Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

A10 Networks Inc patents


Recent patent applications related to A10 Networks Inc. A10 Networks Inc is listed as an Agent/Assignee. Note: A10 Networks Inc may have other listings under different names/spellings. We're not affiliated with A10 Networks Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | A10 Networks Inc-related inventors


Fault resilient virtual broadband gateway

Provided are methods and systems for providing a fault resilient virtual broadband gateway. A fault resilient virtual broadband gateway system may include a primary network node, at least one secondary node, and a controller. ... A10 Networks Inc

Distributed global server load balancing controllers sharing service delay time

A method and system for selecting a server load balancer (slb) for processing requests associated with a client are provided. The method may commence with receiving a domain name system (dns) request from a client dns server associated with the client. ... A10 Networks Inc

Caching network generated security certificates

Provided are methods and systems for caching network generated security certificates. An example system may include a security gateway node and a storage module. ... A10 Networks Inc

System and method to balance servers based on server load status

Provided are methods and systems for balancing servers based on a server load status. A method for balancing servers based on a server load status may commence with receiving, from a server of a plurality of servers, a service response to a service request. ... A10 Networks Inc

Determining an application delivery server based on geo-location information

A method for web service load balancing may commence with receiving, from a local dns server, a request for a web service. The local dns server may be coupled to a web client requesting the web service. ... A10 Networks Inc

Application aware systems and methods to process user loadable network applications

Described herein are methods and systems for application aware fastpath processing over a data network. In some examples, application fastpath operates to facilitate application specific fastpath processing of data packets transferred between a client device and a server device over a network session of a data network.. ... A10 Networks Inc

Dynamic session rate limiter

Provided are methods and systems for dynamically limiting new sessions. A method for dynamically limiting new sessions may commence with initiating a dynamic session rate limiter based on predetermined criteria. ... A10 Networks Inc

Active application response delay time

Provided are methods and systems for load balancing client requests between sites associated with a domain name. A method comprises determining a first active response delay time between a domain name system server and a first site. ... A10 Networks Inc

Measurement of application response delay time

A method and system for measuring application response delay is described. The method may commence with receiving a domain name system (dns) request from a client dns server. ... A10 Networks Inc

Distributing application traffic to servers based on dynamic service response time

Provided are methods and systems for distributing application traffic. A method for distributing application traffic may commence with receiving, from a host, a first service request for a first service session. ... A10 Networks Inc

Synchronization of configuration file of virtual application distribution chassis

Methods and systems for synchronization of configuration files of a plurality of blades in a virtual application distribution chassis are disclosed. In an exemplary method, a master blade processes a configuration command, updates a first configuration file with the configuration command and generates an updated tag, and sends a configuration message to at least one slave blade of the virtual application distribution chassis informing of the updated configuration file. ... A10 Networks Inc

Verification of server certificates using hash codes

Described are systems and methods for verifying server security certificates using hash codes. The system may include a client secure socket layer (ssl) node, a service gateway node, and a storage node. ... A10 Networks Inc

Combining stateless and stateful server load balancing

The processing of data packets sent over a communication session between a host and a server by a service gateway includes processing a data packet using a current hybrid-stateful or hybrid-stateless processing method. The processing then checks whether a hybrid-stateless or hybrid-stateful condition is satisfied. ... A10 Networks Inc

Health monitor based distributed denial of service attack mitigation

Provided are methods and systems for mitigating a ddos event. The method may comprise receiving an indication of a collapse of a collapsible virtual data circuit associated with network data traffic. ... A10 Networks Inc

05/03/18 / #20180124052

Facilitating secure network traffic by an application delivery controller

Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data packet with information from a client indicating that the client is a trusted source; (b) embedding in the data packet a transmission control protocol (tcp) options header, the tcp options header comprising information including at least a sequence number for a protocol connection; and (c) forwarding the embedded data packet to a server.. ... A10 Networks Inc

05/03/18 / #20180123926

Distributed system to determine a server's health

Exemplary embodiments for a distributed system for determining a server's health are disclosed. The systems and methods provide for a network controller to direct one or more servicing nodes to check the health of one or more servers, and report a health score to the network controller. ... A10 Networks Inc

04/12/18 / #20180102945

Graceful scaling in software driven networks

Provided are methods and systems for graceful scaling of data networks. In one example, an indication of removal of a node from a plurality of nodes of the data network is received. ... A10 Networks Inc

04/05/18 / #20180097796

Location determination for user authentication

User authentication techniques based on geographical locations associated with a client device are provided. An example method for authentication of the client device includes receiving an authentication request from the client device. ... A10 Networks Inc

04/05/18 / #20180097736

Application delivery controller and global server load balancer

Application delivery controller (adc), global server load balancer (gslb), and methods for their operation in data networks are disclosed. The methods for load balancing may include receiving a query concerning a host name from a client, determining that there are two or more host servers associated with the host name, measuring various metrics associated with each of the two or more host servers and a local doman name server (dns), and based at least in part on the measurement, selecting a host server among the two or more host servers. ... A10 Networks Inc

03/29/18 / #20180091429

Processing packet header with hardware assistance

Methods and systems for load balancing are disclosed. An example method for load balancing commences with receiving a data packet from a host device. ... A10 Networks Inc

03/29/18 / #20180091389

System and method of updating modules for application or content identification

Provided are computer-implemented methods and systems for transitioning between traffic classification modules. An example method for transitioning between traffic classification modules may include processing a plurality of packets associated with a plurality of sessions by a first collection of traffic-classification modules. ... A10 Networks Inc

03/22/18 / #20180083997

Context aware threat protection

Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. ... A10 Networks Inc

03/08/18 / #20180069753

Enabling planned upgrade/downgrade of network devices without impacting network sessions

Exemplary embodiments for enabling planned network changes such as an upgrade or downgrade of a network device are disclosed. The systems and methods provide for planned upgrades and downgrades for network devices without impacting existing network sessions, by utilizing two network devices simultaneously, and creating a redirect network session for a predetermined period of time. ... A10 Networks Inc

02/22/18 / #20180054478

Virtual application delivery chassis system

A method for electing a master blade in a virtual application distribution chassis (vadc), includes: sending by each blade a vadc message to each of the other blades; determining by each blade that the vadc message was not received from the master blade within a predetermined period of time; in response, sending a master claim message including a blade priority by each blade to the other blades; determining by each blade whether any of the blade priorities obtained from the received master claim messages is higher than the blade priority of the receiving blade; in response to determining that none of the blade priorities obtained is higher, setting a status of a given receiving blade to a new master blade; and sending by the given receiving blade a second vadc message to the other blades indicating the status of the new master blade of the given receiving blade.. . ... A10 Networks Inc

02/22/18 / #20180054459

Systems and methods for network access control

Network access control systems and methods are provided herein. A method includes receiving at a network device a syn packet from a client device over a network, determining if the client device is a trusted source for the network using the syn packet, if the client device is a trusted resource, receiving an acknowledgement (ack) packet from the client device that includes identifying information for the client device plus an additional value, and identifying information for the network device, and establishing a connection with the network for the client device.. ... A10 Networks Inc

02/01/18 / #20180034848

Mitigating tcp syn ddos attacks using tcp reset

Provided are methods and systems for mitigating a denial of service attack. A system for mitigating a denial of service attack may include a network module, a storage module, and a processor module. ... A10 Networks Inc

02/01/18 / #20180034643

Ssl gateway with integrated hardware security module

A security network system may include a security gateway operable to establish a client session between the security gateway and a client device. The security gateway is operable to receive client session information from the client session. ... A10 Networks Inc

01/18/18 / #20180019931

Automatic capture of network data for a detected anomaly

Methods and systems are provided for automatically capturing network data for a detected anomaly. In some examples, a network node establishes a baseline usage by applying at least one baselining rule to network traffic to generate baseline statistics, detects an anomaly usage by applying at least one anomaly rule to network traffic and generating an anomaly event, and captures network data according to an anomaly event by triggering at least one capturing rule to be applied to network traffic when an associated anomaly event is generated.. ... A10 Networks Inc

12/28/17 / #20170374043

Intercepting secure session upon receipt of untrusted certificate

A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device and the security gateway, receiving a first secure session request from the client device, generating a second secure session request based on the first secure session request, receiving a server certificate from the server device, sending the second secure session request to the server device, receiving first secure content from the client device over the first secure data session, creating first encrypted secure content using the first secure content and the server certificate, and sending the first encrypted secure content to the server device over the second secure data session.. . ... A10 Networks Inc

11/09/17 / #20170324846

Hardware-based packet editor

Hardware-based packet editor receives a packet editing script which includes script entries indicating modifications to a data packet and a data block with data for the modified data packet. For a script entry in the packet editing script, the packet editor copies data in the data block at a block location and with a block length identified in the script entry into a packet buffer. ... A10 Networks Inc

11/09/17 / #20170324653

System and method for customizing the identification of application or content type

Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection. ... A10 Networks Inc

10/26/17 / #20170310596

Load distribution in data networks

Provided are methods and systems for load distribution in a data network. A method for load distribution in the data network comprises retrieving network data associated with the data network and service node data associated with one or more service nodes. ... A10 Networks Inc

10/12/17 / #20170295185

System and method to associate a private user identity with a public user identity

The system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. ... A10 Networks Inc

10/05/17 / #20170289106

Applying security policy to an application session

Applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway, determining by the security gateway a user identity of the application session using information about the application session, obtaining by the security gateway the security policy comprising network parameters mapped to the user identity, and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. ... A10 Networks Inc

07/20/17 / #20170208082

Context aware threat protection

Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. ... A10 Networks Inc

07/13/17 / #20170201418

System and method to process a chain of network applications

Facilitation of processing a chain of network applications by a network controller is provided herein. In some examples, a network controller comprising a fast path module receives a service request data packet from a client side session between a client and the network controller and determines that the service request data packet matches a network application chain order, the network application chain order indicating a configuration to apply a plurality of network applications. ... A10 Networks Inc

06/29/17 / #20170187793

Distributing application traffic to servers based on dynamic service response time

A service gateway processes a service request received from a host based on a dynamic service response time of a server. In an exemplary embodiment, the service gateway relays a service request to a server over a service session between the service gateway and the server; receives a service response from the server; calculates a dynamic service processing time for the service request from a service request time and a service response time; compares the dynamic service processing time with an expected service processing time; updates a server busy indicator for the server in response to the comparing, where the server busy indicator is maintained at the service gateway; and processes future service requests in accordance with the server busy indicator at the service gateway.. ... A10 Networks Inc

06/29/17 / #20170187631

Processing packet header with hardware assistance

In processing data packet headers, a packet pre-processor is configured with at least one predetermined header field identifier. The packet pre-processor detects at least one header field identifier in a header field of a data packet received over a communication session between a host and a server, matches the predetermined header field identifier to the header field identifier in the data packet, generates a header report block comprising information corresponding to the header field identifier in the data packet, and sends the data packet and the header report block to a processor module for processing the data packet based on the header report block. ... A10 Networks Inc

06/08/17 / #20170163736

Implementation of secure socket layer intercept

Provided are methods and systems for inspecting secure data. A system for inspecting secure data comprises a server facing module, and a client facing module in communication with the server facing module. ... A10 Networks Inc

06/08/17 / #20170163633

Exchange of control information between secure socket layer gateways

Provided are a method and a system for exchanging control information between secure socket layer (ssl) gateways. The method may commence with intercepting, by a client facing node, a client request including session-specific information and a session request to establish an ssl communication session between a client and a server. ... A10 Networks Inc

05/18/17 / #20170142153

Perfect forward secrecy distributed denial of service attack defense

Provided are methods and systems for mitigating a dos attack. A method for mitigating a dos attack may commence with receiving, from a client, a request to initiate a secure session between the client and a server. ... A10 Networks Inc

05/04/17 / #20170126575

Reducing buffer usage for tcp proxy session based on delayed acknowledgement

Reducing buffer usage for a tcp proxy session between a client and a server by a service gateway includes: determining a first round trip time (rtt) for a server side tcp session and determining a second rtt for a client side tcp session; comparing the first rtt with the second rtt; determining whether the second rtt exceeds the first rtt beyond a threshold; if so, then calculating a desired rtt based on the second rtt; and setting a timer according to the calculated desired rtt, where a tcp acknowledgement for the server side tcp session is delayed until the timer expires. The desired rtt may be calculated as a percentage of the second rtt or as the second rtt minus a predetermined value. ... A10 Networks Inc

04/20/17 / #20170111441

Forwarding policies on a virtual service network

In providing packet forwarding policies in a virtual service network that includes a network node and a pool of service load balancers serving a virtual service, the network node: receives a virtual service session request from a client device, the request including a virtual service network address for the virtual service; compares the virtual service network address in the request with the virtual service network address in each at least one packet forwarding policy; in response to finding a match between the virtual service network address in the request and a given virtual service network address in a given packet forwarding policy, determines the given destination in the given packet forwarding policy; and sends the request to a service load balancer in the pool of service load balancers associated with the given destination, where the service load balancer establishes a virtual service session with the client device.. . ... A10 Networks Inc

03/23/17 / #20170085440

Secure data flow open information analytics

Provided are methods and systems for processing a secure data flow. An example method for processing a secure data flow includes receiving a data packet, determining network conditions associated with the data traffic, and determining that the data packet is associated with the secure data flow. ... A10 Networks Inc

03/16/17 / #20170078319

Captcha risk or score techniques

Captcha risk or score technique systems and methods are presented. A method can begin with extracting client information from the service request. ... A10 Networks Inc

02/16/17 / #20170048356

Transmission control of protocol state exchange for dynamic stateful service insertion

Provided are methods and systems for a transmission control protocol (tcp) state handoff of a data traffic flow. A method for a tcp state handoff of a data traffic flow comprises determining a tcp state at predetermined times by a state machine unit. ... A10 Networks Inc

02/16/17 / #20170048107

Automated adjustment of subscriber policies

Provided are methods and systems for adjusting of subscriber policies. A method for adjusting of subscriber policies may include applying traffic enforcement rules to a data traffic associated with a subscriber. ... A10 Networks Inc

02/09/17 / #20170041350

Applying security policy to an application session

Applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway, determining by the security gateway a user identity of the application session using information about the application session, obtaining by the security gateway the security policy comprising network parameters mapped to the user identity, and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. ... A10 Networks Inc

01/12/17 / #20170013051

Virtual application delivery chassis system

A method for electing a master blade in a virtual application distribution chassis (vadc), includes: sending by each blade a vadc message to each of the other blades; determining by each blade that the vadc message was not received from the master blade within a predetermined period of time; in response, sending a master claim message including a blade priority by each blade to the other blades; determining by each blade whether any of the blade priorities obtained from the received master claim messages is higher than the blade priority of the receiving blade; in response to determining that none of the blade priorities obtained is higher, setting a status of a given receiving blade to a new master blade; and sending by the given receiving blade a second vadc message to the other blades indicating the status of the new master blade of the given receiving blade.. . ... A10 Networks Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with A10 Networks Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for A10 Networks Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###