Gigamon Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 164 pour Gigamon Inc. Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 145
        Marque 19
Juridiction
        États-Unis 146
        International 16
        Canada 2
Date
2025 4
2024 5
2023 7
2022 8
2021 8
Voir plus
Classe IPC
H04L 12/26 - Dispositions de surveillance; Dispositions de test 53
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 36
H04L 12/24 - Dispositions pour la maintenance ou la gestion 26
H04L 12/46 - Interconnexion de réseaux 22
H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité 21
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 19
42 - Services scientifiques, technologiques et industriels, recherche et conception 3
Statut
En Instance 7
Enregistré / En vigueur 157
  1     2        Prochaine page

1.

DYNAMIC MODIFICATION OF TRAFFIC MONITORING POLICIES FOR A CONTAINERIZED ENVIRONMENT

      
Numéro d'application 19085146
Statut En instance
Date de dépôt 2025-03-20
Date de la première publication 2025-08-21
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Palnati, Saritha
  • Cochinwala, Naveed

Abrégé

A method of automatic and dynamic environment discovery and policy adaptation for a containerized environment is disclosed. A plurality of traffic monitoring policies for acquiring and monitoring data traffic transmitted between one or more components of a containerized environment are accessed. The containerized environment includes a plurality of software-implemented containers. The traffic monitoring policies are caused to be applied to one or more components in the containerized environment. A change to a configuration of the containerized environment is automatically detected. In response, one or more containers of the plurality of software-implemented containers are automatically identified as containers affected by the change. Based on that identification, a modification of a traffic monitoring policy is then automatically determined to produce a modified traffic monitoring policy, and the modified traffic monitoring policy is caused to be applied to one or more components in the containerized environment.

Classes IPC  ?

  • H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
  • H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV

2.

Flow-level deduplication of network traffic in a network traffic visibility system

      
Numéro d'application 18441400
Numéro de brevet 12537683
Statut Délivré - en vigueur
Date de dépôt 2024-02-14
Date de la première publication 2025-08-14
Date d'octroi 2026-01-27
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Bommana, Murali
  • Dahiya, Sandeep
  • Kumar, Santhosh

Abrégé

A system and method for flow-level deduplication of network traffic are disclosed. A network node receives a first plurality of packets from a first network endpoint. The first plurality of packets represent a flow of data being communicated between the first network endpoint and a second network endpoint. The network node further receives a second plurality of packets from the second network endpoint. The network node identifies a sequence identifier of each packet of the first and second pluralities of packets. The network node determines that the first and second pluralities of packets are all associated with the same flow, based on the sequence identifiers of the first and second pluralities of packets. In response to that determination, the network node deduplicates the flow by discarding the first plurality of packets or the second plurality of packets. The network node may be a traffic visibility node.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 47/34 - Commande de fluxCommande de la congestion en assurant l'intégrité de la séquence, p. ex. en utilisant des numéros de séquence

3.

Nucleic Acid-Guided Nucleases

      
Numéro d'application 18887663
Statut En instance
Date de dépôt 2024-09-17
Date de la première publication 2025-04-17
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Johnson, David Scott
  • Simons, Jan Fredrik
  • Lim, Yoong Wearn
  • Spindler, Matthew James
  • Carter, Kyle Pierce
  • Sandhu, Savreet Kaur
  • Wagner, Ellen Kathleen
  • Coles, Garry
  • Edgar, Robert

Abrégé

The present disclosure provides novel nucleic acid-guided nucleases and methods of using the nucleases for genome editing. The present disclosure further provides a system for editing a target region in a genome comprising a nucleic acid-guided nuclease, a heterologous guide nucleic acid for complexing with the nucleic acid-guided nuclease, and an editing polynucleotide configured to bind to the target region.

Classes IPC  ?

  • C12N 9/22 - Ribonucléases
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN
  • C12N 15/63 - Introduction de matériel génétique étranger utilisant des vecteursVecteurs Utilisation d'hôtes pour ceux-ciRégulation de l'expression

4.

SOURCE-BASED CAPTURE OF CLEAR TEXT FROM ENCRYPTED DATA TRAFFIC FOR NETWORK TRAFFIC VISIBILITY PROCESSING

      
Numéro d'application 18364198
Statut En instance
Date de dépôt 2023-08-02
Date de la première publication 2025-02-06
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Jagarlapudi, Raghava Krishna
  • Cochinwala, Naveed
  • Xiu, Yan

Abrégé

A method of providing clear text representing encrypted data to an entity that does not support an encryption/decryption protocol used to encrypt/decrypt the data is disclosed. A call to an encryption/decryption function implemented in a worker node is detected, wherein the call is to trigger encryption or decryption of a packet. In response to detecting the call, a clear text payload of the packet is captured from an entry point or an exit point of the encryption/decryption function. A modified packet is then created based on the captured clear text payload, including synthesizing a plurality of headers for the modified packet and appending the plurality of headers to the clear text payload. The modified packet is then sent to a processing entity that is external to the worker node.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes

5.

Optimal control of network traffic visibility resources and distributed traffic processing resource control system

      
Numéro d'application 18322359
Numéro de brevet 12137052
Statut Délivré - en vigueur
Date de dépôt 2023-05-23
Date de la première publication 2024-11-05
Date d'octroi 2024-11-05
Propriétaire Gigamon, Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Saxena, Nitin

Abrégé

A method of optimizing network traffic visibility resources comprises receiving, by a controller associated with a network traffic visibility system, information indicative of operation of the network traffic visibility system. The method further comprises facilitating, by the controller, control of resources in the network traffic visibility system, according to a configured resource control policy. The facilitating can include providing, by the controller, control signaling to cause maximization of network traffic monitoring fidelity for a plurality of Quality of Service (QoS) classes of network traffic, based on a specified fixed amount of one or more network resources associated with the network traffic visibility system. Alternatively or additionally, the facilitating can include providing, by the controller, control signaling to cause minimization of use of the one or more network resources, based on a specified fixed level of traffic monitoring fidelity associated with the plurality of QoS classes.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 43/16 - Surveillance de seuil
  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic

6.

MANAGING DECRYPTION OF NETWORK FLOWS THROUGH A NETWORK APPLIANCE

      
Numéro d'application 18753183
Statut En instance
Date de dépôt 2024-06-25
Date de la première publication 2024-10-17
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abrégé

A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. Prior to initiating a network connection between the network appliance and the server, the network appliance accesses a server certificate associated with the server. In response to a determination not to decrypt data transmitted between the client device and the server, the network appliance establishes a single connection between the network appliance and the server. The network appliance transmits encrypted data between the client device and the server only over the single connection.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire

7.

Dynamic modification of traffic monitoring policies for a containerized environment

      
Numéro d'application 18165250
Numéro de brevet 12261748
Statut Délivré - en vigueur
Date de dépôt 2023-02-06
Date de la première publication 2024-08-15
Date d'octroi 2025-03-25
Propriétaire Gigamon, Inc. (USA)
Inventeur(s)
  • Palnati, Saritha
  • Cochinwala, Naveed

Abrégé

A method of automatic and dynamic environment discovery and policy adaptation for a containerized environment is disclosed. A plurality of traffic monitoring policies for acquiring and monitoring data traffic transmitted between one or more components of a containerized environment are accessed. The containerized environment includes a plurality of software-implemented containers. The traffic monitoring policies are caused to be applied to one or more components in the containerized environment. A change to a configuration of the containerized environment is automatically detected. In response, one or more containers of the plurality of software-implemented containers are automatically identified as containers affected by the change. Based on that identification, a modification of a traffic monitoring policy is then automatically determined to produce a modified traffic monitoring policy, and the modified traffic monitoring policy is caused to be applied to one or more components in the containerized environment.

Classes IPC  ?

  • H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
  • H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p. ex. entités SDN ou NFV

8.

Engineered enveloped vectors and methods of use thereof

      
Numéro d'application 18462747
Numéro de brevet 12371689
Statut Délivré - en vigueur
Date de dépôt 2023-09-07
Date de la première publication 2024-02-29
Date d'octroi 2025-07-29
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Johnson, David Scott
  • Spindler, Matthew James
  • Edgar, Robert
  • Lim, Yoong Wearn
  • Weller, Taylor

Abrégé

The present disclosure relates to a novel, engineered enveloped vector that can be used for gene delivery. The engineered enveloped vector comprises an engineered envelope comprising: (a) a viral envelope protein and optionally, (b) a non-viral membrane-bound protein. The present disclosure also provides a method of making and using the engineered enveloped vector.

Classes IPC  ?

  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN
  • C12N 9/22 - Ribonucléases
  • C12N 15/11 - Fragments d'ADN ou d'ARNLeurs formes modifiées
  • C12N 15/86 - Vecteurs viraux
  • C12N 15/90 - Introduction stable d'ADN étranger dans le chromosome

9.

NOVEL NUCLEIC ACID-GUIDED NUCLEASES

      
Numéro d'application 18336922
Statut En instance
Date de dépôt 2023-06-16
Date de la première publication 2024-01-25
Propriétaire
  • GIGAMUNE, INC. (USA)
  • GIGAMUNE, INC. (USA)
Inventeur(s)
  • Johnson, David Scott
  • Simons, Jan Fredrik
  • Lim, Yoong Wearn
  • Spindler, Matthew James
  • Carter, Kyle Pierce
  • Sandhu, Savreet Kaur
  • Wagner, Ellen Kathleen
  • Coles, Garry
  • Edgar, Robert

Abrégé

The present disclosure provides novel nucleic acid-guided nucleases and methods of using the nucleases for genome editing. The present disclosure further provides a system for editing a target region in a genome comprising a nucleic acid-guided nuclease, a heterologous guide nucleic acid for complexing with the nucleic acid-guided nuclease, and an editing polynucleotide configured to bind to the target region.

Classes IPC  ?

  • C12N 9/22 - Ribonucléases
  • C12N 15/63 - Introduction de matériel génétique étranger utilisant des vecteursVecteurs Utilisation d'hôtes pour ceux-ciRégulation de l'expression
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN

10.

Distributed packet deduplication

      
Numéro d'application 18334222
Numéro de brevet 12375373
Statut Délivré - en vigueur
Date de dépôt 2023-06-13
Date de la première publication 2023-10-12
Date d'octroi 2025-07-29
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.

Classes IPC  ?

  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 67/1023 - Sélection du serveur pour la répartition de charge basée sur un hachage appliqué aux adresses IP ou aux coûts
  • H04L 67/1034 - Réaction aux pannes de serveur par un répartiteur de charge

11.

Dynamic service chaining and late binding

      
Numéro d'application 18175201
Numéro de brevet 12015516
Statut Délivré - en vigueur
Date de dépôt 2023-02-27
Date de la première publication 2023-09-14
Date d'octroi 2024-06-18
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

Classes IPC  ?

