Gigamon Inc.

United States of America

Back to Profile

1-100 of 164 for Gigamon Inc. Sort by
Query
Aggregations
IP Type
        Patent 145
        Trademark 19
Jurisdiction
        United States 146
        World 16
        Canada 2
Date
2025 4
2024 5
2023 7
2022 8
2021 8
See more
IPC Class
H04L 12/26 - Monitoring arrangements; Testing arrangements 53
H04L 29/06 - Communication control; Communication processing characterised by a protocol 36
H04L 12/24 - Arrangements for maintenance or administration 26
H04L 12/46 - Interconnection of networks 22
H04L 12/851 - Traffic type related actions, e.g. QoS or priority 21
See more
NICE Class
09 - Scientific and electric apparatus and instruments 19
42 - Scientific, technological and industrial services, research and design 3
Status
Pending 7
Registered / In Force 157
  1     2        Next Page

1.

DYNAMIC MODIFICATION OF TRAFFIC MONITORING POLICIES FOR A CONTAINERIZED ENVIRONMENT

      
Application Number 19085146
Status Pending
Filing Date 2025-03-20
First Publication Date 2025-08-21
Owner Gigamon Inc. (USA)
Inventor
  • Palnati, Saritha
  • Cochinwala, Naveed

Abstract

A method of automatic and dynamic environment discovery and policy adaptation for a containerized environment is disclosed. A plurality of traffic monitoring policies for acquiring and monitoring data traffic transmitted between one or more components of a containerized environment are accessed. The containerized environment includes a plurality of software-implemented containers. The traffic monitoring policies are caused to be applied to one or more components in the containerized environment. A change to a configuration of the containerized environment is automatically detected. In response, one or more containers of the plurality of software-implemented containers are automatically identified as containers affected by the change. Based on that identification, a modification of a traffic monitoring policy is then automatically determined to produce a modified traffic monitoring policy, and the modified traffic monitoring policy is caused to be applied to one or more components in the containerized environment.

IPC Classes  ?

  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

2.

Flow-level deduplication of network traffic in a network traffic visibility system

      
Application Number 18441400
Grant Number 12537683
Status In Force
Filing Date 2024-02-14
First Publication Date 2025-08-14
Grant Date 2026-01-27
Owner Gigamon Inc. (USA)
Inventor
  • Bommana, Murali
  • Dahiya, Sandeep
  • Kumar, Santhosh

Abstract

A system and method for flow-level deduplication of network traffic are disclosed. A network node receives a first plurality of packets from a first network endpoint. The first plurality of packets represent a flow of data being communicated between the first network endpoint and a second network endpoint. The network node further receives a second plurality of packets from the second network endpoint. The network node identifies a sequence identifier of each packet of the first and second pluralities of packets. The network node determines that the first and second pluralities of packets are all associated with the same flow, based on the sequence identifiers of the first and second pluralities of packets. In response to that determination, the network node deduplicates the flow by discarding the first plurality of packets or the second plurality of packets. The network node may be a traffic visibility node.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 47/34 - Flow controlCongestion control ensuring sequence integrity, e.g. using sequence numbers

3.

Nucleic Acid-Guided Nucleases

      
Application Number 18887663
Status Pending
Filing Date 2024-09-17
First Publication Date 2025-04-17
Owner GigaMune, Inc. (USA)
Inventor
  • Johnson, David Scott
  • Simons, Jan Fredrik
  • Lim, Yoong Wearn
  • Spindler, Matthew James
  • Carter, Kyle Pierce
  • Sandhu, Savreet Kaur
  • Wagner, Ellen Kathleen
  • Coles, Garry
  • Edgar, Robert

Abstract

The present disclosure provides novel nucleic acid-guided nucleases and methods of using the nucleases for genome editing. The present disclosure further provides a system for editing a target region in a genome comprising a nucleic acid-guided nuclease, a heterologous guide nucleic acid for complexing with the nucleic acid-guided nuclease, and an editing polynucleotide configured to bind to the target region.

IPC Classes  ?

  • C12N 9/22 - Ribonucleases
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA
  • C12N 15/63 - Introduction of foreign genetic material using vectorsVectorsUse of hosts thereforRegulation of expression

4.

SOURCE-BASED CAPTURE OF CLEAR TEXT FROM ENCRYPTED DATA TRAFFIC FOR NETWORK TRAFFIC VISIBILITY PROCESSING

      
Application Number 18364198
Status Pending
Filing Date 2023-08-02
First Publication Date 2025-02-06
Owner Gigamon Inc. (USA)
Inventor
  • Jagarlapudi, Raghava Krishna
  • Cochinwala, Naveed
  • Xiu, Yan

Abstract

A method of providing clear text representing encrypted data to an entity that does not support an encryption/decryption protocol used to encrypt/decrypt the data is disclosed. A call to an encryption/decryption function implemented in a worker node is detected, wherein the call is to trigger encryption or decryption of a packet. In response to detecting the call, a clear text payload of the packet is captured from an entry point or an exit point of the encryption/decryption function. A modified packet is then created based on the captured clear text payload, including synthesizing a plurality of headers for the modified packet and appending the plurality of headers to the clear text payload. The modified packet is then sent to a processing entity that is external to the worker node.

IPC Classes  ?

5.

Optimal control of network traffic visibility resources and distributed traffic processing resource control system

      
Application Number 18322359
Grant Number 12137052
Status In Force
Filing Date 2023-05-23
First Publication Date 2024-11-05
Grant Date 2024-11-05
Owner Gigamon, Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Saxena, Nitin

Abstract

A method of optimizing network traffic visibility resources comprises receiving, by a controller associated with a network traffic visibility system, information indicative of operation of the network traffic visibility system. The method further comprises facilitating, by the controller, control of resources in the network traffic visibility system, according to a configured resource control policy. The facilitating can include providing, by the controller, control signaling to cause maximization of network traffic monitoring fidelity for a plurality of Quality of Service (QoS) classes of network traffic, based on a specified fixed amount of one or more network resources associated with the network traffic visibility system. Alternatively or additionally, the facilitating can include providing, by the controller, control signaling to cause minimization of use of the one or more network resources, based on a specified fixed level of traffic monitoring fidelity associated with the plurality of QoS classes.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 43/16 - Threshold monitoring
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering

6.

MANAGING DECRYPTION OF NETWORK FLOWS THROUGH A NETWORK APPLIANCE

      
Application Number 18753183
Status Pending
Filing Date 2024-06-25
First Publication Date 2024-10-17
Owner Gigamon Inc. (USA)
Inventor
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abstract

A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. Prior to initiating a network connection between the network appliance and the server, the network appliance accesses a server certificate associated with the server. In response to a determination not to decrypt data transmitted between the client device and the server, the network appliance establishes a single connection between the network appliance and the server. The network appliance transmits encrypted data between the client device and the server only over the single connection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching

7.

Dynamic modification of traffic monitoring policies for a containerized environment

      
Application Number 18165250
Grant Number 12261748
Status In Force
Filing Date 2023-02-06
First Publication Date 2024-08-15
Grant Date 2025-03-25
Owner Gigamon, Inc. (USA)
Inventor
  • Palnati, Saritha
  • Cochinwala, Naveed

Abstract

A method of automatic and dynamic environment discovery and policy adaptation for a containerized environment is disclosed. A plurality of traffic monitoring policies for acquiring and monitoring data traffic transmitted between one or more components of a containerized environment are accessed. The containerized environment includes a plurality of software-implemented containers. The traffic monitoring policies are caused to be applied to one or more components in the containerized environment. A change to a configuration of the containerized environment is automatically detected. In response, one or more containers of the plurality of software-implemented containers are automatically identified as containers affected by the change. Based on that identification, a modification of a traffic monitoring policy is then automatically determined to produce a modified traffic monitoring policy, and the modified traffic monitoring policy is caused to be applied to one or more components in the containerized environment.

IPC Classes  ?

  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

8.

Engineered enveloped vectors and methods of use thereof

      
Application Number 18462747
Grant Number 12371689
Status In Force
Filing Date 2023-09-07
First Publication Date 2024-02-29
Grant Date 2025-07-29
Owner GigaMune, Inc. (USA)
Inventor
  • Johnson, David Scott
  • Spindler, Matthew James
  • Edgar, Robert
  • Lim, Yoong Wearn
  • Weller, Taylor

Abstract

The present disclosure relates to a novel, engineered enveloped vector that can be used for gene delivery. The engineered enveloped vector comprises an engineered envelope comprising: (a) a viral envelope protein and optionally, (b) a non-viral membrane-bound protein. The present disclosure also provides a method of making and using the engineered enveloped vector.

IPC Classes  ?

  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA
  • C12N 9/22 - Ribonucleases
  • C12N 15/11 - DNA or RNA fragmentsModified forms thereof
  • C12N 15/86 - Viral vectors
  • C12N 15/90 - Stable introduction of foreign DNA into chromosome

9.

NOVEL NUCLEIC ACID-GUIDED NUCLEASES

      
Application Number 18336922
Status Pending
Filing Date 2023-06-16
First Publication Date 2024-01-25
Owner
  • GIGAMUNE, INC. (USA)
  • GIGAMUNE, INC. (USA)
Inventor
  • Johnson, David Scott
  • Simons, Jan Fredrik
  • Lim, Yoong Wearn
  • Spindler, Matthew James
  • Carter, Kyle Pierce
  • Sandhu, Savreet Kaur
  • Wagner, Ellen Kathleen
  • Coles, Garry
  • Edgar, Robert

Abstract

The present disclosure provides novel nucleic acid-guided nucleases and methods of using the nucleases for genome editing. The present disclosure further provides a system for editing a target region in a genome comprising a nucleic acid-guided nuclease, a heterologous guide nucleic acid for complexing with the nucleic acid-guided nuclease, and an editing polynucleotide configured to bind to the target region.

IPC Classes  ?

