Patents by Inventor Joseph Petviashvili
Joseph Petviashvili has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7941495Abstract: Techniques for managing instant message (IM) communications are provided. In various embodiments, IM communications in a plurality of network implementations are managed using one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. Once an IM communications is received from an IM client, a policy that is applicable for that IM communication is determined. After determining an applicable policy, an action associated with the policy for the instant message communication is performed. Examples of actions that may be taken include recording the IM communication, modifying the IM communication, blocking the IM communication, forwarding the IM communication, and the like.Type: GrantFiled: July 29, 2009Date of Patent: May 10, 2011Assignee: Actiance, Inc.Inventors: Mehdi Maghsoodnia, Lewis D. Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
-
Patent number: 7899867Abstract: Techniques for processing instant messages (IM) received from entities destined for IM clients are provided. An IM module is used to receive the instant messages and process them. In one embodiment, the IM module may be used to determine if a message is spam (or spim) or not. The IM module receives an instant message for the IM client and determines if a challenge message should be sent to the sender of the IM. The challenge IM is an IM that is sent to the sender of the IM that necessitates a challenge. If a response to the IM challenge is received at the IM module, it is determined if the response satisfies an answer required by the challenge IM. If the response satisfies the answer, the IM received may be forwarded to the intended recipient IM client. Additionally, a method for processing buddy list events using an IM module is provided.Type: GrantFiled: January 7, 2005Date of Patent: March 1, 2011Assignee: FaceTime Communications, Inc,Inventors: Alex Sherstinsky, Joseph Petviashvili, Eric Young, Jonathan Christensen
-
Patent number: 7809829Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: GrantFiled: October 27, 2008Date of Patent: October 5, 2010Assignee: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
-
Patent number: 7673004Abstract: Techniques for enabling secure communications between IM modules are provided. An IM is received from a first IM client for a second IM client at a first IM module. It is determined if the second IM client can receive IMs through a second IM module that is capable of receiving secure communications from the first IM module. If the second IM module is capable of receiving secure communications from the first IM module, an encrypted IM is sent from the first IM module to the second IM client. The encrypted IM is received at the second IM module, which decrypts the IM and sends the decrypted IM to the second IM client.Type: GrantFiled: January 7, 2005Date of Patent: March 2, 2010Assignee: Face Time Communications, Inc.Inventors: Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, Jonathan Christensen
-
Publication number: 20090288168Abstract: Techniques for managing instant message (IM) communications are provided. In various embodiments, IM communications in a plurality of network implementations are managed using one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. Once an IM communications is received from an IM client, a policy that is applicable for that IM communication is determined. After determining an applicable policy, an action associated with the policy for the instant message communication is performed. Examples of actions that may be taken include recording the IM communication, modifying the IM communication, blocking the IM communication, forwarding the IM communication, and the like.Type: ApplicationFiled: July 29, 2009Publication date: November 19, 2009Applicant: Face Time Communications, Inc.Inventors: Mehdi Maghsoodnia, Lewis D. Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
-
Patent number: 7596599Abstract: Techniques for managing instant message (IM) communications are provided. Instant message communications of a plurality of network implementations is managed using an instant message module that uses one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. The techniques comprise receiving an instant message communication at the instant message module. The IM communication may be in a network implementation of one of the plurality of network implementations. Then, a policy is determined from the one or more policies that is applicable for the instant message communication. An action associated with the policy for the instant message communication is then performed.Type: GrantFiled: July 31, 2002Date of Patent: September 29, 2009Assignee: FaceTime Communications, Inc.Inventors: Mehdi Maghsoodnia, Lewis D Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
-
Publication number: 20090161544Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: ApplicationFiled: October 27, 2008Publication date: June 25, 2009Applicant: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
-
Patent number: 7447768Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: GrantFiled: January 19, 2006Date of Patent: November 4, 2008Assignee: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
-
Publication number: 20060277288Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: ApplicationFiled: January 19, 2006Publication date: December 7, 2006Applicant: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu