Michael Ray Walter

age ~56

from Denver, CO

Also known as:
  • Michael R Walter
  • Mike R Walter
  • Michale R Walter
  • Mike L Walter
  • Michael R Walker
  • Michael W Ard
  • Michael Ward
  • Walter Michale
  • Walter Micha

Michael Walter Phones & Addresses

  • Denver, CO
  • Johnson Creek, WI
  • Watertown, WI
  • Littleton, CO
  • Jefferson, CO
Name / Title
Company / Classification
Phones & Addresses
Michael Walter
Owner
Aspen Park Automotive
General Automotive Repair Shops
26131 Main St, Conifer, CO 80433
Website: apautomotive.com
Michael Walter
Owner
Aspen Park Automotive
General Auto Repair · Automobile Repairing & Service
26131 Main St, Conifer, CO 80433
3038384757

Us Patents

  • Applying Blocking Measures Progressively To Malicious Network Traffic

    view source
  • US Patent:
    7308716, Dec 11, 2007
  • Filed:
    May 20, 2003
  • Appl. No.:
    10/442008
  • Inventors:
    Robert William Danford - Ashburn VA, US
    Kenneth M. Farmer - Manitou Springs CO, US
    Clark Debs Jeffries - Chapel Hill NC, US
    Robert B. Sisk - Chapel Hill NC, US
    Michael A. Walter - Denver CO, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 15/08
    G08B 23/00
  • US Classification:
    726 23, 726 25, 709224
  • Abstract:
    A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.
  • Applying Blocking Measures Progressively To Malicious Network Traffic

    view source
  • US Patent:
    7707633, Apr 27, 2010
  • Filed:
    Oct 12, 2007
  • Appl. No.:
    11/871188
  • Inventors:
    Robert William Danford - Ashburn VA, US
    Kenneth M. Farmer - Manitou Springs CO, US
    Clark Debs Jeffries - Chapel Hill NC, US
    Robert B. Sisk - Chapel Hill NC, US
    Michael A. Walter - Denver CO, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 11/30
    G08B 23/00
    G06F 11/18
  • US Classification:
    726 23, 726 25, 709224
  • Abstract:
    A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-apply the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.
  • System, Method And Program Product For Detecting Unknown Computer Attacks

    view source
  • US Patent:
    8127356, Feb 28, 2012
  • Filed:
    Aug 27, 2003
  • Appl. No.:
    10/650440
  • Inventors:
    Frederic G. Thiele - Broomfield CO, US
    Michael A. Walter - Longmont CO, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04L 29/14
    H04L 29/02
  • US Classification:
    726 23, 726 22
  • Abstract:
    A computer system and program product for automatically determining if a packet is a new, exploit candidate. First program instructions determine if the packet is a known exploit or portion thereof. Second program instructions determine if the packet is network broadcast traffic presumed to be harmless. Third program instructions determine if the packet is network administration traffic. If the packet is a known exploit or portion thereof, network broadcast traffic, or network administration traffic, the packet is not considered a new, exploit candidate. If the packet is not a known exploit or portion thereof, network broadcast traffic, or network administration traffic, the packet is an exploit candidate. Alternately, the first program instructions determine if the packet is a known exploit or portion thereof. The second program instructions determine if the packet is network broadcast traffic presumed to be harmless.
  • System, Method And Program For Identifying And Preventing Malicious Intrusions

    view source
  • US Patent:
    20060294588, Dec 28, 2006
  • Filed:
    Jun 24, 2005
  • Appl. No.:
    11/166550
  • Inventors:
    Jeffrey Lahann - Erie CO, US
    Frederic Thiele - Broomfield CO, US
    Michael Walter - Longmont CO, US
  • Assignee:
    INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
  • International Classification:
    G06F 12/14
    G06F 11/00
    G06F 12/16
    G06F 15/18
    G08B 23/00
    G06F 15/16
    G06F 17/00
    G06F 9/00
  • US Classification:
    726023000, 726011000
  • Abstract:
    Computer system, method and program product for identifying a malicious intrusion. A first number of different destination IP addresses, a second number of different destination ports and a third number of different signatures of messages, are identified from a source IP address during a predetermined period. A determination is made that in one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures. Based on the determination that in the one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures, a determination is made that the messages are characteristic of a malicious intrusion.
  • System, Method And Program For Identifying And Preventing Malicious Intrusions

    view source
  • US Patent:
    20130333036, Dec 12, 2013
  • Filed:
    Aug 13, 2013
  • Appl. No.:
    13/965303
  • Inventors:
    FREDERIC G. THIELE - NIWOT CO, US
    MICHAEL A. WALTER - ATLANTA GA, US
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    G06F 21/56
  • US Classification:
    726 23
  • Abstract:
    Computer system, method and program product for identifying a malicious intrusion. A first number of different destination IP addresses, a second number of different destination ports and a third number of different signatures of messages, are identified from a source IP address during a predetermined period. A determination is made that in one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures. Based on the determination that in the one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures, a determination is made that the messages are characteristic of a malicious intrusion.

