Patents by Inventor Ron Talmor

Ron Talmor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9378005
    Abstract: Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.
    Type: Grant
    Filed: April 12, 2013
    Date of Patent: June 28, 2016
    Assignee: Foundry Networks, LLC
    Inventors: Rajiv Ramanathan, Ron Talmor, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge
  • Patent number: 9270766
    Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: February 23, 2016
    Assignee: F5 Networks, Inc.
    Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
  • Publication number: 20160014033
    Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network, policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.
    Type: Application
    Filed: July 11, 2014
    Publication date: January 14, 2016
    Applicant: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
  • Publication number: 20150142948
    Abstract: Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine.
    Type: Application
    Filed: November 15, 2013
    Publication date: May 21, 2015
    Applicant: F5 NETWORKS, INC.
    Inventors: Paul I. Szabo, Gennady Dosovitsky, Ron Talmor, Jeroen de Borst, David A. Hansen
  • Patent number: 8627467
    Abstract: A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction.
    Type: Grant
    Filed: October 19, 2011
    Date of Patent: January 7, 2014
    Assignee: F5 Networks, Inc.
    Inventors: Yuval Levy, Ron Talmor, Beni Serfaty
  • Patent number: 8522311
    Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.
    Type: Grant
    Filed: January 23, 2012
    Date of Patent: August 27, 2013
    Assignee: Foundry Networks, LLC
    Inventors: Mehul Dholakia, Ron Talmor
  • Patent number: 8509106
    Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.
    Type: Grant
    Filed: October 4, 2010
    Date of Patent: August 13, 2013
    Assignee: Foundry Networks, LLC
    Inventors: Sheng-Yih Wang, Ron Talmor
  • Publication number: 20130173779
    Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
    Type: Application
    Filed: December 30, 2011
    Publication date: July 4, 2013
    Applicant: F5 NETWORKS, INC.
    Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
  • Patent number: 8448162
    Abstract: Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.
    Type: Grant
    Filed: December 27, 2006
    Date of Patent: May 21, 2013
    Assignee: Foundry Networks, LLC
    Inventors: Rajiv Ramanathan, Ron Talmor, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge
  • Publication number: 20120297447
    Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.
    Type: Application
    Filed: January 23, 2012
    Publication date: November 22, 2012
    Applicant: Foundry Networks, LLC
    Inventors: Mehul Dholakia, Ron Talmor
  • Publication number: 20120185937
    Abstract: A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction.
    Type: Application
    Filed: October 19, 2011
    Publication date: July 19, 2012
    Applicant: F5 NETWORKS, INC.
    Inventors: Yuval Levy, Ron Talmor, Beni Serfaty
  • Patent number: 8122485
    Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.
    Type: Grant
    Filed: October 1, 2010
    Date of Patent: February 21, 2012
    Assignee: Foundry Networks, LLC
    Inventors: Mehul Dholakia, Ron Talmor
  • Publication number: 20110113490
    Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.
    Type: Application
    Filed: October 4, 2010
    Publication date: May 12, 2011
    Applicant: Foundry Networks, LLC
    Inventors: Sheng-Yih Wang, Ron Talmor
  • Publication number: 20110107399
    Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.
    Type: Application
    Filed: October 1, 2010
    Publication date: May 5, 2011
    Applicant: Foundry Networks, LLC
    Inventors: Mehul Dholakia, Ron Talmor
  • Patent number: 7832009
    Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.
    Type: Grant
    Filed: December 26, 2006
    Date of Patent: November 9, 2010
    Assignee: Foundry Networks, LLC
    Inventors: Sheng-Yih Wang, Ron Talmor
  • Patent number: 7831996
    Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: November 9, 2010
    Assignee: Foundry Networks, LLC
    Inventors: Mehul Dholakia, Ron Talmor
  • Publication number: 20100077447
    Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.
    Type: Application
    Filed: July 31, 2006
    Publication date: March 25, 2010
    Applicant: Foundry Networks, Inc.
    Inventors: Mehul Dholakia, Ron Talmor
  • Publication number: 20090300759
    Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.
    Type: Application
    Filed: December 26, 2006
    Publication date: December 3, 2009
    Applicant: Foundry Networks, Inc.
    Inventors: Sheng-Yih Wang, Ron Talmor
  • Publication number: 20090279549
    Abstract: Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.
    Type: Application
    Filed: December 27, 2006
    Publication date: November 12, 2009
    Applicant: Foundry Networks, Inc.
    Inventors: Rajiv Ramanathan, Ron Talmor, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge
  • Patent number: 7080179
    Abstract: Multiple levels of interrupts to be utilized in a computer system, which allows, for example, an interrupt with an interrupt level associated with an application to be distinct from an interrupt with an interrupt level associated with a kernel. The kernel level interrupt may be handled quickly via its own handler, while the application level interrupt may be handled more slowly. This may be accomplished by first determining if a first-level handler is installed for the interrupt source. If so, then it may be called. Otherwise, the interrupt source may be masked and a second-level handler may be called. Once this second-level handler has completed its tasks, the interrupt source may then be unmasked. Implementations with three or more levels of interrupt are also possible.
    Type: Grant
    Filed: March 26, 2004
    Date of Patent: July 18, 2006
    Assignee: Foundry Networks, Inc.
    Inventors: Changbai He, Ron Talmor