  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 43/062 - Génération de rapports liés au trafic du réseau
  • H04L 43/12 - Sondes de surveillance de réseau
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau

12.

PRECRYPTION

      
Numéro d'application 1730152
Statut Enregistrée
Date de dépôt 2023-04-06
Date d'enregistrement 2023-04-06
Propriétaire Gigamon Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Downloadable and recorded software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets. Providing temporary use of non-downloadable software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets.

13.

One-armed inline decryption/encryption proxy operating in transparent bridge mode

      
Numéro d'application 18057581
Numéro de brevet 12095740
Statut Délivré - en vigueur
Date de dépôt 2022-11-21
Date de la première publication 2023-04-27
Date d'octroi 2024-09-17
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Guise, Jr., Dale L.
  • Cheung, David Chun Ying
  • Yuan, Fushan Allan

Abrégé

A proxy device coupled to a network receives communications between a client and a server on the network. The proxy device operates transparently to the client and the server, while coupled to receive and process the communications from a node on the network via a network port in a one-armed configuration. The proxy device communicates packets of the communications with an external tool coupled to the proxy device via a tool port and operates transparently to the nod and the tool. In certain embodiments, the tool may be a network security device, such as a firewall.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 12/46 - Interconnexion de réseaux

14.

Engineered cells expressing anti-viral T cell receptors and methods of use thereof

      
Numéro d'application 17864228
Numéro de brevet 12497711
Statut Délivré - en vigueur
Date de dépôt 2022-07-13
Date de la première publication 2023-04-20
Date d'octroi 2025-12-16
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Spindler, Matthew James
  • Johnson, David Scott
  • Nelson, Ayla Lynn
  • Wagner, Ellen Kathleen
  • Adler, Adam Shultz
  • Lim, Yoong Wearn
  • Asensio, Michael

Abrégé

Provided herein are compositions comprising recombinant mammalian cells that express recombinant T cell rectors with specificity against EBV or CMV peptide:MHC antigens. Also provided are therapeutic methods of using the recombinant mammalian cells as cell therapies against viral infections.

Classes IPC  ?

  • C40B 30/06 - Procédés de criblage des bibliothèques en mesurant les effets sur des cellules, des tissus ou des organismes vivants
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN

15.

Managing decryption of network flows through a network appliance

      
Numéro d'application 18051312
Numéro de brevet 12028332
Statut Délivré - en vigueur
Date de dépôt 2022-10-31
Date de la première publication 2023-03-16
Date d'octroi 2024-07-02
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abrégé

A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. Prior to initiating a network connection between the network appliance and the server, the network appliance accesses a server certificate issued by the server. In response to a determination, based on application of a policy to the server certificate, not to decrypt data transmitted between the client device and the server, the network appliance establishes only a single connection between the network appliance and the server. The network appliance transmits encrypted data between the client device and the server over the single connection.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire

16.

PRECRYPTION

      
Numéro de série 97793107
Statut Enregistrée
Date de dépôt 2023-02-13
Date d'enregistrement 2024-11-19
Propriétaire Gigamon Inc. ()
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Downloadable and recorded software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets Providing temporary use of non-downloadable software used to intercept transmitted and received network packets prior to encryption and after decryption to allow for inspection and analysis of the data in the network packets

17.

DISTRIBUTED PACKET DEDUPLICATION

      
Numéro d'application 17814440
Statut En instance
Date de dépôt 2022-07-22
Date de la première publication 2022-11-17
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.

Classes IPC  ?

  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 67/1023 - Sélection du serveur pour la répartition de charge basée sur un hachage appliqué aux adresses IP ou aux coûts
  • H04L 67/1034 - Réaction aux pannes de serveur par un répartiteur de charge

18.

Tool port throttling at a network visibility node

      
Numéro d'application 17862070
Numéro de brevet 11979326
Statut Délivré - en vigueur
Date de dépôt 2022-07-11
Date de la première publication 2022-10-27
Date d'octroi 2024-05-07
Propriétaire Gigamon, Inc. (USA)
Inventeur(s)
  • Johansson, Jan
  • Jagtap, Tushar R.
  • Reddy, Vikram
  • Nangineni, Ujjvala

Abrégé

Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level) for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

Classes IPC  ?

  • H04L 47/127 - Prévention de la congestionRécupération de la congestion en utilisant la prévision de congestion
  • H04L 47/74 - Mesures pour pallier la non-disponibilité des ressources

19.

Tool port aware stateful protocol visibility for packet distribution

      
Numéro d'application 17183106
Numéro de brevet 11463558
Statut Délivré - en vigueur
Date de dépôt 2021-02-23
Date de la première publication 2022-08-25
Date d'octroi 2022-10-04
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Muthusamy, Rakesh
  • Cafarelli, Dominick
  • Jagtap, Tushar
  • Mani, Arunraj

Abrégé

At least one technique for distributing traffic from a visibility node to a network tool is disclosed. In certain embodiments, the visibility node has a tool port through which to receive a plurality of packets which each include a compressed header. The visibility node determines, for each packet, whether a given network tool has received the compressed header in decompressed format based on a header-to-tool mapping structure. The structure includes information indicative of which packet headers each of the plurality of network tools have received in decompressed format. If the visibility node determines that the tool previously received the decompressed header, the visibility node transmits the packet to the network tool in compressed format. If the visibility node determines that the tool has not previously received the decompressed header, the visibility node decompresses the compressed header prior to transmitting the packet to the given network tool.

Classes IPC  ?

  • H04L 69/04 - Protocoles de compression de données, p. ex. ROHC
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
  • H04L 45/74 - Traitement d'adresse pour le routage

20.

ENGINEERED CELLS EXPRESSING ANTI-TUMOR T CELL RECEPTORS AND METHODS OF USE THEREOF

      
Numéro d'application 17608261
Statut En instance
Date de dépôt 2020-05-01
Date de la première publication 2022-07-07
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Spindler, Matthew James
  • Johnson, David Scott
  • Adler, Adam Shultz
  • Asensio, Michael

Abrégé

Provided herein are compositions comprising recombinant mammalian cells that express recombinant T cell receptors with specificity against gp100 peptide:MHC antigens. Also provided are therapeutic methods of using the recombinant mammalian cells as cell therapies against melanoma tumors.

Classes IPC  ?

  • C07K 14/725 - Récepteurs de lymphocytes-T
  • C12N 5/0783 - Cellules TCellules NKProgéniteurs de cellules T ou NK

21.

GIGAMON

      
Numéro de série 97447582
Statut Enregistrée
Date de dépôt 2022-06-07
Date d'enregistrement 2023-09-05
Propriétaire Gigamon Inc. ()
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

downloadable computer software and computer hardware for test access point and terminal access point for computer network and application monitoring, visibility, analytics, and security providing temporary use of non-downloadable computer software for test access point and terminal access point computer network and application monitoring, visibility, analytics, and security

22.

Optimal control of network traffic visibility resources and distributed traffic processing resource control system

      
Numéro d'application 17393359
Numéro de brevet 11700205
Statut Délivré - en vigueur
Date de dépôt 2021-08-03
Date de la première publication 2022-02-10
Date d'octroi 2023-07-11
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Saxena, Nitin

Abrégé

A method of optimizing network traffic visibility resources comprises receiving, by a controller associated with a network traffic visibility system, information indicative of operation of the network traffic visibility system. The method further comprises facilitating, by the controller, control of resources in the network traffic visibility system, according to a configured resource control policy. The facilitating can include providing, by the controller, control signaling to cause maximization of network traffic monitoring fidelity for a plurality of Quality of Service (QoS) classes of network traffic, based on a specified fixed amount of one or more network resources associated with the network traffic visibility system. Alternatively or additionally, the facilitating can include providing, by the controller, control signaling to cause minimization of use of the one or more network resources, based on a specified fixed level of traffic monitoring fidelity associated with the plurality of QoS classes.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/16 - Surveillance de seuil
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion

23.

OPTIMAL CONTROL OF NETWORK TRAFFIC VISIBILITY RESOURCES AND DISTRIBUTED TRAFFIC PROCESSING RESOURCE CONTROL SYSTEM

      
Numéro d'application US2021044413
Numéro de publication 2022/031757
Statut Délivré - en vigueur
Date de dépôt 2021-08-03
Date de publication 2022-02-10
Propriétaire GIGAMON INC. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Saxena, Nitin

Abrégé

A method of optimizing network traffic visibility resources comprises receiving, by a controller associated with a network traffic visibility system, information indicative of operation of the network traffic visibility system. The method further comprises facilitating, by the controller, control of resources in the network traffic visibility system, according to a configured resource control policy. The facilitating can include providing, by the controller, control signaling to cause maximization of network traffic monitoring fidelity for a plurality of Quality of Service (QoS) classes of network traffic, based on a specified fixed amount of one or more network resources associated with the network traffic visibility system. Alternatively or additionally, the facilitating can include providing, by the controller, control signaling to cause minimization of use of the one or more network resources, based on a specified fixed level of traffic monitoring fidelity associated with the plurality of QoS classes.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

24.

Engineered cells expressing anti-viral T cell receptors and methods of use thereof

      
Numéro d'application 17480697
Numéro de brevet 11421220
Statut Délivré - en vigueur
Date de dépôt 2021-09-21
Date de la première publication 2022-01-06
Date d'octroi 2022-08-23
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Spindler, Matthew James
  • Johnson, David Scott
  • Nelson, Ayla Lynn
  • Wagner, Ellen Kathleen
  • Adler, Adam Shultz
  • Lim, Yoong Wearn
  • Asensio, Michael

Abrégé

Provided herein are compositions comprising recombinant mammalian cells that express recombinant T cell rectors with specificity against EBV or CMV peptide:MHC antigens. Also provided are therapeutic methods of using the recombinant mammalian cells as cell therapies against viral infections.

Classes IPC  ?

  • C40B 30/04 - Procédés de criblage des bibliothèques en mesurant l'aptitude spécifique à se lier à une molécule cible, p. ex. liaison anticorps-antigène, liaison récepteur-ligand
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN
  • C07K 14/725 - Récepteurs de lymphocytes-T

25.

One-armed inline decryption/encryption proxy operating in transparent bridge mode

      
Numéro d'application 16895831
Numéro de brevet 11509631
Statut Délivré - en vigueur
Date de dépôt 2020-06-08
Date de la première publication 2021-11-11
Date d'octroi 2022-11-22
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Guise, Jr., Dale L.
  • Cheung, David Chun Ying
  • Yuan, Fushan Allan

Abrégé

A proxy device coupled to a network receives communications between a client and a server on the network. The proxy device operates transparently to the client and the server, while coupled to receive and process the communications from a node on the network via a network port in a one-armed configuration. The proxy device communicates packets of the communications with an external tool coupled to the proxy device via a tool port and operates transparently to the nod and the tool. In certain embodiments, the tool may be a network security device, such as a firewall.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 12/46 - Interconnexion de réseaux

26.

Dynamic mapping of nodes responsible for monitoring traffic of an evolved packet core

      
Numéro d'application 17364483
Numéro de brevet 11700568
Statut Délivré - en vigueur
Date de dépôt 2021-06-30
Date de la première publication 2021-10-21
Date d'octroi 2023-07-11
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Muthusamy, Rakesh
  • Jagtap, Tushar R.
  • Nangineni, Ujjvala
  • Pereira, Kristian

Abrégé

Introduced here are visibility platforms able to process the traffic handled by the gateways of an Evolved Packet Core (EPC) with Control and User Plane Separation (CUPS). A visibility platform can include a control processing node (CPN) and one or more user processing nodes (UPNs). The visibility platform may populate a data structure in which the CPN and UPNs are associated with locations along an interface on which Sx/N4 traffic is exchanged between the control and user planes. Each location may be representative of the point on the Sx/N4 interface at which Sx/N4 traffic processed by the corresponding node is acquired. The CPN can use the data structure to program session flows that impact how user traffic is handled by the UPNs.

Classes IPC  ?

  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04W 40/30 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité pour acheminement proactif
  • H04W 88/16 - Dispositions de passerelles

27.

Graph-based network fabric for a network visibility appliance

      
Numéro d'application 17213735
Numéro de brevet 12068905
Statut Délivré - en vigueur
Date de dépôt 2021-03-26
Date de la première publication 2021-07-15
Date d'octroi 2024-08-20
Propriétaire Gigamon, Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, or OpenStack. But it can be difficult to manage how the visibility platform handles incoming virtualized traffic. Introduced here, therefore, are graphs that visually represent the network fabric of a visibility platform. When the network fabric of the visibility platform is represented as a graph, an end user can easily modify the network fabric, for example, by adding, removing, or modifying nodes that represent network objects, adding, removing, or modifying connections between pairs of nodes that represent traffic flows between pairs of network objects, etc.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 43/062 - Génération de rapports liés au trafic du réseau
  • H04L 43/12 - Sondes de surveillance de réseau
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau

28.

Dynamic service chaining and late binding

      
Numéro d'application 17142145
Numéro de brevet 11595240
Statut Délivré - en vigueur
Date de dépôt 2021-01-05
Date de la première publication 2021-06-03
Date d'octroi 2023-02-28
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

Classes IPC  ?

  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 43/062 - Génération de rapports liés au trafic du réseau
  • H04L 43/12 - Sondes de surveillance de réseau
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS

29.

Maps having a high branching factor

      
Numéro d'application 17175551
Numéro de brevet 11658861
Statut Délivré - en vigueur
Date de dépôt 2021-02-12
Date de la première publication 2021-06-03
Date d'octroi 2023-05-23
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Disclosed is a technique for providing packet filter maps with high branching factors in a system for managing network traffic in a visibility fabric. A high branching factor enables a map to branch out more than two ways. High branching factors can be realized by allowing a map to be affiliated with more than one action set. For example, each rule of the map may be affiliated with a unique action set that is executed only when the corresponding rule is satisfied.

Classes IPC  ?

  • H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 43/062 - Génération de rapports liés au trafic du réseau
  • H04L 43/12 - Sondes de surveillance de réseau
  • H04L 49/00 - Éléments de commutation de paquets
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS

30.

Dynamic mapping of nodes responsible for monitoring traffic of an evolved packet core

      
Numéro d'application 16696693
Numéro de brevet 11057820
Statut Délivré - en vigueur
Date de dépôt 2019-11-26
Date de la première publication 2021-05-27
Date d'octroi 2021-07-06
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Muthusamy, Rakesh
  • Jagtap, Tushar R.
  • Nangineni, Ujjvala
  • Pereira, Kristian

Abrégé

Introduced here are visibility platforms able to process the traffic handled by the gateways of an Evolved Packet Core (EPC) with Control and User Plane Separation (CUPS). A visibility platform can include a control processing node (CPN) and one or more user processing nodes (UPNs). The visibility platform may populate a data structure in which the CPN and UPNs are associated with locations along an interface on which Sx/N4 traffic is exchanged between the control and user planes. Each location may be representative of the point on the Sx/N4 interface at which Sx/N4 traffic processed by the corresponding node is acquired. The CPN can use the data structure to program session flows that impact how user traffic is handled by the UPNs.

Classes IPC  ?

  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04W 40/30 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité pour acheminement proactif
  • H04W 88/16 - Dispositions de passerelles

31.

Tool port aliasing in a network visibility fabric

      
Numéro d'application 16749906
Numéro de brevet 10999188
Statut Délivré - en vigueur
Date de dépôt 2020-01-22
Date de la première publication 2021-05-04
Date d'octroi 2021-05-04
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Cafarelli, Dominick
  • Bommana, Murali
  • Jagtap, Tushar

Abrégé

A method of operating a network visibility node is disclosed. In certain embodiments, the network visibility node has a plurality of network ports through which to communicate data with a plurality of network hosts and has a plurality of tool ports through which to communicate data with a plurality of network tools. The network visibility node accesses a port group map associated with a plurality of tool port groups of the network visibility node, where each of the tool port groups includes one or more tool ports of the network visibility node, and where the port group map contains a separate tool alias for each tool port group of the plurality of tool port groups. Each tool alias can correspond to a different type of network traffic. The network visibility node uses the port group map to ascertain a tool port group through which to communicate the plurality of packets with a particular network tool.

Classes IPC  ?

  • H04L 12/725 - Sélection d’un chemin de qualité de service [QoS] adéquate
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/813 - Commande basée sur des règles, p.ex. en fonction de la politique d’utilisation
  • H04L 12/859 - Actions liées à la commande de flux basée sur la nature de l’application, p.ex. contrôle de navigation sur l’Internet ou contrôle du trafic de courrier électronique
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

32.

Elastic modification of application instances in a network visibility infrastructure

      
Numéro d'application 17104893
Numéro de brevet 11750518
Statut Délivré - en vigueur
Date de dépôt 2020-11-25
Date de la première publication 2021-03-18
Date d'octroi 2023-09-05
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Introduced here are network visibility platforms having total processing capacity that can be dynamically varied in response to determining how much network traffic is currently under consideration. A visibility platform can include one or more network appliances, each of which includes at least one instance of an application configured to process data packets. Rather than forward all traffic to a single application instance for processing, the traffic can instead be distributed amongst a pool of application instances to collectively ensure that no data packets are dropped due to over-congestion. Moreover, the visibility platform can be designed such that application instances are elastically added/removed, as necessary, based on the volume of traffic currently under consideration.

Classes IPC  ?

  • H04L 12/801 - Commande de flux ou commande de congestion
  • H04L 12/743 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance par des techniques de hachage
  • H04L 47/12 - Prévention de la congestionRécupération de la congestion
  • H04L 45/7453 - Recherche de table d'adressesFiltrage d'adresses en utilisant le hachage

33.

Network visibility appliances for cloud computing architectures

      
Numéro d'application 17017378
Numéro de brevet 11252011
Statut Délivré - en vigueur
Date de dépôt 2020-09-10
Date de la première publication 2020-12-31
Date d'octroi 2022-02-15
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind spots.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

34.

In-fabric traffic analysis

      
Numéro d'application 16938747
Numéro de brevet 11425004
Statut Délivré - en vigueur
Date de dépôt 2020-07-24
Date de la première publication 2020-11-12
Date d'octroi 2022-08-23
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

An apparatus for a network includes: a processing unit having a filter generation module configured for: receiving an indication that a packet matches a user-defined filter; and creating one or more derivative filters based at least in part on the received indication, wherein a first derivative filter of the one or more derivative filters provides a finer grade of filtration compared to the user-defined filter; and a non-transitory medium configured for storing the one or more derivative filters.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/142 - Analyse ou conception de réseau en utilisant des méthodes statistiques ou mathématiques
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 47/22 - Mise en forme du trafic
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 49/25 - Routage ou recherche de route dans une matrice de commutation
  • H04L 43/062 - Génération de rapports liés au trafic du réseau

35.

Automatic dynamic determination of data traffic sampling policy in a network visibility appliance

      
Numéro d'application 16405674
Numéro de brevet 11115294
Statut Délivré - en vigueur
Date de dépôt 2019-05-07
Date de la première publication 2020-11-12
Date d'octroi 2021-09-07
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Harikrishnan, Bharath
  • Jagtap, Tushar Rajnikant
  • Garcia-Rosell Foronda, Fernando

Abrégé

A network visibility appliance automatically and dynamically determines a data traffic sampling policy that it should apply, i.e., a policy for determining which flows the network appliance should forward to one or more tools. The technique can be used to adjust for changes in network traffic to avoid exceeding performance constraints (e.g., maximum throughput) of network analytic tools, while maintaining high efficiency of usage of the tools. In the technique, a policy engine monitors network traffic characteristics in a subscriber throughput table and dynamically determines a sampling policy to apply, so as to decrease and/or increase traffic throughput to a given tool, so that the tool is efficiently used.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

36.

AUTOMATIC DYNAMIC DETERMINATION OF DATA TRAFFIC SAMPLING POLICY IN A NETWORK VISIBILITY APPLIANCE

      
Numéro d'application US2020030277
Numéro de publication 2020/226947
Statut Délivré - en vigueur
Date de dépôt 2020-04-28
Date de publication 2020-11-12
Propriétaire GIGAMON INC. (USA)
Inventeur(s)
  • Harikrishnan, Bharath
  • Jagtap, Tushar Rajnikant
  • Garcia-Rosell Foronda, Fernando

Abrégé

A network visibility appliance automatically and dynamically determines a data traffic sampling policy that it should apply, i.e., a policy for determining which flows the network appliance should forward to one or more tools. The technique can be used to adjust for changes in network traffic to avoid exceeding performance constraints (e.g., maximum throughput) of network analytic tools, while maintaining high efficiency of usage of the tools. In the technique, a policy engine monitors network traffic characteristics in a subscriber throughput table and dynamically determines a sampling policy to apply, so as to decrease and/or increase traffic throughput to a given tool, so that the tool is efficiently used.

Classes IPC  ?

  • H04L 43/00 - Dispositions pour la surveillance ou le test de réseaux de commutation de données
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

37.

CORRELATING NETWORK FLOWS THROUGH A PROXY DEVICE

      
Numéro d'application US2020020546
Numéro de publication 2020/185430
Statut Délivré - en vigueur
Date de dépôt 2020-02-29
Date de publication 2020-09-17
Propriétaire GIGAMON INC. (USA)
Inventeur(s)
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abrégé

A network appliance stores a session identifier that uniquely identifies a network communication session between a first device and the network appliance. A first communication is received from the first device over the network communication session. The network appliance also receives from a proxy tool, a second communication that includes a header specifying the session identifier and that includes data generated by the proxy in response to the first communication. The network appliance associates the first communication with the second communication using the session identifier. An encrypted representation of the data generated by the proxy is transmitted to a second device based on the association between the first communication and the second communication.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04K 1/00 - Communications secrètes
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité

38.

