65 patents
Page 2 of 4
Utility
Network Application Firewall
20 May 21
Technology related to a network application firewall is disclosed.
Michael Kapelevich, Maxim Zavodchik, Tomer Zait, Ido Breger
Filed: 14 Apr 20
Utility
Scheduling Services on a Platform Including Configurable Resources
20 May 21
Technology related to scheduling services on a platform including configurable computing resources is disclosed.
Hao Cai, William Ross Baumann, Timothy S. Michels, Lars Pierson Friend
Filed: 15 Nov 19
Utility
Methods for improved service chain classification and management and devices thereof
11 May 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that identify a first service based on inspection of a message received from a server.
Mark Quevedo, Saxon Amdahl
Filed: 23 Aug 18
Utility
Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof
6 Apr 21
Methods, non-transitory computer readable media, access policy management apparatuses, and network traffic management systems that send a request received from a client to an application server along with an access token.
Ravi Natarajan, Srinivasa Yarrakonda
Filed: 29 Dec 17
Utility
Methods for secure access to services behind a firewall and devices thereof
23 Mar 21
Methods, non-transitory computer readable media, rendezvous gateway (RG) apparatuses, and network security systems that send an RG synchronization message (SYN) to an application in a secure domain following receipt, from a client, of a client SYN comprising an indication of the application.
Peter M. Thornewell, David D. Schmitt, Alan Mimms, Saxon Amdahl, Bill Baumann
Filed: 6 Mar 19
Utility
Methods for ephemeral authentication screening and devices thereof
23 Feb 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that receive a directory service authentication request from an application.
William Church
Filed: 6 Nov 17
Utility
Methods for detecting and mitigating brute force credential stuffing attacks and devices thereof
23 Feb 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that obtain a dictionary comprising a plurality of credentials and populate a probabilistic data structure based on the dictionary.
Michael Kapelevich, Tomer Zait, Maxim Zavodchik, Ron Talmor
Filed: 28 Sep 18
Utility
Accessing Security Hardware Keys
18 Feb 21
Technology related to accessing security hardware keys is disclosed.
Liang Cheng, Andrey Jivsov, Neha Kochar
Filed: 15 Aug 19
Utility
Methods for server load balancing in a cloud environment using dynamic cloud pricing and devices thereof
26 Jan 21
The disclosed technology includes accessing a first network application programming interface exposed by a first cloud provider of the plurality of cloud providers to identify a first pricing profile, the first pricing profile associated with the first Cloud provider.
Steve Dabell, Timothy Scott Michels, Thomas Troksa
Filed: 8 Jun 18
Reissue
Security for WAP servers
4 Jan 21
A method and system for improving the security and control of internet/network web application processes, such as web applications.
David Mowshowitz
Filed: 6 Apr 17
Utility
Methods for packet data network service slicing with microsegmentation in an evolved packet core and devices thereof
7 Dec 20
Methods, non-transitory computer readable media, session director apparatuses, and network traffic management systems that facilitate packet data network (PDN) service slicing with microsegmentation in an evolved packet core are disclosed.
Vernon Wells, Akihiko Maruse, Barry Goh, Antonio Torzillo
Filed: 24 Mar 19
Utility
Methods and devices for automatically detecting attack signatures and generating attack signature identifications
30 Nov 20
Network traffic management apparatuses, systems, methods, and computer-readable media for automatically detecting attack signatures and generating attack signature identifications, involving: collecting a stable dataset during a stable time; determining whether a cyber-attack is detected; when a cyber-attack is detected, periodically generating attack signatures and updating an enforcer with the attack signatures, the attack signatures representing dynamic rules to be enforced; validating the dynamic rules via a long-time validation mechanism, validating involving considering behavior of each dynamic rule after the cyber-attack and during a new cyber-attack and ranking each dynamic rule using the stable dataset, thereby generating persistent rules having a dynamic rule; exporting the persistent rules to a security enforcer; introducing the persistent rules to a persistent rule revocater; determining whether export of an unrevoked persistent rule is requested; and if requested, exporting the unrevoked persistent rule of the persistent rules through a mitigator and collecting statistics.
Vadim Krishtal, Maor Moshe Gaon, Peter Finkelshtein
Filed: 4 Nov 18
Utility
Managing Network Traffic Flows
25 Nov 20
Technology related to managing network traffic flows is disclosed.
Hao Cai, Timothy S. Michels, Qi Lu, Ryan Romney
Filed: 3 May 20
Utility
Methods for service chaining and devices thereof
9 Nov 20
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that send a server response to a client request from a requesting client device to a service chaining device.
Saxon Amdahl
Filed: 28 Feb 19
Utility
Methods for SSL protected NTLM re-authentication and devices thereof
9 Nov 20
A method, non-transitory computer readable medium, and device that assists with SSL protected NTLM reauthentication includes receiving a connection reset message from a web application server.
Ravi Natarajan, Wui Chung Lie
Filed: 30 Mar 16
Utility
Methods for preventing DDoS attack based on adaptive self learning of session and transport layers and devices thereof
9 Nov 20
A method, non-transitory computer readable medium, and device includes monitoring a session layer and transport layer network traffic data received from a plurality of client computing devices and plurality of servers.
Sergei Edelstein, Michael Kapelevich, Shlomo Yona, Ron Talmor
Filed: 17 Dec 16
Utility
Methods for dynamic computer network fingerprint matching and devices thereof
9 Nov 20
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that receives a client access request to access content at one or more server devices.
Yaniv Shemesh, David Stav, Ziv Rika
Filed: 21 Feb 19
Utility
Methods for Dynamically Controlling Transmission Control Protocol Push Functionality and Devices Thereof
21 Oct 20
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that monitor one or more messages generated by an application or one or more characteristics of one or more transmission control protocol (TCP) connections with a destination device or a source device.
Nasif Ekiz, Martin Duke, Akihiko Maruse, Aniket Dhobe
Filed: 29 Mar 20
Utility
Methods for managing security tokens based on security violations and devices thereof
19 Oct 20
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists managing security tokens based on security violations includes monitoring network traffic data between a client and a web application server.
Ravi Natarajan, Gauravsingh Khatri, Swapnil Mhatre
Filed: 28 Sep 17
Utility
Methods for secured SCEP enrollment for client devices and devices thereof
5 Oct 20
Methods, non-transitory computer readable media, and mobile application manager apparatus that assists secured SCEP enrollment of client devices includes receiving a certificate signing request and an encrypted device key from an enrolled mobile device.
Ravi Natarajan, Wui Chung Lie, Saxon Amdahl, Nicholas Treat
Filed: 19 Jan 17