Patents by Inventor Moisey Akerman

Moisey Akerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9800608
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Grant
    Filed: December 31, 2010
    Date of Patent: October 24, 2017
    Assignee: Symantec Corporation
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Patent number: 9525696
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: December 20, 2016
    Assignee: Blue Coat Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20160366160
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: April 25, 2016
    Publication date: December 15, 2016
    Applicant: Blue Coat Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20160191571
    Abstract: A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.
    Type: Application
    Filed: January 14, 2016
    Publication date: June 30, 2016
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Patent number: 9244739
    Abstract: A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: January 26, 2016
    Assignee: Blue Coat Systems, Inc.
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Patent number: 8402540
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: March 19, 2013
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20120240185
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: March 9, 2012
    Publication date: September 20, 2012
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Patent number: 8135657
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: August 24, 2011
    Date of Patent: March 13, 2012
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20120017262
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: August 24, 2011
    Publication date: January 19, 2012
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20110238783
    Abstract: A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.
    Type: Application
    Filed: December 29, 2010
    Publication date: September 29, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110238839
    Abstract: A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.
    Type: Application
    Filed: December 29, 2010
    Publication date: September 29, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110238855
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Application
    Filed: December 31, 2010
    Publication date: September 29, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110231513
    Abstract: A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.
    Type: Application
    Filed: December 29, 2010
    Publication date: September 22, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110231925
    Abstract: A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups.
    Type: Application
    Filed: December 29, 2010
    Publication date: September 22, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110231564
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Application
    Filed: December 31, 2010
    Publication date: September 22, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110231510
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Application
    Filed: December 31, 2010
    Publication date: September 22, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110219035
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Application
    Filed: December 30, 2010
    Publication date: September 8, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110213869
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Application
    Filed: December 31, 2010
    Publication date: September 1, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Publication number: 20110214157
    Abstract: An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.
    Type: Application
    Filed: December 30, 2010
    Publication date: September 1, 2011
    Inventors: Yevgeny Korsunsky, Moisey Akerman
  • Patent number: 8010469
    Abstract: Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security are described. Such flow processing facilities may be used for inspecting network traffic packet payloads to detect security threats and intrusions across accessible layers of the network IP stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: August 30, 2011
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu