Patents by Inventor Daghan Altas

Daghan Altas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11792866
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Grant
    Filed: October 4, 2022
    Date of Patent: October 17, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20230025751
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Application
    Filed: October 4, 2022
    Publication date: January 26, 2023
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Patent number: 11497067
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Grant
    Filed: February 16, 2021
    Date of Patent: November 8, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Patent number: 11497068
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: November 8, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20210212135
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Application
    Filed: December 3, 2020
    Publication date: July 8, 2021
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20210195667
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Application
    Filed: March 5, 2021
    Publication date: June 24, 2021
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20210168884
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Application
    Filed: February 16, 2021
    Publication date: June 3, 2021
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Patent number: 10917926
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Grant
    Filed: May 18, 2018
    Date of Patent: February 9, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Patent number: 10567344
    Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic firewall configuration based on aggregated cloud managed information. A cloud management device can determine, based on security event data received from a first set of client computing environments, that a security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments. In response to determining that the security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments, the cloud management device can identify a second set of client computing environments to protect from the security attack. For each client computing environment from the second set of client computing environments, the cloud management device can configure firewall settings to protect from the security attack.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: February 18, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Shanks, Daghan Altas
  • Patent number: 10567222
    Abstract: Disclosed are systems, methods, and computer-readable storage media for recommending configurations for a client networking environment based on aggregated cloud managed information. A cloud network management device can receive a first set of infrastructure specifications describing a first client networking environment. The cloud network management device can determine a set of recommended configurations for the first client networking environment based on the first set of infrastructure specifications and configurations for one or more client networking environments determined to be similar to the first client networking environment. The cloud network management device can provide the set of recommended configurations to a client device associated with the first client networking environment.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: February 18, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Shanks, Daghan Altas, Justin Delegard, Ryan Reading, Nathaniel Brahms
  • Patent number: 10374828
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses that involve a first device selecting a data tunnel for sending packets of a determined network traffic type to another device. For example, in some implementations, a method includes a first device receiving a first group of packets for forwarding to a second device. The method includes the first device retrieving packet-forwarding rules for forwarding the first group of packets, and selecting a first private network data tunnel from a plurality of private network data tunnels between the first device and the second device, for forwarding a first packet of the first group of packets, based on satisfaction of the retrieved packet-forwarding rules. A respective private network data tunnel is associated with a respective uplink of a plurality of uplinks of the first network device. The first private network data tunnel is associated with a first uplink of the first device.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: August 6, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Patent number: 10298672
    Abstract: Previous solutions to the problem of maintaining up-to-date network device addressing, fail to provide systems or processes that efficiently share and obtain addressing information of networking devices in a given network. By contrast, and to that end, various implementations disclosed herein include systems, methods and apparatuses that generate a registry request message, where the registry request message includes a first portion characterized by a first write privilege and a second portion characterized by a second write privilege different from the first write privilege. The systems, methods and apparatuses convey the registry request message to a shared contact point network entity, and obtain a response message addressed from the shared contact point network entity, where the response message includes peer addressing information corresponding to one or more peer network devices associated with the aforementioned systems, methods and apparatuses.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: May 21, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20190141761
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Application
    Filed: May 18, 2018
    Publication date: May 9, 2019
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Patent number: 10284521
    Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic security list offload with exponential timeout. A second layer of a firewall can determine that a first data, that previously passed through a first layer of the firewall, should be blocked. The second layer of the firewall can utilize more resources than the first layer of the firewall to determine whether to block a data packet. In response, a first rule can be applied at the first layer of the firewall to block data packets received from a source of the first data packet. Accordingly, a second data packet received from the source of the first data packet will be blocked at the first layer of the firewall based on the first rule.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: May 7, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Shanks, Daghan Altas
  • Patent number: 9980303
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: May 22, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20180062924
    Abstract: Disclosed are systems, methods, and computer-readable storage media for recommending configurations for a client networking environment based on aggregated cloud managed information. A cloud network management device can receive a first set of infrastructure specifications describing a first client networking environment. The cloud network management device can determine a set of recommended configurations for the first client networking environment based on the first set of infrastructure specifications and configurations for one or more client networking environments determined to be similar to the first client networking environment. The cloud network management device can provide the set of recommended configurations to a client device associated with the first client networking environment.
    Type: Application
    Filed: August 23, 2016
    Publication date: March 1, 2018
    Inventors: Robert Shanks, Daghan Altas, Justin Delegard, Ryan Reading, Nathaniel Brahms
  • Publication number: 20180063085
    Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic firewall configuration based on aggregated cloud managed information. A cloud management device can determine, based on security event data received from a first set of client computing environments, that a security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments. In response to determining that the security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments, the cloud management device can identify a second set of client computing environments to protect from the security attack. For each client computing environment from the second set of client computing environments, the cloud management device can configure firewall settings to protect from the security attack.
    Type: Application
    Filed: August 23, 2016
    Publication date: March 1, 2018
    Inventors: Robert Shanks, Daghan Altas
  • Publication number: 20180054419
    Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic security list offload with exponential timeout. A second layer of a firewall can determine that a first data, that previously passed through a first layer of the firewall, should be blocked. The second layer of the firewall can utilize more resources than the first layer of the firewall to determine whether to block a data packet. In response, a first rule can be applied at the first layer of the firewall to block data packets received from a source of the first data packet. Accordingly, a second data packet received from the source of the first data packet will be blocked at the first layer of the firewall based on the first rule.
    Type: Application
    Filed: August 17, 2016
    Publication date: February 22, 2018
    Inventors: Robert Shanks, Daghan Altas
  • Publication number: 20170180155
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses that involve a first device selecting a data tunnel for sending packets of a determined network traffic type to another device. For example, in some implementations, a method includes a first device receiving a first group of packets for forwarding to a second device. The method includes the first device retrieving packet-forwarding rules for forwarding the first group of packets, and selecting a first private network data tunnel from a plurality of private network data tunnels between the first device and the second device, for forwarding a first packet of the first group of packets, based on satisfaction of the retrieved packet-forwarding rules. A respective private network data tunnel is associated with a respective uplink of a plurality of uplinks of the first network device. The first private network data tunnel is associated with a first uplink of the first device.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
  • Publication number: 20170181203
    Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig