370 patents
Utility
Real-time detection of online new-account creation fraud using graph-based neural network modeling
18 Jan 24
A method executes upon receiving data (email, IP address) associated with an account registration.
Nadav George Costa, Ziv Eli
Filed: 12 Jul 22
Utility
Synchronizing independent media and data streams using media stream synchronization points
16 Jan 24
A messaging channel is embedded directly into a media stream.
Mark M. Ingerman, Michael Archer
Filed: 22 Mar 22
Utility
Automated learning and detection of web bot transactions using deep learning
9 Jan 24
This disclosure describes a bot detection system that leverages deep learning to facilitate bot detection and mitigation, and that works even when an attacker changes an attack script.
Sreenath Kurupati
Filed: 1 Aug 19
Utility
Systems and methods for reducing the number of open ports on a host computer
9 Jan 24
Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service.
Simon E. Vera-Schockner
Filed: 26 Feb 20
Utility
Patternless obfuscation of data with low-cost data recovery
19 Dec 23
Systems and methods for obfuscating data.
Kristine Poghosyan
Filed: 13 Dec 21
Utility
Content delivery network (CDN)-based bot detection service with stop and reset protocols
19 Dec 23
A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server.
David Senecal, Prajakta Bhurke, Tu Vuong
Filed: 8 Feb 22
Utility
HTTPS request enrichment
19 Dec 23
This disclosure provides for a network element (in the middle) to inject enrichments into SSL connections, and for taking them out.
Mangesh Kasbekar
Filed: 22 Feb 21
Utility
Key rotation for sensitive data tokenization
19 Dec 23
This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W].
Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
Filed: 23 Jun 22
Utility
Systems and methods for proxying encrypted traffic to protect origin servers from internet threats
5 Dec 23
This document describes, among other things, systems and methods for more efficiently resuming a client-to-origin TLS session through a proxy layer that fronts the origin in order to provide network security services.
Stephen L. Ludin, Michael A. Bishop
Filed: 19 May 21
Utility
High performance distributed system of record with hosted origin services
28 Nov 23
A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner.
David C. Carver
Filed: 29 Oct 19
Utility
Network security system with enhanced traffic analysis based on feedback loop
28 Nov 23
This document describes among other things, network security systems that incorporate a feedback loop so as to automatically and dynamically adjust the scope of network traffic that is subject to inspection.
Eugene (“John”) Neystadt, Eyal Heiman, Elisha Ben-Zvi, Asaf Nadler
Filed: 18 Apr 22
Utility
Embedding MQTT messages in media streams
28 Nov 23
This disclosure provides embedding a messaging channel directly into a media stream, where messages delivered via the embedded messaging channel are the extracted at a client media player.
Michael Archer
Filed: 14 Nov 22
Utility
Cryptographic material sharing among entities with no direct trust relationship or connectivity
28 Nov 23
A mechanism to share cryptographic material across entities that may not have a direct trust relationship between or among each other, or no network connectivity, or some combination thereof, but where participating entities do share a trust relationship (or trusted connection(s)) with a common entity, sometimes referred to herein as a “conduit” entity.
Rupinder Gill, Punit Kandoi, Venukrishna Prasad, Seetharama Ayyadevara
Filed: 15 Mar 21
Utility
Content delivery network (CDN) edge server-based bot detection with session cookie support handling
14 Nov 23
A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server.
David Senecal, Prajakta Bhurke, Tu Vuong
Filed: 28 Jun 22
Utility
Certificate authority (CA) security model in an overlay network supporting a branch appliance
14 Nov 23
A method to generate a trusted certificate on an endpoint appliance located in an untrusted network, wherein client devices are configured to trust a first Certificate Authority (CA) that is administered by the untrusted network.
Brandon O. Williams, Andres Guedez
Filed: 15 Aug 22
Utility
Systems and methods for content delivery acceleration of virtual reality and augmented reality web pages
7 Nov 23
Among other things, this document describes systems, devices, and methods for improving the delivery and performance of web pages authored to produce virtual reality (VR) or augmented reality (AR) experiences.
Utkarsh Goel, Martin T. Flack, Stephen L. Ludin
Filed: 23 Jan 23
Utility
Efficient congestion control in a tunneled network
31 Oct 23
A method of congestion control implemented by a sender over a network link that includes a router having a queue.
William R. Sears, Martin K. Lohner
Filed: 19 Apr 21
Utility
Learning-based storage reduction in an overlay network
26 Oct 23
An overlay network is augmented to provide more efficient data storage by processing a dataset of high dimension into an equivalent dataset of lower dimension, wherein the data reduction reduces the amount of actual physical data but not necessarily its informational value.
Indrajit Banerjee
Filed: 27 Jun 23
Utility
Key rotation for sensitive data tokenization
24 Oct 23
This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W].
Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
Filed: 23 Jun 22
Utility
Bot detection in an edge network using transport layer security (TLS) fingerprint
24 Oct 23
A method of bot detection in a computer network leverages a machine learning system.
David Senecal, Andrew Kahn, Ory Segal, Elad Shuster, Duc Nguyen
Filed: 23 Nov 21