Geoff Mulligan

Geoff Mulligan

Colorado Springs, Colorado, United States
2K followers 500 connections

Articles by Geoff

Activity

Join now to see all activity

Experience

  • GCM Labs

    United States

  • -

    Colorado Springs, Colorado Area

  • -

Publications

  • Removing the Spam: E-mail Processing and Filtering

    Addison-Wesley Networking Basics Series

    Written for network and system administrators, this concise, practical guide offers step-by-step instructions for installing and configuring an effective email system for your organization. The specific book focus is on the growing problem of spam--unwanted electronic junk mail. This book shows how to utilize mail-filtering tools and techniques to keep your system and users as spam-free as possible. Centered around real-world problems and issues, Removing the Spam will save you hours of…

    Written for network and system administrators, this concise, practical guide offers step-by-step instructions for installing and configuring an effective email system for your organization. The specific book focus is on the growing problem of spam--unwanted electronic junk mail. This book shows how to utilize mail-filtering tools and techniques to keep your system and users as spam-free as possible. Centered around real-world problems and issues, Removing the Spam will save you hours of frustration as you get your email system up and running. You will find in-depth coverage of major email systems and subsystems--sendmail, Procmail, Majordomo, and SmartList--and essential information about the following: *How to stop spam at the mail server and user levels *The most simple and effective way of generating the sendmail configuration file *Maintaining your sendmail configuration *Building and managing simple sendmail aliases and filters *Virtual domains *Filtering and sorting mail with Procmail *Procmail recipe files *Creating and administrating automated and manual mailing lists with Majordomo and SmartList *How to spot and combat mailing list abuse by spammers and list terrorists The book's numerous practical examples (compatible with Solaris and FreeBSD) include controlling the procmailrc file, sorting mail, working with auto-responders, and many others. With this book you will be well equipped to install and run an efficient email system that won't be overrun by spam.

Patents

  • Method and Apparatus for Broadcasting Data

    Issued US 8,701,140

    A broadband data broadcast system that allows rich multimedia content to be delivered to a plurality of subscribers is disclosed. The broadband data broadcast system operates by multiplexing a plurality of rich multimedia digital information streams together at a centralized data broadcast center. The data broadcast center then broadcasts the multiplexed digital information stream on a broadcast medium such as satellite broadcasts, radio frequency broadcasts, or digital television broadcasts.…

    A broadband data broadcast system that allows rich multimedia content to be delivered to a plurality of subscribers is disclosed. The broadband data broadcast system operates by multiplexing a plurality of rich multimedia digital information streams together at a centralized data broadcast center. The data broadcast center then broadcasts the multiplexed digital information stream on a broadcast medium such as satellite broadcasts, radio frequency broadcasts, or digital television broadcasts. A large number of receiver systems receive the broadcast signal and demodulate the broadcast signal to retrieve the multiplexed digital stream. The receiver system extracts a subset of digital information streams that the particular receiver system's owner has designated are of interest. The receiver system caches the interesting digital information stream for later access. The receiver system out puts the interesting digital information streams to a client system upon demand. The receiver system may also stream an incoming digital information stream to a client as the stream is received.

  • Configurable architecture for controlling delivery and/or usage of a commodity

    Issued US 7,949,615 B2

    A system and method manage delivery of energy from a distribution network to one or more sites. Each site has at least one device coupled to the distribution network. The at least one device
    controllably consumes energy. The system includes a node and a control system. The node is coupled to the at least one device for sensing and controlling energy delivered to the device. A control system is coupled to the node and distribution network for delivering to the node at least one…

    A system and method manage delivery of energy from a distribution network to one or more sites. Each site has at least one device coupled to the distribution network. The at least one device
    controllably consumes energy. The system includes a node and a control system. The node is coupled to the at least one device for sensing and controlling energy delivered to the device. A control system is coupled to the node and distribution network for delivering to the node at least one characteristic of the distribution network. The node for controls the Supply of energy to the device as a function of the at least one characteristic.

