Patent application number | Description | Published |
20080285577 | Systems and Methods for Providing Network-Wide, Traffic-Aware Dynamic Acceleration and Admission Control for Peer-to-Peer Based Services - In one aspect, the invention provides systems and methods for providing users with a peer-to-peer (P2P) acceleration service over any form of broadband access. | 11-20-2008 |
20130283373 | TECHNIQUES FOR SEPARATING THE PROCESSING OF CLIENTS' TRAFFIC TO DIFFERENT ZONES - A system and method for separation of traffic processing in a computing farm. The method comprises allocating a first group of computing resources of the computing farm to a trusted zone and a second group of computing resources to an un-trusted zone, wherein the computing resources in the first group are allocated to ensure at least service-level agreements (SLA) guaranteed to a group of trusted clients; determining, based on a plurality of security risk indication parameters, if a client associated with an incoming traffic is a trusted client or an un-trusted client; forwarding the incoming traffic to the second group of computing resources when the client is determined to be an un-trusted client; and diverting the incoming traffic to the first group of computing resources when the client is determined to be a trusted client, thereby ensuring at least the SLA guaranteed to the trusted client. | 10-24-2013 |
20130283374 | TECHNIQUES FOR SEPARATING THE PROCESSING OF CLIENTS' TRAFFIC TO DIFFERENT ZONES IN SOFTWARE DEFINED NETWORKS - A method and system for separation of traffic processing in a software defined network (SDN). The method comprises allocating a first group of computing resources of a computing farm to a trusted zone and a second group of computing resources to an un-trusted zone; assigning the computing resources in the first group to a first ADC and the computing resources in the second group with a second ADC; triggering a zoning mode in the computing frame to mitigate a potential cyber-attack; and causing at least one network element in the SDN to divert traffic from a trusted client to the first group of computing resources and traffic from an un-trusted client to the second group of computing resources based on a plurality of zoning rules implemented by the at least one network element. | 10-24-2013 |
20140046701 | Apparatus and Method for Detecting Driving Performance Data - A system and method for detecting driving performance data is provided. The system and method include a mobile device in electronic communication with a network and one or more sensors for measuring at least one parameter associated with operation of a vehicle. A driving performance engine in electronic communication with the mobile device. The driving performance engine verifies the vehicle and a driver of the vehicle, detects vehicle movement by comparing sensor data obtained by the mobile device with a predefined set of rules, records driving performance data, transmits the driving performance data anonymously to an insurance provider computer system, and receives insurance cost information from the insurance provider computer system based on the driving performance data. | 02-13-2014 |
20140189151 | METHOD AND SYSTEM FOR SPOOLING DIAMETER TRANSACTIONS - A method for spooling diameter transactions is provided. The method comprises receiving from a Diameter client a Diameter request message; determining based in part on a type of the received request message if the received request message should be spooled; determining if a current transaction rate exceeds a predefined spooling threshold, if the received request message should be spooled; and queuing the received request message if the current transaction rate exceeds the spooling threshold. | 07-03-2014 |
20150154494 | METHOD AND SYSTEM FOR CONFIGURING BEHAVIORAL NETWORK INTELLIGENCE SYSTEM USING NETWORK MONITORING PROGRAMMING LANGUAGE - A method and system for configuring a behavioral network intelligence system using a network monitoring programming language are provided. The method includes defining at least one target of a traffic segment to be monitored using at least one application path attribute of an application, wherein the application is accessed via at least one user device connected to a network, wherein the at least one application path attribute is defined respective of an application path keyword and an application path assessment keyword; and defining at least one condition representing the behavior of the at least one application path attribute of the application, the at least one target and the at least one condition can be interpreted by a monitoring system to allow for determining a behavioral impact of the application on the network. | 06-04-2015 |
20150156086 | BEHAVIORAL NETWORK INTELLIGENCE SYSTEM AND METHOD THEREOF - A method and system for determining the behavioral impact of applications and their respective users on a network carrier are provided. The method includes receiving data collected by at least one deep packet inspection (DPI) engine; classifying the received data at least per an application path respective of each of the applications; generating an application path profile data structure using the collected data; and generating, responsive to at least one behavioral rule, at least one degree of fulfillment (DoF) for the application path based on contents of the application path profile data structure, wherein the at least DoF defines an association of the application path with at least one behavior group, wherein the behavior group determines the behavioral impact of an application represented by the application path. | 06-04-2015 |
20150372929 | MULTI-LAYER TRAFFIC STEERING FOR SERVICE CHAINING OVER SOFTWARE DEFINED NETWORKS - A method and system for multi-layer traffic steering for enabling service chaining over a software defined network (SDN) are provided. The method is performed by a central controller of the SDN and includes receiving at least one service chaining rule defining at least one value-added service (VAS) to assign to an incoming traffic flow addressed to a destination server; analyzing each of the at least one received service chaining rule to determine if an application-layer steering is required; generating at least one application-layer steering rule, upon determining that an application-layer steering is required; generating at least one network-layer steering rule, upon determining that an application-layer steering is not required; and programming a multi-layer steering fabric with the generated at least one of network-layer steering rule and application-layer steering rule. | 12-24-2015 |