Search

Brant Thomsen Phones & Addresses

  • 7990 S Twelve Pines Dr, Sandy, UT 84094 (801) 652-8580 (801) 563-1322
  • West Valley City, UT
  • South Jordan, UT

Work

Company: Broadcom Nov 2019 Position: Principal software engineer

Education

Degree: Bachelors, Bachelor of Science School / High School: University of Utah 1988 to 1994 Specialities: Computer Science

Skills

Tcp/Ip • Agile Methodologies • Software Engineering • Software Development • Linux • Windows Software Development • Windows • Windows Mobile • Windows Ce • Android Development • C++ • Visual C++ • Microsoft Visual Studio C++ • Embedded C++ • Javascript • Certified Scrum Master Csm • Software Architectural Design • Team Leadership • Java • Qt • Multithreaded Application Development • Speech Recognition • Http • Html • Css • Wireless • Software Design • Scrum • Object Oriented Design • Eclipse • Embedded Systems • Android • Operating Systems • Mobile Devices • C • Audio Engineering • Car Audio

Ranks

Certificate: Advanced Leader Bronze

Industries

Computer Software

Resumes

Resumes

Brant Thomsen Photo 1

Principal Software Engineer

View page
Location:
Sandy, UT
Industry:
Computer Software
Work:
Broadcom
Principal Software Engineer

Symantec
Principal Software Engineer

Harman International May 1, 2013 - Jan 2018
Principal Software Engineer

Landesk Software Jun 2012 - Apr 2013
Principal Software Engineer

Wavelink Feb 2004 - Jun 2012
Software Architect
Education:
University of Utah 1988 - 1994
Bachelors, Bachelor of Science, Computer Science
Skills:
Tcp/Ip
Agile Methodologies
Software Engineering
Software Development
Linux
Windows Software Development
Windows
Windows Mobile
Windows Ce
Android Development
C++
Visual C++
Microsoft Visual Studio C++
Embedded C++
Javascript
Certified Scrum Master Csm
Software Architectural Design
Team Leadership
Java
Qt
Multithreaded Application Development
Speech Recognition
Http
Html
Css
Wireless
Software Design
Scrum
Object Oriented Design
Eclipse
Embedded Systems
Android
Operating Systems
Mobile Devices
C
Audio Engineering
Car Audio
Certifications:
Advanced Leader Bronze
Competent Leader (Cl)
Competent Communicator (Cc)

Publications

Us Patents

Method Of Detecting Tcp/Ip Bindings Of Installed Network Interface Cards Present In A Computer System

View page
US Patent:
6675234, Jan 6, 2004
Filed:
Dec 11, 2000
Appl. No.:
09/734796
Inventors:
Brant D. Thomsen - Sandy UT
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
G06F 300
US Classification:
710 19, 710 8, 710 15, 710 33, 710 62, 709220, 709224, 709228
Abstract:
The present invention provides a method for detecting TCP/IP (Transmission Control Protocol/Internet Protocol) bindings for Network Interface Cards (NICs) installed on Windows 95â and Windows 98â operating systems with a VPN (Virtual Private Network) client present. More particularly, the present invention provides a method for parsing the Windowsâ system registry to detect TCP/IP bindings for network interface cards installed within a host computer system. In one embodiment, a function for detecting TCP/IP bindings of one network interface card implemented and repeated for all keys of the registry of a computer software for detecting the TCP/IP bindings for network interface cards installed on the host computer system.

Methods Of Determining Whether A Network Interface Card Entry Within The System Registry Pertains To Physical Hardware Or To A Virtual Device

View page
US Patent:
6675308, Jan 6, 2004
Filed:
May 9, 2000
Appl. No.:
09/568862
Inventors:
Brant D. Thomsen - West Valley City UT
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
G06F 900
US Classification:
713401, 713100
Abstract:
Methods of determining whether a network interface card entry within the system registry of a Windowsâ-based operating system pertains to ârealâ physical hardware or to a âvirtualâ device. In one embodiment of the present invention, the method includes the steps of: (1) opening the HKEY_LOCAL_MACHINE System CurrentControlSet Services Class Net key entry of the system registry; (2) examining each of the sub-keys for the âNetâ key, and find one with a âDriverDescâ string value matching a NIC; (3) opening the âNdiâ key under the matching sub-key; (4) getting the âDeviceIDâ string value under the âNdiâ key; and, (5) searching the âDeviceIDâ string for a backslash â â character. If the backslash character is found, then it can be concluded that the network interface card entry is associated with ârealâ physical hardware. Otherwise, it can be concluded that the network interface card entry is associated with a âvirtualâ device.

Method For Detecting Unauthorized Network Access By Having A Nic Monitor For Packets Purporting To Be From Itself

View page
US Patent:
6745333, Jun 1, 2004
Filed:
Jan 31, 2002
Appl. No.:
10/062871
Inventors:
Brant D. Thomsen - Sandy UT
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
G06F 124
US Classification:
713201, 713160, 713161, 713168, 713200
Abstract:
A method is described a NIC to ascertain the presence of spoofing activity and thus detect unauthorized network access. The NIC monitors for packets purporting to be from itself. In one embodiment, a NIC views packets trafficking on its network and monitors for packets having its own MAC Address, but which it did not send. In another embodiment, the NIC monitors for packets having its own IP address, but which it did not send. These falsely purportive packets originate not from the observant NIC, but suspiciously from elsewhere. Such suspect origins entities may be rogue entities attempting to gain unauthorized network access. These embodiments detect unauthorized access to a network by ascertaining the presence of spoofing activity in a manner that does not require gross revamping of network architecture or the burdening of network accessibility by legitimate authorized entities.

Method For Managing Network Access

View page
US Patent:
7194004, Mar 20, 2007
Filed:
Jan 28, 2002
Appl. No.:
10/060112
Inventors:
Brant D. Thomsen - Sandy UT, US
Assignee:
3Com Corporation - Marlborough MA
International Classification:
H04L 12/28
G06F 21/00
US Classification:
370401, 726 11, 726 17, 726 21, 726 23, 726 26
Abstract:
A method for providing security in a computing network. A device connects to a network and authenticates itself with a server. Next, the server adds the IP address of the device to a list of trusted devices. The server broadcasts the trusted IP address to all devices in the network to which the newly authenticated device is allowed to communicate. The devices in the network add the trusted IP address to a list of trusted address stored on each device. The server may also transmit its stored list to the newly authenticated device. After a device has received a packet, it determines if the IP address associated with the packet is on its trusted list. If it is, the device processes the packet. If the IP address is not found on the safe list, the device queries the authentication server to determine if the IP address is safe.

System For Providing Firewall Capabilities To A Communication Device

View page
US Patent:
7624434, Nov 24, 2009
Filed:
Mar 1, 2002
Appl. No.:
10/090543
Inventors:
Peter M. Rigstad - Holladay UT, US
John Y. Yoon - Salt Lake City UT, US
Mark Farahar - Les Granges le Roi, FR
Barani Subbiah - Sunnyvale CA, US
Brant D. Thomsen - Sandy UT, US
David E. Richmond - Kearns UT, US
Vered Maor Semel - Palo Alto CA, US
Earl Bryner - Clinton UT, US
Assignee:
3Com Corporation - Marlborough MA
International Classification:
G06F 17/00
G06F 7/04
G06F 15/173
G06F 15/16
H04L 9/00
US Classification:
726 11, 726 4, 713168, 713181, 709225, 709228
Abstract:
A system for providing security in a computing network. The system has a server for distributing policies to be implemented by firewall devices in the network. The firewall devices provide hardware implemented firewalls to communication devices making network connections. The system has logic to allow a connection to be made to the network via a communication device at a node provided the firewall device is at that node. Therefore, the firewall device must be in the system for a connection to be established via the communication device. Additionally, the system is configured to cause data transferred by the communication device to be processed by the firewall.

Method For Establishing A Secure Ad Hoc Wireless Lan

View page
US Patent:
7660990, Feb 9, 2010
Filed:
Apr 27, 2004
Appl. No.:
10/832698
Inventors:
Brant D. Thomsen - Sandy UT, US
Brent R. Beachem - Riverton UT, US
Thomas M. Wheeler - Bountiful UT, US
Assignee:
3Com Corporation - Marlborough MA
International Classification:
H04L 29/06
US Classification:
713171, 713153
Abstract:
Secure communications on a network. An unauthenticated client on an network sends start packets to locate other clients. The unauthenticated client receives responses to the start packets from other clients on the network. The responses may be advertise packets that are from advertising clients that may be authenticated clients or other unauthenticated clients in authenticated mode. The unauthenticated client prioritizes the received packets so that authentication can be performed with the most desirable advertising client. Authentication packets are sent and received between the unauthenticated client and the advertising client in an attempt to authenticate.

Method For Establishing A Secure Ad Hoc Wireless Lan

View page
US Patent:
8321676, Nov 27, 2012
Filed:
Dec 21, 2009
Appl. No.:
12/642942
Inventors:
Brant D. Thomsen - Sandy UT, US
Brent R. Beachem - Riverton UT, US
Thomas M. Wheeler - Bountiful UT, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 29/06
US Classification:
713171, 713153
Abstract:
Secure communications on a network. An unauthenticated client on an network sends start packets to locate other clients. The unauthenticated client receives responses to the start packets from other clients on the network. The responses may be advertise packets that are from advertising clients that may be authenticated clients or other unauthenticated clients in authenticated mode. The unauthenticated client prioritizes the received packets so that authentication can be performed with the most desirable advertising client. Authentication packets are sent and received between the unauthenticated client and the advertising client in an attempt to authenticate.

Scripting Support For Data Identifiers, Voice Recognition And Speech In A Telnet Session

View page
US Patent:
8635069, Jan 21, 2014
Filed:
Aug 16, 2007
Appl. No.:
11/893676
Inventors:
Lamar John Van Wagenen - South Jordan UT, US
Brant David Thomsen - Sandy UT, US
Scott Allen Caddes - Sandy UT, US
Assignee:
Crimson Corporation - Dover DE
International Classification:
G10L 13/00
US Classification:
704258, 704260, 715780, 379 8816, 709227
Abstract:
Methods of adding data identifiers and speech/voice recognition functionality are disclosed. A telnet client runs one or more scripts that add data identifiers to data fields in a telnet session. The input data is inserted in the corresponding fields based on data identifiers. Scripts run only on the telnet client without modifications to the server applications. Further disclosed are methods for providing speech recognition and voice functionality to telnet clients. Portions of input data are converted to voice and played to the user. A user also may provide input to certain fields of the telnet session by using his voice. Scripts running on the telnet client convert the user's voice into text and is inserted to corresponding fields.
Brant D Thomsen from Sandy, UT, age ~54 Get Report