Search

Dennis Isao Oshiba

from Fremont, CA
Age ~55

Dennis Oshiba Phones & Addresses

  • 3536 Johnson Ct, Fremont, CA 94555 (408) 577-1818 (510) 818-9788
  • 734 Overture Ct, San Jose, CA 95134 (408) 392-6092 (408) 577-1818
  • Sunnyvale, CA
  • Channelview, TX
  • Kaneohe, HI
  • Alameda, CA
  • 3536 Johnson Ct, Fremont, CA 94555

Work

Company: A10 networks Sep 2004 Position: Senior director, software engineering

Education

Degree: Graduate or professional degree

Industries

Computer & Network Security

Resumes

Resumes

Dennis Oshiba Photo 1

Senior Director, Software Engineering

View page
Location:
3536 Johnson Ct, Fremont, CA 94555
Industry:
Computer & Network Security
Work:
A10 Networks
Senior Director, Software Engineering

Cosine Communications Apr 2000 - Sep 2004
Principal Engineer

Spyrus 1994 - Apr 2000
Software Development Manager

Esl Subsidiary of Trw 1991 - 1994
Senior Software Engineer

Publications

Us Patents

System And Method To Apply Network Traffic Policy To An Application Session

View page
US Patent:
8312507, Nov 13, 2012
Filed:
May 27, 2010
Appl. No.:
12/788339
Inventors:
Lee Chen - Saratoga CA, US
John Chiong - San Jose CA, US
Dennis Oshiba - Fremont CA, US
Assignee:
A10 Networks, Inc. - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 1, 726 7, 726 28
Abstract:
Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.

System And Method To Apply A Packet Routing Policy To An Application Session

View page
US Patent:
8584199, Nov 12, 2013
Filed:
Dec 15, 2012
Appl. No.:
13/716124
Inventors:
John Chiong - San Jose CA, US
Dennis Oshiba - Fremont CA, US
Assignee:
A10 Networks, Inc. - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 1, 726 7, 726 28
Abstract:
A security gateway includes packet routing policies, each including a host network address, an application network address, and a forwarding interface. In routing data packets of an application session, the security gateway: recognizes the application session between a network and an application; determines a user identity from an application session record for the application session; determines packet routing policies applicable to the application session based on the user identity; receives a data packet for the application session, including a source network address and a destination network address; compares the source network address with the host network address, and the destination network address with the application network address; and in response to finding a match between the source network address and the host network address, and between the destination network address and the application network address, processes the data packet using the forwarding interface of the packet routing policy.

System And Method To Apply Network Traffic Policy To An Application Session

View page
US Patent:
8595791, Nov 26, 2013
Filed:
Oct 12, 2012
Appl. No.:
13/650179
Inventors:
John Chiong - San Jose CA, US
Dennis Oshiba - Fremont CA, US
Assignee:
A10 Networks, Inc. - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 1, 726 7, 726 28
Abstract:
Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.

System And Method For Storing Data-Network Activity Information

View page
US Patent:
20070180101, Aug 2, 2007
Filed:
Jan 10, 2006
Appl. No.:
11/328823
Inventors:
Lee Chen - Saratoga CA, US
Rishi Sampat - Santa Clara CA, US
John Chiong - San Jose CA, US
Dennis Oshiba - Fremont CA, US
International Classification:
G06F 17/00
G06F 15/173
US Classification:
709224000, 707100000
Abstract:
A system and method are disclosed that may include receiving a first event log for a data network user; identifying the user that is the subject of the first event log; updating a user activity record, within stored user activity records, with activity information included in the first event log, the activity information being represented in a first format in the first event log; and repeating the steps of receiving, identifying, and updating for at least one additional event log having activity information stored therein in at least one format other than the first format.

System And Method To Customize A Security Log Analyzer

View page
US Patent:
20080229418, Sep 18, 2008
Filed:
Mar 14, 2007
Appl. No.:
11/686119
Inventors:
Lee Chen - Saratoga CA, US
John Chiong - San Jose CA, US
Dennis I. Oshiba - Fremont CA, US
Assignee:
A10 NETWORKS INC. - San Jose CA
International Classification:
G06F 12/14
US Classification:
726 23
Abstract:
Systems and methods adapted to customize a security log analyzer to recognize a security log, the system including at least one network security device for processing data traffic on a data network, the network security device associated with at least one computing device, and adapted to generate a security log, the system further including rule builder software adapted to generate a rule for recognizing at least one item in a security log and a log analyzer adapted to apply the rule in analyzing a security log.

Virtual Application Delivery Chassis System

View page
US Patent:
20120179770, Jul 12, 2012
Filed:
Jan 31, 2012
Appl. No.:
13/363055
Inventors:
Rajkumar Jalan - Saratoga CA, US
Dennis Oshiba - Fremont CA, US
Assignee:
A10 NETWORKS, INC. - San Jose CA
International Classification:
G06F 15/16
US Classification:
709209
Abstract:
A method for electing a master blade in a virtual application distribution chassis (VADC), includes: sending by each blade a VADC message to each of the other blades; determining by each blade that the VADC message was not received from the master blade within a predetermined period of time; in response, sending a master claim message including a blade priority by each blade to the other blades; determining by each blade whether any of the blade priorities obtained from the received master claim messages is higher than the blade priority of the receiving blade; in response to determining that none of the blade priorities obtained is higher, setting a status of a given receiving blade to a new master blade; and sending by the given receiving blade a second VADC message to the other blades indicating the status of the new master blade of the given receiving blade.

Virtual Application Delivery Chassis System

View page
US Patent:
20120297240, Nov 22, 2012
Filed:
Jul 26, 2012
Appl. No.:
13/558350
Inventors:
Rajkumar Jalan - Saratoga CA, US
Dennis Oshiba - Fremont CA, US
Assignee:
A10 NETWORKS, INC. - San Jose CA
International Classification:
G06F 11/20
G06F 15/16
US Classification:
714 411, 714E11073
Abstract:
A method for electing a master blade in a virtual application distribution chassis (VADC), includes: sending by each blade a VADC message to each of the other blades; determining by each blade that the VADC message was not received from the master blade within a predetermined period of time; in response, sending a master claim message including a blade priority by each blade to the other blades; determining by each blade whether any of the blade priorities obtained from the received master claim messages is higher than the blade priority of the receiving blade; in response to determining that none of the blade priorities obtained is higher, setting a status of a given receiving blade to a new master blade; and sending by the given receiving blade a second VADC message to the other blades indicating the status of the new master blade of the given receiving blade.

Sychronization Of Configuration File Of Virtual Application Distribution Chassis

View page
US Patent:
20120311116, Dec 6, 2012
Filed:
Jun 6, 2011
Appl. No.:
13/154399
Inventors:
Rajkumar JALAN - Saratoga CA, US
Dennis OSHIBA - Fremont CA, US
Assignee:
A10 Networks, Inc. - San Jose CA
International Classification:
G06F 15/177
US Classification:
709222
Abstract:
Synchronization of configuration files of a virtual application distribution chassis, includes: processing a configuration command received by a master blade; updating a first configuration file with the configuration command and an updated tag by the master blade; sending a configuration message by the master blade to the slave blades informing of the updated configuration file, the configuration message comprising the updated tag; in response to receiving the configuration message by a given slave blade of the one or more slave blades, comparing the updated tag in the configuration message with a tag in a second configuration file stored at the given slave blade; and in response to determining that the updated tag in the configuration message is more recent than the tag in the second configuration file stored at the given slave blade, sending a request for the updated configuration file to the master blade by the given slave blade.
Dennis Isao Oshiba from Fremont, CA, age ~55 Get Report