613 patents
Page 3 of 31
Utility
Identification of malicious domain campaigns using unsupervised clustering
14 Nov 23
The technology presented herein enables the use of a clustering algorithm to identify additional malicious domains based on known malicious domains.
Michael Edward Weber, Jun Wang, Yuchen Zhou, Wei Xu
Filed: 12 Jul 18
Utility
Reducing memory footprint after TLS connection establishment
14 Nov 23
For connection establishment, a system allocates memory that will be occupied by the data and handshake sub-protocol infrastructure that facilitates establishing a TLS connection.
Mohit Sahni, Saurabh Tripathi
Filed: 29 May 20
Utility
Securing Application Behavior In Serverless Computing
9 Nov 23
A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.
Ory Segal, Yuri Shapira, Avraham Shulman, Benny Nissimov, Shaked Zin
Filed: 17 Jul 23
Utility
System and Method for Locating Dga Compromised Ip Addresses
9 Nov 23
A system and method for locating DGA compromised IP addresses is provided.
Weihan Jiang, David Qianshan He, Xuya Jiang
Filed: 3 May 22
Utility
Data blaming
7 Nov 23
A copy of a model comprising a plurality of trees is received, as is a copy of training set data comprising a plurality of training set examples.
William Redington Hewlett, II, Seokkyung Chung, Lin Xu
Filed: 6 Aug 22
Utility
Packet classification for network routing
7 Nov 23
Techniques for packet classification for network routing are disclosed.
Nir Zuk, Marc Joseph Benoit
Filed: 14 Jun 22
Utility
Malicious C and C channel to fixed IP detection
7 Nov 23
Methods, apparatus and computer software products implement embodiments of the present invention that include protecting a computer system, by collecting information from data traffic transmitted between multiple local nodes on a private data network and public IP addresses corresponding to multiple remote nodes on a public data network.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 24 Feb 20
Utility
Content-based Deep Learning for Inline Phishing Detection
2 Nov 23
An inline and offline machine learning pipeline for detection of phishing attacks with a holistic, easily upgradeable framework is presented herein.
Lucas Mingyuan Hu, Seokkyung Chung, Jingwei Fan, Wei Wang, Brody James Kutt, William Redington Hewlett, II
Filed: 29 Apr 22
Utility
Communicating Url Categorization Information
2 Nov 23
A URL categorization query is received.
Dao-Chen Zheng, Wei Cao, William Redington Hewlett, II, Shangde Zhou
Filed: 10 Jul 23
Utility
Optimized Adaptive Pooling Layer Hyperparameters for Variably Sized Inputs
2 Nov 23
Adaptive pooling layers for compressing variably sized inputs use window sizes and stride lengths specific to variable input size and fixed output size at the pooling layer.
Brody James Kutt, William Redington Hewlett, II
Filed: 29 Apr 22
Utility
Location based security in service provider networks
31 Oct 23
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky, Jesse C. Shu, Chang Li
Filed: 29 Apr 21
Utility
Firewall Load Balancing with Tunnel Switching Protocols
26 Oct 23
An auto scale monitoring service performs load balancing on a cloud firewall with minimized traffic disruption using eager and lazy load balancing protocols.
Avaneesh Anandrao Kadam, Bhaskar Bhupalam, Ketan Gunawant Kulkarni
Filed: 21 Apr 22
Utility
Detecting Microsoft .Net Malware Using Machine Learning on .Net Structure
26 Oct 23
The present application discloses a method, system, and computer system for detecting malicious .NET files.
Akshata Krishnamoorthy Rao, Yaron Samuel, Dominik Reichel, Robert Jung
Filed: 26 Apr 22
Utility
Detection of User Anomalies for Software As a Service Application Traffic with High and Low Variance Feature Modeling
26 Oct 23
Low variance clustering models and high variance clustering models comprising low and high variance features of user Software as a Service application traffic detect anomalous user behavior and, when risk thresholds are exceeded, trigger behavioral alerts.
Muhammad Aurangzeb Akhtar
Filed: 21 Apr 22
Utility
Combination Rule Mining for Malware Signature Generation
26 Oct 23
Malware signature generation through combination rule mining is disclosed.
Min Du, Wenjun Hu, William Redington Hewlett, II
Filed: 30 Jun 23
Utility
Application Identification for Phishing Detection
26 Oct 23
Techniques for application identification for phishing detection are disclosed.
Rongbo Shao, Bo Qu, Zhanglin He, Shengming Xu, Amy Lee
Filed: 26 Apr 22
Utility
Detecting Phishing PDFS with an Image-based Deep Learning Approach
26 Oct 23
The detection of phishing Portable Document Format (PDF) files using an image-based deep learning approach is disclosed.
Min Du, Hao Huang, Curtis Leland Carmony, Wenjun Hu, Daniel Raygoza, Tyler Pals Halfpop, Jeff White, Esmid Idrizovic
Filed: 2 May 22
Utility
Application-level Sandboxing on Devices
26 Oct 23
Execution of an application in an application-level sandbox is disclosed.
Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
Filed: 12 May 23
Utility
Malware Detection for Documents with Deep Mutual Learning
26 Oct 23
The detection of malicious documents using deep mutual learning is disclosed.
Min Du, Curtis Leland Carmony, Wenjun Hu
Filed: 29 Jun 22
Utility
Malware Detection for Documents Using Knowledge Distillation Assisted Learning
26 Oct 23
The detection of malicious documents using knowledge distillation assisted learning is disclosed.
Min Du, Curtis Leland Carmony, Wenjun Hu
Filed: 29 Jun 22