Patents by Inventor Alon Hazay

Alon Hazay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11323310
    Abstract: Method, device, and system for providing hot reservation for in-line deployed network functions with multiple network interfaces. A system includes a first Network Function (NF) unit, connected to an ingress router and to an egress router; and a second NF unit, connected to the ingress router and to the egress router. The first NF unit is initially configured as a controlling NF. The second NF unit is initially configured as a backup NF. The two NF units periodically exchange keep-alive messages via the two routers. The second NF unit, operating as the backup NF, automatically triggers a switchover if the second NF unit did not receive a keep-alive message from the first NF unit for at least a pre-defined time-period. Additionally or alternatively, the controlling NF initiates a switchover if the maintenance status parameters of the backup NF are better than those of the controlling NF.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: May 3, 2022
    Assignee: ALLOT LTD.
    Inventors: Itai Ephraim Zilbershtein, Nimrod Dezent, Alon Hazay, Itai Weissman, Boris Lifshitz
  • Patent number: 11089049
    Abstract: A system monitors network activity of an end-user device that communicates with servers over a communications network. The performs analysis of packets of data that are transported via the network. The system detects a first set of communications in which a first server infects the end-user device with a cryptocurrency mining malware; a second set of communications, in which a second server activates the end-user device as an activated cryptocurrency mining bot; and a third set of communications, in which the second server allocates a cryptocurrency mining task to the end-user device and later receives a cryptocurrency mining output from the end-user device. The system determines that the first server is a malicious infecting web-server; that the second server is a malicious Command and Control server of a distributed bot-net of cryptocurrency mining bots; and that the end-user device is an infected and activated and operational cryptocurrency mining bot.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: August 10, 2021
    Assignee: ALLOT LTD.
    Inventors: Alon Hazay, Asaf Shahar
  • Publication number: 20210044476
    Abstract: Method, device, and system for providing hot reservation for in-line deployed network functions with multiple network interfaces. A system includes a first Network Function (NF) unit, connected to an ingress router and to an egress router; and a second NF unit, connected to the ingress router and to the egress router. The first NF unit is initially configured as a controlling NF. The second NF unit is initially configured as a backup NF. The two NF units periodically exchange keep-alive messages via the two routers. The second NF unit, operating as the backup NF, automatically triggers a switchover if the second NF unit did not receive a keep-alive message from the first NF unit for at least a pre-defined time-period. Additionally or alternatively, the controlling NF initiates a switchover if the maintenance status parameters of the backup NF are better than those of the controlling NF.
    Type: Application
    Filed: October 22, 2020
    Publication date: February 11, 2021
    Inventors: Itai Ephraim Zilbershtein, Nimrod Dezent, Alon Hazay, Itai Weissman, Boris Lifshitz
  • Patent number: 10833981
    Abstract: Method, device, and system for providing hot reservation for in-line deployed network functions with multiple network interfaces. A system includes a first Network Function (NF) unit, connected to an ingress router and to an egress router; and a second NF unit, connected to the ingress router and to the egress router. The first NF unit is initially configured as a controlling NF. The second NF unit is initially configured as a backup NF. The two NF units periodically exchange keep-alive messages via the two routers. The second NF unit, operating as the backup NF, automatically triggers a switchover if the second NF unit did not receive a keep-alive message from the first NF unit for at least a pre-defined time-period. Additionally or alternatively, the controlling NF initiates a switchover if the maintenance status parameters of the backup NF are better than those of the controlling NF.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: November 10, 2020
    Assignee: ALLOT LTD.
    Inventors: Itai Ephraim Zilbershtein, Nimrod Dezent, Alon Hazay, Itai Weissman, Boris Lifshitz
  • Patent number: 10749798
    Abstract: System, device, and method of deploying layer-3 transparent cloud-based proxy network element. A virtual network function is defined between a west-side router and an east-side router. A west-side interface receives east-bound traffic from a west-side Virtual LAN. East-bound queries from the west-bound router, are intercepted and responded to by the west-side interface, the response indicating the MAC address of the west-side router instead of the east-side router. The system enables the virtual network function to transparently intercept network traffic, and to selectively apply to such traffic one or more network functions or operations, prior to forwarding the traffic or a modified version thereof to the east-side router, in a Layer-3 transparent manner.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: August 18, 2020
    Assignee: ALLOT COMMUNICATIONS LTD.
    Inventors: Alon Hazay, Asaf Shahar
  • Publication number: 20200220814
    Abstract: System, device, and method of deploying layer-3 transparent cloud-based proxy network element. A virtual network function is defined between a west-side router and an east-side router. A west-side interface receives east-bound traffic from a west-side Virtual LAN. East-bound queries from the west-bound router, are intercepted and responded to by the west-side interface, the response indicating the MAC address of the west-side router instead of the east-side router. The system enables the virtual network function to transparently intercept network traffic, and to selectively apply to such traffic one or more network functions or operations, prior to forwarding the traffic or a modified version thereof to the east-side router, in a Layer-3 transparent manner.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Alon Hazay, Asaf Shahar
  • Publication number: 20190364057
    Abstract: A system monitors network activity of an end-user device that communicates with servers over a communications network. The performs analysis of packets of data that are transported via the network. The system detects a first set of communications in which a first server infects the end-user device with a cryptocurrency mining malware; a second set of communications, in which a second server activates the end-user device as an activated cryptocurrency mining bot; and a third set of communications, in which the second server allocates a cryptocurrency mining task to the end-user device and later receives a cryptocurrency mining output from the end-user device. The system determines that the first server is a malicious infecting web-server; that the second server is a malicious Command and Control server of a distributed bot-net of cryptocurrency mining bots; and that the end-user device is an infected and activated and operational cryptocurrency mining bot.
    Type: Application
    Filed: May 24, 2018
    Publication date: November 28, 2019
    Inventors: Alon Hazay, Asaf Shahar
  • Publication number: 20090106500
    Abstract: A buffer management for a data processing system is provided. According to one embodiment, a method for managing buffers in a telephony device is provided. The method comprising providing a plurality of buffers stored in a memory, providing a cache having a pointer pointing to the buffer, scanning the cache to determine if the cache is full, and when the scan determines the cache is not full determining a free buffer from the plurality of buffers, generating a pointer for the free buffer, and placing the generated pointer into the cache.
    Type: Application
    Filed: December 29, 2008
    Publication date: April 23, 2009
    Applicant: Nokia Siemens Networks GmbH & Co. KG
    Inventor: Alon Hazay
  • Publication number: 20070073973
    Abstract: A buffer management for a data processing system is provided. According to one embodiment, a method for managing buffers in a telephony device is provided. The method comprising providing a plurality of buffers stored in a memory, providing a cache having a pointer pointing to the buffer, scanning the cache to determine if the cache is full, and when the scan determines the cache is not full determining a free buffer from the plurality of buffers, generating a pointer for the free buffer, and placing the generated pointer into the cache.
    Type: Application
    Filed: September 29, 2005
    Publication date: March 29, 2007
    Inventor: Alon Hazay
  • Publication number: 20070047583
    Abstract: A method and device for changing between a long address and a short address in a packet is provided. According to one embodiment, a method of converting a long address to a short address by an processing element in a communication network, comprises receiving a packet having a first long address, retrieving a first short address associated with the first long address from a data repository, replacing the first long address in the standard packet with the first short address forming an improved packet with a control field and sending the improved packet toward a subsequent device.
    Type: Application
    Filed: August 29, 2005
    Publication date: March 1, 2007
    Inventors: Eyal Assa, Dekel Shirizly, David Berechya, Alon Hazay, Ilya Vershkov, Nissim Gerbi