Managing decryption of network flows through a network appliance

      
Numéro d'application 16352735
Numéro de brevet 11516205
Statut Délivré - en vigueur
Date de dépôt 2019-03-13
Date de la première publication 2020-09-17
Date d'octroi 2022-11-29
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abrégé

A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. The network appliance establishes, in response to the communication, a single connection between the network appliance and the server based on application of a policy that causes the network appliance to determine not to decrypt data transmitted between the client device and the server. The network appliance transmits encrypted data between the client device and the server over the single connection.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion
  • H04L 61/5007 - Adresses de protocole Internet [IP]
  • H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire

39.

Correlating network flows through a proxy device

      
Numéro d'application 16297346
Numéro de brevet 11019044
Statut Délivré - en vigueur
Date de dépôt 2019-03-08
Date de la première publication 2020-09-10
Date d'octroi 2021-05-25
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Pathak, Manish
  • Joshi, Kishor
  • Bommana, Murali

Abrégé

A network appliance stores a session identifier that uniquely identifies a network communication session between a first device and the network appliance. A first communication is received from the first device over the network communication session. The network appliance also receives from a proxy tool, a second communication that includes a header specifying the session identifier and that includes data generated by the proxy in response to the first communication. The network appliance associates the first communication with the second communication using the session identifier. An encrypted representation of the data generated by the proxy is transmitted to a second device based on the association between the first communication and the second communication.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 9/08 - Répartition de clés

40.

Automated visual assistance for creating or debugging connections of a network device

      
Numéro d'application 16215420
Numéro de brevet 11171840
Statut Délivré - en vigueur
Date de dépôt 2018-12-10
Date de la première publication 2020-06-11
Date d'octroi 2021-11-09
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Shahabudeen, Namick Peer Mohamed
  • Srinivasan, Gowtham
  • Poornachandran, Sowmya
  • Sathiskumar, Thirumalai Srinivasan

Abrégé

Disclosed are a method and apparatus for assisting in the physical wiring or debugging of connections between devices, which may include one or more network visibility appliances. In at least one embodiment, the computer system receives first user input that specifies a first port of a plurality of selectable physical ports or a connection between the first port and a second port of the plurality of selectable physical ports. At least one of the first port or the second port is on a device that is external to the computer system. In response to the first user input, the computer system sends a first signal to the device to trigger the device to output a first visual indication in proximity to the first port, the first visual indication identifying the first port and a status of at least one of the first port or the connection.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

41.

Elastic modification of application instances in a network visibility infrastructure

      
Numéro d'application 16119093
Numéro de brevet 10855590
Statut Délivré - en vigueur
Date de dépôt 2018-08-31
Date de la première publication 2020-03-05
Date d'octroi 2020-12-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Introduced here are network visibility platforms having total processing capacity that can be dynamically varied in response to determining how much network traffic is currently under consideration. A visibility platform can include one or more network appliances, each of which includes at least one instance of an application configured to process data packets. Rather than forward all traffic to a single application instance for processing, the traffic can instead be distributed amongst a pool of application instances to collectively ensure that no data packets are dropped due to over-congestion. Moreover, the visibility platform can be designed such that application instances are elastically added/removed, as necessary, based on the volume of traffic currently under consideration.

Classes IPC  ?

  • H04L 12/801 - Commande de flux ou commande de congestion
  • H04L 12/743 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance par des techniques de hachage

42.

Security access for a switch device

      
Numéro d'application 16678329
Numéro de brevet 11025639
Statut Délivré - en vigueur
Date de dépôt 2019-11-08
Date de la première publication 2020-03-05
Date d'octroi 2021-06-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abrégé

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

43.

Distributed visibility fabrics for private, public, and hybrid clouds

      
Numéro d'application 16598416
Numéro de brevet 10892941
Statut Délivré - en vigueur
Date de dépôt 2019-10-10
Date de la première publication 2020-02-06
Date d'octroi 2021-01-12
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Improved network visibility may be achieved by deriving network traffic information from numerous visibility platforms that are communicatively coupled to one another. In some embodiments, an end user interacts with a distributed visibility fabric via a user interface, which can include a high-level representation of each visibility platform. The end user can then map the network objects of each visibility platform onto a series of network visibility appliances. This technique allows certain network objects (e.g., maps) to be intelligently distributed amongst the series of network visibility appliances.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

44.

Distributed packet deduplication

      
Numéro d'application 16001721
Numéro de brevet 11405289
Statut Délivré - en vigueur
Date de dépôt 2018-06-06
Date de la première publication 2019-12-12
Date d'octroi 2022-08-02
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Introduced here are network visibility appliances capable of implementing a distributed deduplication scheme by routing traffic amongst multiple instances of a deduplication program. Data traffic can be forwarded to a pool of multiple network visibility appliances that collectively ensure no duplicate copies of data packets exist in the data traffic. The network visibility appliances can route the traffic to different instances of the deduplication program so that duplicate copies of a data packet are guaranteed to arrive at the same instance of the deduplication program, regardless of which network visibility appliance(s) initially received the duplicate copies of the data packet.

Classes IPC  ?

  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 67/1023 - Sélection du serveur pour la répartition de charge basée sur un hachage appliqué aux adresses IP ou aux coûts
  • H04L 67/1034 - Réaction aux pannes de serveur par un répartiteur de charge

45.

Status monitoring of inline network tools

      
Numéro d'application 16516043
Numéro de brevet 10778577
Statut Délivré - en vigueur
Date de dépôt 2019-07-18
Date de la première publication 2019-11-14
Date d'octroi 2020-09-15
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abrégé

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. Guiding techniques based on these identifiers offer flexible support for multiple network tool operational modes. For example, the packet broker may be able to readily address changes in the state of a network tool connected to the packet broker by modifying certain egress translation schemes and/or ingress translation schemes. The “state” of a network tool can be “up” (i.e., ready for service) or “down” (i.e., out of service) based on, for example, the network tool's ability to pass through health-probing data packets dispatched by the packet broker.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 12/935 - Interfaces de commutation, p.ex. détails de port
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 1/24 - Tests pour s'assurer du fonctionnement correct
  • H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
  • H04L 12/825 - Commande adaptative, à la source ou aux nœuds intermédiaires, sur réception d'avis de congestion, p.ex. X-on X-off

46.

Tracking changes in network configurations

      
Numéro d'application 16459453
Numéro de brevet 10951499
Statut Délivré - en vigueur
Date de dépôt 2019-07-01
Date de la première publication 2019-10-24
Date d'octroi 2021-03-16
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Drangula, Dennis
  • Bourakov, Veniamin

Abrégé

A method performed by a network device includes: receiving an input indicating a change in an auxiliary network from a first configuration to a second configuration, wherein the auxiliary network is configured to obtain copies of packets from a traffic production network; determining a first network policy, wherein the first network policy is for application in the auxiliary network when the auxiliary network is in the first configuration; and determining a second network policy by the network device based on the received input and the first network policy, wherein the second network policy is for application in the auxiliary network when the auxiliary network is in the second configuration.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

47.

Selective modification of data packets for network tool verification

      
Numéro d'application 16459348
Numéro de brevet 11438352
Statut Délivré - en vigueur
Date de dépôt 2019-07-01
Date de la première publication 2019-10-24
Date d'octroi 2022-09-06
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Tekchandani, Navin C.

Abrégé

A network appliance may be coupled to a network tool configured to monitor the traffic within a computer network. Often, the network tool is operable in two modes (i.e., an inline mode and an out-of-band mode). Before the network tool is deployed as an inline device, however, it is desirable to verify that the network tool is secure. Described herein are systems and techniques for verifying network tools prior to deployment as inline devices. More specifically, the network appliance may be configured to modify the content of a data packet (e.g., by altering a bit) and transmit the modified data packet downstream to a network tool. The network appliance can monitor the network tool to make sure the network tool drops or returns the modified data packet. These techniques allow the network appliance to controllably simulate the receipt of malicious traffic by the network tool.

Classes IPC  ?

  • H04L 43/00 - Dispositions pour la surveillance ou le test de réseaux de commutation de données
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/50 - Disposition de test
  • H04L 43/026 - Capture des données de surveillance en utilisant l’identification du flux

48.

Methods of manufacturing cable management assemblies for electronic appliances

      
Numéro d'application 16427236
Numéro de brevet 11216046
Statut Délivré - en vigueur
Date de dépôt 2019-05-30
Date de la première publication 2019-10-17
Date d'octroi 2022-01-04
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Baum, Henry
  • Venkatachalam, Ravichandran

Abrégé

A laminate curtain can suppress electromagnetic radiation leakage from an electronic appliance, as well as assist in managing cables interconnected to the electronic appliance. More specifically, a laminate curtain can include a conductive elastomer panel that absorbs spurious electromagnetic radiation generated by the electronic appliance, a conductive adhesive film disposed along one side of the conductive elastomer panel, and a conductive support frame affixed to the conductive adhesive film. The laminate curtain can be installed within a mounting frame, which secures the laminate curtain to the electronic appliance. Electromagnetic radiation that is absorbed by the conductive elastomer panel can travel to the electronic appliance via the conductive adhesive film, the conductive support frame, and the mounting frame. Thus, the conductive elastomer panel can be used to form a ground plane that catches and shunts the spurious electromagnetic radiation to the electronic appliance, which is grounded.

Classes IPC  ?

  • G06F 1/18 - Installation ou distribution d'énergie
  • H05K 9/00 - Blindage d'appareils ou de composants contre les champs électriques ou magnétiques
  • H05K 7/16 - Montage de la structure de support dans l'enveloppe, sur cadre ou sur bâti sur charnières ou sur pivots
  • H05K 7/14 - Montage de la structure de support dans l'enveloppe, sur cadre ou sur bâti

49.

Security access for a switch device

      
Numéro d'application 16357140
Numéro de brevet 10484393
Statut Délivré - en vigueur
Date de dépôt 2019-03-18
Date de la première publication 2019-07-11
Date d'octroi 2019-11-19
Propriétaire Gigmon Inc. (USA)
Inventeur(s)
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abrégé

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

50.

