Search

Paul Kirner Phones & Addresses

  • Palo Alto, CA
  • Sunnyvale, CA
  • 14 Moraine St, Jamaica Plain, MA 02130 (617) 524-3826
  • 12-14 Moraine St, Jamaica Plain, MA 02130
  • 3934 Nelson Dr, Palo Alto, CA 94306

Work

Position: Production Occupations

Education

Degree: Bachelor's degree or higher

Specialities

Personal Injury Defense • Plaintiffs Personal Injury • Estate Planning • Family Law • Real Estate Law • Bankruptcy & Debt • Criminal Defense • Criminal Defense

Professional Records

Lawyers & Attorneys

Paul Kirner Photo 1

Paul Kirner - Lawyer

View page
Specialties:
Personal Injury Defense
Plaintiffs Personal Injury
Estate Planning
Family Law
Real Estate Law
Bankruptcy & Debt
Criminal Defense
Criminal Defense
ISLN:
1000436736
Admitted:
1973
Law School:
Cleveland State University, Cleveland Marshall College of Law, J.D.

Business Records

Name / Title
Company / Classification
Phones & Addresses
Paul J. Kirner
Owner
Paul James Kirner
Data Processing/Preparation
3934 Nelson Dr, Palo Alto, CA 94306
Paul T Kirner
K & B INVESTMENTS, LTD
Paul T. Kirner
KIRNER CONSTRUCTION, INC

Publications

Us Patents

Streamlined Packet Forwarding Using Dynamic Filters For Routing And Security In A Shared Forwarding Plane

View page
US Patent:
8339959, Dec 25, 2012
Filed:
Jul 30, 2008
Appl. No.:
12/182619
Inventors:
Jerome P. Moisand - Arlington MA, US
Jean-Marc Frailong - Los Altos CA, US
Krishna Narayanaswamy - San Jose CA, US
Oren Melamud - Herzelia, IL
Paul J. Kirner - Sunnyvale CA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
H04L 12/26
US Classification:
370235
Abstract:
A network router includes a plurality of interfaces configured to send and receive packets, and a routing component comprising: (i) a routing engine that includes a control unit that executes a routing protocol to maintain routing information specifying routes through a network, and (ii) a forwarding plane configured by the routing engine to select next hops for the packets in accordance with the routing information. The forwarding plane comprises a switch fabric to forward the packets to the interfaces based on the selected next hops. The network router also includes a security plane configured to apply security functions to the packets. The security plane is integrated within the network router to share a streamlined forwarding plane of the routing component.

Policy Evaluation In Controlled Environment

View page
US Patent:
8352998, Jan 8, 2013
Filed:
Aug 17, 2006
Appl. No.:
11/465263
Inventors:
Panagiotis Kougiouris - Cupertino CA, US
Roger Chickering - Granite Bay CA, US
Paul James Kirner - Jamaica Plain MA, US
Stephen R. Hanna - Bedford MA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
H04L 9/00
US Classification:
726 1
Abstract:
A module may include interface logic to receive information identifying a state related to a client device via logic related to a controlled environment, and to send a valid policy result to a host device, where the valid policy result is related to the state. The module may include processing logic to process policy content according to a resource policy, where the processing is based on the information, and to produce the valid policy result based on the processing using the resource policy, where the valid policy result is adapted for use by the host device when implementing the network policy with respect to a destination device when the client device attempts to communicate with the destination device.

Combining Network Endpoint Policy Results

View page
US Patent:
8369224, Feb 5, 2013
Filed:
Sep 8, 2006
Appl. No.:
11/530189
Inventors:
Roger Chickering - Granite Bay CA, US
Stephen R. Hanna - Bedford MA, US
Paul Funk - Cambridge MA, US
Paul James Kirner - Jamaica Plain MA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
H04J 1/16
H04J 3/14
H04L 1/00
H04L 12/26
US Classification:
370241, 370242, 370245, 370250
Abstract:
An endpoint integrity system controls access to resources of a protected network for endpoint devices attempting to access the protected network. The system may include a number of evaluation modules that communicate with an endpoint device. The evaluation modules generate policy results for the endpoint device, in which each of the policy results assume one of three or more states, called a multi-state policy result. The multi-state policy results are combined to produce a combined Boolean policy result.

Combining Network Endpoint Policy Results

View page
US Patent:
8644167, Feb 4, 2014
Filed:
Jan 14, 2013
Appl. No.:
13/740396
Inventors:
Stephen Hanna - Brighton MA, US
Paul Funk - Cambridge MA, US
Panagiotis Kougiouris - Cupertino CA, US
Paul James Kirner - Palo Alto CA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
H04J 1/16
H04J 3/14
H04L 1/00
H04L 12/26
US Classification:
370241, 370242, 370245, 370250
Abstract:
An endpoint integrity system controls access to resources of a protected network for endpoint devices attempting to access the protected network. The system may include a number of evaluation modules that communicate with an endpoint device. The evaluation modules generate policy results for the endpoint device, in which each of the policy results assume one of three or more states, called a multi-state policy result. The multi-state policy results are combined to produce a combined Boolean policy result.