  • Method of communication between reduced functionality devices in an IEEE 802.15.4 network

    Issued US 7,940,675

    In a 802.15.4 network, each reduced functionality device (RFD) is permitted to communicate with only an assigned full function device (FFD). The present invention allows each of the RFDs to communicate with another RFD upon the RFD determining that the local FFD assigned to the RFD is inoperable or unable to communicate. Under emergency conditions, the RFD is able to communicate with a closely located RFDs such that the closely located RFDs can receive and respond to an emergency situation…

    In a 802.15.4 network, each reduced functionality device (RFD) is permitted to communicate with only an assigned full function device (FFD). The present invention allows each of the RFDs to communicate with another RFD upon the RFD determining that the local FFD assigned to the RFD is inoperable or unable to communicate. Under emergency conditions, the RFD is able to communicate with a closely located RFDs such that the closely located RFDs can receive and respond to an emergency situation and/or repeat the message. To satisfy the 802.15.4 standards, communication between the RFDs is allowed only during emergency conditions and when the FFD is inoperative. A comprehensive test procedure is included to insure the integrity of the system is preserved at all times.

    Other inventors
  • Method of communication between reduced functionality devices in an IEEE 802.15.4 network

    Issued US 7,940,674

    In a 802.15.4 network, each reduced functionality device (RFD) is permitted to communicate with only an assigned full function device (FFD). The present invention allows each of the RFDs to communicate with another RFD upon the RFD determining that the local FFD assigned to the RFD is inoperable or unable to communicate. Under emergency conditions, the RFD is able to communicate with a closely located RFDs such that the closely located RFDs can receive and respond to an emergency situation…

    In a 802.15.4 network, each reduced functionality device (RFD) is permitted to communicate with only an assigned full function device (FFD). The present invention allows each of the RFDs to communicate with another RFD upon the RFD determining that the local FFD assigned to the RFD is inoperable or unable to communicate. Under emergency conditions, the RFD is able to communicate with a closely located RFDs such that the closely located RFDs can receive and respond to an emergency situation and/or repeat the message. To satisfy the 802.15.4 standards, communication between the RFDs is allowed only during emergency conditions and when the FFD is inoperative. A comprehensive test procedure is included to insure the integrity of the system is preserved at all times.

  • Method of communication between reduced functionality devices in an IEEE 802.15.4 network

    Issued US 7,486,631

    In a 802.15.4 network, each reduced functionality device (RFD) is permitted to communicate with only an assigned full function device (FFD). The present invention allows each of the RFDs to communicate with another RFD upon the RFD determining that the local FFD assigned to the RFD is inoperable or unable to communicate. Under emergency conditions, the RFD is able to communicate with a closely located RFDs such that the closely located RFDs can receive and respond to an emergency situation…

    In a 802.15.4 network, each reduced functionality device (RFD) is permitted to communicate with only an assigned full function device (FFD). The present invention allows each of the RFDs to communicate with another RFD upon the RFD determining that the local FFD assigned to the RFD is inoperable or unable to communicate. Under emergency conditions, the RFD is able to communicate with a closely located RFDs such that the closely located RFDs can receive and respond to an emergency situation and/or repeat the message. To satisfy the 802.15.4 standards, communication between the RFDs is allowed only during emergency conditions and when the FFD is inoperative. A comprehensive test procedure is included to insure the integrity of the system is preserved at all times.

