Patents by Inventor Gennady Dosovitsky

Gennady Dosovitsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10972344
    Abstract: Provided are methods and systems for adjusting subscriber policies. A method for adjusting of subscriber policies may include applying traffic enforcement rules to a data traffic associated with a subscriber. The method can further include determining network conditions associated with the data traffic. The method can include modifying, based on the determination of the network conditions, attributes according to attribute adjustment rules to obtain modified attributes. The method can further include modifying the traffic enforcement rules based on the modified attributes to obtain modified traffic enforcement rules.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: April 6, 2021
    Assignee: A10 Networks, Inc.
    Inventors: Gennady Dosovitsky, Kishore Inampudi
  • Patent number: 10791088
    Abstract: Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that obtain an assigned Internet Protocol (IP) address from a DHCP server in response to an address request received from a client. One of a plurality of processing cores, on which a traffic management process is executing, is identified. The assigned IP address is modified based on the identified processing core. The modified IP address is sent to the client in response to the received address request. With this technology, connections associated with a same subscriber can advantageously be disaggregated to the same traffic management process.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: September 29, 2020
    Assignee: F5 Networks, Inc.
    Inventors: Saxon Amdahl, Gennady Dosovitsky
  • Patent number: 10742559
    Abstract: Provided are methods and systems for eliminating a redirection of data traffic in a cluster. An example method may include receiving, by one or more nodes of the cluster, a data packet associated with a service session. The method may include determining, by the node, that the data packet is directed to a further node in the cluster. The method may further include, in response to the determination, acquiring, by the node, a session context associated with the service session. Acquiring the session context may include sending, by the node, a request for the session context to the further node and receiving the session context from the further node. The method may further include processing, by the one or more nodes, the data packet based on the session context.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: August 11, 2020
    Assignee: A10 Networks, Inc.
    Inventors: Gurudeep Kamat, Swaminathan Sankar, Gennady Dosovitsky, Rajkumar Jalan
  • Patent number: 10599680
    Abstract: Decreasing a volume of data transfer over a network may commence with collecting a plurality of datasets having subscriber data. The method may continue with classifying data fields of each dataset of the plurality of datasets into low frequency change data and high frequency change data based on predetermined criteria. The method may further include combining a plurality of consecutive datasets of the plurality of datasets into a combination dataset. The combination dataset may include the low frequency change data and aggregated high frequency change data from the plurality of consecutive datasets. The method may continue with providing the combination dataset to a data processing node.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: March 24, 2020
    Assignee: A10 Networks, Inc.
    Inventors: Gennady Dosovitsky, Rajkumar Jalan, Kishore Inampudi
  • Patent number: 10554517
    Abstract: Decreasing data transfer over a network may commence with collecting subscriber data. The method may continue with classifying the subscriber data into low frequency change data and high frequency change data based on predetermined criteria. The method may include storing the low frequency change data to a data storage. The method may continue with generating reporting data. The reporting data may include the high frequency change data and at least one data index pointer to the low frequency change data in the data storage. The method may further include providing the reporting data to a data processing node. The low frequency change data may include subscriber identifying data. The data reporting node may be further configured to obfuscate the subscriber identifying data. The at least one data index pointer may include a secure data identifier associated with the obfuscated subscriber identifying data.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: February 4, 2020
    Assignee: A10 Networks, Inc.
    Inventors: Gennady Dosovitsky, Rajkumar Jalan
  • Patent number: 10454768
    Abstract: Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: October 22, 2019
    Assignee: F5 Networks, Inc.
    Inventors: Paul I. Szabo, Gennady Dosovitsky, Ron Talmor, Jeroen de Borst, David A. Hansen
  • Publication number: 20190173752
    Abstract: Provided are methods and systems for adjusting subscriber policies. A method for adjusting of subscriber policies may include applying traffic enforcement rules to a data traffic associated with a subscriber. The method can further include determining network conditions associated with the data traffic. The method can include modifying, based on the determination of the network conditions, attributes according to attribute adjustment rules to obtain modified attributes. The method can further include modifying the traffic enforcement rules based on the modified attributes to obtain modified traffic enforcement rules.