Policy Evaluation In Controlled Environment

View page
US Patent:
20130145421, Jun 6, 2013
Filed:
Dec 27, 2012
Appl. No.:
13/728173
Inventors:
JUNIPER NETWORKS, INC. - Sunnyvale CA, US
Roger Chickering - Granite Bay CA, US
Paul James Kirner - Palo Alto CA, US
Stephen R. Hanna - Brighton MA, US
Assignee:
JUNIPER NETWORKS, INC. - Sunnyvale CA
International Classification:
H04L 29/06
US Classification:
726 1
Abstract:
A module may include interface logic to receive information identifying a state related to a client device via logic related to a controlled environment, and to send a valid policy result to a host device, where the valid policy result is related to the state. The module may include processing logic to process policy content according to a resource policy, where the processing is based on the information, and to produce the valid policy result based on the processing using the resource policy, where the valid policy result is adapted for use by the host device when implementing the network policy with respect to a destination device when the client device attempts to communicate with the destination device.

Reconciliation Of Multiple Sets Of Network Access Control Policies

View page
US Patent:
7886335, Feb 8, 2011
Filed:
Jul 12, 2007
Appl. No.:
11/827598
Inventors:
Roger A. Chickering - Granite Bay CA, US
Paul Funk - Cambridge MA, US
Paul J. Kirner - Sunnyvale CA, US
Assignee:
Juniper Networks, Inc. - Sunnyvale CA
International Classification:
G06F 17/00
G06F 17/30
US Classification:
726 1, 726 2, 726 3
Abstract:
In general, techniques are described for managing multiple access policies in a network access control system. An endpoint device may send, to a policy decision point (“PDP”), a request to communicate on a network. When the PDP receives such an access request, the PDP typically identifies a set of access policies to be enforced with regard to the endpoint device and causes the identified access policies to be enforced with regard to the endpoint device. These access policies may specify rights to communicate on networks and/or rights to communicate with server resources and/or endpoint configuration requirements. However, because the endpoint device may issue multiple access requests, conflicting sets of access policies may potentially be enforced with regard to the endpoint device. The techniques described herein ensure that only a consistent set of access policies are enforced with regard to the endpoint device when accessing the network.

Generating Vulnerability Exposure Scores In A Segmented Computing Environment

View page
US Patent:
20210314345, Oct 7, 2021
Filed:
Jun 21, 2021
Appl. No.:
17/353655
Inventors:
- Sunnyvale CA, US
Paul James Kirner - Palo Alto CA, US
Seth Bruce Ford - San Francisco CA, US
Mukesh Gupta - Fremont CA, US
Joy Anne Scott - Los Altos CA, US
Nathaniel Jurist Gleicher - Palo Alto CA, US
International Classification:
H04L 29/06
G06F 21/57
G06F 9/50
Abstract:
A segmentation server generates vulnerability exposure scores associated with workloads operating in a segmented computing environment. The segmentation server may automatically aggregate the vulnerability exposure scores in various ways to generate vulnerability exposure information representative of workloads in an administrative domain controlled by the segmentation server. The aggregated vulnerability exposure information may be presented in a manner that enables an administrator to easily evaluate different segmentation strategies and assess the risks associated with each of them. Moreover, the segmentation server can automatically generate a segmentation policy that modifies a configured segmentation strategy based on the vulnerability exposure scores to reduce exposure to certain vulnerabilities without impeding operation of the workloads.

Generating A Segmentation Policy Based On Vulnerabilities

View page
US Patent:
20210314346, Oct 7, 2021
Filed:
Jun 21, 2021
Appl. No.:
17/353658
Inventors:
- Sunnyvale CA, US
Paul James Kirner - Palo Alto CA, US
Seth Bruce Ford - San Francisco CA, US
Mukesh Gupta - Fremont CA, US
Joy Anne Scott - Los Altos CA, US
Nathaniel Jurist Gleicher - Palo Alto CA, US
International Classification:
H04L 29/06
G06F 9/50
G06F 21/57
Abstract:
A segmentation server generates vulnerability exposure scores associated with workloads operating in a segmented computing environment. The segmentation server may automatically aggregate the vulnerability exposure scores in various ways to generate vulnerability exposure information representative of workloads in an administrative domain controlled by the segmentation server. The aggregated vulnerability exposure information may be presented in a manner that enables an administrator to easily evaluate different segmentation strategies and assess the risks associated with each of them. Moreover, the segmentation server can automatically generate a segmentation policy that modifies a configured segmentation strategy based on the vulnerability exposure scores to reduce exposure to certain vulnerabilities without impeding operation of the workloads.
Paul J Kirner from Palo Alto, CA Get Report