Patents by Inventor Joseph Petviashvili

Joseph Petviashvili has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7941495
    Abstract: Techniques for managing instant message (IM) communications are provided. In various embodiments, IM communications in a plurality of network implementations are managed using one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. Once an IM communications is received from an IM client, a policy that is applicable for that IM communication is determined. After determining an applicable policy, an action associated with the policy for the instant message communication is performed. Examples of actions that may be taken include recording the IM communication, modifying the IM communication, blocking the IM communication, forwarding the IM communication, and the like.
    Type: Grant
    Filed: July 29, 2009
    Date of Patent: May 10, 2011
    Assignee: Actiance, Inc.
    Inventors: Mehdi Maghsoodnia, Lewis D. Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
  • Patent number: 7899867
    Abstract: Techniques for processing instant messages (IM) received from entities destined for IM clients are provided. An IM module is used to receive the instant messages and process them. In one embodiment, the IM module may be used to determine if a message is spam (or spim) or not. The IM module receives an instant message for the IM client and determines if a challenge message should be sent to the sender of the IM. The challenge IM is an IM that is sent to the sender of the IM that necessitates a challenge. If a response to the IM challenge is received at the IM module, it is determined if the response satisfies an answer required by the challenge IM. If the response satisfies the answer, the IM received may be forwarded to the intended recipient IM client. Additionally, a method for processing buddy list events using an IM module is provided.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: March 1, 2011
    Assignee: FaceTime Communications, Inc,
    Inventors: Alex Sherstinsky, Joseph Petviashvili, Eric Young, Jonathan Christensen
  • Patent number: 7809829
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: October 5, 2010
    Assignee: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Patent number: 7673004
    Abstract: Techniques for enabling secure communications between IM modules are provided. An IM is received from a first IM client for a second IM client at a first IM module. It is determined if the second IM client can receive IMs through a second IM module that is capable of receiving secure communications from the first IM module. If the second IM module is capable of receiving secure communications from the first IM module, an encrypted IM is sent from the first IM module to the second IM client. The encrypted IM is received at the second IM module, which decrypts the IM and sends the decrypted IM to the second IM client.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: March 2, 2010
    Assignee: Face Time Communications, Inc.
    Inventors: Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, Jonathan Christensen
  • Publication number: 20090288168
    Abstract: Techniques for managing instant message (IM) communications are provided. In various embodiments, IM communications in a plurality of network implementations are managed using one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. Once an IM communications is received from an IM client, a policy that is applicable for that IM communication is determined. After determining an applicable policy, an action associated with the policy for the instant message communication is performed. Examples of actions that may be taken include recording the IM communication, modifying the IM communication, blocking the IM communication, forwarding the IM communication, and the like.
    Type: Application
    Filed: July 29, 2009
    Publication date: November 19, 2009
    Applicant: Face Time Communications, Inc.
    Inventors: Mehdi Maghsoodnia, Lewis D. Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
  • Patent number: 7596599
    Abstract: Techniques for managing instant message (IM) communications are provided. Instant message communications of a plurality of network implementations is managed using an instant message module that uses one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. The techniques comprise receiving an instant message communication at the instant message module. The IM communication may be in a network implementation of one of the plurality of network implementations. Then, a policy is determined from the one or more policies that is applicable for the instant message communication. An action associated with the policy for the instant message communication is then performed.
    Type: Grant
    Filed: July 31, 2002
    Date of Patent: September 29, 2009
    Assignee: FaceTime Communications, Inc.
    Inventors: Mehdi Maghsoodnia, Lewis D Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
  • Publication number: 20090161544
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Application
    Filed: October 27, 2008
    Publication date: June 25, 2009
    Applicant: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Patent number: 7447768
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Grant
    Filed: January 19, 2006
    Date of Patent: November 4, 2008
    Assignee: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Publication number: 20060277288
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Application
    Filed: January 19, 2006
    Publication date: December 7, 2006
    Applicant: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu