Patents by Inventor Daghan Altas
Daghan Altas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11792866Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: GrantFiled: October 4, 2022Date of Patent: October 17, 2023Assignee: Cisco Technology, Inc.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20230025751Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: ApplicationFiled: October 4, 2022Publication date: January 26, 2023Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Patent number: 11497067Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: GrantFiled: February 16, 2021Date of Patent: November 8, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Patent number: 11497068Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: GrantFiled: March 5, 2021Date of Patent: November 8, 2022Assignee: Cisco Technology, Inc.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20210212135Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: ApplicationFiled: December 3, 2020Publication date: July 8, 2021Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20210195667Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: ApplicationFiled: March 5, 2021Publication date: June 24, 2021Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20210168884Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: ApplicationFiled: February 16, 2021Publication date: June 3, 2021Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Patent number: 10917926Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: GrantFiled: May 18, 2018Date of Patent: February 9, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Patent number: 10567344Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic firewall configuration based on aggregated cloud managed information. A cloud management device can determine, based on security event data received from a first set of client computing environments, that a security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments. In response to determining that the security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments, the cloud management device can identify a second set of client computing environments to protect from the security attack. For each client computing environment from the second set of client computing environments, the cloud management device can configure firewall settings to protect from the security attack.Type: GrantFiled: August 23, 2016Date of Patent: February 18, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Shanks, Daghan Altas
-
Patent number: 10567222Abstract: Disclosed are systems, methods, and computer-readable storage media for recommending configurations for a client networking environment based on aggregated cloud managed information. A cloud network management device can receive a first set of infrastructure specifications describing a first client networking environment. The cloud network management device can determine a set of recommended configurations for the first client networking environment based on the first set of infrastructure specifications and configurations for one or more client networking environments determined to be similar to the first client networking environment. The cloud network management device can provide the set of recommended configurations to a client device associated with the first client networking environment.Type: GrantFiled: August 23, 2016Date of Patent: February 18, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Shanks, Daghan Altas, Justin Delegard, Ryan Reading, Nathaniel Brahms
-
Patent number: 10374828Abstract: Various implementations disclosed herein include systems, methods and apparatuses that involve a first device selecting a data tunnel for sending packets of a determined network traffic type to another device. For example, in some implementations, a method includes a first device receiving a first group of packets for forwarding to a second device. The method includes the first device retrieving packet-forwarding rules for forwarding the first group of packets, and selecting a first private network data tunnel from a plurality of private network data tunnels between the first device and the second device, for forwarding a first packet of the first group of packets, based on satisfaction of the retrieved packet-forwarding rules. A respective private network data tunnel is associated with a respective uplink of a plurality of uplinks of the first network device. The first private network data tunnel is associated with a first uplink of the first device.Type: GrantFiled: December 18, 2015Date of Patent: August 6, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Patent number: 10298672Abstract: Previous solutions to the problem of maintaining up-to-date network device addressing, fail to provide systems or processes that efficiently share and obtain addressing information of networking devices in a given network. By contrast, and to that end, various implementations disclosed herein include systems, methods and apparatuses that generate a registry request message, where the registry request message includes a first portion characterized by a first write privilege and a second portion characterized by a second write privilege different from the first write privilege. The systems, methods and apparatuses convey the registry request message to a shared contact point network entity, and obtain a response message addressed from the shared contact point network entity, where the response message includes peer addressing information corresponding to one or more peer network devices associated with the aforementioned systems, methods and apparatuses.Type: GrantFiled: December 18, 2015Date of Patent: May 21, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20190141761Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: ApplicationFiled: May 18, 2018Publication date: May 9, 2019Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Patent number: 10284521Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic security list offload with exponential timeout. A second layer of a firewall can determine that a first data, that previously passed through a first layer of the firewall, should be blocked. The second layer of the firewall can utilize more resources than the first layer of the firewall to determine whether to block a data packet. In response, a first rule can be applied at the first layer of the firewall to block data packets received from a source of the first data packet. Accordingly, a second data packet received from the source of the first data packet will be blocked at the first layer of the firewall based on the first rule.Type: GrantFiled: August 17, 2016Date of Patent: May 7, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Shanks, Daghan Altas
-
Patent number: 9980303Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: GrantFiled: December 18, 2015Date of Patent: May 22, 2018Assignee: CISCO TECHNOLOGY, INC.Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20180062924Abstract: Disclosed are systems, methods, and computer-readable storage media for recommending configurations for a client networking environment based on aggregated cloud managed information. A cloud network management device can receive a first set of infrastructure specifications describing a first client networking environment. The cloud network management device can determine a set of recommended configurations for the first client networking environment based on the first set of infrastructure specifications and configurations for one or more client networking environments determined to be similar to the first client networking environment. The cloud network management device can provide the set of recommended configurations to a client device associated with the first client networking environment.Type: ApplicationFiled: August 23, 2016Publication date: March 1, 2018Inventors: Robert Shanks, Daghan Altas, Justin Delegard, Ryan Reading, Nathaniel Brahms
-
Publication number: 20180063085Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic firewall configuration based on aggregated cloud managed information. A cloud management device can determine, based on security event data received from a first set of client computing environments, that a security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments. In response to determining that the security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments, the cloud management device can identify a second set of client computing environments to protect from the security attack. For each client computing environment from the second set of client computing environments, the cloud management device can configure firewall settings to protect from the security attack.Type: ApplicationFiled: August 23, 2016Publication date: March 1, 2018Inventors: Robert Shanks, Daghan Altas
-
Publication number: 20180054419Abstract: Disclosed are systems, methods, and computer-readable storage media for automatic security list offload with exponential timeout. A second layer of a firewall can determine that a first data, that previously passed through a first layer of the firewall, should be blocked. The second layer of the firewall can utilize more resources than the first layer of the firewall to determine whether to block a data packet. In response, a first rule can be applied at the first layer of the firewall to block data packets received from a source of the first data packet. Accordingly, a second data packet received from the source of the first data packet will be blocked at the first layer of the firewall based on the first rule.Type: ApplicationFiled: August 17, 2016Publication date: February 22, 2018Inventors: Robert Shanks, Daghan Altas
-
Publication number: 20170180155Abstract: Various implementations disclosed herein include systems, methods and apparatuses that involve a first device selecting a data tunnel for sending packets of a determined network traffic type to another device. For example, in some implementations, a method includes a first device receiving a first group of packets for forwarding to a second device. The method includes the first device retrieving packet-forwarding rules for forwarding the first group of packets, and selecting a first private network data tunnel from a plurality of private network data tunnels between the first device and the second device, for forwarding a first packet of the first group of packets, based on satisfaction of the retrieved packet-forwarding rules. A respective private network data tunnel is associated with a respective uplink of a plurality of uplinks of the first network device. The first private network data tunnel is associated with a first uplink of the first device.Type: ApplicationFiled: December 18, 2015Publication date: June 22, 2017Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig
-
Publication number: 20170181203Abstract: Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device associated with the first device, as a peer device in a private network, where the contact point information of the second device includes one or more peer uplink identifiers and each respective peer uplink identifier corresponds to a respective peer device uplink of the second device. The systems, methods and apparatuses establish a first private network data tunnel from a first uplink of the first device to the second device, using the contact point information of the second device, and a first uplink identifier associated with the first uplink, and establish a second private network data tunnel from a second uplink of the first device to the second device, using the contact point information of the second device, and a second uplink identifier associated with the second uplink.Type: ApplicationFiled: December 18, 2015Publication date: June 22, 2017Inventors: Robert Tristan Shanks, Jignesh Devji Patel, Patrick Douglas Verkaik, Selahattin Daghan Altas, Joseph Morgan Aronow, Justin Delegard, Dylan Jason Koenig