Policy-based sampling of network flows at a network visibility node

      
Numéro d'application 15826286
Numéro de brevet 10931545
Statut Délivré - en vigueur
Date de dépôt 2017-11-29
Date de la première publication 2019-05-30
Date d'octroi 2021-02-23
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Mommileti, Srinivasa

Abrégé

Methods and systems are disclosed for analyzing control signaling messages over a network to inform policy-based sampling of network flows using a network visibility node communicatively coupled to the network. In an illustrative embodiment, session dialog information is extracted from control signaling messages exchanged between subscriber devices initiating a communications session and tracked. A network flow associated with the communications session is selected for sampling at the network visibility node based on the tracked session dialog information. Packets associated with the network flow are then forwarded by the network visibility node to an external tool for processing.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/813 - Commande basée sur des règles, p.ex. en fonction de la politique d’utilisation
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/801 - Commande de flux ou commande de congestion
  • H04L 12/853 - Actions liées au type de trafic, p.ex. qualité de service ou priorité pour le trafic temps réel

51.

Tool port throttling at a network visibility node

      
Numéro d'application 15806767
Numéro de brevet 11405319
Statut Délivré - en vigueur
Date de dépôt 2017-11-08
Date de la première publication 2019-05-09
Date d'octroi 2022-08-02
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Johansson, Jan
  • Jagtap, Tushar R.
  • Reddy, Vikram
  • Nangineni, Ujjvala

Abrégé

Systems and methods are disclosed for analyzing traffic received at a network visibility node to determine traffic levels relative to capacity at tools communicatively coupled to the network visibility node and throttling traffic when the traffic levels exceed tool capacity. In an illustrative embodiment, streams received at a network visibility node are analyzed to predict a traffic level for a given traffic flow. The predicted level of traffic for a given traffic flow is used to decide whether to forward traffic associated with the given traffic flow to a tool port of the network visibility node that is communicatively coupled to an external tool.

Classes IPC  ?

  • H04L 47/127 - Prévention de la congestionRécupération de la congestion en utilisant la prévision de congestion
  • H04L 47/74 - Mesures pour pallier la non-disponibilité des ressources

52.

Network visibility appliances for cloud computing architectures

      
Numéro d'application 16212486
Numéro de brevet 10778502
Statut Délivré - en vigueur
Date de dépôt 2018-12-06
Date de la première publication 2019-04-18
Date d'octroi 2020-09-15
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind sports.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/751 - Mise à jour ou découverte de la topologie

53.

Redundant inline-bypass switch

      
Numéro d'application 16203485
Numéro de brevet 10659392
Statut Délivré - en vigueur
Date de dépôt 2018-11-28
Date de la première publication 2019-03-28
Date d'octroi 2020-05-19
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abrégé

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a first switch coupled to the first bypass component, and a first controller; and a second inline-bypass switch appliance having a second bypass component, a second switch coupled to the second bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide a state signal that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the state signal.

Classes IPC  ?

  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur

54.

Dynamic decryption of suspicious network traffic based on certificate validation

      
Numéro d'application 15845635
Numéro de brevet 11032294
Statut Délivré - en vigueur
Date de dépôt 2017-12-18
Date de la première publication 2019-02-21
Date d'octroi 2021-06-08
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Joshi, Kishor
  • Pathak, Manish
  • Dahiya, Sandeep

Abrégé

A disclosed method performed by a network device can include intercepting cryptographic certificates of host servers received in response to requests for encrypted connections between host servers and user devices, and determining that each encrypted connection is a suspicious connection or a normal connection based on a certificate validation policy. The method can further include causing decryption or metadata analysis of any suspicious encrypted connection and bypassing decryption or metadata analysis of any normal encrypted connection.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

55.

Adaptive and flexible packet sampling

      
Numéro d'application 15848465
Numéro de brevet 11095535
Statut Délivré - en vigueur
Date de dépôt 2017-12-20
Date de la première publication 2019-02-21
Date d'octroi 2021-08-17
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Mirzazad Barijough, Maziar
  • Mamidi, Santosh Reddy

Abrégé

The disclosed techniques include at least one method. The method includes receiving, by a network device, incoming packets communicated over a computer network, and detecting flows to which the incoming packets belong. Each incoming packet belongs to a flow of the flows. The method further includes sampling each incoming packet that satisfies a flow condition having a flow interval of packets for the flow of the incoming packet, and sampling each incoming packet that satisfies a global condition having a global interval of packets irrespective of the flow of the incoming packet. The method further includes storing any sampled packets or information indicative of any sampled packets.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/825 - Commande adaptative, à la source ou aux nœuds intermédiaires, sur réception d'avis de congestion, p.ex. X-on X-off
  • H04L 12/823 - Suppression de paquets

56.

Cable management assemblies for electronic appliances

      
Numéro d'application 15832542
Numéro de brevet 10372174
Statut Délivré - en vigueur
Date de dépôt 2017-12-05
Date de la première publication 2019-02-14
Date d'octroi 2019-08-06
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Baum, Henry
  • Venkatachalam, Ravichandran

Abrégé

A laminate curtain can suppress electromagnetic radiation leakage from an electronic appliance, as well as assist in managing cables interconnected to the electronic appliance. More specifically, a laminate curtain can include a conductive elastomer panel that absorbs spurious electromagnetic radiation generated by the electronic appliance, a conductive adhesive film disposed along one side of the conductive elastomer panel, and a conductive support frame affixed to the conductive adhesive film. The laminate curtain can be installed within a mounting frame, which secures the laminate curtain to the electronic appliance. Electromagnetic radiation that is absorbed by the conductive elastomer panel can travel to the electronic appliance via the conductive adhesive film, the conductive support frame, and the mounting frame. Thus, the conductive elastomer panel can be used to form a ground plane that catches and shunts the spurious electromagnetic radiation to the electronic appliance, which is grounded.

Classes IPC  ?

  • H05K 9/00 - Blindage d'appareils ou de composants contre les champs électriques ou magnétiques
  • G06F 1/18 - Installation ou distribution d'énergie
  • H05K 7/16 - Montage de la structure de support dans l'enveloppe, sur cadre ou sur bâti sur charnières ou sur pivots
  • H05K 7/14 - Montage de la structure de support dans l'enveloppe, sur cadre ou sur bâti

57.

Selectively forwarding flow of packets in a network appliance

      
Numéro d'application 16123856
Numéro de brevet 10855570
Statut Délivré - en vigueur
Date de dépôt 2018-09-06
Date de la première publication 2019-01-17
Date d'octroi 2020-12-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nuthalapati, Ayyappa
  • Parlapalli, Bhanu Prathap Reddy
  • Mao, Andrew
  • Ng, Qi Ming

Abrégé

A network appliance described herein allows the user to selectively forward the flow of packets received through a network port, to a particular egress port. The network appliance creates virtual ports, which can be assigned to the one or more egress ports. The network appliance assigns the flow of packets to the one or more virtual ports in the network appliance. The network appliance decides a forwarding treatment to be applied to the flow of packets, for forwarding the flow of packets to the egress tool ports, based on the virtual port to which the flow of packets is assigned and based on a detected network characteristic. The forwarding treatment can be a decision to drop the flow of packets, or to send the flow of packets to the egress port assigned to the virtual port.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/743 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance par des techniques de hachage
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/823 - Suppression de paquets

58.

Intelligent dropping of packets in a network visibility fabric

      
Numéro d'application 16101644
Numéro de brevet 10931582
Statut Délivré - en vigueur
Date de dépôt 2018-08-13
Date de la première publication 2018-12-06
Date d'octroi 2021-02-23
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Kumar, Anant
  • Parlapalli, Bhanu Prathap Reddy

Abrégé

A network appliance deployed in a visibility fabric may intelligently drop certain low priority traffic to avoid indiscriminate dropping of data packets across all flow maps during periods of high congestion. More specifically, the network appliance may determine the data packets of a flow map should be dropped based on priority measures assigned on a per-flow map basis. Such a technique enables the network appliance to drop low priority traffic and forward high priority traffic downstream. Also introduced herein are techniques for metering traffic in order to gain better control over the traffic that is forwarded to an egress port of a network appliance. Because a network tool connected to the egress port can become easily overwhelmed, the network appliance may filter the traffic based on the priority of the flow maps to ensure that the network tool does not receive more traffic than can be handled.

Classes IPC  ?

  • H04L 12/801 - Commande de flux ou commande de congestion
  • H04L 12/823 - Suppression de paquets
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

59.

Security access for a switch device

      
Numéro d'application 16013587
Numéro de brevet 10291625
Statut Délivré - en vigueur
Date de dépôt 2018-06-20
Date de la première publication 2018-11-01
Date d'octroi 2019-05-14
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abrégé

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

60.

Network switch device for routing network traffic through an inline tool

      
Numéro d'application 16000708
Numéro de brevet 10785152
Statut Délivré - en vigueur
Date de dépôt 2018-06-05
Date de la première publication 2018-10-04
Date d'octroi 2020-09-22
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Kumar, Anant

Abrégé

Introduced here is a technique for using a network switch device, which may include commodity switching fabric, to route packets through an inline tool, without introducing any additional information to the packets. The introduced technique modifies standard capability of packet forwarding and learning port-to-MAC address associations to route data packets through the inline tool. The technique may include applying two override settings to the network device. A first override setting involves a forwarding rule that is based on the arrival port and the content of the packet. A second override setting involves disabling the MAC address learning mechanism for the packet received from the inline tool via the second tool port of the network device.

Classes IPC  ?

  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/935 - Interfaces de commutation, p.ex. détails de port

61.

GIGASECURE

      
Numéro de série 88138907
Statut Enregistrée
Date de dépôt 2018-10-01
Date d'enregistrement 2019-05-14
Propriétaire Gigamon Inc. ()
Classes de Nice  ? 09 - Appareils et instruments scientifiques et électriques

Produits et services

Computer network hardware with embedded computer software used for computer network security and monitoring computer network traffic; computer software used for computer network security and monitoring computer network traffic

62.

Network switch device for routing network traffic through an inline tool

      
Numéro d'application 14880036
Numéro de brevet 10009263
Statut Délivré - en vigueur
Date de dépôt 2015-10-09
Date de la première publication 2018-06-26
Date d'octroi 2018-06-26
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Kumar, Anant

Abrégé

Introduced here is a technique for using a network switch device, which may include commodity switching fabric, to route packets through an inline tool, without introducing any additional information to the packets. The introduced technique modifies standard capability of packet forwarding and learning port-to-MAC address associations to route data packets through the inline tool. The technique may include applying two override settings to the network device. A first override setting involves a forwarding rule that is based on the arrival port and the content of the packet. A second override setting involves disabling the MAC address learning mechanism for the packet received from the inline tool via the second tool port of the network device.

Classes IPC  ?

  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance

63.