    Type: Application
    Filed: February 5, 2019
    Publication date: June 6, 2019
    Inventors: Gennady Dosovitsky, Kishore Inampudi
  • Patent number: 10243791
    Abstract: Provided are methods and systems for adjusting of subscriber policies. A method for adjusting of subscriber policies may include applying traffic enforcement rules to a data traffic associated with a subscriber. The method can further include determining network conditions associated with the data traffic. The method can include modifying, based on the determination of the network conditions, attributes according to attribute adjustment rules to obtain modified attributes. The method can further include modifying the traffic enforcement rules based on the modified attributes to obtain modified traffic enforcement rules.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: March 26, 2019
    Assignee: A10 Networks, Inc.
    Inventors: Gennady Dosovitsky, Kishore Inampudi
  • Publication number: 20180285372
    Abstract: Decreasing data transfer over a network may commence with collecting subscriber data. The method may continue with classifying the subscriber data into low frequency change data and high frequency change data based on predetermined criteria. The method may include storing the low frequency change data to a data storage. The method may continue with generating reporting data. The reporting data may include the high frequency change data and at least one data index pointer to the low frequency change data in the data storage. The method may further include providing the reporting data to a data processing node. The low frequency change data may include subscriber identifying data. The data reporting node may be further configured to obfuscate the subscriber identifying data. The at least one data index pointer may include a secure data identifier associated with the obfuscated subscriber identifying data.
    Type: Application
    Filed: March 28, 2017
    Publication date: October 4, 2018
    Inventors: Gennady Dosovitsky, Rajkumar Jalan
  • Publication number: 20180285373
    Abstract: Decreasing a volume of data transfer over a network may commence with collecting a plurality of datasets having subscriber data. The method may continue with classifying data fields of each dataset of the plurality of datasets into low frequency change data and high frequency change data based on predetermined criteria. The method may further include combining a plurality of consecutive datasets of the plurality of datasets into a combination dataset. The combination dataset may include the low frequency change data and aggregated high frequency change data from the plurality of consecutive datasets. The method may continue with providing the combination dataset to a data processing node.
    Type: Application
    Filed: March 28, 2017
    Publication date: October 4, 2018
    Inventors: Gennady Dosovitsky, Rajkumar Jalan, Kishore Inampudi
  • Publication number: 20180248805
    Abstract: Provided are methods and systems for eliminating a redirection of data traffic in a cluster. An example method may include receiving, by one or more nodes of the cluster, a data packet associated with a service session. The method may include determining, by the node, that the data packet is directed to a further node in the cluster. The method may further include, in response to the determination, acquiring, by the node, a session context associated with the service session. Acquiring the session context may include sending, by the node, a request for the session context to the further node and receiving the session context from the further node. The method may further include processing, by the one or more nodes, the data packet based on the session context.
    Type: Application
    Filed: April 30, 2018
    Publication date: August 30, 2018
    Inventors: Gurudeep Kamat, Swaminathan Sankar, Gennady Dosovitsky, Rajkumar Jalan
  • Patent number: 9906452
    Abstract: Embodiments are directed towards managing communication over a network assist application classification using predicted subscriber behavior. Subscriber information associated with a network flow may be determined. Prediction information that includes application identifiers may be generated based on the subscriber information. A classification engine may determine the applications associated with the network flow based on the prediction information and the network flow using a plurality of application classifiers that correspond to the applications. If an application identifier included in the prediction information is correspondent to an application classifier, the application may be determined based on the correspondent application classifier; otherwise the application is determined based on the remainder of the application classifiers. A policy for managing the network flow may be determined based on the determined application.
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: February 27, 2018
    Assignee: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Amir Harush, Ron Talmor, Dan Eliezer Karpati, Assaf Jacob Mendelson
  • Patent number: 9866489
    Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: January 9, 2018
    Assignee: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
  • Patent number: 9787581
    Abstract: Provided are methods and systems for processing a secure data flow. An example method for processing a secure data flow includes receiving a data packet, determining network conditions associated with the data traffic, and determining that the data packet is associated with the secure data flow. Upon determination that the data packet is associated with the secure data flow, the data packet is analyzed. Thereafter, the method proceeds to classify the secure data flow based on the analysis. Subscriber data associated with the data packet may be obtained. The method can then process the secure data flow based on the subscriber data and the classification of the secure data flow.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: October 10, 2017
    Assignee: A10 NETWORKS, INC.