  • Methods of operating a data broadcast service

    Issued US 7,155,734

    A broadband data broadcast system that allows rich multimedia content to be delivered to a plurality of subscribers is disclosed. The broadband data broadcast system operates by multiplexing a plurality of rich multimedia digital information streams together at a centralized data broadcast center. The data broadcast center then broadcasts the multiplexed digital information stream on a broadcast medium such as satellite broadcasts, radio frequency broadcasts, or digital television broadcasts. A…

    A broadband data broadcast system that allows rich multimedia content to be delivered to a plurality of subscribers is disclosed. The broadband data broadcast system operates by multiplexing a plurality of rich multimedia digital information streams together at a centralized data broadcast center. The data broadcast center then broadcasts the multiplexed digital information stream on a broadcast medium such as satellite broadcasts, radio frequency broadcasts, or digital television broadcasts. A large number of receiver systems receive the broadcast signal and demodulate the broadcast signal to retrieve the multiplexed digital stream. The receiver system extracts a subset of digital information streams that the particular receiver system's owner has designated are of interest. The receiver system caches the interesting digital information stream for later access. The receiver system outputs the interesting digital information streams to a client system upon demand. The receiver system may also stream an incoming digital information stream to a client as the stream is received.

  • Method for lossless IPv6 Header Compression

    Filed US 20060O88051A

    The present invention provides a method to statelessly compress an IPv6 header from forty octets to as small as or at a minimum of four octets by utilizing information contained in the lower network layers so that the original IPv6 header can be reconstituted as needed without state information maintained from and/or intermediate nodes. By compressing a typical forty octet IPv6 header into at a minimum four octets for transmission across a local area network, battery life for non-line powered…

    The present invention provides a method to statelessly compress an IPv6 header from forty octets to as small as or at a minimum of four octets by utilizing information contained in the lower network layers so that the original IPv6 header can be reconstituted as needed without state information maintained from and/or intermediate nodes. By compressing a typical forty octet IPv6 header into at a minimum four octets for transmission across a local area network, battery life for non-line powered local devices can be increased. When the package is to be sent outside of the local area network, the complete IPv6 header packet can be rebuilt prior to transmission.

  • Broadband data broadcasting service

    Issued US 6,526,580

    A broadband data broadcast system that allows rich multimedia content to be delivered to a plurality of subscribers is disclosed. The broadband data broadcast system operates by multiplexing a plurality of rich multimedia digital information streams together at a centralized data broadcast center. The data broadcast center then broadcasts the multiplexed digital information stream on a broadcast medium such as satellite broadcasts, radio frequency broadcasts, or digital television broadcasts. A…

    A broadband data broadcast system that allows rich multimedia content to be delivered to a plurality of subscribers is disclosed. The broadband data broadcast system operates by multiplexing a plurality of rich multimedia digital information streams together at a centralized data broadcast center. The data broadcast center then broadcasts the multiplexed digital information stream on a broadcast medium such as satellite broadcasts, radio frequency broadcasts, or digital television broadcasts. A large number of receiver systems receive the broadcast signal and demodulate the broadcast signal to retrieve the multiplexed digital stream. The receiver system extracts a subset of digital information streams that the particular receiver system's owner has designated are of interest. The receiver system caches the interesting digital information stream for later access. The receiver system outputs the interesting digital information streams to a client system upon demand. The receiver system may also stream an incoming digital information stream to a client as the stream is received.

  • Method and apparatus for broadcasting data with access control

    Issued US 6,473,858

    A data broadcasting system is disclosed. The data broadcasting system operates by receiving source material from a number of different sources. The source material is processed by performing adding error correction encoding and in some cases, encryption. The source material from the different sources is then multiplexed together and broadcast on a broadcast medium. The multiplexed digital broadcast is received by a plurality of receiver systems. The receiver systems demultiplex the multiplexed…

    A data broadcasting system is disclosed. The data broadcasting system operates by receiving source material from a number of different sources. The source material is processed by performing adding error correction encoding and in some cases, encryption. The source material from the different sources is then multiplexed together and broadcast on a broadcast medium. The multiplexed digital broadcast is received by a plurality of receiver systems. The receiver systems demultiplex the multiplexed digital stream to obtain desired digital streams. The desired streams are then decrypted if necessary.

