Loading...
Docoh

F5 (FFIV)

Utility
Methods for enforcing access control list based on managed application and devices thereof
16 Nov 21
Methods, non-transitory computer readable media, and access policy manager apparatus that assists with enforcing an access control list based on one or more managed applications includes receiving a request to access a web application from an enrolled mobile device.
Wui Chung Lie, Ravi Natarajan
Filed: 20 Jan 17
Utility
Methods for adding OCSP stapling in conjunction with generated certificates and devices thereof
9 Nov 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with adding an online certificate status protocol (OCSP) in conjunction with generated certificates includes receiving a client request to access a website via a TLS connection.
Jeroen de Borst
Filed: 15 Mar 19
Utility
Methods and devices for service-discovering reverse-tunnel proxy and tunnel service center
26 Oct 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that utilize a reverse tunnel proxy in a cloud environment.
Joel Benjamin Moses, Steven Dabell, William Ross Baumann, Timothy Scott Michels
Filed: 5 Nov 18
Utility
Methods and system for client side analysis of responses for server purposes
5 Oct 21
A method and system for collecting information on responses and their interpretation on a client device that requests access to a server.
Shlomo Yona, Ron Talmor
Filed: 16 Sep 10
Utility
Filter-based request processing in a web server
28 Sep 21
Filter-based request processing includes generating first data corresponding to a request.
Igor Sysoev, Valentin Bartenev, Nikolay Shadrin, Maxim Romanov
Filed: 1 Apr 19
Utility
Methods for dynamically managing user access control and devices thereof
14 Sep 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with dynamically managing user access control includes receiving a request to access one or more applications from a client.
Ravi Natarajan
Filed: 11 May 18
Utility
Methods for detecting and mitigating malicious network behavior and devices thereof
14 Sep 21
Methods, non-transitory computer readable media, anomaly detection apparatuses, and network traffic management systems that generate, based on the application of one or more models and for a first flow associated with a received first set of network traffic, one or more likelihood scores and at least one flow score based on the likelihood scores.
Shlomo Yona, Ron Talmor, Itsik Mantin, Yaniv Shemesh
Filed: 7 Aug 19
Utility
Methods for managing network connections based on DNS data and network policies and devices thereof
14 Sep 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with managing network connections includes obtaining a destination internet protocol (IP) address and a domain name from a received request sent by a client.
Mark Quevedo
Filed: 7 Sep 18
Reissue
Methods for accessing data in a compressed file system and devices thereof
7 Sep 21
A method, computer readable medium, and network traffic management apparatus that accesses data in a compressed file system includes obtaining an original write request from a client computing device including at least object data.
Sumandra Majee, David Hansen
Filed: 27 Apr 17
Utility
Methods and system for returning requests with javascript for clients before passing a request to a server
31 Aug 21
Identifying potential network attacks on servers and protecting the servers from those potential attacks until the associated client requests can be confirmed as either legitimate or an actual attack is disclosed.
Ron Talmor, Nir Shahaf, Orna Zackaria
Filed: 19 Dec 19
Utility
Subscriber-aware Network Controller
19 Aug 21
Technology related to processing network packets in a subscriber-aware manner is disclosed.
Christian Josef Koenning, Bart Salaets, Manjunath Jagannatharao
Filed: 19 Feb 20
Utility
Disaggregation of network traffic
27 Jul 21
Technology related to disaggregating network traffic is disclosed.
Wei Qian, William Ross Baumann, Ning Kai Chen
Filed: 9 Jul 19
Utility
Scheduling services on a platform including configurable resources
27 Jul 21
Technology related to scheduling services on a platform including configurable computing resources is disclosed.
Hao Cai, William Ross Baumann, Timothy S. Michels, Lars Pierson Friend
Filed: 15 Nov 19
Utility
Methods for facilitating cipher selection and devices thereof
13 Jul 21
Methods, non-transitory computer readable media, and network traffic management apparatuses that obtain one or more custom selection rules and one or more custom priority rules via a graphical user interface (GUI).
Saxon Amdahl
Filed: 6 Oct 17
Utility
Pipelined request processing using shared memory
22 Jun 21
Pipelined request processing using shared memory includes writing, by a first process, data associated with a request and an identifier referencing the data to a shared memory segment.
Igor Sysoev, Valentin Bartenev, Nikolay Shadrin, Maxim Romanov
Filed: 1 Apr 19
Utility
Methods for service stitching using a packet header and devices thereof
22 Jun 21
Methods, non-transitory computer readable media, network traffic manager apparatuses, and systems that assist with service stitching using a packet header includes identifying a type of service (TOS) or differentiated services code point (DSCP) value in a header field in each of a plurality of received network packets.
Sumandra Majee
Filed: 8 Jul 19
Utility
Methods for dynamically managing utilization of Nagle's algorithm in transmission control protocol (TCP) connections and devices thereof
22 Jun 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that monitor at least one TCP connection.
Martin Huynh Duke, Nasif Ekiz, Saxon Amdahl, Nicholas Alexander Pulera
Filed: 5 Feb 19
Utility
Methods for managing a federated identity environment based on application availability and devices thereof
15 Jun 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with managing a federated identity environment based on application availability includes identifying a current status of one or more applications.
Ravi Natarajan, Saxon Amdahl
Filed: 1 May 18
Utility
Methods for detecting and mitigating malicious network activity based on dynamic application context and devices thereof
8 Jun 21
Methods, non-transitory computer readable media, attack mitigation apparatuses, and network security systems that maintain an application context model for a protected application based on ingested logs.
Sebastian Michael Convertino, Judge Kennedy Singh Arora
Filed: 11 Dec 18
Utility
Processing packets with returnable values
25 May 21
Technology related to processing network packets with returnable values is disclosed.
Peter Michael Thornewell, Robert Andrew Kovalchik
Filed: 28 Jan 20
Patents are sorted by USPTO publication date, most recent first