  • C12N 9/22 - Ribonucleases
  • C12N 15/63 - Introduction of foreign genetic material using vectorsVectorsUse of hosts thereforRegulation of expression
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA

10.

Distributed packet deduplication

      
Application Number 18334222
Grant Number 12375373
Status In Force
Filing Date 2023-06-13
First Publication Date 2023-10-12
Grant Date 2025-07-29
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.

IPC Classes  ?

  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 67/1023 - Server selection for load balancing based on a hash applied to IP addresses or costs
  • H04L 67/1034 - Reaction to server failures by a load balancer

11.

Dynamic service chaining and late binding

      
Application Number 18175201
Grant Number 12015516
Status In Force
Filing Date 2023-02-27
First Publication Date 2023-09-14
Grant Date 2024-06-18
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

IPC Classes  ?

  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 12/46 - Interconnection of networks
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/12 - Network monitoring probes
  • H04L 45/02 - Topology update or discovery
  • H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS
  • H04L 49/00 - Packet switching elements
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

12.

PRECRYPTION

      
Application Number 1730152
Status Registered
Filing Date 2023-04-06
Registration Date 2023-04-06
Owner Gigamon Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable and recorded software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets. Providing temporary use of non-downloadable software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets.

13.

One-armed inline decryption/encryption proxy operating in transparent bridge mode

      
Application Number 18057581
Grant Number 12095740
Status In Force
Filing Date 2022-11-21
First Publication Date 2023-04-27
Grant Date 2024-09-17
Owner Gigamon Inc. (USA)
Inventor
  • Guise, Jr., Dale L.
  • Cheung, David Chun Ying
  • Yuan, Fushan Allan

Abstract

A proxy device coupled to a network receives communications between a client and a server on the network. The proxy device operates transparently to the client and the server, while coupled to receive and process the communications from a node on the network via a network port in a one-armed configuration. The proxy device communicates packets of the communications with an external tool coupled to the proxy device via a tool port and operates transparently to the nod and the tool. In certain embodiments, the tool may be a network security device, such as a firewall.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/46 - Interconnection of networks

14.

Engineered cells expressing anti-viral T cell receptors and methods of use thereof

      
Application Number 17864228
Grant Number 12497711
Status In Force
Filing Date 2022-07-13
First Publication Date 2023-04-20
Grant Date 2025-12-16
Owner GigaMune, Inc. (USA)
Inventor
  • Spindler, Matthew James
  • Johnson, David Scott
  • Nelson, Ayla Lynn
  • Wagner, Ellen Kathleen
  • Adler, Adam Shultz
  • Lim, Yoong Wearn
  • Asensio, Michael

Abstract

Provided herein are compositions comprising recombinant mammalian cells that express recombinant T cell rectors with specificity against EBV or CMV peptide:MHC antigens. Also provided are therapeutic methods of using the recombinant mammalian cells as cell therapies against viral infections.

IPC Classes  ?

  • C40B 30/06 - Methods of screening libraries by measuring effects on living organisms, tissues or cells
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA

15.

Managing decryption of network flows through a network appliance

      
Application Number 18051312
Grant Number 12028332
Status In Force
Filing Date 2022-10-31
First Publication Date 2023-03-16
Grant Date 2024-07-02
Owner Gigamon Inc. (USA)
Inventor
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abstract

A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. Prior to initiating a network connection between the network appliance and the server, the network appliance accesses a server certificate issued by the server. In response to a determination, based on application of a policy to the server certificate, not to decrypt data transmitted between the client device and the server, the network appliance establishes only a single connection between the network appliance and the server. The network appliance transmits encrypted data between the client device and the server over the single connection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching

16.

PRECRYPTION

      
Serial Number 97793107
Status Registered
Filing Date 2023-02-13
Registration Date 2024-11-19
Owner Gigamon Inc. ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable and recorded software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets Providing temporary use of non-downloadable software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets

17.

DISTRIBUTED PACKET DEDUPLICATION

      
Application Number 17814440
Status Pending
Filing Date 2022-07-22
First Publication Date 2022-11-17
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.

IPC Classes  ?

  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 67/1023 - Server selection for load balancing based on a hash applied to IP addresses or costs
  • H04L 67/1034 - Reaction to server failures by a load balancer

18.

Tool port throttling at a network visibility node

      
Application Number 17862070
Grant Number 11979326
Status In Force
Filing Date 2022-07-11
First Publication Date 2022-10-27
Grant Date 2024-05-07
Owner Gigamon, Inc. (USA)
Inventor
  • Johansson, Jan
  • Jagtap, Tushar R.
  • Reddy, Vikram
  • Nangineni, Ujjvala

Abstract

Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level) for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

IPC Classes  ?

  • H04L 47/127 - Avoiding congestionRecovering from congestion by using congestion prediction
  • H04L 47/74 - Admission controlResource allocation measures in reaction to resource unavailability

19.

Tool port aware stateful protocol visibility for packet distribution

      
Application Number 17183106
Grant Number 11463558
Status In Force
Filing Date 2021-02-23
First Publication Date 2022-08-25
Grant Date 2022-10-04
Owner Gigamon Inc. (USA)
Inventor
  • Muthusamy, Rakesh
  • Cafarelli, Dominick
  • Jagtap, Tushar
  • Mani, Arunraj

Abstract

At least one technique for distributing traffic from a visibility node to a network tool is disclosed. In certain embodiments, the visibility node has a tool port through which to receive a plurality of packets which each include a compressed header. The visibility node determines, for each packet, whether a given network tool has received the compressed header in decompressed format based on a header-to-tool mapping structure. The structure includes information indicative of which packet headers each of the plurality of network tools have received in decompressed format. If the visibility node determines that the tool previously received the decompressed header, the visibility node transmits the packet to the network tool in compressed format. If the visibility node determines that the tool has not previously received the decompressed header, the visibility node decompresses the compressed header prior to transmitting the packet to the given network tool.

IPC Classes  ?

  • H04L 69/04 - Protocols for data compression, e.g. ROHC
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 45/74 - Address processing for routing

20.

ENGINEERED CELLS EXPRESSING ANTI-TUMOR T CELL RECEPTORS AND METHODS OF USE THEREOF

      
Application Number 17608261
Status Pending
Filing Date 2020-05-01
First Publication Date 2022-07-07
Owner GigaMune, Inc. (USA)
Inventor
  • Spindler, Matthew James
  • Johnson, David Scott
  • Adler, Adam Shultz
  • Asensio, Michael

Abstract

Provided herein are compositions comprising recombinant mammalian cells that express recombinant T cell receptors with specificity against gp100 peptide:MHC antigens. Also provided are therapeutic methods of using the recombinant mammalian cells as cell therapies against melanoma tumors.

IPC Classes  ?

21.

GIGAMON

      
Serial Number 97447582
Status Registered
Filing Date 2022-06-07
Registration Date 2023-09-05
Owner Gigamon Inc. ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

downloadable computer software and computer hardware for test access point and terminal access point for computer network and application monitoring, visibility, analytics, and security providing temporary use of non-downloadable computer software for test access point and terminal access point computer network and application monitoring, visibility, analytics, and security

22.

Optimal control of network traffic visibility resources and distributed traffic processing resource control system

      
Application Number 17393359
Grant Number 11700205
Status In Force
Filing Date 2021-08-03
First Publication Date 2022-02-10
Grant Date 2023-07-11
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Saxena, Nitin

Abstract

A method of optimizing network traffic visibility resources comprises receiving, by a controller associated with a network traffic visibility system, information indicative of operation of the network traffic visibility system. The method further comprises facilitating, by the controller, control of resources in the network traffic visibility system, according to a configured resource control policy. The facilitating can include providing, by the controller, control signaling to cause maximization of network traffic monitoring fidelity for a plurality of Quality of Service (QoS) classes of network traffic, based on a specified fixed amount of one or more network resources associated with the network traffic visibility system. Alternatively or additionally, the facilitating can include providing, by the controller, control signaling to cause minimization of use of the one or more network resources, based on a specified fixed level of traffic monitoring fidelity associated with the plurality of QoS classes.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 43/16 - Threshold monitoring
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level

23.

OPTIMAL CONTROL OF NETWORK TRAFFIC VISIBILITY RESOURCES AND DISTRIBUTED TRAFFIC PROCESSING RESOURCE CONTROL SYSTEM

      
Application Number US2021044413
Publication Number 2022/031757
Status In Force
Filing Date 2021-08-03
Publication Date 2022-02-10
Owner GIGAMON INC. (USA)
Inventor
  • Sufleta, Zbigniew
  • Saxena, Nitin

Abstract

A method of optimizing network traffic visibility resources comprises receiving, by a controller associated with a network traffic visibility system, information indicative of operation of the network traffic visibility system. The method further comprises facilitating, by the controller, control of resources in the network traffic visibility system, according to a configured resource control policy. The facilitating can include providing, by the controller, control signaling to cause maximization of network traffic monitoring fidelity for a plurality of Quality of Service (QoS) classes of network traffic, based on a specified fixed amount of one or more network resources associated with the network traffic visibility system. Alternatively or additionally, the facilitating can include providing, by the controller, control signaling to cause minimization of use of the one or more network resources, based on a specified fixed level of traffic monitoring fidelity associated with the plurality of QoS classes.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

24.

Engineered cells expressing anti-viral T cell receptors and methods of use thereof

      
Application Number 17480697
Grant Number 11421220
Status In Force
Filing Date 2021-09-21
First Publication Date 2022-01-06
Grant Date 2022-08-23
Owner GigaMune, Inc. (USA)
Inventor
  • Spindler, Matthew James
  • Johnson, David Scott
  • Nelson, Ayla Lynn
  • Wagner, Ellen Kathleen
  • Adler, Adam Shultz
  • Lim, Yoong Wearn
  • Asensio, Michael

Abstract

Provided herein are compositions comprising recombinant mammalian cells that express recombinant T cell rectors with specificity against EBV or CMV peptide:MHC antigens. Also provided are therapeutic methods of using the recombinant mammalian cells as cell therapies against viral infections.