Analysis of network traffic rules at a network visibility node

      
Numéro d'application 15406487
Numéro de brevet 10367703
Statut Délivré - en vigueur
Date de dépôt 2017-01-13
Date de la première publication 2018-06-07
Date d'octroi 2019-07-30
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Gibson, Simon H
  • Merchant, Shehzad

Abrégé

Techniques are disclosed for monitoring usage of network traffic rules applied by devices on a computer network. Operations in accordance with the disclosed techniques can be performed at one or more network visibility nodes that operate as part of a visibility fabric, for example for monitoring traffic on the network. In certain embodiments, packets associated with the traffic are received at a network visibility node communicatively coupled to the network that is operable to enable visibility across the network. The network visibility node can access network traffic rules that mirror the network traffic rules applied at devices on the network. The network visibility node can further process the received packets using the accessed network traffic rules to identify packets or flows of packets that satisfy criteria associated with the accessed network traffic rules.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

64.

Network visibility appliances for cloud computing architectures

      
Numéro d'application 15885534
Numéro de brevet 10177963
Statut Délivré - en vigueur
Date de dépôt 2018-01-31
Date de la première publication 2018-06-07
Date d'octroi 2019-01-08
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind sports.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/931 - Architecture de matrice de commutation

65.

Graph-based network fabric for a network visibility appliance

      
Numéro d'application 15805460
Numéro de brevet 10965515
Statut Délivré - en vigueur
Date de dépôt 2017-11-07
Date de la première publication 2018-05-24
Date d'octroi 2021-03-30
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, or OpenStack. But it can be difficult to manage how the visibility platform handles incoming virtualized traffic. Introduced here, therefore, are graphs that visually represent the network fabric of a visibility platform. When the network fabric of the visibility platform is represented as a graph, an end user can easily modify the network fabric, for example, by adding, removing, or modifying nodes that represent network objects, adding, removing, or modifying connections between pairs of nodes that represent traffic flows between pairs of network objects, etc.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

66.

Distributed visibility fabrics for private, public, and hybrid clouds

      
Numéro d'application 15805505
Numéro de brevet 10778501
Statut Délivré - en vigueur
Date de dépôt 2017-11-07
Date de la première publication 2018-05-24
Date d'octroi 2020-09-15
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Improved network visibility may be achieved by deriving network traffic information from numerous visibility platforms that are communicatively coupled to one another. In some embodiments, an end user interacts with a distributed visibility fabric via a user interface, which can include a high-level representation of each visibility platform. The end user can then map the network objects of each visibility platform onto a series of network visibility appliances. This technique allows certain network objects (e.g., maps) to be intelligently distributed amongst the series of network visibility appliances.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

67.

Maps having a high branching factor

      
Numéro d'application 15815524
Numéro de brevet 10924325
Statut Délivré - en vigueur
Date de dépôt 2017-11-16
Date de la première publication 2018-05-24
Date d'octroi 2021-02-16
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

Disclosed is a technique for providing packet filter maps with high branching factors in a system for managing network traffic in a visibility fabric. A high branching factor enables a map to branch out more than two ways. High branching factors can be realized by allowing a map to be affiliated with more than one action set. For example, each rule of the map may be affiliated with a unique action set that is executed only when the corresponding rule is satisfied.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

68.

Selectively forwarding flow of packets in a network appliance

      
Numéro d'application 15358096
Numéro de brevet 10103963
Statut Délivré - en vigueur
Date de dépôt 2016-11-21
Date de la première publication 2018-05-24
Date d'octroi 2018-10-16
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nuthalapati, Ayyappa
  • Parlapalli, Bhanu Prathap Reddy
  • Mao, Andrew
  • Ng, Qi Ming

Abrégé

A network appliance described herein allows the user to selectively forward the flow of packets received through a network port, to a particular egress port. The network appliance creates virtual ports, which can be assigned to the one or more egress ports. The network appliance assigns the flow of packets to the one or more virtual ports in the network appliance. The network appliance decides a forwarding treatment to be applied to the flow of packets, for forwarding the flow of packets to the egress tool ports, based on the virtual port to which the flow of packets is assigned and based on a detected network characteristic. The forwarding treatment can be a decision to drop the flow of packets, or to send the flow of packets to the egress port assigned to the virtual port.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/743 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance par des techniques de hachage
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/823 - Suppression de paquets

69.

Dynamic service chaining and late binding

      
Numéro d'application 15805487
Numéro de brevet 10917285
Statut Délivré - en vigueur
Date de dépôt 2017-11-07
Date de la première publication 2018-05-24
Date d'octroi 2021-02-09
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

Classes IPC  ?

  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité

70.

Multi-path arrangement of redundant inline-bypass switches

      
Numéro d'application 15815225
Numéro de brevet 10142130
Statut Délivré - en vigueur
Date de dépôt 2017-11-16
Date de la première publication 2018-05-03
Date d'octroi 2018-11-27
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abrégé

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a second bypass component, a first switch coupled to the first bypass component and the second bypass component, and a first controller; and a second inline-bypass switch appliance having a third bypass component, a fourth bypass component, a second switch coupled to the third bypass component and the fourth bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide one or more state signals that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the one or more state signals.

Classes IPC  ?

  • B23K 11/24 - Circuits d'alimentation ou de commande appropriés
  • H02B 1/24 - Circuits pour tableaux ou stations de commutation
  • H04L 12/54 - Systèmes de commutation par mémorisation et restitution
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

71.

Reduction of network connectivity gaps experienced by inline network appliances

      
Numéro d'application 15828872
Numéro de brevet 10154323
Statut Délivré - en vigueur
Date de dépôt 2017-12-01
Date de la première publication 2018-04-12
Date d'octroi 2018-12-11
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Amarittapark, Sitti

Abrégé

A network appliance may include a signal splitter that splits an incoming signal into multiple portions. The signal splitter can direct one portion of the incoming signal to a switching fabric and another portion of the incoming signal to an optical switch. By monitoring the power intensity of the portion of the incoming signal received by the switching fabric, the network appliance can seamlessly switch between a bypass traffic path and a pass-through traffic path without losing network traffic caused by gaps in network connectivity. Such a configuration also enables the network appliance to maintain an accurate record of the logical connectivity state even when the network appliance is in the bypass state (i.e., when network traffic bypasses the switching fabric of the network appliance).

Classes IPC  ?

72.

Status monitoring of inline network tools

      
Numéro d'application 15428784
Numéro de brevet 10404591
Statut Délivré - en vigueur
Date de dépôt 2017-02-09
Date de la première publication 2018-03-29
Date d'octroi 2019-09-03
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abrégé

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. Guiding techniques based on these identifiers offer flexible support for multiple network tool operational modes. For example, the packet broker may be able to readily address changes in the state of a network tool connected to the packet broker by modifying certain egress translation schemes and/or ingress translation schemes. The “state” of a network tool can be “up” (i.e., ready for service) or “down” (i.e., out of service) based on, for example, the network tool's ability to pass through health-probing data packets dispatched by the packet broker.

Classes IPC  ?

  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 12/935 - Interfaces de commutation, p.ex. détails de port
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 1/24 - Tests pour s'assurer du fonctionnement correct
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
  • H04L 12/825 - Commande adaptative, à la source ou aux nœuds intermédiaires, sur réception d'avis de congestion, p.ex. X-on X-off

73.

Statistical multiplexing of inline network tools

      
Numéro d'application 15428815
Numéro de brevet 10225186
Statut Délivré - en vigueur
Date de dépôt 2017-02-09
Date de la première publication 2018-03-29
Date d'octroi 2019-03-05
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abrégé

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. However, in some instances, it may be desirable for data packets the one or more network tools in a load-balanced manner rather than a cascaded manner. Accordingly, the packet broker may initially form a trunk group (i.e., a predefined group of ports that are treated as one port) based on input provided by an administrator. A group of network tools that share a load (i.e., a traffic flow) through trunking facilitated by the packet broker are referred to as a “trunk group” of network tools.

Classes IPC  ?

  • H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 1/24 - Tests pour s'assurer du fonctionnement correct
  • H04L 12/825 - Commande adaptative, à la source ou aux nœuds intermédiaires, sur réception d'avis de congestion, p.ex. X-on X-off
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 12/935 - Interfaces de commutation, p.ex. détails de port
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

74.

Intelligent dropping of packets in a network visibility fabric

      
Numéro d'application 15274871
Numéro de brevet 10057170
Statut Délivré - en vigueur
Date de dépôt 2016-09-23
Date de la première publication 2018-03-29
Date d'octroi 2018-08-21
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Kumar, Anant
  • Parlapalli, Bhanu Prathap Reddy

Abrégé

A network appliance deployed in a visibility fabric may intelligently drop certain low priority traffic to avoid indiscriminate dropping of data packets across all flow maps during periods of high congestion. More specifically, the network appliance may determine the data packets of a flow map should be dropped based on priority measures assigned on a per-flow map basis. Such a technique enables the network appliance to drop low priority traffic and forward high priority traffic downstream. Also introduced herein are techniques for metering traffic in order to gain better control over the traffic that is forwarded to an egress port of a network appliance. Because a network tool connected to the egress port can become easily overwhelmed, the network appliance may filter the traffic based on the priority of the flow maps to ensure that the network tool does not receive more traffic than can be handled.

Classes IPC  ?

  • H04L 12/807 - Calcul ou mise à jour de la fenêtre de congestion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/801 - Commande de flux ou commande de congestion

75.

Flexible inline arrangements for guiding traffic through network tools

      
Numéro d'application 15409903
Numéro de brevet 10178026
Statut Délivré - en vigueur
Date de dépôt 2017-01-19
Date de la première publication 2018-03-29
Date d'octroi 2019-01-08
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Ma, Yingchun
  • Xiu, Yan
  • Manchiraju-Venkata, Ramakrishna
  • Sufleta, Zbigniew

Abrégé

A packet broker deployed in a visibility fabric may intelligently assign identifiers to data packets that are routed through sequences of one or more network tools for monitoring and/or security purposes. More specifically, the packet broker may apply packet-matching criteria to incoming data packets to determine a predetermined sequence of network tools through which the data packets are to be guided. For example, the packet broker may guide a data packet through a predetermined sequence of network tools by translating an internal identifier added to the data packet to an external identifier before transmission to each of the network tools, and translating the external identifier to a different internal identifier each time the data packet is received from each of the network tools.

Classes IPC  ?

  • H04L 12/851 - Actions liées au type de trafic, p.ex. qualité de service ou priorité
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 12/935 - Interfaces de commutation, p.ex. détails de port
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 1/24 - Tests pour s'assurer du fonctionnement correct
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
  • H04L 12/825 - Commande adaptative, à la source ou aux nœuds intermédiaires, sur réception d'avis de congestion, p.ex. X-on X-off

76.

Systems and methods for implementing a traffic visibility network

      
Numéro d'application 15801158
Numéro de brevet 10230612
Statut Délivré - en vigueur
Date de dépôt 2017-11-01
Date de la première publication 2018-03-15
Date d'octroi 2019-03-12
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Leong, Patrick Pak Tak
  • Hooper, Paul Andrew

Abrégé

A method of packet processing, includes: providing a plurality of network appliances that form a cluster, wherein two or more of the plurality of network appliances in the cluster are located at different geographical locations, are communicatively coupled via a private network or an Internet, and are configured to collectively perform out-of-band packet processing; receiving a packet by one of the network appliances in the cluster; processing the packet using two or more of the plurality of the appliances in the cluster; and passing the packet to one or more network monitoring tools after the packet is processed.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

77.

Network visibility appliances for cloud computing architectures

      
Numéro d'application 15433864
Numéro de brevet 09906401
Statut Délivré - en vigueur
Date de dépôt 2017-02-15
Date de la première publication 2018-02-27
Date d'octroi 2018-02-27
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge. Introduced here, therefore, are visibility platforms for monitoring virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, and OpenStack. A visibility platform can be integrated into a cloud computing platform to provide a coherent view of virtualized traffic in motion across the cloud computing platform for a given end user. Said another way, a visibility platform can intelligently select, filter, and forward virtualized traffic belonging to an end user to a monitoring infrastructure, thereby eliminating traffic blind sports.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 12/46 - Interconnexion de réseaux

78.

Filtration of network traffic using virtually-extended ternary content-addressable memory (TCAM)

      
Numéro d'application 15794364
Numéro de brevet 10164908
Statut Délivré - en vigueur
Date de dépôt 2017-10-26
Date de la première publication 2018-02-22
Date d'octroi 2018-12-25
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nanda, Avoy
  • Nguyen, Hoang

Abrégé

Ternary content-addressable memory (TCAM) of an ingress appliance in a visibility fabric may include rules for filtering traffic received by the ingress appliance. But the TCAM has limited space for rules and can become easily exhausted. By migrating rules to other visibility nodes in the visibility fabric, the techniques introduced here allow the TCAM to be virtually extended across multiple visibility nodes. More specifically, upon receiving a data packet at an ingress port, the ingress visibility node can tag the data packet with an identifier based on which ingress port received the data packet. The ingress visibility node can then determine, based on the identifier, whether the data packet should be filtered using a rule stored in the TCAM of the ingress visibility node or a rule stored in the TCAM of some visibility node in the visibility fabric.

Classes IPC  ?

  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur

79.

Software defined visibility fabric

      
Numéro d'application 15706470
Numéro de brevet 10764207
Statut Délivré - en vigueur
Date de dépôt 2017-09-15
Date de la première publication 2018-01-11
Date d'octroi 2020-09-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

A fabric manager includes: a processing unit having a service chain creation module configured to create a service chain by connecting some of a plurality of nodes via virtual links; wherein the some of the plurality of nodes represent respective network components of an auxiliary network configured to obtain packets from a traffic production network; and wherein the service chain is configured to control an order of the network components represented by the some of the plurality of nodes packets are to traverse.

Classes IPC  ?

  • H04L 12/933 - Cœur de commutateur, p.ex. barres croisées, mémoire partagée ou support partagé
  • H04L 12/931 - Architecture de matrice de commutation
  • H04L 12/46 - Interconnexion de réseaux
  • G06F 9/00 - Dispositions pour la commande par programme, p. ex. unités de commande
  • H04L 12/715 - Routage hiérarchique, p.ex. réseaux en grappe ou routage inter-domaine

80.

Reduction of network connectivity gaps experienced by inline network appliances

      
Numéro d'application 15257743
Numéro de brevet 09860616
Statut Délivré - en vigueur
Date de dépôt 2016-09-06
Date de la première publication 2018-01-02
Date d'octroi 2018-01-02
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Amarittapark, Sitti

Abrégé

A network appliance may include a signal splitter that splits an incoming signal into multiple portions. The signal splitter can direct one portion of the incoming signal to a switching fabric and another portion of the incoming signal to an optical switch. By monitoring the power intensity of the portion of the incoming signal received by the switching fabric, the network appliance can seamlessly switch between a bypass traffic path and a pass-through traffic path without losing network traffic caused by gaps in network connectivity. Such a configuration also enables the network appliance to maintain an accurate record of the logical connectivity state even when the network appliance is in the bypass state (i.e., when network traffic bypasses the switching fabric of the network appliance).

Classes IPC  ?

81.

Monitoring virtualized network

      
Numéro d'application 15679017
Numéro de brevet 10230616
Statut Délivré - en vigueur
Date de dépôt 2017-08-16
Date de la première publication 2017-12-28
Date d'octroi 2019-03-12
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Nguyen, Hung

Abrégé

A method of monitoring virtualized network includes receiving information regarding the virtualized network, wherein the information is received at a port of a network switch appliance, receiving a packet at a network port of the network switch appliance, and using the received information to determine whether to process the packet according to a first packet processing scheme or a second packet processing scheme, wherein the first packet processing scheme involves performing header stripping, and performing packet transmission to one of a plurality of instrument ports at the network switch appliance after the header stripping, each of the instrument ports configured for communicatively coupling to a network monitoring instrument, and wherein the second packet processing scheme involves performing packet transmission to one of the plurality of instrument ports at the network switch appliance without performing any header stripping.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

82.

Session aware adaptive packet filtering

      
Numéro d'application 15629556
Numéro de brevet 11165682
Statut Délivré - en vigueur
Date de dépôt 2017-06-21
Date de la première publication 2017-11-09
Date d'octroi 2021-11-02
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Merchant, Shehzad
  • Cheung, David
  • Bommana, Murali

Abrégé

A method performed by a network device includes: receiving a first packet by the network device, wherein the first packet is tapped from a network; identifying a session to which the first packet belongs when the first packet has one or more values that at least partially match one or more terms, wherein the act of identifying the session is performed by the network device; receiving a second packet by the network device; determining whether the second packet belongs to the session; and performing a packet processing action by the network device based on the identified session; wherein the session is identified based on a first criterion, and the act of determining whether the second packet belongs to the session is performed based on a second criterion that is different from the first criterion.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/801 - Commande de flux ou commande de congestion

83.

Redundant inline-bypass switch

      
Numéro d'application 15620604
Numéro de brevet 10178049
Statut Délivré - en vigueur
Date de dépôt 2017-06-12
Date de la première publication 2017-09-28
Date d'octroi 2019-01-08
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abrégé

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a first switch coupled to the first bypass component, and a first controller; and a second inline-bypass switch appliance having a second bypass component, a second switch coupled to the second bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide a state signal that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the state signal.

Classes IPC  ?

  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur

84.

Automatic target selection

      
Numéro d'application 15604564
Numéro de brevet 10057143
Statut Délivré - en vigueur
Date de dépôt 2017-05-24
Date de la première publication 2017-09-07
Date d'octroi 2018-08-21
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

A method of identifying targets for monitoring includes: obtaining a user-defined filter map, the user-defined filter map having one or more filter rules for matching against network traffic when the user-defined filter map is used by a network system to process the network traffic; and determining a set of one or more targets by a processing unit based at least in part on the user-defined filter map, wherein the processing unit comprises a target selection module configured to access a list of available targets from a database, and select the one or more targets from the list of available targets based at least in part on the user-defined filter map.

Classes IPC  ?

  • H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans filLeurs installations
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

85.

Recombinant fusion proteins and libraries from immune cell repertoires

      
Numéro d'application 15598313
Numéro de brevet 09926554
Statut Délivré - en vigueur
Date de dépôt 2017-05-18
Date de la première publication 2017-08-31
Date d'octroi 2018-03-27
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Johnson, David Scott
  • Adler, Adam
  • Mizrahi, Rena

Abrégé

Disclosed herein are methods and compositions for generating a repertoire of recombinant fusion polypeptides from immune cells, and uses thereof.

Classes IPC  ?

  • C40B 50/06 - Procédés biochimiques, p. ex. utilisant des enzymes ou des micro-organismes viables entiers
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN

86.

Recombinant fusion proteins and libraries from immune cell repertoires

      
Numéro d'application 15598314
Numéro de brevet 09926555
Statut Délivré - en vigueur
Date de dépôt 2017-05-18
Date de la première publication 2017-08-31
Date d'octroi 2018-03-27
Propriétaire GigaMune, Inc. (USA)
Inventeur(s)
  • Johnson, David Scott
  • Adler, Adam
  • Mizrahi, Rena

Abrégé

Disclosed herein are methods and compositions for generating a repertoire of recombinant fusion polypeptides from immune cells, and uses thereof.

Classes IPC  ?

  • C40B 50/06 - Procédés biochimiques, p. ex. utilisant des enzymes ou des micro-organismes viables entiers
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN

87.

Security access for a switch device

      
Numéro d'application 15498263
Numéro de brevet 10027677
Statut Délivré - en vigueur
Date de dépôt 2017-04-26
Date de la première publication 2017-08-10
Date d'octroi 2018-07-17
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nguyen, Hung
  • Yu, Jay Han
  • Riley, Patrick Allen
  • Nguyen, Hoang Nguyen Bao

Abrégé

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.

Classes IPC  ?

  • G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

88.

Selective modification of data packets for network tool verification

      
Numéro d'application 15003453
Numéro de brevet 10341368
Statut Délivré - en vigueur
Date de dépôt 2016-01-21
Date de la première publication 2017-07-27
Date d'octroi 2019-07-02
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Tekchandani, Navin C.

Abrégé

A network appliance may be coupled to a network tool configured to monitor the traffic within a computer network. Often, the network tool is operable in two modes (i.e., an inline mode and an out-of-band mode). Before the network tool is deployed as an inline device, however, it is desirable to verify that the network tool is secure. Described herein are systems and techniques for verifying network tools prior to deployment as inline devices. More specifically, the network appliance may be configured to modify the content of a data packet (e.g., by altering a bit) and transmit the modified data packet downstream to a network tool. The network appliance can monitor the network tool to make sure the network tool drops or returns the modified data packet. These techniques allow the network appliance to controllably simulate the receipt of malicious traffic by the network tool.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

89.

Bypass switch for redundant in-line network switch appliance

      
Numéro d'application 15006984
Numéro de brevet 09960953
Statut Délivré - en vigueur
Date de dépôt 2016-01-26
Date de la première publication 2017-07-27
Date d'octroi 2018-05-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Sufleta, Zbigniew

Abrégé

Systems of redundant in-line network switch appliances are described. In an embodiment, a system includes a primary network switch appliance and a secondary network switch appliance communicatively coupled in-line between nodes on a computer network. A tool, for example for network monitoring, is communicatively coupled to the primary network switch appliance. In use, when the primary network switch appliance is in a first state, a bypass switch of the primary network switch appliance is configured to complete a communication path between the tool and a node on the computer network via a switching fabric of the primary network switch appliance. When the primary network switch appliance is in a second state, the bypass switch is configured to complete a communication path between the tool and the node on the computer network via the secondary network switch appliance, bypassing the switching fabric of the primary network switch appliance.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion

90.

