Atul N. Trivedi - San Jose CA, US James K. Tosh - Fremont CA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
H04L 12/26 G06F 15/16
US Classification:
370235, 370252, 709228
Abstract:
Techniques are described in which a network device waits differing amounts of time for different network sockets before beginning processes to determine whether respective network connections from the network sockets have failed. An intermediate device may create a network socket for a network connection having a keep-alive wait time option set to a keep-alive wait time associated with a class of the network connection. If an amount of time specified by the keep-alive option of the socket passes after a last successful communication on the network connection, the socket may begin a process to determine whether the network connection has failed. If the intermediate device determines that the network connection has failed, the intermediate device may terminate the connection to free resources on the intermediate device allocated to the network connection.
Disposable Browsers And Authentication Techniques For A Secure Online User Environment
Ramesh Rajagopal - Los Altos CA, US James K. Tosh - Fremont CA, US Fredric L. Cox - San Jose CA, US Perry F. Nguyen - Santa Clara CA, US Jason T. Champion - Mountain View CA, US
Assignee:
AUTHENTIC8, INC. - LOS ALTOS CA
International Classification:
H04L 9/32 G06F 21/00
US Classification:
726 1, 726 7
Abstract:
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.User PCs and other user computers can often be vulnerable to identity theft and other malicious computer attacks due to keyloggers, malware, phishing attacks, untrustworthy internet sites and the like. In particular, such user computers often store credentials on local memory and transmit credentials across the internet. Disclosed in the present application are systems and methods for implementing a secure service environment by which users can access online services without exposing their client machines directly to the internet or storing or transmitting their credentials or other attributes. Also disclosed are methods for authenticating users and validating downstream sites that the users visit and for securely and under stored policies maintaining user credentials and attributes.
Network Proxy With Asymmetric Connection Connectivity
Atul N. Trivedi - San Jose CA, US James K. Tosh - Fremont CA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
H04L 12/26
US Classification:
370252, 709224
Abstract:
Techniques are described in which a network device waits differing amounts of time for different network sockets before beginning processes to determine whether respective network connections from the network sockets have failed. An intermediate device may create a network socket for a network connection having a keep-alive wait time option set to a keep-alive wait time associated with a class of the network connection. If an amount of time specified by the keep-alive option of the socket passes after a last successful communication on the network connection, the socket may begin a process to determine whether the network connection has failed. If the intermediate device determines that the network connection has failed, the intermediate device may terminate the connection to free resources on the intermediate device allocated to the network connection.
Secure Web Container For A Secure Online User Environment
- Redwood City CA, US Scott M. Petry - Portola Valley CA, US James K. Tosh - Fremont CA, US Peter K. Lund - San Francisco CA, US Fredric L. Cox - San Jose CA, US Adam P. Moore - San Francisco CA, US
International Classification:
H04L 29/06 G06F 21/36 G06F 21/44 G06F 21/53
Abstract:
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
Disposable Browsers And Authentication Techniques For A Secure Online User Environment
- Redwood City CA, US James K. Tosh - Fremont CA, US Fredric L. Cox - San Jose CA, US Perry F. Nguyen - Santa Clara CA, US Jason T. Champion - Mountain View CA, US
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.
Secure Web Container For A Secure Online User Environment
- Redwood City CA, US Scott M. Petry - Portola Valley CA, US James K. Tosh - Fremont CA, US Peter K. Lund - San Francisco CA, US Fredric L. Cox - San Jose CA, US Adam P. Moore - San Francisco CA, US
International Classification:
H04L 29/06 G06F 21/53 G06F 21/44 G06F 21/36
Abstract:
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
Disposable Browsers And Authentication Techniques For A Secure Online User Environment
- Redwood City CA, US James K. Tosh - Fremont CA, US Fredric L. Cox - San Jose CA, US Perry F. Nguyen - Santa Clara CA, US Jason T. Champion - Mountain View CA, US
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.
Secure Web Container For A Secure Online User Environment
- Mountain View CA, US Scott M. Petry - Portola Valley CA, US James K. Tosh - Fremont CA, US Peter K. Lund - San Francisco CA, US Fredric L. Cox - San Jose CA, US Adam P. Moore - San Francisco CA, US
International Classification:
H04L 29/06 G06F 21/36 G06F 21/53 G06F 21/44
Abstract:
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
Name / Title
Company / Classification
Phones & Addresses
James C. Tosh Sq
McGuire Memorial Home Foundation Fund Raising Service
Reed, Tosh, Wolford & Douglass, PC Attorneys at Law 999 Third Street, Beaver, PA 15009
Phone:
7249874566 (Phone)
Specialties:
Probate Estate Planning and Administration Fiduciary Law Real Estate Law Commercial Law Corporate Law
Memberships:
Beaver County, Pennsylvania and American Bar Associations.
ISLN:
903102429
Admitted:
1967, Pennsylvania
University:
Bowling Green State University, B.S., 1964
Law School:
University of Pittsburgh, J.D., Beta Gamma Sigma, 1967
Links:
Site
Biography:
<br /><br />James C. Tosh has practiced law in Beaver County for over 40 years, concentrating his practice in the areas of Probate, Estate Planning and Administration, Fiduciary Law, Real Estate Law, ...
James Tosh - Lawyer
License Records
James C Tosh
License #:
AB027024A - Expired
Category:
Real Estate Commission
Type:
Associate Broker (AB)-Standard
Googleplus
James Tosh
James Tosh
James Tosh
Relationship:
In_a_relationship
James Tosh
Youtube
How Do 90% of Americans Have Jobs? - Daniel T...
Daniel Tosh wonders why Americans still think they live in the greates...
Duration:
9m 49s
daniel tosh
Duration:
50m 51s
Daniel Tosh FULL Stand Up - Completely Seriou...
Comedy's chosen one, Daniel Tosh, has been healing the sick, stopping ...
Duration:
49m 30s
Peter Tosh - Captured Live AT THE GREEK THEAT...
Peter Tosh captured live VO emulovore com] Filmed AT THE GREEK THEATER...
Duration:
59m 36s
PETER TOSH Greatest Hits (Full Album)
PETER TOSH Greatest Hits (Full Album) PETER TOSH Greatest Hits (Full A...
Duration:
1h 13m 30s
The Dumbest World Record Attempts - Tosh.0
Daniel highlights a selection of world record hopefuls, each one stran...