    Inventor: Gennady Dosovitsky
  • Publication number: 20170085440
    Abstract: Provided are methods and systems for processing a secure data flow. An example method for processing a secure data flow includes receiving a data packet, determining network conditions associated with the data traffic, and determining that the data packet is associated with the secure data flow. Upon determination that the data packet is associated with the secure data flow, the data packet is analyzed. Thereafter, the method proceeds to classify the secure data flow based on the analysis. Subscriber data associated with the data packet may be obtained. The method can then process the secure data flow based on the subscriber data and the classification of the secure data flow.
    Type: Application
    Filed: September 21, 2015
    Publication date: March 23, 2017
    Inventor: Gennady Dosovitsky
  • Publication number: 20170048107
    Abstract: Provided are methods and systems for adjusting of subscriber policies. A method for adjusting of subscriber policies may include applying traffic enforcement rules to a data traffic associated with a subscriber. The method can further include determining network conditions associated with the data traffic. The method can include modifying, based on the determination of the network conditions, attributes according to attribute adjustment rules to obtain modified attributes. The method can further include modifying the traffic enforcement rules based on the modified attributes to obtain modified traffic enforcement rules.
    Type: Application
    Filed: August 13, 2015
    Publication date: February 16, 2017
    Inventors: Gennady Dosovitsky, Kishore Inampudi
  • Publication number: 20160014033
    Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network, policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.
    Type: Application
    Filed: July 11, 2014
    Publication date: January 14, 2016
    Applicant: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
  • Publication number: 20150142948
    Abstract: Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine.
    Type: Application
    Filed: November 15, 2013
    Publication date: May 21, 2015
    Applicant: F5 NETWORKS, INC.
    Inventors: Paul I. Szabo, Gennady Dosovitsky, Ron Talmor, Jeroen de Borst, David A. Hansen
  • Patent number: 6633565
    Abstract: An apparatus and associated method for performing flow switching (tag switching) in a frame switching environment. The flow switching apparatus provides a mechanism whereby flows are identified and tags assigned to them. The identification and assignment of tags to flows is made Independently of other network entities and does not require communications with any other entities within the box itself or other entities in the network. The forwarding decisions are calculated once and stored in a cache or a look up table which can be accessed very quickly. The tag is used as an index into the cache or LUT such that if an entry is found in the cache or LUT for that particular tag, the forwarding decision does not have to be made again. This serves to greatly reduce the time to obtain a forwarding decision which is used by the switching fabric in steering the input frame to the appropriate output port(s). Multiple queues are used along with the cache to facilitate the forwarding of the frames.
    Type: Grant
    Filed: June 29, 1999
    Date of Patent: October 14, 2003
    Assignee: 3Com Corporation
    Inventors: Zvika Bronstein, Opher Yaron, Gennady Dosovitsky
  • Patent number: 6343078
    Abstract: An apparatus for and a method of compressing the forwarding decision for a frame within a network device. A forwarding decision is compressed yielding a forwarding pointer that occupies far less memory space than the corresponding output port vector. The compressed forwarding pointers are stored in a forwarding table that is accessed using a hash function. A forwarding CAM is used to resolve conflicts in the hash table. The output port vectors are stored in an output port vector table that comprises a relatively small number of possible combinations of the port vector. A forwarding decision is made for each received frame by a forwarding processor in the device. The forwarding decision is represented by a compressed forwarding pointer that is stored in a table and associated with the received frame. At some later point in time, the frame is output to one or more destination ports in accordance with a corresponding output port vector.
    Type: Grant
    Filed: May 12, 2000
    Date of Patent: January 29, 2002
    Assignee: 3Com Corporation
    Inventors: Zvika Bronstein, Gennady Dosovitsky, Opher Yaron, Golan Schzukin, Ilan Shimony