In-line tool performance monitoring and adaptive packet routing

      
Numéro d'application 14940877
Numéro de brevet 10142210
Statut Délivré - en vigueur
Date de dépôt 2015-11-13
Date de la première publication 2017-05-18
Date d'octroi 2018-11-27
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Lee, Jason
  • Manchiraju-Venkata, Ramakrishna
  • Kishore, Tanmay
  • Xiu, Yan

Abrégé

Embodiments are disclosed for monitoring the performance of an in-line tool without adding data to network traffic routed through the in-line tool. In some embodiments, performance of the in-line tool is based on a measured latency introduced by the processing of packets through the in-line tool. In some embodiments, network traffic is adaptively routed based on the measured latency at the in-line tool.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/727 - Sélection d’un chemin avec délai minimum
  • H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
  • H04L 12/841 - Actions liées à la commande de flux utilisant des données temporelles, p.ex. temps d'aller retour [RTT]

91.

Routing network traffic packets through a shared inline tool

      
Numéro d'application 14945347
Numéro de brevet 09912575
Statut Délivré - en vigueur
Date de dépôt 2015-11-18
Date de la première publication 2017-05-18
Date d'octroi 2018-03-06
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Lee, Hung Chuen Jason
  • Manchiraju-Venkata, Ramakrishna
  • Kishore, Tanmay
  • Xiu, Yan
  • Nguyen, Hung
  • Amarittapark, Sitti

Abrégé

Introduced herein is a technology for a network switch device to route network packets through a inline tool, without introducing additional information to the network packets. The technology records an association between an input network port and a signature (e.g., source MAC address) of the network packet, before forwarding the packet to the inline tool. When receiving the packet back from the inline tool, the network device recognizes that the packet signature is associated with the input network port, and that the input network port is paired with a particular output network port. Thus, the network device identifies the output network port for sending the packet, without modifying contents of the packet.

Classes IPC  ?

  • H04L 12/751 - Mise à jour ou découverte de la topologie
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

92.

Traffic broker for routing data packets through sequences of in-line tools

      
Numéro d'application 14938700
Numéro de brevet 10986039
Statut Délivré - en vigueur
Date de dépôt 2015-11-11
Date de la première publication 2017-05-11
Date d'octroi 2021-04-20
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abrégé

Embodiments are disclosed for a network switch appliance with a traffic broker that facilitates routing of network traffic between pairs of end nodes on a computer network through a configurable sequence of in-line tools.

Classes IPC  ?

  • H04L 12/935 - Interfaces de commutation, p.ex. détails de port

93.

Systems and methods for determining input and output interfaces of a network device and copies of a same packet going through the network device

      
Numéro d'application 15413209
Numéro de brevet 10404589
Statut Délivré - en vigueur
Date de dépôt 2017-01-23
Date de la première publication 2017-05-11
Date d'octroi 2019-09-03
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Alawani, Ashutosh
  • Settipalli, Sreekanth
  • Kishore, Tanmay
  • Cafarelli, Dominick
  • Merchant, Shehzad

Abrégé

A method performed by a network device that taps to a network having a routing device, includes: receiving a first packet tapped from the network; determining a first information regarding an input interface of the routing device based on a destination address of the first packet; receiving a second packet tapped from the network; determining a second information regarding an output interface of the routing device based on a source address of the second packet; determining a first CRC for the first packet; determining a second CRC for the second packet; and comparing the first CRC with the second CRC at the network device to determine whether the first packet and the second packet are the same.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance

94.

Filtration of network traffic using virtually-extended ternary content-addressable memory (TCAM)

      
Numéro d'application 14931502
Numéro de brevet 09813357
Statut Délivré - en vigueur
Date de dépôt 2015-11-03
Date de la première publication 2017-05-04
Date d'octroi 2017-11-07
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nanda, Avoy
  • Nguyen, Hoang

Abrégé

Ternary content-addressable memory (TCAM) of an ingress appliance in a visibility fabric may include rules for filtering traffic received by the ingress appliance. But the TCAM has limited space for rules and can become easily exhausted. By migrating rules to other visibility nodes in the visibility fabric, the techniques introduced here allow the TCAM to be virtually extended across multiple visibility nodes. More specifically, upon receiving a data packet at an ingress port, the ingress visibility node can tag the data packet with an identifier based on which ingress port received the data packet. The ingress visibility node can then determine, based on the identifier, whether the data packet should be filtered using a rule stored in the TCAM of the ingress visibility node or a rule stored in the TCAM of some visibility node in the visibility fabric.

Classes IPC  ?

  • H04L 12/50 - Systèmes de commutation de circuits, c.-à-d. systèmes dans lesquels la voie de transmission est stable pendant la communication
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur

95.

Buffered session filtering for inline bypass application

      
Numéro d'application 14810245
Numéro de brevet 09722955
Statut Délivré - en vigueur
Date de dépôt 2015-07-27
Date de la première publication 2017-02-02
Date d'octroi 2017-08-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Nguyen, Hung
  • Bommana, Murali

Abrégé

A switch appliance includes a first network port for communication with a first node, where the first network port is configured to receive a packet, and a second network port for communication with a second node. The switch appliance further includes a first instrument port for communication with a first inline tool, a buffer, and a processing unit coupled to the first network port, the second network port, the first instrument port and the buffer. The processing unit is configured to determine whether a packet processing state has been set as an inline-tool processing state or a bypass state, and is configured to pass the packet to the second network port for transmission to the second node, and to store a copy of the packet in the buffer, if the packet processing state has not been set as the inline-tool processing state nor the bypass state.

Classes IPC  ?

  • H04L 12/701 - Routage ou recherche du chemin de transmission
  • H04L 12/64 - Systèmes de commutation hybrides
  • H04L 12/861 - Mise en mémoire tampon de paquets ou mise en file d’attente; Ordonnancement de file d’attente
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

96.

Recombinant fusion proteins and libraries from immune cell repertoires

      
Numéro d'application 15159705
Numéro de brevet 09738699
Statut Délivré - en vigueur
Date de dépôt 2016-05-19
Date de la première publication 2016-12-15
Date d'octroi 2017-08-22
Propriétaire GIGAMUNE, INC. (USA)
Inventeur(s)
  • Johnson, David Scott
  • Adler, Adam
  • Mizrahi, Rena

Abrégé

Disclosed herein are methods and compositions for generating a repertoire of recombinant fusion polypeptides from immune cells, and uses thereof.

Classes IPC  ?

  • C40B 50/06 - Procédés biochimiques, p. ex. utilisant des enzymes ou des micro-organismes viables entiers
  • C07K 14/725 - Récepteurs de lymphocytes-T
  • C07K 16/00 - Immunoglobulines, p. ex. anticorps monoclonaux ou polyclonaux
  • C12N 15/10 - Procédés pour l'isolement, la préparation ou la purification d'ADN ou d'ARN
  • C12Q 1/68 - Procédés de mesure ou de test faisant intervenir des enzymes, des acides nucléiques ou des micro-organismesCompositions à cet effetProcédés pour préparer ces compositions faisant intervenir des acides nucléiques

97.

Redundant inline-bypass switch

      
Numéro d'application 14693809
Numéro de brevet 09680771
Statut Délivré - en vigueur
Date de dépôt 2015-04-22
Date de la première publication 2016-10-27
Date d'octroi 2017-06-13
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abrégé

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a first switch coupled to the first bypass component, and a first controller; and a second inline-bypass switch appliance having a second bypass component, a second switch coupled to the second bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide a state signal that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the state signal.

Classes IPC  ?

  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  • H04L 12/707 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès

98.

Multi-path arrangement of redundant inline-bypass switches

      
Numéro d'application 14693825
Numéro de brevet 09843460
Statut Délivré - en vigueur
Date de dépôt 2015-04-22
Date de la première publication 2016-10-27
Date d'octroi 2017-12-12
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Sufleta, Zbigniew
  • Nguyen, Hung

Abrégé

An inline-bypass switch system includes: a first inline-bypass switch appliance having a first bypass component, a second bypass component, a first switch coupled to the first bypass component and the second bypass component, and a first controller; and a second inline-bypass switch appliance having a third bypass component, a fourth bypass component, a second switch coupled to the third bypass component and the fourth bypass component, and a second controller; wherein the first controller in the first inline-bypass switch appliance is configured to provide one or more state signals that is associated with a state of the first inline-bypass switch appliance; and wherein the second controller in the second inline-bypass switch appliance is configured to control the second bypass component based at least in part on the one or more state signals.

Classes IPC  ?

  • B23K 11/24 - Circuits d'alimentation ou de commande appropriés
  • H04L 12/54 - Systèmes de commutation par mémorisation et restitution
  • H04L 12/931 - Architecture de matrice de commutation

99.

Systems and methods for processing packets

      
Numéro d'application 15188705
Numéro de brevet 10063671
Statut Délivré - en vigueur
Date de dépôt 2016-06-21
Date de la première publication 2016-10-13
Date d'octroi 2018-08-28
Propriétaire Gigamon Inc. (USA)
Inventeur(s)
  • Merchant, Shehzad
  • Ng, Qi Ming
  • Wang, Ning

Abrégé

A network switch apparatus, includes: a network port configured to receive a packet; instrument ports configured to communicate with respective network monitoring instruments; a packet duplication module configured to copy the packet to provide multiple packets that are identical to each other: a tagging module configured to tag the multiple packets with different respective identifiers to obtain tagged packets; and a processing unit coupled to the instrument ports; wherein the processing unit is configured to determine whether a first one of the tagged packets satisfies a first criterion, whether a second one of the tagged packets satisfies a second criterion, process the first one of the tagged packets in a first manner if the first one of the tagged packets satisfies the first criterion, and process the second one of the tagged packets in a second manner if the second one of the tagged packets satisfies the second criterion.

Classes IPC  ?

  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/56 - Systèmes de commutation par paquets
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/761 - Routage de diffusion ou de multidiffusion

100.

In-fabric traffic analysis

      
Numéro d'application 14668813
Numéro de brevet 10764162
Statut Délivré - en vigueur
Date de dépôt 2015-03-25
Date de la première publication 2016-09-29
Date d'octroi 2020-09-01
Propriétaire Gigamon Inc. (USA)
Inventeur(s) Rao, Anil

Abrégé

An apparatus for a network includes: a processing unit having a filter generation module configured for: receiving an indication that a packet matches a user-defined filter; and creating one or more derivative filters based at least in part on the received indication, wherein a first derivative filter of the one or more derivative filters provides a finer grade of filtration compared to the user-defined filter; and a non-transitory medium configured for storing the one or more derivative filters.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
  • H04L 12/815 - Configuration
  • H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
  1     2        Prochaine page