J
John Keane
Publications - 13
Citations - 1465
John Keane is an academic researcher. The author has contributed to research in topics: Virtual address space & Information processor. The author has an hindex of 10, co-authored 13 publications receiving 1465 citations.
Papers
More filters
Patent
Methods and systems for enabling a tunnel between two computers on a network
TL;DR: In this article, the authors present a protocol for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. But the protocol requires the first processor and the second processor to be independently administered through the additional processor.
Patent
Methods and system for providing network services using at least one processor interfacing a base network
Samuel Bendinelli,Michael Herrick,John Keane,Christopher Macey,Mark Logan Tuomenoksa,Jerold Francus,Jonathan Harwood,Brion Shimamoto,Joseph Ferraro +8 more
TL;DR: In this article, the authors present a method for providing network services using at least one processor, such as a network operations center that interfaces a base network, to self-configure itself as a gateway.
Patent
Methods and systems for enabling communication between a processor and a network operations center
TL;DR: In this paper, the authors describe a protocol for enabling a virtual network between a first processor and a second processor using at least one additional processor separate from the first and second processors.
Patent
Method and system for managing and configuring virtual private networks
Mark Logan Tuomenoksa,Samuel Bendinelli,Jerold Francus,Jonathan Harwood,Michael Herrick,John Keane,Christopher Macey,Brion Shimamoto +7 more
TL;DR: In this article, the authors present a protocol for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. But they do not specify how to enable a tunnel between the first processor and the second processor.
Patent
Methods and systems for firewalling virtual private networks
TL;DR: In this article, the authors present a method for processing packets between a first and a second network by using a set of rules for processing the first packet and the information for routing the second packet.