53 patents
Utility
Methods for enforcing access control list based on managed application and devices thereof
16 Nov 21
Methods, non-transitory computer readable media, and access policy manager apparatus that assists with enforcing an access control list based on one or more managed applications includes receiving a request to access a web application from an enrolled mobile device.
Wui Chung Lie, Ravi Natarajan
Filed: 20 Jan 17
Utility
Methods for adding OCSP stapling in conjunction with generated certificates and devices thereof
9 Nov 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with adding an online certificate status protocol (OCSP) in conjunction with generated certificates includes receiving a client request to access a website via a TLS connection.
Jeroen de Borst
Filed: 15 Mar 19
Utility
Methods and devices for service-discovering reverse-tunnel proxy and tunnel service center
26 Oct 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that utilize a reverse tunnel proxy in a cloud environment.
Joel Benjamin Moses, Steven Dabell, William Ross Baumann, Timothy Scott Michels
Filed: 5 Nov 18
Utility
Methods and system for client side analysis of responses for server purposes
5 Oct 21
A method and system for collecting information on responses and their interpretation on a client device that requests access to a server.
Shlomo Yona, Ron Talmor
Filed: 16 Sep 10
Utility
Filter-based request processing in a web server
28 Sep 21
Filter-based request processing includes generating first data corresponding to a request.
Igor Sysoev, Valentin Bartenev, Nikolay Shadrin, Maxim Romanov
Filed: 1 Apr 19
Utility
Methods for dynamically managing user access control and devices thereof
14 Sep 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with dynamically managing user access control includes receiving a request to access one or more applications from a client.
Ravi Natarajan
Filed: 11 May 18
Utility
Methods for detecting and mitigating malicious network behavior and devices thereof
14 Sep 21
Methods, non-transitory computer readable media, anomaly detection apparatuses, and network traffic management systems that generate, based on the application of one or more models and for a first flow associated with a received first set of network traffic, one or more likelihood scores and at least one flow score based on the likelihood scores.
Shlomo Yona, Ron Talmor, Itsik Mantin, Yaniv Shemesh
Filed: 7 Aug 19
Utility
Methods for managing network connections based on DNS data and network policies and devices thereof
14 Sep 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with managing network connections includes obtaining a destination internet protocol (IP) address and a domain name from a received request sent by a client.
Mark Quevedo
Filed: 7 Sep 18
Utility
Methods and system for returning requests with javascript for clients before passing a request to a server
31 Aug 21
Identifying potential network attacks on servers and protecting the servers from those potential attacks until the associated client requests can be confirmed as either legitimate or an actual attack is disclosed.
Ron Talmor, Nir Shahaf, Orna Zackaria
Filed: 19 Dec 19
Utility
Disaggregation of network traffic
27 Jul 21
Technology related to disaggregating network traffic is disclosed.
Wei Qian, William Ross Baumann, Ning Kai Chen
Filed: 9 Jul 19
Utility
Scheduling services on a platform including configurable resources
27 Jul 21
Technology related to scheduling services on a platform including configurable computing resources is disclosed.
Hao Cai, William Ross Baumann, Timothy S. Michels, Lars Pierson Friend
Filed: 15 Nov 19
Utility
Methods for facilitating cipher selection and devices thereof
13 Jul 21
Methods, non-transitory computer readable media, and network traffic management apparatuses that obtain one or more custom selection rules and one or more custom priority rules via a graphical user interface (GUI).
Saxon Amdahl
Filed: 6 Oct 17
Utility
Pipelined request processing using shared memory
22 Jun 21
Pipelined request processing using shared memory includes writing, by a first process, data associated with a request and an identifier referencing the data to a shared memory segment.
Igor Sysoev, Valentin Bartenev, Nikolay Shadrin, Maxim Romanov
Filed: 1 Apr 19
Utility
Methods for service stitching using a packet header and devices thereof
22 Jun 21
Methods, non-transitory computer readable media, network traffic manager apparatuses, and systems that assist with service stitching using a packet header includes identifying a type of service (TOS) or differentiated services code point (DSCP) value in a header field in each of a plurality of received network packets.
Sumandra Majee
Filed: 8 Jul 19
Utility
Methods for dynamically managing utilization of Nagle's algorithm in transmission control protocol (TCP) connections and devices thereof
22 Jun 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that monitor at least one TCP connection.
Martin Huynh Duke, Nasif Ekiz, Saxon Amdahl, Nicholas Alexander Pulera
Filed: 5 Feb 19
Utility
Methods for managing a federated identity environment based on application availability and devices thereof
15 Jun 21
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with managing a federated identity environment based on application availability includes identifying a current status of one or more applications.
Ravi Natarajan, Saxon Amdahl
Filed: 1 May 18
Utility
Methods for detecting and mitigating malicious network activity based on dynamic application context and devices thereof
8 Jun 21
Methods, non-transitory computer readable media, attack mitigation apparatuses, and network security systems that maintain an application context model for a protected application based on ingested logs.
Sebastian Michael Convertino, Judge Kennedy Singh Arora
Filed: 11 Dec 18
Utility
Processing packets with returnable values
25 May 21
Technology related to processing network packets with returnable values is disclosed.
Peter Michael Thornewell, Robert Andrew Kovalchik
Filed: 28 Jan 20
Utility
Methods for improved service chain classification and management and devices thereof
11 May 21
Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that identify a first service based on inspection of a message received from a server.
Mark Quevedo, Saxon Amdahl
Filed: 23 Aug 18
Utility
Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof
6 Apr 21
Methods, non-transitory computer readable media, access policy management apparatuses, and network traffic management systems that send a request received from a client to an application server along with an access token.
Ravi Natarajan, Srinivasa Yarrakonda
Filed: 29 Dec 17