455 patents
Utility
Centralized state database storing state information
16 Jan 24
Systems and methods for a cloud state engine are provided.
Thorsten Jäger
Filed: 28 Jun 17
Utility
Systems and Methods for Preventing Data Leaks Over RTP or Sip
11 Jan 24
Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.
Jochen Pretli
Filed: 7 Jul 22
Utility
Systems and Methods for Security Enhanced Domain Categorization
11 Jan 24
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.
Jochen Pretli
Filed: 7 Jul 22
Utility
Scalable physical loop detection in non-native virtual local area networks (VLANs)
9 Jan 24
Systems and methods for detecting physical loops in both native and non-native VLANs are provided.
Wayming D. Tai
Filed: 31 Dec 20
Utility
Kernel space based capture using intelligent packet selection paradigm and event output storage determination methodology
9 Jan 24
Systems and methods for efficient kernel space packet processing and IoT device classification are provided.
Sameer T. Khanna, Xiaoguang Liu, Jianwen Zhang
Filed: 31 Dec 20
Utility
Systems and methods for centrally managed host and network firewall services
9 Jan 24
Systems and methods for a unified, cloud-managed platform for controlling enterprise network security are provided.
Anurag Jain, Kenneth Ammon, Thomas Cross, Michael C. Starr
Filed: 2 Dec 21
Utility
Systems and Methods for Cloud Based Root Service Application Across Multiple Cooperative Security Fabrics
4 Jan 24
Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric using a cloud based root.
Robert A. May
Filed: 4 Jul 22
Utility
Capturing Multiuser Data Packets by Grouping Access Points on a Wireless Network
4 Jan 24
A capture group of access points formed from the plurality of access points dedicate at least one radio from each of the access points for capturing data packets.
Vijayakumar V
Filed: 30 Jun 22
Utility
Steering Wi-fi 6E Wireless Clients to Wi-fi 6E Access Points on Hybrid Wireless Networks
4 Jan 24
A probe request sent from a Wi-Fi 6E wireless client to the legacy access point is received by a Wi-Fi controller.
Vijayakumar V
Filed: 30 Jun 22
Utility
Remote Debugging of Local Gui Rendering by Playing Back a Capture File to Recreate a Real-time Local Network Environment
4 Jan 24
Debug engine receives a capture file over the network interface and initiate playback by executing the capture file with the processor.
Kai Guo
Filed: 30 Jun 22
Utility
Chassis System Management Through Data Paths
4 Jan 24
A firewall processing card from a plurality of firewall processing cards coupled to a chassis, is selected by a load balancing engine (or other mechanism) and receives the data packet over the fabric channel.
Sen Yang, Zicheng Wang, Ting Liu
Filed: 30 Jun 22
Utility
Enabling global quality of service for real-time selection of best data communications channels in autonomous driving vehicles
2 Jan 24
An orchestrator ensures the best available vehicle communication technology is selected.
Hector Agustin Cozzetti
Filed: 31 Dec 20
Utility
Identifying Hidden Service Set Identifiers (Ssids) of Unauthorized Access Points on a Wireless Network
28 Dec 23
An unauthorized access point is identified during a periodic scan on the wireless network and storing a MAC address for the unauthorized access point and monitored for connection attempts.
Vijayakumar V
Filed: 28 Jun 22
Utility
Systems and methods for unpacking protected data from obfuscated code
12 Dec 23
Systems, devices, and methods are discussed that provide for discovering protected data from a code.
Jeremy Allen Wildsmith
Filed: 1 Nov 21
Utility
Automated feature extraction and artificial intelligence (AI) based detection and classification of malware
12 Dec 23
Systems and methods for detection and classification of malware using an AI-based approach are provided.
Lei Zhang
Filed: 30 Sep 20
Utility
Hardware acceleration device for denial-of-service attack identification and mitigation
5 Dec 23
Systems and methods for providing an integrated or Smart NIC-based hardware accelerator for a network security device to facilitate identification and mitigation of DoS attacks is provided.
Zhi Guo, Peixue Li, Xu Zhou
Filed: 2 May 22
Utility
Detecting malicious behavior in a network using security analytics by analyzing process interaction ratios
5 Dec 23
Systems and methods for detecting malicious behavior in a network by analyzing process interaction ratios (PIRs) are provided.
Ernest Mugambi, Partha Bhattacharya, Gun Sumlut
Filed: 30 Mar 20
Utility
Systems and methods for incorporating passive wireless monitoring with video surveillance
21 Nov 23
Various systems and methods for surveillance using a combination of video image capture and passive wireless detection are described.
Carl Windsor
Filed: 22 Sep 21
Utility
Systems and methods for enhanced key security in an SD-WAN network environment
21 Nov 23
Systems, devices, and methods are discussed for leveraging SD-WAN's property of redundant independent paths to enable out of band key exchange using the collection of available paths, dynamically managing link failures to keep the separation whenever possible, and/or signaling availability of quantum-safe data transfer to SD-WAN to enable quantum-safety to be used in SD-WAN policy decisions.
Simon Bryden
Filed: 14 Feb 22
Utility
Systems and methods for application integrated malicious behavior mitigation
14 Nov 23
Various embodiments discussed generally relate to securing applications that work across networks, and more particularly to systems and methods for mitigating malicious behavior integrated within an application that directly calls a separate cloud based malicious behavior mitigation system.
Pedro Miguel Paixao
Filed: 2 Dec 21