Patents by Inventor Moisey Akerman
Moisey Akerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7979368Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: GrantFiled: October 29, 2007Date of Patent: July 12, 2011Assignee: Crossbeam Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Patent number: 7836443Abstract: An apparatus and method to distribute applications and services throughout a network, including switch functionality and the ability to apply applications and services to received data according to subscriber profiles. Network Processor Modules (NPMs) receive and recognize data flows from subscribers, extract profile information for the subscribers, and utilize flow scheduling techniques to forward the data to Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. The MS can download and otherwise control applications on the FPMs to provide an open architecture for downloading, executing, modifying, and otherwise managing applications.Type: GrantFiled: July 1, 2005Date of Patent: November 16, 2010Assignee: Crossbeam Systems, Inc.Inventors: Moisey Akerman, Stephen D. Justus
-
Publication number: 20100042565Abstract: A mezzanine adapter based data processing facility provides in-depth data analysis that is presented as a digest of advanced statistics and network measures including latency data, content analysis, bidirectional flow related characteristics, multiple flow related statistics over a count of connections or over a period of time, and the like.Type: ApplicationFiled: August 11, 2009Publication date: February 18, 2010Applicant: Crossbeam Systems, Inc.Inventor: Moisey AKERMAN
-
Publication number: 20080262991Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 29, 2007Publication date: October 23, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080262990Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 29, 2007Publication date: October 23, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080229415Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 29, 2007Publication date: September 18, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080162390Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: July 3, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080133517Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: June 5, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080134330Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: June 5, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080133518Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: June 5, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20070192863Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: December 13, 2006Publication date: August 16, 2007Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, JC Ferguson, Yevgeny Korsunsky, Paul Gallo, Charles Lee, Timothy Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20060010207Abstract: An apparatus and method to distribute applications and services in and throughout a network. The apparatus includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.Type: ApplicationFiled: July 1, 2005Publication date: January 12, 2006Applicant: Crossbeam Systems, Inc.Inventors: Moisey Akerman, Stephen Justus
-
Publication number: 20020165947Abstract: An apparatus and method to distribute applications and services in and throughout a network. The apparatus includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMS. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.Type: ApplicationFiled: February 21, 2001Publication date: November 7, 2002Applicant: Crossbeam Systems, Inc.Inventors: Moisey Akerman, Stephen D. Justus