IPC Classes  ?

  • C40B 30/04 - Methods of screening libraries by measuring the ability to specifically bind a target molecule, e.g. antibody-antigen binding, receptor-ligand binding
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA
  • C07K 14/725 - T-cell receptors

25.

One-armed inline decryption/encryption proxy operating in transparent bridge mode

      
Application Number 16895831
Grant Number 11509631
Status In Force
Filing Date 2020-06-08
First Publication Date 2021-11-11
Grant Date 2022-11-22
Owner Gigamon Inc. (USA)
Inventor
  • Guise, Jr., Dale L.
  • Cheung, David Chun Ying
  • Yuan, Fushan Allan

Abstract

A proxy device coupled to a network receives communications between a client and a server on the network. The proxy device operates transparently to the client and the server, while coupled to receive and process the communications from a node on the network via a network port in a one-armed configuration. The proxy device communicates packets of the communications with an external tool coupled to the proxy device via a tool port and operates transparently to the nod and the tool. In certain embodiments, the tool may be a network security device, such as a firewall.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/46 - Interconnection of networks

26.

Dynamic mapping of nodes responsible for monitoring traffic of an evolved packet core

      
Application Number 17364483
Grant Number 11700568
Status In Force
Filing Date 2021-06-30
First Publication Date 2021-10-21
Grant Date 2023-07-11
Owner Gigamon Inc. (USA)
Inventor
  • Muthusamy, Rakesh
  • Jagtap, Tushar R.
  • Nangineni, Ujjvala
  • Pereira, Kristian

Abstract

Introduced here are visibility platforms able to process the traffic handled by the gateways of an Evolved Packet Core (EPC) with Control and User Plane Separation (CUPS). A visibility platform can include a control processing node (CPN) and one or more user processing nodes (UPNs). The visibility platform may populate a data structure in which the CPN and UPNs are associated with locations along an interface on which Sx/N4 traffic is exchanged between the control and user planes. Each location may be representative of the point on the Sx/N4 interface at which Sx/N4 traffic processed by the corresponding node is acquired. The CPN can use the data structure to program session flows that impact how user traffic is handled by the UPNs.

IPC Classes  ?

  • H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update
  • H04W 24/08 - Testing using real traffic
  • H04W 40/30 - Connectivity information management, e.g. connectivity discovery or connectivity update for proactive routing
  • H04W 88/16 - Gateway arrangements

27.

Graph-based network fabric for a network visibility appliance

      
Application Number 17213735
Grant Number 12068905
Status In Force
Filing Date 2021-03-26
First Publication Date 2021-07-15
Grant Date 2024-08-20
Owner Gigamon, Inc. (USA)
Inventor Rao, Anil

Abstract

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, or OpenStack. But it can be difficult to manage how the visibility platform handles incoming virtualized traffic. Introduced here, therefore, are graphs that visually represent the network fabric of a visibility platform. When the network fabric of the visibility platform is represented as a graph, an end user can easily modify the network fabric, for example, by adding, removing, or modifying nodes that represent network objects, adding, removing, or modifying connections between pairs of nodes that represent traffic flows between pairs of network objects, etc.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/46 - Interconnection of networks
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/931 - Switch fabric architecture
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/12 - Network monitoring probes
  • H04L 45/02 - Topology update or discovery
  • H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS
  • H04L 49/00 - Packet switching elements
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

28.

Dynamic service chaining and late binding

      
Application Number 17142145
Grant Number 11595240
Status In Force
Filing Date 2021-01-05
First Publication Date 2021-06-03
Grant Date 2023-02-28
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

IPC Classes  ?

  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 12/46 - Interconnection of networks
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/12 - Network monitoring probes
  • H04L 49/00 - Packet switching elements
  • H04L 45/02 - Topology update or discovery
  • H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS

29.

Maps having a high branching factor

      
Application Number 17175551
Grant Number 11658861
Status In Force
Filing Date 2021-02-12
First Publication Date 2021-06-03
Grant Date 2023-05-23
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Disclosed is a technique for providing packet filter maps with high branching factors in a system for managing network traffic in a visibility fabric. A high branching factor enables a map to branch out more than two ways. High branching factors can be realized by allowing a map to be affiliated with more than one action set. For example, each rule of the map may be affiliated with a unique action set that is executed only when the corresponding rule is satisfied.

IPC Classes  ?

  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 12/46 - Interconnection of networks
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/12 - Network monitoring probes
  • H04L 49/00 - Packet switching elements
  • H04L 45/02 - Topology update or discovery
  • H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS

30.

Dynamic mapping of nodes responsible for monitoring traffic of an evolved packet core

      
Application Number 16696693
Grant Number 11057820
Status In Force
Filing Date 2019-11-26
First Publication Date 2021-05-27
Grant Date 2021-07-06
Owner Gigamon Inc. (USA)
Inventor
  • Muthusamy, Rakesh
  • Jagtap, Tushar R.
  • Nangineni, Ujjvala
  • Pereira, Kristian

Abstract

Introduced here are visibility platforms able to process the traffic handled by the gateways of an Evolved Packet Core (EPC) with Control and User Plane Separation (CUPS). A visibility platform can include a control processing node (CPN) and one or more user processing nodes (UPNs). The visibility platform may populate a data structure in which the CPN and UPNs are associated with locations along an interface on which Sx/N4 traffic is exchanged between the control and user planes. Each location may be representative of the point on the Sx/N4 interface at which Sx/N4 traffic processed by the corresponding node is acquired. The CPN can use the data structure to program session flows that impact how user traffic is handled by the UPNs.

IPC Classes  ?

  • H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update
  • H04W 24/08 - Testing using real traffic
  • H04W 40/30 - Connectivity information management, e.g. connectivity discovery or connectivity update for proactive routing
  • H04W 88/16 - Gateway arrangements

31.

Tool port aliasing in a network visibility fabric

      
Application Number 16749906
Grant Number 10999188
Status In Force
Filing Date 2020-01-22
First Publication Date 2021-05-04
Grant Date 2021-05-04
Owner Gigamon Inc. (USA)
Inventor
  • Cafarelli, Dominick
  • Bommana, Murali
  • Jagtap, Tushar

Abstract

A method of operating a network visibility node is disclosed. In certain embodiments, the network visibility node has a plurality of network ports through which to communicate data with a plurality of network hosts and has a plurality of tool ports through which to communicate data with a plurality of network tools. The network visibility node accesses a port group map associated with a plurality of tool port groups of the network visibility node, where each of the tool port groups includes one or more tool ports of the network visibility node, and where the port group map contains a separate tool alias for each tool port group of the plurality of tool port groups. Each tool alias can correspond to a different type of network traffic. The network visibility node uses the port group map to ascertain a tool port group through which to communicate the plurality of packets with a particular network tool.

IPC Classes  ?

  • H04L 12/725 - Selecting a path with suitable quality of service [QoS]
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/813 - Policy-based control, e.g. policing
  • H04L 12/859 - Flow control actions based on the nature of the application, e.g. controlling web browsing or e-mail traffic
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

32.

Elastic modification of application instances in a network visibility infrastructure

      
Application Number 17104893
Grant Number 11750518
Status In Force
Filing Date 2020-11-25
First Publication Date 2021-03-18
Grant Date 2023-09-05
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Introduced here are network visibility platforms having total processing capacity that can be dynamically varied in response to determining how much network traffic is currently under consideration. A visibility platform can include one or more network appliances, each of which includes at least one instance of an application configured to process data packets. Rather than forward all traffic to a single application instance for processing, the traffic can instead be distributed amongst a pool of application instances to collectively ensure that no data packets are dropped due to over-congestion. Moreover, the visibility platform can be designed such that application instances are elastically added/removed, as necessary, based on the volume of traffic currently under consideration.

IPC Classes  ?

  • H04L 12/801 - Flow control or congestion control
  • H04L 12/743 - Header address processing for routing, e.g. table lookup using hashing techniques
  • H04L 47/12 - Avoiding congestionRecovering from congestion
  • H04L 45/7453 - Address table lookupAddress filtering using hashing

33.

Network visibility appliances for cloud computing architectures

      
Application Number 17017378
Grant Number 11252011
Status In Force
Filing Date 2020-09-10
First Publication Date 2020-12-31
Grant Date 2022-02-15
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind spots.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

34.

In-fabric traffic analysis

      
Application Number 16938747
Grant Number 11425004
Status In Force
Filing Date 2020-07-24
First Publication Date 2020-11-12
Grant Date 2022-08-23
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

An apparatus for a network includes: a processing unit having a filter generation module configured for: receiving an indication that a packet matches a user-defined filter; and creating one or more derivative filters based at least in part on the received indication, wherein a first derivative filter of the one or more derivative filters provides a finer grade of filtration compared to the user-defined filter; and a non-transitory medium configured for storing the one or more derivative filters.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/142 - Network analysis or design using statistical or mathematical methods
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 47/22 - Traffic shaping
  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 49/25 - Routing or path finding in a switch fabric
  • H04L 43/062 - Generation of reports related to network traffic

35.

Automatic dynamic determination of data traffic sampling policy in a network visibility appliance

      
Application Number 16405674
Grant Number 11115294
Status In Force
Filing Date 2019-05-07
First Publication Date 2020-11-12
Grant Date 2021-09-07
Owner Gigamon Inc. (USA)
Inventor
  • Harikrishnan, Bharath
  • Jagtap, Tushar Rajnikant
  • Garcia-Rosell Foronda, Fernando

Abstract

A network visibility appliance automatically and dynamically determines a data traffic sampling policy that it should apply, i.e., a policy for determining which flows the network appliance should forward to one or more tools. The technique can be used to adjust for changes in network traffic to avoid exceeding performance constraints (e.g., maximum throughput) of network analytic tools, while maintaining high efficiency of usage of the tools. In the technique, a policy engine monitors network traffic characteristics in a subscriber throughput table and dynamically determines a sampling policy to apply, so as to decrease and/or increase traffic throughput to a given tool, so that the tool is efficiently used.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

36.

