Patents by Inventor Nir Zuk

Nir Zuk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100132030
    Abstract: Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data packet, determining a single flow record associated with the packet and extracting flow instructions for two or more devices from the single flow record.
    Type: Application
    Filed: October 8, 2009
    Publication date: May 27, 2010
    Applicant: JUNIPER NETWORKS, INC.
    Inventor: Nir ZUK
  • Patent number: 7650634
    Abstract: Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data packet, determining a single flow record associated with the packet and extracting flow instructions for two or more devices from the single flow record.
    Type: Grant
    Filed: March 28, 2003
    Date of Patent: January 19, 2010
    Assignee: Juniper Networks, Inc.
    Inventor: Nir Zuk
  • Publication number: 20080253366
    Abstract: Methods and apparatus for processing data packets in a computer network are described. One general method includes receiving a data packet; examining the data packet to classify the data packet including classifying the data packet as a L2 or L3 packet and including determining at least one zone associated with the packet; processing the packet in accordance with one or more policies associated with the zone; determining forwarding information associated with the data packet; and if one or more policies permit, forwarding the data packet toward an intended destination using the forwarding information.
    Type: Application
    Filed: April 11, 2007
    Publication date: October 16, 2008
    Inventors: Nir Zuk, Yuming Mao, Haoying Xu, Arnit Green
  • Publication number: 20080155697
    Abstract: Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.
    Type: Application
    Filed: December 6, 2007
    Publication date: June 26, 2008
    Applicant: Juniper Networks, Inc.
    Inventor: Nir ZUK
  • Patent number: 7325002
    Abstract: Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.
    Type: Grant
    Filed: April 4, 2003
    Date of Patent: January 29, 2008
    Assignee: Juniper Networks, Inc.
    Inventor: Nir Zuk
  • Publication number: 20070297333
    Abstract: Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header data and content. One method includes receiving a data packet, examining the data packet to classify the data packet including classifying the data packet using information included in the header and content, determining flow instructions for processing the packet based on both the header information and the content and processing of the packet using the flow instructions.
    Type: Application
    Filed: June 26, 2006
    Publication date: December 27, 2007
    Inventors: Nir Zuk, Song Wang, Siu-Wang Leung, Fengmin Gong
  • Publication number: 20060005231
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Application
    Filed: October 12, 2004
    Publication date: January 5, 2006
    Inventors: Nir Zuk, Yu Mao, Kowsik Guruswamy
  • Publication number: 20040199535
    Abstract: Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.
    Type: Application
    Filed: April 4, 2003
    Publication date: October 7, 2004
    Inventor: Nir Zuk
  • Publication number: 20040030927
    Abstract: Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data packet, determining a single flow record associated with the packet and extracting flow instructions for two or more devices from the single flow record.
    Type: Application
    Filed: March 28, 2003
    Publication date: February 12, 2004
    Inventor: Nir Zuk
  • Publication number: 20030154399
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Application
    Filed: February 8, 2002
    Publication date: August 14, 2003
    Inventors: Nir Zuk, Kowsik Guruswamy
  • Patent number: 5835726
    Abstract: The present invention discloses a novel system for controlling the inbound and outbound data packet flow in a computer network. By controlling the packet flow in a computer network, private networks can be secured from outside attacks in addition to controlling the flow of packets from within the private network to the outside world. A user generates a rule base which is then converted into a set of filter language instruction. Each rule in the rule base includes a source, destination, service, whether to accept or reject the packet and whether to log the event. The set of filter language instructions are installed and execute on inspection engines which are placed on computers acting as firewalls. The firewalls are positioned in the computer network such that all traffic to and from the network to be protected is forced to pass through the firewall. Thus, packets are filtered as they flow into and out of the network in accordance with the rules comprising the rule base.
    Type: Grant
    Filed: June 17, 1996
    Date of Patent: November 10, 1998
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Gil Shwed, Shlomo Kramer, Nir Zuk, Gil Dogon, Ehud Ben-Reuven