BackgroundCheck.run
Search For

John M Brawn, 932928 Varden Ave, San Jose, CA 95124

John Brawn Phones & Addresses

2928 Varden Ave, San Jose, CA 95124    408-3772603   

1747 Dolores Dr, San Jose, CA 95125    408-2652333   

Cupertino, CA   

Incline Village, NV   

Sunnyvale, CA   

Palo Alto, CA   

Livingston, TN   

Mentions for John M Brawn

John Brawn resumes & CV records

Resumes

John Brawn Photo 21

Principle Network Design Engineer

Location:
2928 Varden Ave, San Jose, CA 95124
Industry:
Telecommunications
Work:
At&T
Principle Network Design Engineer
Hewlett-Packard Mar 31, 1984 - Oct 31, 2015
Network Architect
Hp Apr 1999 - Oct 2015
Network Architect
Cub Scout Pack 318 2004 - 2007
Cubmaster
Hp Mar 1984 - Apr 1999
Various Other Positions
Good Samaritan United Methodist Church Aug 1982 - Nov 1986
Youth Director
S Levi Nuclear Consultants Apr 1983 - Jan 1984
Legal Researcher
Microcomputer Systems Corp Nov 1981 - Mar 1983
Programmer and Data Center Manager
Security General Corporation Jun 1979 - Aug 1981
Alarm Installer
J C Pennys Sep 1980 - Jun 1981
Sales and Warehouse Floater
Alaska Methodist University Sep 1980 - May 1981
Locksmith
Associated Student Body of Amu Nov 1979 - May 1980
Secretary
Alaska General Alarm Jun 1979 - Dec 1979
Alarm Installer
St John United Methodist Church Anchorage Jun 1979 - Nov 1979
Youth Director
Radio Shack Mountain View Jul 1976 - Aug 1977
Salesman
Education:
Alaska Pacific University Sep 1978 - Jun 1981
Deanza Jr. College Sep 1977 - May 1978
Fremont High School (Sunnyvale California)
Skills:
Data Center, Wan, Network Security, It Operations, Troubleshooting, Cloud Computing, Network Architecture, Itil, Firewalls, Network Administration, Disaster Recovery, Vpn, Leadership, Network Engineering
John Brawn Photo 22

John Brawn

John Brawn Photo 23

Member En Us Army

Position:
member at US Army
Location:
Redding, California, Estados Unidos
Industry:
Government Administration
Work:
US Army Actualmente tiene este puesto de trabajo
member
Education:
Shasta College 1994 - 1997

Publications & IP owners

Us Patents

Secure Network And Method Of Establishing Communication Amongst Network Devices That Have Restricted Network Connectivity

US Patent:
7024686, Apr 4, 2006
Filed:
May 11, 2001
Appl. No.:
09/854359
Inventors:
John Melvin Brawn - San Jose CA, US
Christian Klein - Herrenberg, DE
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04K 1/00
H04L 9/32
US Classification:
726 1, 726 2, 726 3
Abstract:
A secure network is provided which includes a plurality of anti-bubbles having a plurality of anti-bubble partitions. Each anti-bubble partition has at least one network device configured to transmit and receive data. All the network devices that belong to or correspond to a particular anti-bubble have the same network security policy. Data may not be transmitted between two network devices in the same anti-bubble or two network devices in different anti-bubble partitions of the same anti-bubble. The secure network also includes a plurality of network control points, which has one or more network control point devices having at least one interface. Each anti-bubble partition is connected to at least one network control point. The network control point is used to provide a connection between at least two network devices. Each network control point device is configured to enforce the network security policy of all the anti-bubbles that are connected to it.

Signal Level Propagation Mechanism For Distribution Of A Payload To Vulnerable Systems

US Patent:
7353539, Apr 1, 2008
Filed:
Jan 16, 2003
Appl. No.:
10/345701
Inventors:
John Melvin Brawn - San Jose CA, US
Andrew Patrick Norman - Bristol, GB
Chris Ralph Dalton - Bristol, GB
Jonathan Griffin - Bristol, GB
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 12/14
G06F 11/30
H04L 9/32
G06F 15/173
US Classification:
726 25, 726 22, 709224, 713187, 713188
Abstract:
A method of identifying a software vulnerability in computer systems in a computer network includes a multiple level scanning process controlled from a management system connected to the network. The management system runs a root scanner which applies an interrogation program to remote systems having network addresses in a predefined address range. When a software vulnerability is detected, the interrogation program causes the respective remote system to scan topologically local systems, the remote system itself applying a second interrogation program to the local systems to detect and mitigate the vulnerability using an associated mitigation payload. Whilst that local scanning process is in progress, the root scanner can be applied to remote systems in other predefined address ranges.

System And Method For Implementing A Bubble Policy To Achieve Host And Network Security

US Patent:
7376965, May 20, 2008
Filed:
May 14, 2001
Appl. No.:
09/861986
Inventors:
Brian Jemes - Moscow ID, US
John Melvin Brawn - San Jose CA, US
Leif Buch-Pedersen - St. Martin d'Uriage, FR
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/177
G06F 15/173
US Classification:
726 3, 709220, 709221, 709222, 709223, 709224, 709225
Abstract:
A method of creating a structured access list template, which includes dividing an access list template into a plurality of sections, creating an inbound local rule group for the bubble, creating an outbound local rule group for the bubble, creating an inbound remote rule group for the bubble, and creating an outbound remote rule group for the bubble. A method of creating an access list for each of the plurality of bubble boundary devices, which includes creating an address table that includes a plurality of addresses corresponding to devices in a bubble partition, creating a protocol table that includes a list of network services and whether each of the network services are granted or denied access to the bubble partition, creating an access list template using the address table and the protocol table, generating an access list from the access list template, and providing the access list to one of the plurality of bubble boundary devices.

Method Of Creating An Address And A Discontiguous Mask For A Network Security Policy Area

US Patent:
7400591, Jul 15, 2008
Filed:
Jun 1, 2005
Appl. No.:
11/142643
Inventors:
John Melvin Brawn - San Jose CA, US
Brian Jemes - Palo Alto CA, US
Stephen F. Froelich - Corvallis OR, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/177
US Classification:
370254, 370392, 370400, 370476, 709222, 709226, 709245, 711217
Abstract:
A method of creating a discontiguous address plan for an enterprise is provided which includes determining a hierarchy of routing optimization for an enterprise, determining a number of route advertisement aggregation points at each level of the hierarchy, determining a number of network security policy areas for the enterprise, and determining a number of addresses for each of the network security policy areas. The number of addresses is rounded up to a power of the address scheme base number to produce a plurality of rounded addresses. The method further includes allocating an address range for each of the plurality of rounded addresses so that a starting address of the address range begins on a power of the base number and determining a size of the plurality of address ranges. The size of the plurality of address ranges is rounded up to a power of the base number to produce the size of a repeating policy pattern. The method further includes assigning an instance of the repeating policy pattern to each of the route advertisement aggregation points at each hierarchy, and determining an address and a mask for each of the network security policy areas in the repeating policy pattern.

System And Method For Implementing A Private Virtual Backbone On A Common Network Infrastructure

US Patent:
7703124, Apr 20, 2010
Filed:
Mar 31, 2005
Appl. No.:
11/094989
Inventors:
Brian L. Jemes - Moscow ID, US
John M. Brawn - San Jose CA, US
Farid Filsoof - Bournemouth, GB
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/00
US Classification:
726 1, 726 2, 726 3, 709225
Abstract:
A network security system is provided comprising a plurality of network bubbles wherein each bubble includes bubble members configured to transmit and receive data. Bubbles have network security policies that may be enforced by a plurality of network control point devices. The system further includes a private virtual backbone configured to interconnect the plurality of network control points connected to known bubbles. The privacy of the private virtual backbone is maintained by an inter-bubble device and/or set of two network control points. The inter-bubble device and set of control points enforce the network security policies of any connected bubble and relay data packets between address spaces. The private virtual backbone may operate in private address space. The system also includes an instance-specific virtual backbone that interconnects only bubble partitions from the same network bubble, thus simplifying the enforcement of a network security policy.

Method Of Identifying Software Vulnerabilities On A Computer System

US Patent:
8230497, Jul 24, 2012
Filed:
Nov 4, 2002
Appl. No.:
10/287125
Inventors:
Andrew Patrick Norman - Bristol, GB
John Melvin Brawn - San Jose CA, US
John P Scrimsher - Albany OR, US
Jonathan Griffin - Bristol, GB
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 12/14
G06F 21/00
US Classification:
726 22, 726 23, 726 25, 726 26, 709229
Abstract:
A method of identifying a software vulnerability on a computer system is disclosed in which the computer system has software stored thereon and is connected to a management system over a computer network. The method comprises the steps of: applying an interrogation program to the software, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied; in the event that the software vulnerability is exploited by the interrogation program, operating the interrogation program to generate a set of management information from which can be derived the identification of the computer system; and sending the management information to the management system.

System And Method For Implementing Network Security Policies On A Common Network Infrastructure

US Patent:
7263719, Aug 28, 2007
Filed:
Nov 29, 2000
Appl. No.:
09/726072
Inventors:
Brian Jemes - Palo Alto CA, US
John Melvin Brawn - San Jose CA, US
Joseph Garcia - Mountain View CA, US
Michael Milligan - Palo Alto CA, US
John M. Pape - Fort Collins CO, US
Jeff Hansell - Fremont CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/16
US Classification:
726 12, 726 3, 726 11, 726 14, 726 15, 709220
Abstract:
A secure network is provided which includes a plurality of network bubbles having a plurality of bubble partitions. Each bubble partition has at least one network device configured to transmit and receive data. All the network devices that belong to or correspond to a particular network bubble have the same network security policy. The secure network also includes a plurality of network control points, which has one or more network control point devices having at least one interface. Each bubble partition is connected to at least one network control point. The network control point is used to provide a connection between at least two network devices. Each network control point device is configured to enforce the network security policy of all the network bubbles that are connected to it. During the transmission of data from one network device to another network device, one or more network control points are traversed.

System And Method Of Aggregating Discontiguous Address Ranges Into Addresses And Masks Using A Plurality Of Repeating Address Blocks

US Patent:
2002003, Mar 28, 2002
Filed:
May 14, 2001
Appl. No.:
09/855862
Inventors:
John Brawn - San Jose CA, US
Brian Jemes - Palo Alto CA, US
Stephen Froelich - Corvallis OR, US
International Classification:
G06F015/16
G06F015/173
US Classification:
709/238000, 713/201000, 709/245000
Abstract:
A method of creating a discontiguous address plan for an enterprise is provided which includes determining a hierarchy of routing optimization for an enterprise, determining a number of route advertisement aggregation points at each level of the hierarchy, determining a number of network security policy areas for the enterprise, and determining a number of addresses for each of the network security policy areas. The number of addresses is rounded up to a power of the address scheme base number to produce a plurality of rounded addresses. The method further includes allocating an address range for each of the plurality of rounded addresses so that a starting address of the address range begins on a power of the base number and determining a size of the plurality of address ranges. The size of the plurality of address ranges is rounded up to a power of the base number to produce the size of a repeating policy pattern. The method further includes assigning an instance of the repeating policy pattern to each of the route advertisement aggregation points at each hierarchy, and determining an address and a mask for each of the network security policy areas in the repeating policy pattern.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.