Docoh
Loading...

PANW Palo Alto Networks

GRANT
Utility
Dynamic per subscriber policy enablement for security platforms within service provider network environments
25 Jan 22
Techniques for dynamic per subscriber policy enablement for security platforms within service provider network environments are disclosed.
Mitchell Rappard, Leonid Burakovsky
Filed: 21 Jan 20
GRANT
Utility
Dynamic application firewall configuration for cloud native applications
18 Jan 22
To dynamically determine and apply WAF protections for an application deployed to the cloud, exposed entities, are identified.
Liron Levin, Isaac Schnitzer, Elad Shuster, Ory Segal
Filed: 4 Dec 20
APP
Utility
Identifying Security Risks and Enforcing Policies on Encrypted/encoded Network Communications
13 Jan 22
Network traffic collectively associated with a set of communications made between a client device and a respective first and second resource during a usage of a program executed on the client device is monitored.
Zhi Xu, Yangjie Chang, Cong Zheng
Filed: 23 Sep 21
APP
Utility
Detection of malicious C2 channels abusing social media sites
6 Jan 22
Methods, apparatuses and computer program products implement embodiments of the present invention that include protecting a computing device by specifying one or more Internet sites that are accessible by one or more computing devices that communicate over a data network and identifying process binaries that executed on the computing devices accessed and retrieved data from any of the specified one more Internet sites.
Jonathan Allon, Aviad Meyer, Tomer Schwartz
Filed: 1 Jul 20
GRANT
Utility
Focused URL recrawl
4 Jan 22
A website misclassification report is received, indicating that a website has been misclassified.
Lei Zhang, Lin Xu, Seokkyung Chung, Xunhua Tong
Filed: 28 Feb 17
GRANT
Utility
Security policy enforcement and visibility for network architectures that mask external source addresses
4 Jan 22
Some network architectures include perimeter or edge devices which perform network address translation or otherwise modify data in a network traffic packet header, such as the source address.
Thomas Arthur Warburton, Ashwath Sreenivasa Murthy, Jeffrey James Fitz-Gerald, Jr.
Filed: 30 Apr 19
APP
Utility
Securing Control and User Plane Separation In Mobile Networks
30 Dec 21
Techniques for securing control and user plane separation in mobile networks (e.g., service provider networks for mobile subscribers, such as for 4G/5G networks) are disclosed.
Leonid Burakovsky, Sachin Verma, Fengliang Hu, I-Chun Chen, How Tung Lim
Filed: 30 Jun 20
APP
Utility
Context for Malware Forensics and Detection
30 Dec 21
A malware profile is received.
Jun Wang, Wei Xu
Filed: 10 Sep 21
GRANT
Utility
Application-level sandboxing on devices
28 Dec 21
Execution of an application in an application-level sandbox is disclosed.
Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
Filed: 29 Nov 18
APP
Utility
Port scan detection using destination profiles
23 Dec 21
A method, including identifying, in network data traffic, a set of pairs of source and destination nodes, each pair having a given source node, a given destination node, and one or more ports accessed in the traffic between the nodes in each pair, and computing, for each pair, a respective baseline that indicates a first number of the ports that source nodes other than the given source node in the pair accessed on the given destination node during a first period.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 2 Sep 21
APP
Utility
Malicious port scan detection using source profiles
23 Dec 21
A method, including identifying, in network traffic during multiple periods, scans, each scan including an access of multiple ports on a given destination node by a given source node, and computing, for each given source in the scans, an average of destinations whose ports were accessed by the given source during any scan by the given source, and a fraction of periods when the given source accessed at least one of the destinations in at least one scan performed by the given source node.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 2 Sep 21
GRANT
Utility
Explorable visual analytics system having reduced latency
21 Dec 21
A method and system for processing datasets having a number of data points are described.
Seyed Amir Yahyavi Firouz Abadi, Saman Amirpour Amraii, Laleh Roosta Pour
Filed: 20 Dec 18
APP
Utility
Innocent Until Proven Guilty (Iupg): Adversary Resistant and False Positive Resistant Deep Learning Models
9 Dec 21
Techniques for providing innocent until proven guilty (IUPG) solutions for building and using adversary resistant and false positive resistant deep learning models are disclosed.
Brody James Kutt, Oleksii Starov, Yuchen Zhou, William Redington Hewlett, II
Filed: 26 May 21
GRANT
Utility
Logical identification of malicious threats across a plurality of end-point devices
7 Dec 21
A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network, comprising collecting over the network an identifier associated with each file of a plurality of files, wherein each file of the plurality of files is installed on at least one of the plurality of EPDs and wherein the identifier is the same for each like file of the plurality of file.
Gil Barak
Filed: 21 Jun 18
GRANT
Utility
Simulating user interactions for malware analysis
7 Dec 21
Simulating user interactions during dynamic analysis of a sample is disclosed.
Brandon R. Young, Daniel Raygoza, Sebas Sujeen Reymond Johnson, Abhiroop Dabral
Filed: 13 Sep 19
APP
Utility
Automating Iot Device Identification Using Statistical Payload Fingerprints
2 Dec 21
Internet of Things (IoT) device classification is disclosed.
Feng Wang
Filed: 23 Dec 20
APP
Utility
Method for Distributed Application Segmentation Through Authorization
2 Dec 21
Methods and supporting systems for managing secure communications and establishing authenticated communications between processes of a computer application operating across network domains are provided.
Dimitri Styliadis, Satyam Sinha
Filed: 17 May 21
APP
Utility
Reducing Memory Footprint after TLS Connection Establishment
2 Dec 21
For connection establishment, a system allocates memory that will be occupied by the data and handshake sub-protocol infrastructure that facilitates establishing a TLS connection.
Mohit Sahni, Saurabh Tripathi
Filed: 29 May 20
APP
Utility
Iot Device Discovery and Identification
2 Dec 21
Techniques for performing Internet of Things (IoT) device identification are disclosed.
Jun Du, Yilin Zhao
Filed: 20 Jul 21
GRANT
Utility
Identifying security risks and enforcing policies on encrypted/encoded network communications
30 Nov 21
Network traffic associated with a communication between a client device and a resource is monitored.
Zhi Xu, Yangjie Cheng, Cong Zheng
Filed: 28 Feb 18
Patents are sorted by USPTO publication date, most recent first