. Information collection is increasingly utilized by advertisers and others that desire to customize a user's display for the user's individual preferences. According to one ore more embodiments of the invention, Internet Service Providers (ISPs) or proxies owned by an ISP collect and store information regarding particular users in a user profile. The information may include demographic information such as the user's age, residence, credit history, etc. Additionally, the information may include the web sites that the user has accessed, the time spent on each web site, and any internet searches performed by the user. The profile information may be utilized by the proxy to conduct targeted advertising, the information may be provided to a web host so that the web host may conduct targeted advertising, or the information may be utilized to customize a user's display, for example. The profile information may also be utilized to associate a cost with certain demographic information. For example, if the profile information indicates that the user is interested in automobiles, a premium may be charged to an automobile advertiser. The profile information may be evaluated by the ISP for advertisement insertion or customized displays. Alternatively, the profile information may be sold to a third party such as an advertiser. Thus, the profile and demographic information can be utilized to individually customize information displayed to a client.
Method And Apparatus For Device Location Sensitive Data Routing
Germano Caronni - Mountain View CA, US Geoffrey Baehr - Menlo Park CA, US
International Classification:
H04Q007/20
US Classification:
455/445000, 455/456000
Abstract:
The present invention provides a method and apparatus for device location sensitive data routing. In one embodiment of the present invention, a signal from a portable, electronic device identifies a user. In this embodiment, a sensor detects the signal and relays the identification information along with information about electronic communications devices available at the location to a routing device. The routing device reroutes electronic communications to the physical location of the user. In one embodiment, the signal is a radio emanation. In another embodiment, the signal is an infrared emanation. In yet another embodiment, the signal is transmitted over a connection line which couples the portable, electronic device to the sensor. In one embodiment, phone calls are rerouted to a phone located near the portable, electronic device. In another embodiment, e-mail messages are rerouted to a general purpose computer located near the portable, electronic device. In one embodiment, a cellular phone is attached to a non-wireless phone line. In one embodiment, the user configures the routing device to perform an action when the user's location becomes known to the routing device. In another embodiment, the user configures the routing device to perform an action when the user's location becomes unknown to the routing device. In one embodiment, the user configures the routing device to send an e-mail. In another embodiment, the user configures the routing device to update a web page.
System For Packet Filtering Of Data Packets At A Computer Network Interface
Geoffrey G. Baehr - Menlo Park CA William Danielson - Mountain View CA Thomas L. Lyon - Palo Alto CA Geoffrey Mulligan - Fremont CA Martin Patterson - Grenoble, FR Glenn C. Scott - Tehachapi CA Carolyn Turbyfill - Los Gatos CA
Assignee:
Sun Microsystems, Inc. - Palo Alto CA
International Classification:
G06F 1300 G06F 15163
US Classification:
39520079
Abstract:
A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy network is isolated from the private network, so it cannot be used as a jumping off point for intruders. Packets received at the screen (either into or out of a host in the private network) are filtered based upon their contents, state information and other criteria, including their source and destination, and actions are taken by the screen depending upon the determination of the filtering phase. The packets may be allowed through, with or without alteration of their data, IP (internet protocol) address, etc. , or they may be dropped, with or without an error message generated to the sender of the packet.
Youtube
Fireside Chat with Whitfield Diffie Moderator...
Fireside Chat with Whitfield Diffie, Winner, 2015 A.M. Turing Award (E...
Duration:
18m 31s
Geoffrey Baehr, Almaz Capital, about SVOD2017
Geoffrey Baehr, Almaz Capital, about Silicon Valley Open Doors Confere...
Duration:
1m 21s
PHD-2015 - Geoffrey Baehr, General Partner, A...
A short story about the most interesting projects in fund portfolio. W...
Duration:
2m 56s
How In-Memory Computing Changes Everything
Moderator: Geoffrey Baehr, General Partner, Almaz Capital Partners IT ...
Duration:
18m 47s
Building Bridges Across Seas and Continents |...
... Managing Partner, Sunrise Securities Corp, Israel Moderator: Geoff...
Duration:
46m 55s
Dr. Baehr Movieguide reviews Elizabeth: The G...
Dr. Baehr Movieguide reviews Elizabeth: The Golden Age.