370 patents
Page 5 of 19
Utility
Download management with congestion mitigation for over the air content delivery to vehicles
20 Dec 22
Among other things, this document describes systems, devices, and methods for wireless content delivery to vehicles and in particular to vehicles in cellular radio environments.
Mark M. Ingerman
Filed: 12 May 21
Utility
Certificate Authority (CA) security model in an overlay network supporting a branch appliance
8 Dec 22
A method to generate a trusted certificate on an endpoint appliance located in an untrusted network, wherein client devices are configured to trust a first Certificate Authority (CA) that is administered by the untrusted network.
Brandon O. Williams, Andres Guedez
Filed: 15 Aug 22
Utility
High performance distributed system of record with extended transaction processing capability
6 Dec 22
A set of transaction handling computing elements comprise a network core that receive and process transaction requests into an append-only immutable chain of data blocks, wherein a data block is a collection of transactions, and wherein an Unspent Transaction Output (UTXO) data structure supporting the immutable chain of data blocks is an output from a finalized transaction.
David C. Carver, Leen Al Shenibr, William R. Sears, Vladimir Shtokman
Filed: 30 Jun 20
Utility
High performance distributed system of record with key management
6 Dec 22
A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner.
David C. Carver, Samuel Erb
Filed: 10 Sep 19
Utility
Network Security System with Enhanced Traffic Analysis Based on Feedback Loop
1 Dec 22
This document describes among other things, network security systems that incorporate a feedback loop so as to automatically and dynamically adjust the scope of network traffic that is subject to inspection.
Eugene ("John") Neystadt, Eyal Heiman, Elisha Ben-Zvi, Asaf Nadler
Filed: 18 Apr 22
Utility
Virtual private network (VPN)-as-a-service with delivery optimizations while maintaining end-to-end data security
1 Dec 22
A mechanism to facilitate a private network (VPN)-as-a-service, preferably within the context of an overlay IP routing mechanism implemented within an overlay network.
Brandon O. Williams, Martin K. Lohner, Kevin Harmon, Jeffrey Bower
Filed: 9 Aug 22
Utility
Method and apparatus to detect non-human users on computer systems
1 Dec 22
Methods and systems for malicious non-human user detection on computing devices are described.
Sreenath Kurupati
Filed: 9 Aug 22
Utility
Dynamic Placement of Computing Tasks In a Distributed Computing Environment
1 Dec 22
Among other things, this document describes systems, methods and devices for performance testing and dynamic placement of computing tasks in a distributed computing environment.
Byung K. Choi
Filed: 11 Apr 22
Utility
Device discovery for cloud-based network security gateways
29 Nov 22
Among other things, this document describes systems, methods and devices for discovering and identifying client devices that attempt to access out-of-policy network services via a secure web gateway (or other network security gateway) that lacks visibility into the client network actual IP space.
Eugene (John) Neystadt, Michael Graham, John Devasia
Filed: 3 Nov 20
Utility
Fast, Secure, and Scalable Data Store at the Edge for Connecting Network Enabled Devices
24 Nov 22
A distributed computing system provides a distributed data store for network enabled devices at the edge.
Mark M. Ingerman, Robert B. Bird
Filed: 18 May 21
Utility
Managing mobile device user subscription and service preferences to predictively pre-fetch content
22 Nov 22
A content delivery network (CDN) is enhanced to enable mobile network operators (MNOs) to provide their mobile device users with a content prediction and pre-fetching service.
Prasandh Balakrishnan, James V. Luciani, Ravi S. Aysola, Richard G. D'Addio, Lawrence Gensch, Ittehad Shaikh, Terence Lobo
Filed: 8 Sep 20
Utility
Internet address structure analysis, and applications thereof
17 Nov 22
An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling.
Pawel J. Foremski, Arthur W. Berger, David J. Plonka
Filed: 28 Jul 22
Utility
Marker based reporting system for hybrid content delivery network and peer to peer network
15 Nov 22
This document describes marker based approaches for a CDN to monitor and report on the amount of traffic that it is serving on behalf of content providers.
Rahul Singhal, Eric K. Geyer, Henning Makholm, Christian Worm Mortensen
Filed: 30 Dec 20
Utility
Embedding MQTT messages in media streams
15 Nov 22
This disclosure provides embedding a messaging channel directly into a media stream, where messages delivered via the embedded messaging channel are the extracted at a client media player.
Michael Archer
Filed: 17 Mar 20
Utility
Overload Protection for Data Sinks In a Distributed Computing System
3 Nov 22
Described in this document, among other things, is an overload protection system that can protect data sinks from overload by controlling the volume of data sent to those data sinks in a fine-grained manner.
Aniruddha Bohra, Vadim Grinshpun, Hari Raghunathan, Mithila Nagendra
Filed: 28 Mar 22
Utility
MAPPING INTERNET ROUTING WITH ANYCAST AND UTILIZING SUCH MAPS FOR DEPLOYING AND OPERATING ANYCAST POINTS OF PRESENCE (PoPs)
3 Nov 22
Generally, aspects of the invention involve creating a data structure (a map) that reflects routing of Internet traffic to Anycast prefixes.
Kyle G. Schomp, Rami Al-Dalky
Filed: 21 Mar 22
Utility
Intelligently pre-positioning and migrating compute capacity in an overlay network, with compute handoff and data consistency
1 Nov 22
Edge server compute capacity demand in an overlay network is predicted and used to pre-position compute capacity in advance of application-specific demands.
Vinay Kanitkar, Robert B. Bird, Aniruddha Bohra, Michael Merideth
Filed: 13 Jun 19
Utility
Intermediary Handling of Identity Services to Guard Against Client Side Attack Vectors
27 Oct 22
Jason C. Bonci
Filed: 4 Apr 22
Utility
Traffic delivery using anycast and end user-based mapping in an overlay network
25 Oct 22
An overlay network is enhanced to provide traffic delivery using anycast and end user mapping.
Igor Lubashev, Elizabeth L. Borowsky, Stephen Hill, Katharine Jenkins, Debabrata Banerjee, Noam Freedman, Marcelo Torres
Filed: 12 Oct 20
Utility
High performance distributed system of record with secure interoperability to external systems
25 Oct 22
A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner.
Samuel Erb, Mark A. Roman, Talmai Oliveira, David C. Carver
Filed: 26 Nov 19