  • Method and system for generating data packets on a heterogeneous network

    Issued US 6,212,190

    An improved method and system for generating packets for transmission over different routes on a network is presented. In a large network such as the Internet, each route over the network carries different size packets which are not compatible unless they are fragmented into smaller segments. Initially, the technique determines a maximum transmission unit (MTU) capable of being transmitted over a predetermined route. Next, the size of each packet to be transmitted over the network is compared…

    An improved method and system for generating packets for transmission over different routes on a network is presented. In a large network such as the Internet, each route over the network carries different size packets which are not compatible unless they are fragmented into smaller segments. Initially, the technique determines a maximum transmission unit (MTU) capable of being transmitted over a predetermined route. Next, the size of each packet to be transmitted over the network is compared with the MTU size. If the comparison indicates the packet is larger than the MTU, the packet must be processed further before it can be transmitted over the route. The additional processing initially divides the total number of transmission units contained within the packet by the MTU value. The integer result of this division is temporarily stored in a DCOUNT variable and the remainder of the division in a RCOUNT variable. If the remainder in RCOUNT is non-zero, the value in DCOUNT is incremented by one. The DCOUNT value indicates the minimum number of datagrams for sending a packet using the present technique. Next, the transmission units contained in the original packet are redistributed equally into DCOUNT packets and then sent over the network route.

  • Electronic message forwarding system

    Issued US 5,937,161

    A telecommunications system (100) includes a service provider node (116) that is capable of forwarding electronic mail messages addressed to a user of the service provider node. The forwarding process is controlled by a message transfer agent (202), a subscriber database analyzer (204), a queue directory (206), and a message queue agent (208). The subscriber database analyzer performs a comparison between data that the user has provided and the message content. The subscriber database causes…

    A telecommunications system (100) includes a service provider node (116) that is capable of forwarding electronic mail messages addressed to a user of the service provider node. The forwarding process is controlled by a message transfer agent (202), a subscriber database analyzer (204), a queue directory (206), and a message queue agent (208). The subscriber database analyzer performs a comparison between data that the user has provided and the message content. The subscriber database causes the message queue agent to forward the message to a user-defined telecommunications address based upon the message content and the results of the comparison.

  • System for packet filtering of data packet at a computer network interface

    Issued US 5,884,025

    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy…

    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy network is isolated from the private network, so it cannot be used as a jumping off point for intruders. Packets received at the screen (either into or out of a host in the private network) are filtered based upon their contents, state information and other criteria, including their source and destination, and actions are taken by the screen depending upon the determination of the filtering phase. The packets may be allowed through, with or without alteration of their data, IP (internet protocol) address, etc., or they may be dropped, with or without an error message generated to the sender of the packet. Packets may be sent with or without alteration to a host on the proxy network that performs some or all of the functions of the intended destination host as specified by a given packet. The passing through of packets without the addition of any network address pertaining to the screening system allows the screening system to function without being identifiable by such an address, and therefore it is more difficult to target as an IP entity, e.g. by intruders.

    Other inventors
  • System for packet filtering of data packets at a computer network interface

    Issued US 5,878,231

    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy…

    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy network is isolated from the private network, so it cannot be used as a jumping off point for intruders. Packets received at the screen (either into or out of a host in the private network) are filtered based upon their contents, state information and other criteria, including their source and destination, and actions are taken by the screen depending upon the determination of the filtering phase. The packets may be allowed through, with or without alteration of their data, IP (internet protocol) address, etc., or they may be dropped, with or without an error message generated to the sender of the packet. Packets may be sent with or without alteration to a host on the proxy network that performs some or all of the functions of the intended destination host as specified by a given packet. The passing through of packets without the addition of any network address pertaining to the screening system allows the screening system to function without being identifiable by such an address, and therefore it is more difficult to target as an IP entity, e.g. by intruders.

