1
Ronald W Szeto, Nitin Jain, Ravindran Suresh, Philip Kwan: System and method for source IP anti-spoofing security. Foundry Networks, Townsend and Townsend and Crew, April 7, 2009: US07516487 (175 worldwide citation)

A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datal ...


2
Ronald W Szeto, David Chun Ying Cheung, Rajkumar Jalan: Connection rate limiting. Foundry Networks, Nixon Peabody, John P Schaub, April 27, 2010: US07707295 (44 worldwide citation)

Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For e ...


3
Ronald W Szeto, David Chun Ying Cheung, Rajkumar Jalan: Connection rate limiting for server load balancing and transparent cache switching. Foundry Networks, Nixon Peabody, John P Schaub, October 8, 2013: US08554929 (35 worldwide citation)

Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For e ...


4
Ronald W Szeto, Philip Kwan, Raymond Wai Kit Kwong: System and method for protecting CPU against remote access attacks. Foundry Networks, Townsend and Townsend and Crew, August 10, 2010: US07774833 (16 worldwide citation)

A system and method that provides for protection of a CPU of a router, by establishing a management port on a router. Hosts which are connected to a non-management ports of the router are denied access to management functions of a CPU of the router. The system and method can utilize an application s ...


5
Ronald W Szeto, Nitin Jain, Ravindran Suresh, Philip Kwan: System and method for source IP anti-spoofing security. Foundry Networks, Fountainhead Law Group P C, September 10, 2013: US08533823 (4 worldwide citation)

A system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP addresses in data packets. The system and method provide for analyzing MAC addresses and source IP addresses at the datal ...


6
Ronald W Szeto, David Chun Ying Cheung, Rajkumar Jalan: Connection rate limiting for server load balancing and transparent cache switching. Foundry Networks, Nixon Peabody, John P Schaub, October 29, 2013: US08572228 (1 worldwide citation)

Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For e ...


7
Ronald W Szeto, David Chun Ying Cheung, Rajkumar Jalan, Sridhar J Devarapalli: Transaction rate limiting. Foundry Networks, Fountainhead Law Group P C, August 26, 2014: US08819252 (1 worldwide citation)

Transaction rate limiting is provided to monitor new connections. If the number of new connections requested by a particular client exceeds a predetermined threshold value, then the client may be frozen out for a configured period of time. By denying access for the configured period of time, the cli ...


8
Ronald W Szeto, David Chun Ying Cheung, Rajkumar Jalan: Connection rate limiting for server load balancing and transparent cache switching. Foundry Networks, Fountainhead Law Group P C, May 3, 2016: US09332066

Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For e ...


9
Ronald W Szeto, David Chun Ying Cheung, Rajkumar Jalan: Connection rate limiting for server load balancing and transparent cache switching. Foundry Networks, Nixon Peabody, John P Schaub, August 10, 2010: US07774482

Each service in a computer network may have a connection rate limit. The number of new connections per time period may be limited by using a series of rules. In a specific embodiment of the present invention, a counter is increased each time a server is selected to handle a connection request. For e ...


10
Ronald W Szeto, Philip Kwan, Raymond Wai Kit Kwong: System and method for protecting cpu against remote access attacks. Foundry Networks, Townsend and Townsend and Crew Foundry Brocade, December 30, 2010: US20100333191-A1

A system and method that provides for protection of a CPU of a router, by establishing a management port on a router. Hosts which are connected to a non-management ports of the router are denied access to management functions of a CPU of the router. The system and method can utilize an application s ...