212 patents
Page 5 of 11
Utility
Multi-tiered sandbox based network threat detection
10 May 22
Systems and methods for multi-tiered sandbox based network threat detection are provided.
Michael F. Chalmandrier-Perna
Filed: 30 Dec 19
Utility
Virtual routing and forwarding (VRF)-aware socket
10 May 22
Systems and methods for a VRF-aware socket are provided.
Yixin Pan
Filed: 21 Dec 18
Utility
Accelerating data communication using tunnels
10 May 22
Methods and systems are provided for increasing application performance and accelerating data communications in a WAN environment.
Wenping Luo, Hongwei Li, Yixin Pan, Tao Huang
Filed: 14 Sep 17
Utility
TCP (transmission control protocol) fast open for classification acceleration of cache misses in a network processor
10 May 22
A packet parser generates a key from TCP metadata of a data packet for a specific session.
Shushan Wen
Filed: 12 Aug 20
Utility
Cooperative access points for quality of service (QoS) requirements in wireless local access networking (WLAN)
10 May 22
For QoS (quality of service) requirements of a session at a first access point and a wireless station, a cost function value is calculated for the specific session based on a number of network packets to be processed in the queue and the identified QoS requirement.
Ravikiran Mahamkali
Filed: 27 Sep 19
Utility
Increasing access point throughput by exceeding A-MPDU buffer size limitation in a 802.11 compliant station
10 May 22
An 802.11-compliant device for high throughput is disclosed.
Mohan Ram, Sung-Wook Han
Filed: 27 Jun 16
Utility
Dynamic establishment of application-specific network tunnels between network devices by an SDWAN controller
10 May 22
Systems and methods for dynamically establishing network overlay tunnels between edges within different groups of a network architecture are provided.
Wei Zhang
Filed: 12 Mar 20
Utility
Avoiding asymetric routing in an SDWAN by dynamically setting BGP attributes within routing information advertised by an SDWAN appliance
10 May 22
Systems and methods are described for automatically controlling network routing between downstream side and upstream side of a communication network to enforce symmetric routing.
Shangwei Duan, Xin Gu
Filed: 26 Mar 20
Utility
Detecting malicious web pages by analyzing elements of hypertext markup language (HTML) files
10 May 22
Systems and methods are described for detecting compromised web pages and domains by analyzing of elements of hypertext markup language (HTML) files of a domain.
Haitao Li
Filed: 25 Sep 19
Utility
Detecting data exfiltration using machine learning on personal e-mail account display names
10 May 22
An e-mail application is identified by parsing a network packet from the network packets.
Carl Mark Windsor
Filed: 21 Dec 19
Utility
Providing a secure communication channel between kernel and user mode components
26 Apr 22
Systems and methods for implementing a secure communication channel between kernel and user mode components are provided.
Udi Yavo, Roy Katmor, Ido Kelson
Filed: 5 Mar 20
Utility
Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution
26 Apr 22
Methods and systems for a two-stage attribution of application layer DDoS attack are provided.
Hemant Kumar Jain
Filed: 8 May 18
Utility
Breached website detection and notification
19 Apr 22
System and methods for a cloud-based approach to breached website detection and notification as a security service are provided.
Sameer Kumar Vasanthapuram
Filed: 19 Mar 19
Utility
AI-DFS (artificial intelligence enabled dynamic frequency selection) for steering downgraded wireless stations on 160 MHz bandwidth supported wireless data communication networks
5 Apr 22
A station with a 160 MHz channel connection at a first access point is downgraded by an access point in response to being displaced off of a channel status changing to NOP (non occupancy period).
Srinivasa Subbarao Neeli, Sudheer Nagurla
Filed: 13 Sep 20
Utility
Automatic tagging of cloud resources for implementing security policies
29 Mar 22
Systems and methods for automatically tagging cloud resources that are spread across multiple cloud platforms are provided.
Ignacio Franzoni Martinez, Joan Ruiz Sanchez
Filed: 30 Jun 20
Utility
Mitigating malware impact by utilizing sandbox insights
15 Mar 22
Systems and methods for mitigating the impact of malware by reversing malware related modifications in a computing device are provided.
Udi Yavo, Roy Katmor, Ido Kelson
Filed: 10 Dec 19
Utility
Automated testing of network security policies against a desired set of security controls
1 Mar 22
Systems and methods for automated testing of network security controls are provided.
Eric C. Hastings
Filed: 18 Sep 17
Utility
Fan vibration damping devices, systems and/or methods
22 Feb 22
Vibration damping devices and methods utilizing the same for damping vibrations in a fan.
Zhi Hon Yang, Shenghua Jiang, Keqin Chen
Filed: 19 Sep 16
Utility
Conditional hardware acceleration of secure forward error correction (FEC) processing
15 Feb 22
It is determined whether hardware acceleration is available for the incoming data packet.
Benzheng Xiao, Xudong Li, Mingxing Nan
Filed: 31 Mar 20
Utility
System and methods for detection of cryptoware
8 Feb 22
A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.
Udi Yavo, Tomer Bitton, Ido Kelson, Gregory Messerman
Filed: 11 Dec 17