Patents Assigned to FaceTime Communications, Inc.
  • Patent number: 7899867
    Abstract: Techniques for processing instant messages (IM) received from entities destined for IM clients are provided. An IM module is used to receive the instant messages and process them. In one embodiment, the IM module may be used to determine if a message is spam (or spim) or not. The IM module receives an instant message for the IM client and determines if a challenge message should be sent to the sender of the IM. The challenge IM is an IM that is sent to the sender of the IM that necessitates a challenge. If a response to the IM challenge is received at the IM module, it is determined if the response satisfies an answer required by the challenge IM. If the response satisfies the answer, the IM received may be forwarded to the intended recipient IM client. Additionally, a method for processing buddy list events using an IM module is provided.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: March 1, 2011
    Assignee: FaceTime Communications, Inc,
    Inventors: Alex Sherstinsky, Joseph Petviashvili, Eric Young, Jonathan Christensen
  • Patent number: 7870613
    Abstract: Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The inoculation data provider analyzes unauthorized software applications to develop inoculation data. The inoculation data configures the security component to block execution of unauthorized software applications. Inoculation data can be embedded into a script, which is distributed via a management protocol to one or more managed computers from a management computer. Unauthorized software applications can be identified by filenames, storage paths, registry keys, digital signatures, download locations, residuals, and ActiveX controls or classes.
    Type: Grant
    Filed: March 2, 2006
    Date of Patent: January 11, 2011
    Assignee: FaceTime Communications, Inc.
    Inventors: Wayne Porter, Chris Criswell, Jan Hertsens, Robert Egan
  • Patent number: 7809829
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: October 5, 2010
    Assignee: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Publication number: 20100085883
    Abstract: An application detection architecture and related techniques are provided for detecting, identifying, and managing network-based applications. In various embodiments, a combined layered approach to application detection and various application-detection techniques provide for quick assessments that move from simplest to complex for rapid detection of unauthorized or misbehaving applications in communication with one or more computer networks. This layering, in some embodiments, further provides scalability and speed for determining and implementing policies that may be applicable to detected network-based application, users, groups, or devices associated with unauthorized network-based applications sending or receiving data via a computer network.
    Type: Application
    Filed: September 28, 2009
    Publication date: April 8, 2010
    Applicant: FaceTime Communications, Inc.
    Inventor: Steven B. Paster
  • Publication number: 20100088670
    Abstract: In various embodiments, a data-driven model is provided for an application detection engine for the detection and identification of network-based applications. In one embodiment, information can be input into an application detection database. The information may include a hostname, ports, transport protocol (TCP/UDP), higher layer protocol (SOCKS, HTTP, SMTP, FTP, etc), or the like. The information may be associated with a given application. The information may be used to create rule sets or custom program logic used by one or more various application detection engines for determining whether network traffic has been initiated by a given application. The information may be dynamically loaded and updated at the application detection engine.
    Type: Application
    Filed: September 28, 2009
    Publication date: April 8, 2010
    Applicant: FaceTime Communications, Inc.
    Inventor: Steven B. Paster
  • Publication number: 20100064353
    Abstract: In various embodiments, techniques can be provided for identifying a user or group of users who initiated network traffic. The user or group of users may be identified as an employee who can be found in corporate or organizational directory. In some embodiments, different authentication mechanisms may be used for various types of network traffic. For example, by proxying instant messaging (IM) communications, a proxy server can know which users are associated with what network traffic. In another example, transparent and non-transparent mechanisms may be provided to authenticate HTTP URL traffic. For other types of traffic, such as non-proxied IM, P2P, and spyware, an existing authentication cache or credential cache may be used to identify the user who generated the traffic.
    Type: Application
    Filed: September 9, 2008
    Publication date: March 11, 2010
    Applicant: FaceTime Communications, Inc.
    Inventors: Dan Kan, Jae Kim, Vivek Vallachira
  • Publication number: 20100064042
    Abstract: In various embodiments, techniques can be provided for identifying and filtering network resources. The filtering may occur not only on the type of network traffic (e.g., HTTP traffic) but also with resources identified by the network traffic. In some embodiments, one or more hash functions may be used to facilitate the identification, searching, and matching of network resources. The network resources may be identified as a unique domain, unique network host, unique URL, or the like.
    Type: Application
    Filed: September 9, 2008
    Publication date: March 11, 2010
    Applicant: FaceTime Communications, Inc.
    Inventor: Steven B. Paster
  • Patent number: 7596599
    Abstract: Techniques for managing instant message (IM) communications are provided. Instant message communications of a plurality of network implementations is managed using an instant message module that uses one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. The techniques comprise receiving an instant message communication at the instant message module. The IM communication may be in a network implementation of one of the plurality of network implementations. Then, a policy is determined from the one or more policies that is applicable for the instant message communication. An action associated with the policy for the instant message communication is then performed.
    Type: Grant
    Filed: July 31, 2002
    Date of Patent: September 29, 2009
    Assignee: FaceTime Communications, Inc.
    Inventors: Mehdi Maghsoodnia, Lewis D Roth, Frank Mangin, Yuri Khodosh, Rahul Abhyankar, Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, John Onusko
  • Publication number: 20090161544
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Application
    Filed: October 27, 2008
    Publication date: June 25, 2009
    Applicant: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Patent number: 7447768
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Grant
    Filed: January 19, 2006
    Date of Patent: November 4, 2008
    Assignee: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Publication number: 20070261051
    Abstract: Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The inoculation data provider analyzes unauthorized software applications to develop inoculation data. The inoculation data configures the security component to block execution of unauthorized software applications. Inoculation data can be embedded into a script, which is distributed via a management protocol to one or more managed computers from a management computer. Unauthorized software applications can be identified by filenames, storage paths, registry keys, digital signatures, download locations, residuals, and ActiveX controls or classes.
    Type: Application
    Filed: March 2, 2006
    Publication date: November 8, 2007
    Applicant: FaceTime Communications, Inc.
    Inventors: Wayne Porter, Chris Criswell, Jan Hertsens, Robert Egan
  • Publication number: 20070209076
    Abstract: Security components of managed computers are configured using inoculation data. Inoculation data can be retrieved from an inoculation data provider. The inoculation data provider analyzes unauthorized software applications to develop inoculation data. The inoculation data configures the security component to deny access to resources to unauthorized software applications. Inoculation data can be embedded into a script, which is distributed via a management protocol to one or more managed computers from a management computer. Resources can include files, storage paths, memory, registry keys, processor priority, services, dynamic link libraries, archives, browser cookies, and/or ActiveX controls, Java applets, or classes thereof.
    Type: Application
    Filed: March 2, 2006
    Publication date: September 6, 2007
    Applicant: FaceTime Communications, Inc.
    Inventors: Wayne Porter, Chris Criswell, Jan Hertsens, Robert Egan
  • Publication number: 20060277288
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Application
    Filed: January 19, 2006
    Publication date: December 7, 2006
    Applicant: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu