Patents by Inventor Ron Talmor
Ron Talmor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9378005Abstract: Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.Type: GrantFiled: April 12, 2013Date of Patent: June 28, 2016Assignee: Foundry Networks, LLCInventors: Rajiv Ramanathan, Ron Talmor, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge
-
Patent number: 9270766Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.Type: GrantFiled: December 30, 2011Date of Patent: February 23, 2016Assignee: F5 Networks, Inc.Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
-
Publication number: 20160014033Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network, policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.Type: ApplicationFiled: July 11, 2014Publication date: January 14, 2016Applicant: F5 Networks, Inc.Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
-
Publication number: 20150142948Abstract: Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine.Type: ApplicationFiled: November 15, 2013Publication date: May 21, 2015Applicant: F5 NETWORKS, INC.Inventors: Paul I. Szabo, Gennady Dosovitsky, Ron Talmor, Jeroen de Borst, David A. Hansen
-
Patent number: 8627467Abstract: A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction.Type: GrantFiled: October 19, 2011Date of Patent: January 7, 2014Assignee: F5 Networks, Inc.Inventors: Yuval Levy, Ron Talmor, Beni Serfaty
-
Patent number: 8522311Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.Type: GrantFiled: January 23, 2012Date of Patent: August 27, 2013Assignee: Foundry Networks, LLCInventors: Mehul Dholakia, Ron Talmor
-
Patent number: 8509106Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.Type: GrantFiled: October 4, 2010Date of Patent: August 13, 2013Assignee: Foundry Networks, LLCInventors: Sheng-Yih Wang, Ron Talmor
-
Publication number: 20130173779Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.Type: ApplicationFiled: December 30, 2011Publication date: July 4, 2013Applicant: F5 NETWORKS, INC.Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
-
Patent number: 8448162Abstract: Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.Type: GrantFiled: December 27, 2006Date of Patent: May 21, 2013Assignee: Foundry Networks, LLCInventors: Rajiv Ramanathan, Ron Talmor, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge
-
Publication number: 20120297447Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.Type: ApplicationFiled: January 23, 2012Publication date: November 22, 2012Applicant: Foundry Networks, LLCInventors: Mehul Dholakia, Ron Talmor
-
Publication number: 20120185937Abstract: A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction.Type: ApplicationFiled: October 19, 2011Publication date: July 19, 2012Applicant: F5 NETWORKS, INC.Inventors: Yuval Levy, Ron Talmor, Beni Serfaty
-
Patent number: 8122485Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.Type: GrantFiled: October 1, 2010Date of Patent: February 21, 2012Assignee: Foundry Networks, LLCInventors: Mehul Dholakia, Ron Talmor
-
Publication number: 20110113490Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.Type: ApplicationFiled: October 4, 2010Publication date: May 12, 2011Applicant: Foundry Networks, LLCInventors: Sheng-Yih Wang, Ron Talmor
-
Publication number: 20110107399Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.Type: ApplicationFiled: October 1, 2010Publication date: May 5, 2011Applicant: Foundry Networks, LLCInventors: Mehul Dholakia, Ron Talmor
-
Patent number: 7832009Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.Type: GrantFiled: December 26, 2006Date of Patent: November 9, 2010Assignee: Foundry Networks, LLCInventors: Sheng-Yih Wang, Ron Talmor
-
Patent number: 7831996Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.Type: GrantFiled: July 31, 2006Date of Patent: November 9, 2010Assignee: Foundry Networks, LLCInventors: Mehul Dholakia, Ron Talmor
-
Publication number: 20100077447Abstract: Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.Type: ApplicationFiled: July 31, 2006Publication date: March 25, 2010Applicant: Foundry Networks, Inc.Inventors: Mehul Dholakia, Ron Talmor
-
Publication number: 20090300759Abstract: Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.Type: ApplicationFiled: December 26, 2006Publication date: December 3, 2009Applicant: Foundry Networks, Inc.Inventors: Sheng-Yih Wang, Ron Talmor
-
Publication number: 20090279549Abstract: Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.Type: ApplicationFiled: December 27, 2006Publication date: November 12, 2009Applicant: Foundry Networks, Inc.Inventors: Rajiv Ramanathan, Ron Talmor, Shao-Kong Kao, Anthony Ho, Rudramahesh Rugge
-
Patent number: 7080179Abstract: Multiple levels of interrupts to be utilized in a computer system, which allows, for example, an interrupt with an interrupt level associated with an application to be distinct from an interrupt with an interrupt level associated with a kernel. The kernel level interrupt may be handled quickly via its own handler, while the application level interrupt may be handled more slowly. This may be accomplished by first determining if a first-level handler is installed for the interrupt source. If so, then it may be called. Otherwise, the interrupt source may be masked and a second-level handler may be called. Once this second-level handler has completed its tasks, the interrupt source may then be unmasked. Implementations with three or more levels of interrupt are also possible.Type: GrantFiled: March 26, 2004Date of Patent: July 18, 2006Assignee: Foundry Networks, Inc.Inventors: Changbai He, Ron Talmor