AUTOMATIC DYNAMIC DETERMINATION OF DATA TRAFFIC SAMPLING POLICY IN A NETWORK VISIBILITY APPLIANCE

      
Application Number US2020030277
Publication Number 2020/226947
Status In Force
Filing Date 2020-04-28
Publication Date 2020-11-12
Owner GIGAMON INC. (USA)
Inventor
  • Harikrishnan, Bharath
  • Jagtap, Tushar Rajnikant
  • Garcia-Rosell Foronda, Fernando

Abstract

A network visibility appliance automatically and dynamically determines a data traffic sampling policy that it should apply, i.e., a policy for determining which flows the network appliance should forward to one or more tools. The technique can be used to adjust for changes in network traffic to avoid exceeding performance constraints (e.g., maximum throughput) of network analytic tools, while maintaining high efficiency of usage of the tools. In the technique, a policy engine monitors network traffic characteristics in a subscriber throughput table and dynamically determines a sampling policy to apply, so as to decrease and/or increase traffic throughput to a given tool, so that the tool is efficiently used.

IPC Classes  ?

  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

37.

CORRELATING NETWORK FLOWS THROUGH A PROXY DEVICE

      
Application Number US2020020546
Publication Number 2020/185430
Status In Force
Filing Date 2020-02-29
Publication Date 2020-09-17
Owner GIGAMON INC. (USA)
Inventor
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abstract

A network appliance stores a session identifier that uniquely identifies a network communication session between a first device and the network appliance. A first communication is received from the first device over the network communication session. The network appliance also receives from a proxy tool, a second communication that includes a header specifying the session identifier and that includes data generated by the proxy in response to the first communication. The network appliance associates the first communication with the second communication using the session identifier. An encrypted representation of the data generated by the proxy is transmitted to a second device based on the association between the first communication and the second communication.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04K 1/00 - Secret communication
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

38.

Managing decryption of network flows through a network appliance

      
Application Number 16352735
Grant Number 11516205
Status In Force
Filing Date 2019-03-13
First Publication Date 2020-09-17
Grant Date 2022-11-29
Owner Gigamon Inc. (USA)
Inventor
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abstract

A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. The network appliance establishes, in response to the communication, a single connection between the network appliance and the server based on application of a policy that causes the network appliance to determine not to decrypt data transmitted between the client device and the server. The network appliance transmits encrypted data between the client device and the server over the single connection.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching

39.

Correlating network flows through a proxy device

      
Application Number 16297346
Grant Number 11019044
Status In Force
Filing Date 2019-03-08
First Publication Date 2020-09-10
Grant Date 2021-05-25
Owner Gigamon Inc. (USA)
Inventor
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abstract

A network appliance stores a session identifier that uniquely identifies a network communication session between a first device and the network appliance. A first communication is received from the first device over the network communication session. The network appliance also receives from a proxy tool, a second communication that includes a header specifying the session identifier and that includes data generated by the proxy in response to the first communication. The network appliance associates the first communication with the second communication using the session identifier. An encrypted representation of the data generated by the proxy is transmitted to a second device based on the association between the first communication and the second communication.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/08 - Key distribution

40.

Automated visual assistance for creating or debugging connections of a network device

      
Application Number 16215420
Grant Number 11171840
Status In Force
Filing Date 2018-12-10
First Publication Date 2020-06-11
Grant Date 2021-11-09
Owner Gigamon Inc. (USA)
Inventor
  • Shahabudeen, Namick Peer Mohamed
  • Srinivasan, Gowtham
  • Poornachandran, Sowmya
  • Sathiskumar, Thirumalai Srinivasan

Abstract

Disclosed are a method and apparatus for assisting in the physical wiring or debugging of connections between devices, which may include one or more network visibility appliances. In at least one embodiment, the computer system receives first user input that specifies a first port of a plurality of selectable physical ports or a connection between the first port and a second port of the plurality of selectable physical ports. At least one of the first port or the second port is on a device that is external to the computer system. In response to the first user input, the computer system sends a first signal to the device to trigger the device to output a first visual indication in proximity to the first port, the first visual indication identifying the first port and a status of at least one of the first port or the connection.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

41.

Elastic modification of application instances in a network visibility infrastructure

      
Application Number 16119093
Grant Number 10855590
Status In Force
Filing Date 2018-08-31
First Publication Date 2020-03-05
Grant Date 2020-12-01
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Introduced here are network visibility platforms having total processing capacity that can be dynamically varied in response to determining how much network traffic is currently under consideration. A visibility platform can include one or more network appliances, each of which includes at least one instance of an application configured to process data packets. Rather than forward all traffic to a single application instance for processing, the traffic can instead be distributed amongst a pool of application instances to collectively ensure that no data packets are dropped due to over-congestion. Moreover, the visibility platform can be designed such that application instances are elastically added/removed, as necessary, based on the volume of traffic currently under consideration.

IPC Classes  ?

  • H04L 12/801 - Flow control or congestion control
  • H04L 12/743 - Header address processing for routing, e.g. table lookup using hashing techniques

42.

Security access for a switch device

      
Application Number 16678329
Grant Number 11025639
Status In Force
Filing Date 2019-11-08
First Publication Date 2020-03-05
Grant Date 2021-06-01
Owner Gigamon Inc. (USA)
Inventor
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abstract

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

43.

Distributed visibility fabrics for private, public, and hybrid clouds

      
Application Number 16598416
Grant Number 10892941
Status In Force
Filing Date 2019-10-10
First Publication Date 2020-02-06
Grant Date 2021-01-12
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Improved network visibility may be achieved by deriving network traffic information from numerous visibility platforms that are communicatively coupled to one another. In some embodiments, an end user interacts with a distributed visibility fabric via a user interface, which can include a high-level representation of each visibility platform. The end user can then map the network objects of each visibility platform onto a series of network visibility appliances. This technique allows certain network objects (e.g., maps) to be intelligently distributed amongst the series of network visibility appliances.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

44.

Distributed packet deduplication

      
Application Number 16001721
Grant Number 11405289
Status In Force
Filing Date 2018-06-06
First Publication Date 2019-12-12
Grant Date 2022-08-02
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.

IPC Classes  ?

  • H04L 43/028 - Capturing of monitoring data by filtering
  • H04L 67/1023 - Server selection for load balancing based on a hash applied to IP addresses or costs
  • H04L 67/1034 - Reaction to server failures by a load balancer

45.

Status monitoring of inline network tools

      
Application Number 16516043
Grant Number 10778577
Status In Force
Filing Date 2019-07-18
First Publication Date 2019-11-14
Grant Date 2020-09-15
Owner Gigamon Inc. (USA)
Inventor
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abstract

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. Guiding techniques based on these identifiers offer flexible support for multiple network tool operational modes. For example, the packet broker may be able to readily address changes in the state of a network tool connected to the packet broker by modifying certain egress translation schemes and/or ingress translation schemes. The “state” of a network tool can be “up” (i.e., ready for service) or “down” (i.e., out of service) based on, for example, the network tool's ability to pass through health-probing data packets dispatched by the packet broker.

IPC Classes  ?

  • H04L 12/46 - Interconnection of networks
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 12/935 - Switch interfaces, e.g. port details
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 1/24 - Testing correct operation
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off

46.

Tracking changes in network configurations

      
Application Number 16459453
Grant Number 10951499
Status In Force
Filing Date 2019-07-01
First Publication Date 2019-10-24
Grant Date 2021-03-16
Owner Gigamon Inc. (USA)
Inventor
  • Drangula, Dennis
  • Bourakov, Veniamin

Abstract

A method performed by a network device includes: receiving an input indicating a change in an auxiliary network from a first configuration to a second configuration, wherein the auxiliary network is configured to obtain copies of packets from a traffic production network; determining a first network policy, wherein the first network policy is for application in the auxiliary network when the auxiliary network is in the first configuration; and determining a second network policy by the network device based on the received input and the first network policy, wherein the second network policy is for application in the auxiliary network when the auxiliary network is in the second configuration.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration

47.

Selective modification of data packets for network tool verification

      
Application Number 16459348
Grant Number 11438352
Status In Force
Filing Date 2019-07-01
First Publication Date 2019-10-24
Grant Date 2022-09-06
Owner Gigamon Inc. (USA)
Inventor Tekchandani, Navin C.

Abstract

A network appliance may be coupled to a network tool configured to monitor the traffic within a computer network. Often, the network tool is operable in two modes (i.e., an inline mode and an out-of-band mode). Before the network tool is deployed as an inline device, however, it is desirable to verify that the network tool is secure. Described herein are systems and techniques for verifying network tools prior to deployment as inline devices. More specifically, the network appliance may be configured to modify the content of a data packet (e.g., by altering a bit) and transmit the modified data packet downstream to a network tool. The network appliance can monitor the network tool to make sure the network tool drops or returns the modified data packet. These techniques allow the network appliance to controllably simulate the receipt of malicious traffic by the network tool.

IPC Classes  ?

  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • H04L 9/40 - Network security protocols
  • H04L 43/50 - Testing arrangements
  • H04L 43/026 - Capturing of monitoring data using flow identification

48.

Methods of manufacturing cable management assemblies for electronic appliances

      
Application Number 16427236
Grant Number 11216046
Status In Force
Filing Date 2019-05-30
First Publication Date 2019-10-17
Grant Date 2022-01-04
Owner Gigamon Inc. (USA)
Inventor
  • Baum, Henry
  • Venkatachalam, Ravichandran

Abstract

A laminate curtain can suppress electromagnetic radiation leakage from an electronic appliance, as well as assist in managing cables interconnected to the electronic appliance. More specifically, a laminate curtain can include a conductive elastomer panel that absorbs spurious electromagnetic radiation generated by the electronic appliance, a conductive adhesive film disposed along one side of the conductive elastomer panel, and a conductive support frame affixed to the conductive adhesive film. The laminate curtain can be installed within a mounting frame, which secures the laminate curtain to the electronic appliance. Electromagnetic radiation that is absorbed by the conductive elastomer panel can travel to the electronic appliance via the conductive adhesive film, the conductive support frame, and the mounting frame. Thus, the conductive elastomer panel can be used to form a ground plane that catches and shunts the spurious electromagnetic radiation to the electronic appliance, which is grounded.

IPC Classes  ?

  • G06F 1/18 - Packaging or power distribution
  • H05K 9/00 - Screening of apparatus or components against electric or magnetic fields
  • H05K 7/16 - Mounting supporting structure in casing or on frame or rack on hinges or pivots
  • H05K 7/14 - Mounting supporting structure in casing or on frame or rack

49.

Security access for a switch device

      
Application Number 16357140
Grant Number 10484393
Status In Force
Filing Date 2019-03-18
First Publication Date 2019-07-11
Grant Date 2019-11-19
Owner Gigmon Inc. (USA)
Inventor
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abstract

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

50.

Policy-based sampling of network flows at a network visibility node

      
Application Number 15826286
Grant Number 10931545
Status In Force
Filing Date 2017-11-29
First Publication Date 2019-05-30
Grant Date 2021-02-23
Owner Gigamon Inc. (USA)
Inventor Mommileti, Srinivasa

Abstract

Methods and systems are disclosed for analyzing control signaling messages over a network to inform policy-based sampling of network flows using a network visibility node communicatively coupled to the network. In an illustrative embodiment, session dialog information is extracted from control signaling messages exchanged between subscriber devices initiating a communications session and tracked. A network flow associated with the communications session is selected for sampling at the network visibility node based on the tracked session dialog information. Packets associated with the network flow are then forwarded by the network visibility node to an external tool for processing.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/813 - Policy-based control, e.g. policing
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/801 - Flow control or congestion control
  • H04L 12/853 - Traffic type related actions, e.g. QoS or priority for real time traffic

51.

Tool port throttling at a network visibility node

      
Application Number 15806767
Grant Number 11405319
Status In Force
Filing Date 2017-11-08
First Publication Date 2019-05-09
Grant Date 2022-08-02
Owner Gigamon Inc. (USA)
Inventor
  • Johansson, Jan
  • Jagtap, Tushar R.
  • Reddy, Vikram
  • Nangineni, Ujjvala

Abstract

Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

IPC Classes  ?

  • H04L 47/127 - Avoiding congestionRecovering from congestion by using congestion prediction
  • H04L 47/74 - Admission controlResource allocation measures in reaction to resource unavailability

52.

Network visibility appliances for cloud computing architectures

      
Application Number 16212486
Grant Number 10778502
Status In Force
Filing Date 2018-12-06
First Publication Date 2019-04-18
Grant Date 2020-09-15
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind sports.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/751 - Topology update or discovery

53.

Redundant inline-bypass switch

      
Application Number 16203485
Grant Number 10659392
Status In Force
Filing Date 2018-11-28
First Publication Date 2019-03-28
Grant Date 2020-05-19
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abstract

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a first switch coupled to the first bypass component, and a first controller; and a second inline-bypass switch appliance having a second bypass component, a second switch coupled to the second bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide a state signal that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the state signal.

IPC Classes  ?

  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch

54.

Dynamic decryption of suspicious network traffic based on certificate validation

      
Application Number 15845635
Grant Number 11032294
Status In Force
Filing Date 2017-12-18
First Publication Date 2019-02-21
Grant Date 2021-06-08
Owner Gigamon Inc. (USA)
Inventor
  • Joshi, Kishor
  • Pathak, Manish
  • Dahiya, Sandeep

Abstract

A disclosed method performed by a network device can include intercepting cryptographic certificates of host servers received in response to requests for encrypted connections between host servers and user devices, and determining that each encrypted connection is a suspicious connection or a normal connection based on a certificate validation policy. The method can further include causing decryption or metadata analysis of any suspicious encrypted connection and bypassing decryption or metadata analysis of any normal encrypted connection.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

55.

Adaptive and flexible packet sampling

      
Application Number 15848465
Grant Number 11095535
Status In Force
Filing Date 2017-12-20
First Publication Date 2019-02-21
Grant Date 2021-08-17
Owner Gigamon Inc. (USA)
Inventor
  • Mirzazad Barijough, Maziar
  • Mamidi, Santosh Reddy

Abstract

The disclosed techniques include at least one method. The method includes receiving, by a network device, incoming packets communicated over a computer network, and detecting flows to which the incoming packets belong. Each incoming packet belongs to a flow of the flows. The method further includes sampling each incoming packet that satisfies a flow condition having a flow interval of packets for the flow of the incoming packet, and sampling each incoming packet that satisfies a global condition having a global interval of packets irrespective of the flow of the incoming packet. The method further includes storing any sampled packets or information indicative of any sampled packets.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
  • H04L 12/823 - Packet dropping

56.

Cable management assemblies for electronic appliances

      
Application Number 15832542
Grant Number 10372174
Status In Force
Filing Date 2017-12-05
First Publication Date 2019-02-14
Grant Date 2019-08-06
Owner Gigamon Inc. (USA)
Inventor
  • Baum, Henry
  • Venkatachalam, Ravichandran

Abstract

A laminate curtain can suppress electromagnetic radiation leakage from an electronic appliance, as well as assist in managing cables interconnected to the electronic appliance. More specifically, a laminate curtain can include a conductive elastomer panel that absorbs spurious electromagnetic radiation generated by the electronic appliance, a conductive adhesive film disposed along one side of the conductive elastomer panel, and a conductive support frame affixed to the conductive adhesive film. The laminate curtain can be installed within a mounting frame, which secures the laminate curtain to the electronic appliance. Electromagnetic radiation that is absorbed by the conductive elastomer panel can travel to the electronic appliance via the conductive adhesive film, the conductive support frame, and the mounting frame. Thus, the conductive elastomer panel can be used to form a ground plane that catches and shunts the spurious electromagnetic radiation to the electronic appliance, which is grounded.

IPC Classes  ?

  • H05K 9/00 - Screening of apparatus or components against electric or magnetic fields
  • G06F 1/18 - Packaging or power distribution
  • H05K 7/16 - Mounting supporting structure in casing or on frame or rack on hinges or pivots
  • H05K 7/14 - Mounting supporting structure in casing or on frame or rack

57.

Selectively forwarding flow of packets in a network appliance

      
Application Number 16123856
Grant Number 10855570
Status In Force
Filing Date 2018-09-06
First Publication Date 2019-01-17
Grant Date 2020-12-01
Owner Gigamon Inc. (USA)
Inventor
  • Nuthalapati, Ayyappa
  • Parlapalli, Bhanu Prathap Reddy
  • Mao, Andrew
  • Ng, Qi Ming

Abstract

A network appliance described herein allows the user to selectively forward the flow of packets received through a network port, to a particular egress port. The network appliance creates virtual ports, which can be assigned to the one or more egress ports. The network appliance assigns the flow of packets to the one or more virtual ports in the network appliance. The network appliance decides a forwarding treatment to be applied to the flow of packets, for forwarding the flow of packets to the egress tool ports, based on the virtual port to which the flow of packets is assigned and based on a detected network characteristic. The forwarding treatment can be a decision to drop the flow of packets, or to send the flow of packets to the egress port assigned to the virtual port.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/743 - Header address processing for routing, e.g. table lookup using hashing techniques
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/823 - Packet dropping

58.

Intelligent dropping of packets in a network visibility fabric

      
Application Number 16101644
Grant Number 10931582
Status In Force
Filing Date 2018-08-13
First Publication Date 2018-12-06
Grant Date 2021-02-23
Owner Gigamon Inc. (USA)
Inventor
  • Kumar, Anant
  • Parlapalli, Bhanu Prathap Reddy

Abstract

A network appliance deployed in a visibility fabric may intelligently drop certain low priority traffic to avoid indiscriminate dropping of data packets across all flow maps during periods of high congestion. More specifically, the network appliance may determine the data packets of a flow map should be dropped based on priority measures assigned on a per-flow map basis. Such a technique enables the network appliance to drop low priority traffic and forward high priority traffic downstream. Also introduced herein are techniques for metering traffic in order to gain better control over the traffic that is forwarded to an egress port of a network appliance. Because a network tool connected to the egress port can become easily overwhelmed, the network appliance may filter the traffic based on the priority of the flow maps to ensure that the network tool does not receive more traffic than can be handled.

IPC Classes  ?

59.

Security access for a switch device

      
Application Number 16013587
Grant Number 10291625
Status In Force
Filing Date 2018-06-20
First Publication Date 2018-11-01
Grant Date 2019-05-14
Owner Gigamon Inc. (USA)
Inventor
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abstract

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

60.

Network switch device for routing network traffic through an inline tool

      
Application Number 16000708
Grant Number 10785152
Status In Force
Filing Date 2018-06-05
First Publication Date 2018-10-04
Grant Date 2020-09-22
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Kumar, Anant

Abstract

Introduced here is a technique for using a network switch device, which may include commodity switching fabric, to route packets through an inline tool, without introducing any additional information to the packets. The introduced technique modifies standard capability of packet forwarding and learning port-to-MAC address associations to route data packets through the inline tool. The technique may include applying two override settings to the network device. A first override setting involves a forwarding rule that is based on the arrival port and the content of the packet. A second override setting involves disabling the MAC address learning mechanism for the packet received from the inline tool via the second tool port of the network device.

IPC Classes  ?

61.

GIGASECURE

      
Serial Number 88138907
Status Registered
Filing Date 2018-10-01
Registration Date 2019-05-14
Owner Gigamon Inc. ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Computer network hardware with embedded computer software used for computer network security and monitoring computer network traffic; computer software used for computer network security and monitoring computer network traffic

62.

Network switch device for routing network traffic through an inline tool

      
Application Number 14880036
Grant Number 10009263
Status In Force
Filing Date 2015-10-09
First Publication Date 2018-06-26
Grant Date 2018-06-26
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Kumar, Anant

Abstract

Introduced here is a technique for using a network switch device, which may include commodity switching fabric, to route packets through an inline tool, without introducing any additional information to the packets. The introduced technique modifies standard capability of packet forwarding and learning port-to-MAC address associations to route data packets through the inline tool. The technique may include applying two override settings to the network device. A first override setting involves a forwarding rule that is based on the arrival port and the content of the packet. A second override setting involves disabling the MAC address learning mechanism for the packet received from the inline tool via the second tool port of the network device.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/741 - Header address processing for routing, e.g. table lookup

63.

Analysis of network traffic rules at a network visibility node

      
Application Number 15406487
Grant Number 10367703
Status In Force
Filing Date 2017-01-13
First Publication Date 2018-06-07
Grant Date 2019-07-30
Owner Gigamon Inc. (USA)
Inventor
  • Gibson, Simon H
  • Merchant, Shehzad

Abstract

Techniques are disclosed for monitoring usage of network traffic rules applied by devices on a computer network. Operations in accordance with the disclosed techniques can be performed at one or more network visibility nodes that operate as part of a visibility fabric, for example for monitoring traffic on the network. In certain embodiments, packets associated with the traffic are received at a network visibility node communicatively coupled to the network that is operable to enable visibility across the network. The network visibility node can access network traffic rules that mirror the network traffic rules applied at devices on the network. The network visibility node can further process the received packets using the accessed network traffic rules to identify packets or flows of packets that satisfy criteria associated with the accessed network traffic rules.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

64.

Network visibility appliances for cloud computing architectures

      
Application Number 15885534
Grant Number 10177963
Status In Force
Filing Date 2018-01-31
First Publication Date 2018-06-07
Grant Date 2019-01-08
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind sports.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/931 - Switch fabric architecture

65.

Graph-based network fabric for a network visibility appliance

      
Application Number 15805460
Grant Number 10965515
Status In Force
Filing Date 2017-11-07
First Publication Date 2018-05-24
Grant Date 2021-03-30
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, or OpenStack. But it can be difficult to manage how the visibility platform handles incoming virtualized traffic. Introduced here, therefore, are graphs that visually represent the network fabric of a visibility platform. When the network fabric of the visibility platform is represented as a graph, an end user can easily modify the network fabric, for example, by adding, removing, or modifying nodes that represent network objects, adding, removing, or modifying connections between pairs of nodes that represent traffic flows between pairs of network objects, etc.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/46 - Interconnection of networks
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

66.

Distributed visibility fabrics for private, public, and hybrid clouds

      
Application Number 15805505
Grant Number 10778501
Status In Force
Filing Date 2017-11-07
First Publication Date 2018-05-24
Grant Date 2020-09-15
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Improved network visibility may be achieved by deriving network traffic information from numerous visibility platforms that are communicatively coupled to one another. In some embodiments, an end user interacts with a distributed visibility fabric via a user interface, which can include a high-level representation of each visibility platform. The end user can then map the network objects of each visibility platform onto a series of network visibility appliances. This technique allows certain network objects (e.g., maps) to be intelligently distributed amongst the series of network visibility appliances.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

67.

Maps having a high branching factor

      
Application Number 15815524
Grant Number 10924325
Status In Force
Filing Date 2017-11-16
First Publication Date 2018-05-24
Grant Date 2021-02-16
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

Disclosed is a technique for providing packet filter maps with high branching factors in a system for managing network traffic in a visibility fabric. A high branching factor enables a map to branch out more than two ways. High branching factors can be realized by allowing a map to be affiliated with more than one action set. For example, each rule of the map may be affiliated with a unique action set that is executed only when the corresponding rule is satisfied.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

68.

Dynamic service chaining and late binding

      
Application Number 15805487
Grant Number 10917285
Status In Force
Filing Date 2017-11-07
First Publication Date 2018-05-24
Grant Date 2021-02-09
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/751 - Topology update or discovery
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

69.

Selectively forwarding flow of packets in a network appliance

      
Application Number 15358096
Grant Number 10103963
Status In Force
Filing Date 2016-11-21
First Publication Date 2018-05-24
Grant Date 2018-10-16
Owner Gigamon Inc. (USA)
Inventor
  • Nuthalapati, Ayyappa
  • Parlapalli, Bhanu Prathap Reddy
  • Mao, Andrew
  • Ng, Qi Ming

Abstract

A network appliance described herein allows the user to selectively forward the flow of packets received through a network port, to a particular egress port. The network appliance creates virtual ports, which can be assigned to the one or more egress ports. The network appliance assigns the flow of packets to the one or more virtual ports in the network appliance. The network appliance decides a forwarding treatment to be applied to the flow of packets, for forwarding the flow of packets to the egress tool ports, based on the virtual port to which the flow of packets is assigned and based on a detected network characteristic. The forwarding treatment can be a decision to drop the flow of packets, or to send the flow of packets to the egress port assigned to the virtual port.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/743 - Header address processing for routing, e.g. table lookup using hashing techniques
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/823 - Packet dropping

70.

Multi-path arrangement of redundant inline-bypass switches

      
Application Number 15815225
Grant Number 10142130
Status In Force
Filing Date 2017-11-16
First Publication Date 2018-05-03
Grant Date 2018-11-27
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abstract

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a second bypass component, a first switch coupled to the first bypass component and the second bypass component, and a first controller; and a second inline-bypass switch appliance having a third bypass component, a fourth bypass component, a second switch coupled to the third bypass component and the fourth bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide one or more state signals that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the one or more state signals.

IPC Classes  ?

  • B23K 11/24 - Electric supply or control circuits therefor
  • H02B 1/24 - Circuit arrangements for boards or switchyards
  • H04L 12/54 - Store-and-forward switching systems
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

71.

Reduction of network connectivity gaps experienced by inline network appliances

      
Application Number 15828872
Grant Number 10154323
Status In Force
Filing Date 2017-12-01
First Publication Date 2018-04-12
Grant Date 2018-12-11
Owner Gigamon Inc. (USA)
Inventor Amarittapark, Sitti

Abstract

A network appliance may include a signal splitter that splits an incoming signal into multiple portions. The signal splitter can direct one portion of the incoming signal to a switching fabric and another portion of the incoming signal to an optical switch. By monitoring the power intensity of the portion of the incoming signal received by the switching fabric, the network appliance can seamlessly switch between a bypass traffic path and a pass-through traffic path without losing network traffic caused by gaps in network connectivity. Such a configuration also enables the network appliance to maintain an accurate record of the logical connectivity state even when the network appliance is in the bypass state (i.e., when network traffic bypasses the switching fabric of the network appliance).

IPC Classes  ?

72.

Status monitoring of inline network tools

      
Application Number 15428784
Grant Number 10404591
Status In Force
Filing Date 2017-02-09
First Publication Date 2018-03-29
Grant Date 2019-09-03
Owner Gigamon Inc. (USA)
Inventor
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abstract

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. Guiding techniques based on these identifiers offer flexible support for multiple network tool operational modes. For example, the packet broker may be able to readily address changes in the state of a network tool connected to the packet broker by modifying certain egress translation schemes and/or ingress translation schemes. The “state” of a network tool can be “up” (i.e., ready for service) or “down” (i.e., out of service) based on, for example, the network tool's ability to pass through health-probing data packets dispatched by the packet broker.

IPC Classes  ?

  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/46 - Interconnection of networks
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 12/935 - Switch interfaces, e.g. port details
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 1/24 - Testing correct operation
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off

73.

Statistical multiplexing of inline network tools

      
Application Number 15428815
Grant Number 10225186
Status In Force
Filing Date 2017-02-09
First Publication Date 2018-03-29
Grant Date 2019-03-05
Owner Gigamon Inc. (USA)
Inventor
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abstract

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. However, in some instances, it may be desirable for data packets the one or more network tools in a load-balanced manner rather than a cascaded manner. Accordingly, the packet broker may initially form a trunk group (i.e., a predefined group of ports that are treated as one port) based on input provided by an administrator. A group of network tools that share a load (i.e., a traffic flow) through trunking facilitated by the packet broker are referred to as a “trunk group” of network tools.

IPC Classes  ?

  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 1/24 - Testing correct operation
  • H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 12/46 - Interconnection of networks
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 12/935 - Switch interfaces, e.g. port details
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

74.

Intelligent dropping of packets in a network visibility fabric

      
Application Number 15274871
Grant Number 10057170
Status In Force
Filing Date 2016-09-23
First Publication Date 2018-03-29
Grant Date 2018-08-21
Owner Gigamon Inc. (USA)
Inventor
  • Kumar, Anant
  • Parlapalli, Bhanu Prathap Reddy

Abstract

A network appliance deployed in a visibility fabric may intelligently drop certain low priority traffic to avoid indiscriminate dropping of data packets across all flow maps during periods of high congestion. More specifically, the network appliance may determine the data packets of a flow map should be dropped based on priority measures assigned on a per-flow map basis. Such a technique enables the network appliance to drop low priority traffic and forward high priority traffic downstream. Also introduced herein are techniques for metering traffic in order to gain better control over the traffic that is forwarded to an egress port of a network appliance. Because a network tool connected to the egress port can become easily overwhelmed, the network appliance may filter the traffic based on the priority of the flow maps to ensure that the network tool does not receive more traffic than can be handled.

IPC Classes  ?

  • H04L 12/807 - Calculation or update of the congestion window
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/801 - Flow control or congestion control

75.

Flexible inline arrangements for guiding traffic through network tools

      
Application Number 15409903
Grant Number 10178026
Status In Force
Filing Date 2017-01-19
First Publication Date 2018-03-29
Grant Date 2019-01-08
Owner Gigamon Inc. (USA)
Inventor
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abstract

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. More specifically, the packet broker may apply packet-matching criteria to incoming data packets to determine a predetermined sequence of network tools through which the data packets are to be guided. For example, the packet broker may guide a data packet through a predetermined sequence of network tools by translating an internal identifier added to the data packet to an external identifier before transmission to each of the network tools, and translating the external identifier to a different internal identifier each time the data packet is received from each of the network tools.

