Search

Ron Talmor Phones & Addresses

  • 1431 Knowlton Dr, Sunnyvale, CA (408) 406-5010
  • La Vergne, TN
  • Murfreesboro, TN
  • Canton, GA
  • Buford, GA
  • Cupertino, CA
  • Rutherford, TN
  • 1431 Knowlton Dr, Sunnyvale, CA 94087 (562) 881-8180

Work

Position: Professional/Technical

Education

Degree: Associate degree or higher

Publications

Us Patents

Authentication Techniques

View page
US Patent:
7831996, Nov 9, 2010
Filed:
Jul 31, 2006
Appl. No.:
11/496788
Inventors:
Mehul Dholakia - Milpitas CA, US
Ron Talmor - Cupertino CA, US
Assignee:
Foundry Networks, LLC - San Jose CA
International Classification:
H04L 9/32
H04L 9/00
US Classification:
726 2, 726 3, 713168
Abstract:
Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.

Techniques For Preventing Attacks On Computer Systems And Networks

View page
US Patent:
7832009, Nov 9, 2010
Filed:
Dec 26, 2006
Appl. No.:
11/616209
Inventors:
Sheng-Yih Wang - San Jose CA, US
Ron Talmor - Cupertino CA, US
Assignee:
Foundry Networks, LLC - San Jose CA
International Classification:
G06F 11/00
US Classification:
726 22, 370241, 370252, 370351, 370389, 370400, 370401, 709238
Abstract:
Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.

Authentication Techniques

View page
US Patent:
8122485, Feb 21, 2012
Filed:
Oct 1, 2010
Appl. No.:
12/896645
Inventors:
Mehul Dholakia - Cupertino CA, US
Ron Talmor - Cupertino CA, US
Assignee:
Foundry Networks, LLC - San Jose CA
International Classification:
H04L 9/32
H04L 9/00
US Classification:
726 2, 726 3, 713168
Abstract:
Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.

Hitless Software Upgrades

View page
US Patent:
8448162, May 21, 2013
Filed:
Dec 27, 2006
Appl. No.:
11/646845
Inventors:
Rajiv Ramanathan - Cupertino CA, US
Ron Talmor - San Jose CA, US
Anthony Ho - Fremont CA, US
Rudramahesh Rugge - Sunnyvale CA, US
Assignee:
Foundry Networks, LLC - San Jose CA
International Classification:
G06F 9/44
G06F 9/445
US Classification:
717171, 717176
Abstract:
Disclosed is a technique for facilitating software upgrade for a switching system comprising a first management processor and a second management processor and a set of one or more line processors, the techniques comprising receiving a signal to perform a software upgrade for a line processor from the set of line processors, and performing a software upgrade for the line processor without substantially affecting packet switching performed by the switching system.

Techniques For Preventing Attacks On Computer Systems And Networks

View page
US Patent:
8509106, Aug 13, 2013
Filed:
Oct 4, 2010
Appl. No.:
12/897627
Inventors:
Sheng-Yih Wang - San Jose CA, US
Ron Talmor - Cupertino CA, US
Assignee:
Foundry Networks, LLC - San Jose CA
International Classification:
H04L 1/00
US Classification:
370252, 370235
Abstract:
Techniques for detecting and responding to attacks on computer and network systems including denial-of-service (DoS) attacks. A packet is classified as potentially being an attack packet if it matches an access control list (ACL) specifying one or more conditions. One or more actions may be performed responsive to packets identified as potential attack packets. These actions may include dropping packets identified as potential attack packets for a period of time, rate limiting a port over which the potential attack packets are received for a period of time, and other actions.

Authentication Techniques

View page
US Patent:
8522311, Aug 27, 2013
Filed:
Jan 23, 2012
Appl. No.:
13/356449
Inventors:
Mehul Dholakia - Cupertino CA, US
Ron Talmor - Cupertino CA, US
Assignee:
Foundry Networks, LLC - San Jose CA
International Classification:
H04L 9/32
H04L 9/00
US Classification:
726 2, 726 3, 713168
Abstract:
Techniques for authenticating clients of differing capabilities in an efficient manner. Two or more authentication techniques, including one preferred authentication technique, are initiated to run in parallel to authenticate a client. Upon determining that the client can support the preferred authentication technique, the preferred technique is used to authenticate the client and the other authentication techniques are aborted. If it is determined that the client cannot support the preferred authentication technique, then one of the other authentication techniques is used to authenticate the client. In this manner, based upon the capabilities of the client, an appropriate authentication technique is used to authenticate the client in an efficient manner.

System And Method For Selectively Storing Web Objects In A Cache Memory Based On Policy Decisions

View page
US Patent:
8627467, Jan 7, 2014
Filed:
Oct 19, 2011
Appl. No.:
13/277041
Inventors:
Yuval Levy - Tel Aviv, IL
Ron Talmor - San Jose CA, US
Beni Serfaty - Tel Aviv, IL
Assignee:
F5 Networks, Inc. - Seattle WA
International Classification:
H04L 29/06
US Classification:
726 22, 726 11
Abstract:
A system and method for selectively storing one or more web objects in a memory is disclosed. A server response is received at a network traffic management device, wherein the server response is associated with a client request sent from a client device and includes at least one web object. The server response is analyzed using a security module of the network traffic management device which determines if the at least a portion of the server response contains suspicious content in relation to one or more defined policy parameters handled by the security module. An instruction is sent from the security module to a cache module of the network traffic management device upon determining that the at least a portion of the server response contains suspicious information, wherein the cache module does not store the at least one web object upon receiving the instruction.

Methods For Identifying Network Traffic Characteristics To Correlate And Manage One Or More Subsequent Flows And Devices Thereof

View page
US Patent:
20130173779, Jul 4, 2013
Filed:
Dec 30, 2011
Appl. No.:
13/341360
Inventors:
Dmitry Rovniaguin - Rishon Le Zion, IL
Ephraim Dan - Yad-Binyamin, IL
Ron Talmor - Sunnyvale CA, US
Assignee:
F5 NETWORKS, INC. - Seattle WA
International Classification:
G06F 15/173
US Classification:
709224
Abstract:
A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
Ron Talmor from Sunnyvale, CA, age ~66 Get Report