“Jerome and I worked together on a major project at The TC. The details are under a strict NDA. Jerome's modest, unassuming manner did not prevent his peers from recognizing his ability to do exceptionally careful analysis of large distributed systems. In addition to his ability to spot patterns in masses of minute details that indicated major, general issues, he was also the best within a very strong group at creatively devising tools to do automated analysis and to support manual analysis of the observed behaviors of interacting network protocols.”
Jerome Freedman
Larkspur, California, United States
341 followers
342 connections
About
Expert Witness | Software Development | Web Site Design | SEO | Social Media…
Activity
-
So glad to be part of the Global Forum for Climate Justice in Vancouver where we gained the tools and knowledge to make meaningful contributions to…
So glad to be part of the Global Forum for Climate Justice in Vancouver where we gained the tools and knowledge to make meaningful contributions to…
Liked by Jerome Freedman
-
Wow! It's already the end of the week – where has it gone? Are you being hard on yourself for what you did NOT do? How can you REFRAME that belief by…
Wow! It's already the end of the week – where has it gone? Are you being hard on yourself for what you did NOT do? How can you REFRAME that belief by…
Liked by Jerome Freedman
Experience
Education
Volunteer Experience
-
Teacher
Mindfulness in Healing
-
Committee Member
Institute for Health and Healing
-
Board Member
Marin AIDS Project
Licenses & Certifications
Patents
-
Multi-Layer Protocol Reassembly That Operates Independently Of Underlying Protocols, And Resulting Vector List Corresponding Thereto
Issued United States 6968554, 7181748
A segmentation and re-assembly (SAR) decode engine receives protocol data units of data from a communication channel between two computers, sequences the protocol data units, and re-assembles the data in the protocol data units into the messages exchanged by the computers. The SAR decode engine is responsible for unpacking the payloads from the protocol data units as instructed by a protocol interpreter associated with the protocol data unit, and for creating and maintaining a flow object…
A segmentation and re-assembly (SAR) decode engine receives protocol data units of data from a communication channel between two computers, sequences the protocol data units, and re-assembles the data in the protocol data units into the messages exchanged by the computers. The SAR decode engine is responsible for unpacking the payloads from the protocol data units as instructed by a protocol interpreter associated with the protocol data unit, and for creating and maintaining a flow object database containing flow objects representing the data flows at each protocol layer. The SAR decode engine creates a protocol flow object for each protocol layer and logically links the protocol flow object to circuit flow objects that define two one-way circuits within the channel. The circuit flow objects linked to a protocol flow object are logical representations of the protocol data units for the next higher protocol layer. For protocols that fragment data, each circuit flow object is a vector list containing one or more vectors that define the length, starting location and position of the data fragments in the immediately lower layer circuit flow objects.
Other inventors -
Multiplexed Request and Replies in a Communications Channel
United States 7103675
Primary and alternate circuits on protocol flow objects representing application protocol layers in a communications channel are linked to connect multiplexed requests and replies. Various protocol flow objects are arranged in a hierarchical flow tree data structure that corresponds to multiple protocol layers in the channel. One branch of the flow tree data structure is selected to represent a reply, and source-destination address pairs for lower layer protocol flow objects for the reply are…
Primary and alternate circuits on protocol flow objects representing application protocol layers in a communications channel are linked to connect multiplexed requests and replies. Various protocol flow objects are arranged in a hierarchical flow tree data structure that corresponds to multiple protocol layers in the channel. One branch of the flow tree data structure is selected to represent a reply, and source-destination address pairs for lower layer protocol flow objects for the reply are used to identify the branch of the flow tree data structure that represents the corresponding request. In one aspect, the address pairs for network and transport layer protocol flow objects for the reply are used to identify the request branch. In a further aspect, a link layer protocol object corresponding to the link layer protocol object for the reply may be used to reduce the number of network and transport protocol flow objects examined to identify the request branch.
-
Network Intrusion Detection and Analysis System and Method
United States 7493659
An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system further includes an intrusion detection device comprising a detection engine operable to perform intrusion detection on data provided by the data monitoring device. Application program interfaces are…
An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system further includes an intrusion detection device comprising a detection engine operable to perform intrusion detection on data provided by the data monitoring device. Application program interfaces are provided and configured to allow the intrusion detection device access to applications of the data monitoring device to perform intrusion detection. The system also includes memory for storing reference network information used by the intrusion detection device to determine if an intrusion has occurred.
Other inventors
Recommendations received
1 person has recommended Jerome Join now to view
More activity by Jerome
Today is World Mental Health Day, and the month October is Depression Awareness Month. According to the World Health Organization, approximately 280…
Liked by Jerome Freedman
It's the last week of summer - can you believe it?! Transitions are big in Ayurveda, especially when it comes to seasonal changes. As fall…
Shared by Jerome Freedman
It's the last week of summer - can you believe it?! Transitions are big in Ayurveda, especially when it comes to seasonal changes. As fall…
Liked by Jerome Freedman
Mini Mindfulness Break for June 30, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 29, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 28, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 27, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 26, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 25, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 24, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 23, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 22, 2023
Shared by Jerome Freedman
Mini Mindfulness Break for June 21, 2023
Shared by Jerome Freedman
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jerome Freedman
2 others named Jerome Freedman are on LinkedIn
See others named Jerome Freedman