Patents by Inventor Yehiel Shtein

Yehiel Shtein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7979694
    Abstract: A method for authenticating communication traffic includes intercepting a request directed over a network from a source address to open a connection to a target computer in accordance with a handshake procedure specified by a predetermined communication protocol. A reply to the request that deviates from the specified handshake procedure is sent to the source address. A response from the source address to the reply is analyzed in order to make an assessment of legitimacy of the source address. Upon determining, based on the assessment, that the source address is legitimate, the target computer is permitted to complete the handshake procedure so as to open the connection with the source address.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: July 12, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Dan Touitou, Guy Pazi, Yehiel Shtein, Rephael Tzadikario
  • Patent number: 7653938
    Abstract: A method for processing communication traffic includes receiving a data packet sent over a network from a source address and reading a value of an attribute from the data packet. The value is hashed to determine a key, which is used as an index in extracting a tag from a table of random values. A decision is made using the tag regarding forwarding of the communication traffic from the source address.
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: January 26, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Dan Touitou, Guy Pazi, Yehiel Shtein
  • Publication number: 20050021999
    Abstract: A method for authenticating communication traffic includes intercepting a request directed over a network from a source address to open a connection to a target computer in accordance with a handshake procedure specified by a predetermined communication protocol. A reply to the request that deviates from the specified handshake procedure is sent to the source address. A response from the source address to the reply is analyzed in order to make an assessment of legitimacy of the source address. Upon determining, based on the assessment, that the source address is legitimate, the target computer is permitted to complete the handshake procedure so as to open the connection with the source address.
    Type: Application
    Filed: March 2, 2004
    Publication date: January 27, 2005
    Applicant: RIVERHEAD NETWORKS INC.
    Inventors: Dan Touitou, Guy Pazi, Yehiel Shtein, Rephael Tzadikario