Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

A10 Networks Inc
A10 Networks Incorporated

A10 Networks Inc patents


Recent patent applications related to A10 Networks Inc. A10 Networks Inc is listed as an Agent/Assignee. Note: A10 Networks Inc may have other listings under different names/spellings. We're not affiliated with A10 Networks Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | A10 Networks Inc-related inventors


Captcha risk or score techniques

Captcha risk or score technique systems and methods are presented. A method can begin with extracting client information from the service request. The extracted client information may be used to determine if the client device has been identified as a computer bot. A captcha is also selected in response to... A10 Networks Inc

Ssl gateway with integrated hardware security module

A security network system may include a security gateway operable to establish a client session between the security gateway and a client device. The security gateway is operable to receive client session information from the client session. The client session information includes an identification of a server with which the... A10 Networks Inc

Mitigating tcp syn ddos attacks using tcp reset

Provided are methods and systems for mitigating a denial of service attack. A system for mitigating a denial of service attack may include a network module, a storage module, and a processor module. The network module may be operable to receive a request from a network device to establish a... A10 Networks Inc

Automatic capture of network data for a detected anomaly

Methods and systems are provided for automatically capturing network data for a detected anomaly. In some examples, a network node establishes a baseline usage by applying at least one baselining rule to network traffic to generate baseline statistics, detects an anomaly usage by applying at least one anomaly rule to... A10 Networks Inc

Intercepting secure session upon receipt of untrusted certificate

A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device... A10 Networks Inc

System and customizing the identification of application or content type

Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection. Programming language constructs are introduced that facilitate the writing of modules customized to identify network traffic... A10 Networks Inc

Hardware-based packet editor

Hardware-based packet editor receives a packet editing script which includes script entries indicating modifications to a data packet and a data block with data for the modified data packet. For a script entry in the packet editing script, the packet editor copies data in the data block at a block... A10 Networks Inc

Load distribution in data networks

Provided are methods and systems for load distribution in a data network. A method for load distribution in the data network comprises retrieving network data associated with the data network and service node data associated with one or more service nodes. The method further comprises analyzing the retrieved network data... A10 Networks Inc

System and method to associate a private user identity with a public user identity

The system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the... A10 Networks Inc

Applying security policy to an application session

Applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway, determining by the security gateway a user identity of the application session using information about the application session, obtaining by the security gateway the security policy comprising... A10 Networks Inc

Context aware threat protection

Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated... A10 Networks Inc

System and method to process a chain of network applications

Facilitation of processing a chain of network applications by a network controller is provided herein. In some examples, a network controller comprising a fast path module receives a service request data packet from a client side session between a client and the network controller and determines that the service request... A10 Networks Inc

Processing packet header with hardware assistance

In processing data packet headers, a packet pre-processor is configured with at least one predetermined header field identifier. The packet pre-processor detects at least one header field identifier in a header field of a data packet received over a communication session between a host and a server, matches the predetermined... A10 Networks Inc

Distributing application traffic to servers based on dynamic service response time

A service gateway processes a service request received from a host based on a dynamic service response time of a server. In an exemplary embodiment, the service gateway relays a service request to a server over a service session between the service gateway and the server; receives a service response... A10 Networks Inc

Exchange of control information between secure socket layer gateways

Provided are a method and a system for exchanging control information between secure socket layer (SSL) gateways. The method may commence with intercepting, by a client facing node, a client request including session-specific information and a session request to establish an SSL communication session between a client and a server.... A10 Networks Inc

Implementation of secure socket layer intercept

Provided are methods and systems for inspecting secure data. A system for inspecting secure data comprises a server facing module, and a client facing module in communication with the server facing module. The client facing module is operable to intercept a client request associated with the secure data to establish... A10 Networks Inc

Synchronization of configuration file of virtual application distribution chassis

Methods and systems for synchronization of configuration files of a plurality of blades in a virtual application distribution chassis are disclosed. In an exemplary method, a master blade processes a configuration command, updates a first configuration file with the configuration command and generates an updated tag, and sends a configuration... A10 Networks Inc

Perfect forward secrecy distributed denial of service attack defense

Provided are methods and systems for mitigating a DoS attack. A method for mitigating a DoS attack may commence with receiving, from a client, a request to initiate a secure session between the client and a server. The method may continue with determining whether the client is on a whitelist.... A10 Networks Inc

Reducing buffer usage for tcp proxy session based on delayed acknowledgement

Reducing buffer usage for a TCP proxy session between a client and a server by a service gateway includes: determining a first round trip time (RTT) for a server side TCP session and determining a second RTT for a client side TCP session; comparing the first RTT with the second... A10 Networks Inc

Forwarding policies on a virtual service network

In providing packet forwarding policies in a virtual service network that includes a network node and a pool of service load balancers serving a virtual service, the network node: receives a virtual service session request from a client device, the request including a virtual service network address for the virtual... A10 Networks Inc

Secure data flow open information analytics

Provided are methods and systems for processing a secure data flow. An example method for processing a secure data flow includes receiving a data packet, determining network conditions associated with the data traffic, and determining that the data packet is associated with the secure data flow. Upon determination that the... A10 Networks Inc

Automated adjustment of subscriber policies

Provided are methods and systems for adjusting of subscriber policies. A method for adjusting of subscriber policies may include applying traffic enforcement rules to a data traffic associated with a subscriber. The method can further include determining network conditions associated with the data traffic. The method can include modifying, based... A10 Networks Inc

Transmission control of protocol state exchange for dynamic stateful service insertion

Provided are methods and systems for a Transmission Control Protocol (TCP) state handoff of a data traffic flow. A method for a TCP state handoff of a data traffic flow comprises determining a TCP state at predetermined times by a state machine unit. The TCP state includes data concerning a... A10 Networks Inc

Applying security policy to an application session

Applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway, determining by the security gateway a user identity of the application session using information about the application session, obtaining by the security gateway the security policy comprising... A10 Networks Inc

Virtual application delivery chassis system

A method for electing a master blade in a virtual application distribution chassis (VADC), includes: sending by each blade a VADC message to each of the other blades; determining by each blade that the VADC message was not received from the master blade within a predetermined period of time; in... A10 Networks Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with A10 Networks Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for A10 Networks Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###