    Other inventors
  • System for packet filtering of data packets at a computer network interface

    Issued US US5802320A

    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy…

    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy network is isolated from the private network, so it cannot be used as a jumping off point for intruders. Packets received at the screen (either into or out of a host in the private network) are filtered based upon their contents, state information and other criteria, including their source and destination, and actions are taken by the screen depending upon the determination of the filtering phase. The packets may be allowed through, with or without alteration of their data, IP (internet protocol) address, etc., or they may be dropped, with or without an error message generated to the sender of the packet. Packets may be sent with or without alteration to a host on the proxy network that performs some or all of the functions of the intended destination host as specified by a given packet. The passing through of packets without the addition of any network address pertaining to the screening system allows the screening system to function without being identifiable by such an address, and therefore it is more difficult to target as an IP entity, e.g. by intruders.

    Other inventors
  • Systems and methods for securing electronic message

    Filed US WO2000008794A2

    System and methods are provided for permitting a sender to control access to an electronic message. The sender selects one or more policies (202) which are packaged (220) with the electronic message (204) to form an object (222). The policies are implemented as computer-executable instructions capable of execution on a remote computer. The recipient can only access the electronic message as dictated by the policies which are in the object. Unauthorized use of the electronic message is…

    System and methods are provided for permitting a sender to control access to an electronic message. The sender selects one or more policies (202) which are packaged (220) with the electronic message (204) to form an object (222). The policies are implemented as computer-executable instructions capable of execution on a remote computer. The recipient can only access the electronic message as dictated by the policies which are in the object. Unauthorized use of the electronic message is substantially prevented and the electronic message remains in the control of the sender.

  • System for signatureless transmission and reception of data packets between computer networks

    Issued US US5548646A

    A system for automatically encrypting and decrypting data packet sent from a source host to a destination host across a public internetwork. A tunnelling bridge is positioned at each network, and intercepts all packets transmitted to or from its associated network. The tunnelling bridge includes tables indicated pairs of hosts or pairs of networks between which packets should be encrypted. When a packet is transmitted from a first host, the tunnelling bridge of that host's network intercepts…

    A system for automatically encrypting and decrypting data packet sent from a source host to a destination host across a public internetwork. A tunnelling bridge is positioned at each network, and intercepts all packets transmitted to or from its associated network. The tunnelling bridge includes tables indicated pairs of hosts or pairs of networks between which packets should be encrypted. When a packet is transmitted from a first host, the tunnelling bridge of that host's network intercepts the packet, and determines from its header information whether packets from that host that are directed to the specified destination host should be encrypted; or, alternatively, whether packets from the source host's network that are directed to the destination host's network should be encrypted. If so, the packet is encrypted, and transmitted to the destination network along with an encapsulation header indicating source and destination information: either source and destination host addresses, or the broadcast addresses of the source and destination networks (in the latter case, concealing by encryption the hosts' respective addresses).

    Other inventors
  • Systems and Methods for Securing Electronic Messages

    US EP1101190A2

    System and methods are provided for permitting a sender to control access to an electronic message. The sender selects one or more policies (202) which are packaged (220) with the electronic message (204) to form an object (222). The policies are implemented as computer-executable instructions capable of execution on a remote computer. The recipient can only access the electronic message as dictated by the policies which are in the object. Unauthorized use of the electronic message is…

    System and methods are provided for permitting a sender to control access to an electronic message. The sender selects one or more policies (202) which are packaged (220) with the electronic message (204) to form an object (222). The policies are implemented as computer-executable instructions capable of execution on a remote computer. The recipient can only access the electronic message as dictated by the policies which are in the object. Unauthorized use of the electronic message is substantially prevented and the electronic message remains in the control of the sender.

    Other inventors
    See patent

Honors & Awards

  • Jim Bound IPv6 Award

    IPv6 Forum

  • Presidential Innovation Fellow

    The White House

Organizations

  • IPSO Alliance

    Chairman

    - Present

More activity by Geoff

View Geoff’s full profile

  • See who you know in common
  • Get introduced
  • Contact Geoff directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Geoff Mulligan