Patents by Inventor Rafi Zadikario

Rafi Zadikario has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7536552
    Abstract: A method for authenticating communication traffic includes receiving a first message, sent over a network from a source address, requesting information from a server in accordance with a higher-level protocol. A challenge is sent to the source address in reply to the first message, in accordance with the higher-level protocol. A second message is received from the source address following the challenge, and the legitimacy of the source address is assessed by determining whether the second message contains a correct response to the challenge.
    Type: Grant
    Filed: January 24, 2005
    Date of Patent: May 19, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Dan Touitou, Rafi Zadikario
  • Publication number: 20060212572
    Abstract: A method for screening packet-based communication traffic. At least a first data packet, sent over a network from a source address to a destination address, is received. A determination is made, by analyzing the first data packet, that the first data packet was generated by a worm. In response to the determination, a second data packet sent over the network from the source address is blocked.
    Type: Application
    Filed: July 14, 2005
    Publication date: September 21, 2006
    Inventors: Yehuda Afek, Rafi Zadikario, Dan Touitou, Anat Bremler Bar
  • Publication number: 20050166049
    Abstract: A method for authenticating communication traffic includes receiving a first message, sent over a network from a source address, requesting information from a server in accordance with a higher-level protocol. A challenge is sent to the source address in reply to the first message, in accordance with the higher-level protocol. A second message is received from the source address following the challenge, and the legitimacy of the source address is assessed by determining whether the second message contains a correct response to the challenge.
    Type: Application
    Filed: January 24, 2005
    Publication date: July 28, 2005
    Inventors: Dan Touitou, Rafi Zadikario