IPC Classes  ?

  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority
  • H04L 12/46 - Interconnection of networks
  • H04L 12/935 - Switch interfaces, e.g. port details
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 1/24 - Testing correct operation
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off

76.

Systems and methods for implementing a traffic visibility network

      
Application Number 15801158
Grant Number 10230612
Status In Force
Filing Date 2017-11-01
First Publication Date 2018-03-15
Grant Date 2019-03-12
Owner Gigamon Inc. (USA)
Inventor
  • Leong, Patrick Pak Tak
  • Hooper, Paul Andrew

Abstract

A method of packet processing, includes: providing a plurality of network appliances that form a cluster, wherein two or more of the plurality of network appliances in the cluster are located at different geographical locations, are communicatively coupled via a private network or an Internet, and are configured to collectively perform out-of-band packet processing; receiving a packet by one of the network appliances in the cluster; processing the packet using two or more of the plurality of the appliances in the cluster; and passing the packet to one or more network monitoring tools after the packet is processed.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

77.

Network visibility appliances for cloud computing architectures

      
Application Number 15433864
Grant Number 09906401
Status In Force
Filing Date 2017-02-15
First Publication Date 2018-02-27
Grant Date 2018-02-27
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind sports.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/46 - Interconnection of networks

78.

Filtration of network traffic using virtually-extended ternary content-addressable memory (TCAM)

      
Application Number 15794364
Grant Number 10164908
Status In Force
Filing Date 2017-10-26
First Publication Date 2018-02-22
Grant Date 2018-12-25
Owner Gigamon Inc. (USA)
Inventor
  • Nanda, Avoy
  • Nguyen, Hoang

Abstract

Ternary content-addressable memory (TCAM) of an ingress appliance in a visibility fabric may include rules for filtering traffic received by the ingress appliance. But the TCAM has limited space for rules and can become easily exhausted. By migrating rules to other visibility nodes in the visibility fabric, the techniques introduced here allow the TCAM to be virtually extended across multiple visibility nodes. More specifically, upon receiving a data packet at an ingress port, the ingress visibility node can tag the data packet with an identifier based on which ingress port received the data packet. The ingress visibility node can then determine, based on the identifier, whether the data packet should be filtered using a rule stored in the TCAM of the ingress visibility node or a rule stored in the TCAM of some visibility node in the visibility fabric.

IPC Classes  ?

  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch

79.

Software defined visibility fabric

      
Application Number 15706470
Grant Number 10764207
Status In Force
Filing Date 2017-09-15
First Publication Date 2018-01-11
Grant Date 2020-09-01
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

A fabric manager includes: a processing unit having a service chain creation module configured to create a service chain by connecting some of a plurality of nodes via virtual links; wherein the some of the plurality of nodes represent respective network components of an auxiliary network configured to obtain packets from a traffic production network; and wherein the service chain is configured to control an order of the network components represented by the some of the plurality of nodes packets are to traverse.

IPC Classes  ?

  • H04L 12/933 - Switch core, e.g. crossbar, shared memory or shared medium
  • H04L 12/931 - Switch fabric architecture
  • H04L 12/46 - Interconnection of networks
  • G06F 9/00 - Arrangements for program control, e.g. control units
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing

80.

Reduction of network connectivity gaps experienced by inline network appliances

      
Application Number 15257743
Grant Number 09860616
Status In Force
Filing Date 2016-09-06
First Publication Date 2018-01-02
Grant Date 2018-01-02
Owner Gigamon Inc. (USA)
Inventor Amarittapark, Sitti

Abstract

A network appliance may include a signal splitter that splits an incoming signal into multiple portions. The signal splitter can direct one portion of the incoming signal to a switching fabric and another portion of the incoming signal to an optical switch. By monitoring the power intensity of the portion of the incoming signal received by the switching fabric, the network appliance can seamlessly switch between a bypass traffic path and a pass-through traffic path without losing network traffic caused by gaps in network connectivity. Such a configuration also enables the network appliance to maintain an accurate record of the logical connectivity state even when the network appliance is in the bypass state (i.e., when network traffic bypasses the switching fabric of the network appliance).

IPC Classes  ?

81.

Monitoring virtualized network

      
Application Number 15679017
Grant Number 10230616
Status In Force
Filing Date 2017-08-16
First Publication Date 2017-12-28
Grant Date 2019-03-12
Owner Gigamon Inc. (USA)
Inventor Nguyen, Hung

Abstract

A method of monitoring virtualized network includes receiving information regarding the virtualized network, wherein the information is received at a port of a network switch appliance, receiving a packet at a network port of the network switch appliance, and using the received information to determine whether to process the packet according to a first packet processing scheme or a second packet processing scheme, wherein the first packet processing scheme involves performing header stripping, and performing packet transmission to one of a plurality of instrument ports at the network switch appliance after the header stripping, each of the instrument ports configured for communicatively coupling to a network monitoring instrument, and wherein the second packet processing scheme involves performing packet transmission to one of the plurality of instrument ports at the network switch appliance without performing any header stripping.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements

82.

Session aware adaptive packet filtering

      
Application Number 15629556
Grant Number 11165682
Status In Force
Filing Date 2017-06-21
First Publication Date 2017-11-09
Grant Date 2021-11-02
Owner Gigamon Inc. (USA)
Inventor
  • Merchant, Shehzad
  • Cheung, David
  • Bommana, Murali

Abstract

A method performed by a network device includes: receiving a first packet by the network device, wherein the first packet is tapped from a network; identifying a session to which the first packet belongs when the first packet has one or more values that at least partially match one or more terms, wherein the act of identifying the session is performed by the network device; receiving a second packet by the network device; determining whether the second packet belongs to the session; and performing a packet processing action by the network device based on the identified session; wherein the session is identified based on a first criterion, and the act of determining whether the second packet belongs to the session is performed based on a second criterion that is different from the first criterion.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/801 - Flow control or congestion control

83.

Redundant inline-bypass switch

      
Application Number 15620604
Grant Number 10178049
Status In Force
Filing Date 2017-06-12
First Publication Date 2017-09-28
Grant Date 2019-01-08
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abstract

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a first switch coupled to the first bypass component, and a first controller; and a second inline-bypass switch appliance having a second bypass component, a second switch coupled to the second bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide a state signal that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the state signal.

IPC Classes  ?

  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch

84.

Automatic target selection

      
Application Number 15604564
Grant Number 10057143
Status In Force
Filing Date 2017-05-24
First Publication Date 2017-09-07
Grant Date 2018-08-21
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

A method of identifying targets for monitoring includes: obtaining a user-defined filter map, the user-defined filter map having one or more filter rules for matching against network traffic when the user-defined filter map is used by a network system to process the network traffic; and determining a set of one or more targets by a processing unit based at least in part on the user-defined filter map, wherein the processing unit comprises a target selection module configured to access a list of available targets from a database, and select the one or more targets from the list of available targets based at least in part on the user-defined filter map.

IPC Classes  ?

  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

85.

Recombinant fusion proteins and libraries from immune cell repertoires

      
Application Number 15598313
Grant Number 09926554
Status In Force
Filing Date 2017-05-18
First Publication Date 2017-08-31
Grant Date 2018-03-27
Owner GigaMune, Inc. (USA)
Inventor
  • Johnson, David Scott
  • Adler, Adam
  • Mizrahi, Rena

Abstract

Disclosed herein are methods and compositions for generating a repertoire of recombinant fusion polypeptides from immune cells, and uses thereof.

IPC Classes  ?

  • C40B 50/06 - Biochemical methods, e.g. using enzymes or whole viable microorganisms
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA

86.

Recombinant fusion proteins and libraries from immune cell repertoires

      
Application Number 15598314
Grant Number 09926555
Status In Force
Filing Date 2017-05-18
First Publication Date 2017-08-31
Grant Date 2018-03-27
Owner GigaMune, Inc. (USA)
Inventor
  • Johnson, David Scott
  • Adler, Adam
  • Mizrahi, Rena

Abstract

Disclosed herein are methods and compositions for generating a repertoire of recombinant fusion polypeptides from immune cells, and uses thereof.

IPC Classes  ?

  • C40B 50/06 - Biochemical methods, e.g. using enzymes or whole viable microorganisms
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA

87.

Security access for a switch device

      
Application Number 15498263
Grant Number 10027677
Status In Force
Filing Date 2017-04-26
First Publication Date 2017-08-10
Grant Date 2018-07-17
Owner Gigamon Inc. (USA)
Inventor
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abstract

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

88.

Selective modification of data packets for network tool verification

      
Application Number 15003453
Grant Number 10341368
Status In Force
Filing Date 2016-01-21
First Publication Date 2017-07-27
Grant Date 2019-07-02
Owner Gigamon Inc. (USA)
Inventor Tekchandani, Navin C.

Abstract

A network appliance may be coupled to a network tool configured to monitor the traffic within a computer network. Often, the network tool is operable in two modes (i.e., an inline mode and an out-of-band mode). Before the network tool is deployed as an inline device, however, it is desirable to verify that the network tool is secure. Described herein are systems and techniques for verifying network tools prior to deployment as inline devices. More specifically, the network appliance may be configured to modify the content of a data packet (e.g., by altering a bit) and transmit the modified data packet downstream to a network tool. The network appliance can monitor the network tool to make sure the network tool drops or returns the modified data packet. These techniques allow the network appliance to controllably simulate the receipt of malicious traffic by the network tool.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

89.

Bypass switch for redundant in-line network switch appliance

      
Application Number 15006984
Grant Number 09960953
Status In Force
Filing Date 2016-01-26
First Publication Date 2017-07-27
Grant Date 2018-05-01
Owner Gigamon Inc. (USA)
Inventor Sufleta, Zbigniew

Abstract

Systems of redundant in-line network switch appliances are described. In an embodiment, a system includes a primary network switch appliance and a secondary network switch appliance communicatively coupled in-line between nodes on a computer network. A tool, for example for network monitoring, is communicatively coupled to the primary network switch appliance. In use, when the primary network switch appliance is in a first state, a bypass switch of the primary network switch appliance is configured to complete a communication path between the tool and a node on the computer network via a switching fabric of the primary network switch appliance. When the primary network switch appliance is in a second state, the bypass switch is configured to complete a communication path between the tool and the node on the computer network via the secondary network switch appliance, bypassing the switching fabric of the primary network switch appliance.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration

90.

In-line tool performance monitoring and adaptive packet routing

      
Application Number 14940877
Grant Number 10142210
Status In Force
Filing Date 2015-11-13
First Publication Date 2017-05-18
Grant Date 2018-11-27
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Lee, Jason
  • Manchiraju-Venkata, Ramakrishna
  • Kishore, Tanmay
  • Xiu, Yan

Abstract

Embodiments are disclosed for monitoring the performance of an in-line tool without adding data to network traffic routed through the in-line tool. In some embodiments, performance of the in-line tool is based on a measured latency introduced by the processing of packets through the in-line tool. In some embodiments, network traffic is adaptively routed based on the measured latency at the in-line tool.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/727 - Selecting a path with minimum delay
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/841 - Flow control actions using time consideration, e.g. round trip time [RTT]

91.

Routing network traffic packets through a shared inline tool

      
Application Number 14945347
Grant Number 09912575
Status In Force
Filing Date 2015-11-18
First Publication Date 2017-05-18
Grant Date 2018-03-06
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Lee, Hung Chuen Jason
  • Manchiraju-Venkata, Ramakrishna
  • Kishore, Tanmay
  • Xiu, Yan
  • Nguyen, Hung
  • Amarittapark, Sitti

Abstract

Introduced herein is a technology for a network switch device to route network packets through a inline tool, without introducing additional information to the network packets. The technology records an association between an input network port and a signature (e.g., source MAC address) of the network packet, before forwarding the packet to the inline tool. When receiving the packet back from the inline tool, the network device recognizes that the packet signature is associated with the input network port, and that the input network port is paired with a particular output network port. Thus, the network device identifies the output network port for sending the packet, without modifying contents of the packet.

IPC Classes  ?

  • H04L 12/751 - Topology update or discovery
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

92.

Traffic broker for routing data packets through sequences of in-line tools

      
Application Number 14938700
Grant Number 10986039
Status In Force
Filing Date 2015-11-11
First Publication Date 2017-05-11
Grant Date 2021-04-20
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abstract

Embodiments are disclosed for a network switch appliance with a traffic broker that facilitates routing of network traffic between pairs of end nodes on a computer network through a configurable sequence of in-line tools.

IPC Classes  ?

93.

Systems and methods for determining input and output interfaces of a network device and copies of a same packet going through the network device

      
Application Number 15413209
Grant Number 10404589
Status In Force
Filing Date 2017-01-23
First Publication Date 2017-05-11
Grant Date 2019-09-03
Owner Gigamon Inc. (USA)
Inventor
  • Alawani, Ashutosh
  • Settipalli, Sreekanth
  • Kishore, Tanmay
  • Cafarelli, Dominick
  • Merchant, Shehzad

Abstract

A method performed by a network device that taps to a network having a routing device, includes: receiving a first packet tapped from the network; determining a first information regarding an input interface of the routing device based on a destination address of the first packet; receiving a second packet tapped from the network; determining a second information regarding an output interface of the routing device based on a source address of the second packet; determining a first CRC for the first packet; determining a second CRC for the second packet; and comparing the first CRC with the second CRC at the network device to determine whether the first packet and the second packet are the same.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/741 - Header address processing for routing, e.g. table lookup

94.

Filtration of network traffic using virtually-extended ternary content-addressable memory (TCAM)

      
Application Number 14931502
Grant Number 09813357
Status In Force
Filing Date 2015-11-03
First Publication Date 2017-05-04
Grant Date 2017-11-07
Owner Gigamon Inc. (USA)
Inventor
  • Nanda, Avoy
  • Nguyen, Hoang

Abstract

Ternary content-addressable memory (TCAM) of an ingress appliance in a visibility fabric may include rules for filtering traffic received by the ingress appliance. But the TCAM has limited space for rules and can become easily exhausted. By migrating rules to other visibility nodes in the visibility fabric, the techniques introduced here allow the TCAM to be virtually extended across multiple visibility nodes. More specifically, upon receiving a data packet at an ingress port, the ingress visibility node can tag the data packet with an identifier based on which ingress port received the data packet. The ingress visibility node can then determine, based on the identifier, whether the data packet should be filtered using a rule stored in the TCAM of the ingress visibility node or a rule stored in the TCAM of some visibility node in the visibility fabric.

IPC Classes  ?

  • H04L 12/50 - Circuit switching systems, i.e. systems in which the path is physically permanent during the communication
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch

95.

Buffered session filtering for inline bypass application

      
Application Number 14810245
Grant Number 09722955
Status In Force
Filing Date 2015-07-27
First Publication Date 2017-02-02
Grant Date 2017-08-01
Owner Gigamon Inc. (USA)
Inventor
  • Nguyen, Hung
  • Bommana, Murali

Abstract

A switch appliance includes a first network port for communication with a first node, where the first network port is configured to receive a packet, and a second network port for communication with a second node. The switch appliance further includes a first instrument port for communication with a first inline tool, a buffer, and a processing unit coupled to the first network port, the second network port, the first instrument port and the buffer. The processing unit is configured to determine whether a packet processing state has been set as an inline-tool processing state or a bypass state, and is configured to pass the packet to the second network port for transmission to the second node, and to store a copy of the packet in the buffer, if the packet processing state has not been set as the inline-tool processing state nor the bypass state.

IPC Classes  ?

  • H04L 12/701 - Routing or path finding
  • H04L 12/64 - Hybrid switching systems
  • H04L 12/861 - Packet buffering or queuing arrangements; Queue scheduling
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

96.

Recombinant fusion proteins and libraries from immune cell repertoires

      
Application Number 15159705
Grant Number 09738699
Status In Force
Filing Date 2016-05-19
First Publication Date 2016-12-15
Grant Date 2017-08-22
Owner GIGAMUNE, INC. (USA)
Inventor
  • Johnson, David Scott
  • Adler, Adam
  • Mizrahi, Rena

Abstract

Disclosed herein are methods and compositions for generating a repertoire of recombinant fusion polypeptides from immune cells, and uses thereof.

IPC Classes  ?

  • C40B 50/06 - Biochemical methods, e.g. using enzymes or whole viable microorganisms
  • C07K 14/725 - T-cell receptors
  • C07K 16/00 - Immunoglobulins, e.g. monoclonal or polyclonal antibodies
  • C12N 15/10 - Processes for the isolation, preparation or purification of DNA or RNA
  • C12Q 1/68 - Measuring or testing processes involving enzymes, nucleic acids or microorganismsCompositions thereforProcesses of preparing such compositions involving nucleic acids

97.

Redundant inline-bypass switch

      
Application Number 14693809
Grant Number 09680771
Status In Force
Filing Date 2015-04-22
First Publication Date 2016-10-27
Grant Date 2017-06-13
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abstract

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a first switch coupled to the first bypass component, and a first controller; and a second inline-bypass switch appliance having a second bypass component, a second switch coupled to the second bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide a state signal that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the state signal.

IPC Classes  ?

  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy

98.

Multi-path arrangement of redundant inline-bypass switches

      
Application Number 14693825
Grant Number 09843460
Status In Force
Filing Date 2015-04-22
First Publication Date 2016-10-27
Grant Date 2017-12-12
Owner Gigamon Inc. (USA)
Inventor
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abstract

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a second bypass component, a first switch coupled to the first bypass component and the second bypass component, and a first controller; and a second inline-bypass switch appliance having a third bypass component, a fourth bypass component, a second switch coupled to the third bypass component and the fourth bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide one or more state signals that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the one or more state signals.

IPC Classes  ?

99.

Systems and methods for processing packets

      
Application Number 15188705
Grant Number 10063671
Status In Force
Filing Date 2016-06-21
First Publication Date 2016-10-13
Grant Date 2018-08-28
Owner Gigamon Inc. (USA)
Inventor
  • Merchant, Shehzad
  • Ng, Qi Ming
  • Wang, Ning

Abstract

A network switch apparatus, includes: a network port configured to receive a packet; instrument ports configured to communicate with respective network monitoring instruments; a packet duplication module configured to copy the packet to provide multiple packets that are identical to each other: a tagging module configured to tag the multiple packets with different respective identifiers to obtain tagged packets; and a processing unit coupled to the instrument ports; wherein the processing unit is configured to determine whether a first one of the tagged packets satisfies a first criterion, whether a second one of the tagged packets satisfies a second criterion, process the first one of the tagged packets in a first manner if the first one of the tagged packets satisfies the first criterion, and process the second one of the tagged packets in a second manner if the second one of the tagged packets satisfies the second criterion.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 12/56 - Packet switching systems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/761 - Broadcast or multicast routing

100.

In-fabric traffic analysis

      
Application Number 14668813
Grant Number 10764162
Status In Force
Filing Date 2015-03-25
First Publication Date 2016-09-29
Grant Date 2020-09-01
Owner Gigamon Inc. (USA)
Inventor Rao, Anil

Abstract

An apparatus for a network includes: a processing unit having a filter generation module configured for: receiving an indication that a packet matches a user-defined filter; and creating one or more derivative filters based at least in part on the received indication, wherein a first derivative filter of the one or more derivative filters provides a finer grade of filtration compared to the user-defined filter; and a non-transitory medium configured for storing the one or more derivative filters.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/815 - Shaping
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  1     2        Next Page