Youtube

Teaching English : Write College Research Pap...

There are three main types of college-level research papers that are w...

  • Category:
    Howto & Style
  • Uploaded:
    16 Nov, 2008
  • Duration:
    2m 6s

Teaching English : Creating Survey Questions

Create a survey by including a variety of questions with yes and no an...

  • Category:
    Howto & Style
  • Uploaded:
    16 Nov, 2008
  • Duration:
    2m 45s

Teaching English : How to Set the Style for a...

When setting the style for a speech, determine who your audience is, d...

  • Category:
    Howto & Style
  • Uploaded:
    16 Nov, 2008
  • Duration:
    2m 4s

Teaching English : How to Prepare a Speech

When preparing a speech, research important facts or statistics to cap...

  • Category:
    Howto & Style
  • Uploaded:
    16 Nov, 2008
  • Duration:
    2m 46s

Teaching English : How to Write a College Paper

When writing a college paper, start with an introduction that includes...

  • Category:
    Howto & Style
  • Uploaded:
    16 Nov, 2008
  • Duration:
    2m 42s

Take Five + Solo - Michael Walter

Take Five von Paul Desmond...

  • Category:
    Music
  • Uploaded:
    12 Oct, 2008
  • Duration:
    2m 8s

News

The Sun Shines Brightly On A 'Full' Jupiter In May

The sun shines brightly on a 'full' Jupiter in May

view source
  • May 9 Deep Earth Through a Diamond Looking Glass, a lecture by Michael Walter, director of Carnegie Sciences Geophysical Laboratory, who uncovers Earths secrets from below. At the Carnegie Institution for Science, 1530 P St. NW, 6:30 p.m. Free, registration required. carnegiescience.edu/even
  • Date: Apr 29, 2018
  • Category: Sci/Tech
  • Source: Google
At Least One Person Killed As 'Catastrophic' Floods Inundate Houston

At Least One Person Killed As 'Catastrophic' Floods Inundate Houston

view source
  • "We have, I would venture to say, thousands of people now who are in a situation where they have taken on water in their homes," Michael Walter, Public Information Officer for Houston's Office of Emergency Management told NPR's Weekend Edition early Sunday afternoon. "We still have reports of indivi
  • Date: Aug 27, 2017
  • Category: Top Stories
  • Source: Google
Still Recovering From May Flooding, Houston Braces For More

Still recovering from May flooding, Houston braces for more

view source
  • The city of Houston, for example, began to pre-stage high-water rescue teams across town in areas prone to flooding, said Michael Walter, spokesman for the city's Office of Emergency Management. City officials did not close any roads in advance of the storm, deciding to wait for overnight developmen
  • Date: Jun 15, 2015
  • Category: U.S.
  • Source: Google
Punishing Storms In Texas Test Government Emergency Response

Punishing storms in Texas test government emergency response

view source
  • officials say they havent yet installed a system that would allow them to alert residents with more targeted warnings. The city was still working with the Federal Emergency Management Agency to get that framework running, said Michael Walter, spokesman for Houstons Office of Emergency Management.
  • Date: May 27, 2015
  • Source: Google
Latest On Flooding: 840 To 1400 Houston Homes Damaged

Latest on flooding: 840 to 1400 Houston homes damaged

view source
  • Harris County Emergency Management spokesman Francisco Sanchez said Wednesday that there are about 1,400 homes in Houston with some degree of damage. Michael Walter, a spokesman for the city's Office of Emergency Management, put that figure at about 840 homes.
  • Date: May 27, 2015
  • Category: U.S.
  • Source: Google
Deluge, Suspected Twisters Hit Houston Area

Deluge, suspected twisters hit Houston area

view source
  • "Between 9 a.m. and about noon today the Houston police department had 51 active flood locations with flooding reports and thats all over the city in city streets, the Chronicle quoted city spokesman Michael Walter as saying.
  • Date: Jan 09, 2012
  • Source: Google

Get Report for Michael Ray Walter from Denver, CO, age ~56
Control profile