613 patents
Page 5 of 31
Utility
Method and System for Automatically Generating Malware Signature
28 Sep 23
Automatic generation of a malware signature is disclosed.
Yang Ji, Tyler Pals Halfpop, Zihang Xiao, Wenjun Hu
Filed: 7 Feb 22
Utility
Automatic and dynamic performance benchmarking and scoring of applications based on crowdsourced traffic data
26 Sep 23
The disclosure describes various aspects of crowdsourcing traffic data for automatic and dynamic benchmarking of applications.
John Bothe, Hristos Siakou, Con Nikolouzakis
Filed: 3 Apr 20
Utility
Maintaining communications in a failover instance via network address translation
26 Sep 23
Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment.
Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
Filed: 15 Feb 22
Utility
Cobalt strike beacon HTTP C2 heuristic detection
26 Sep 23
Techniques for Cobalt Strike Beacon HTTP C2 heuristic detection are disclosed.
Yanhui Jia, Christian Elihu Navarrete Discua, Durgesh Madhavrao Sangvikar, Ajaya Neupane, Yu Fu, Shengming Xu
Filed: 29 Jul 22
Utility
Port scan detection using destination profiles
26 Sep 23
A method, including identifying, in network data traffic, a set of pairs of source and destination nodes, each pair having a given source node, a given destination node, and one or more ports accessed in the traffic between the nodes in each pair, and computing, for each pair, a respective baseline that indicates a first number of the ports that source nodes other than the given source node in the pair accessed on the given destination node during a first period.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 2 Sep 21
Utility
Malicious port scan detection using source profiles
26 Sep 23
A method, including identifying, in network traffic during multiple periods, scans, each scan including an access of multiple ports on a given destination node by a given source node, and computing, for each given source in the scans, an average of destinations whose ports were accessed by the given source during any scan by the given source, and a fraction of periods when the given source accessed at least one of the destinations in at least one scan performed by the given source node.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 2 Sep 21
Utility
Domain-independent resource security and management
26 Sep 23
A resource database which stores structured data describing resources from a diverse array of origins (e.g., an application or cloud environment) is built and maintained to support querying, policy enforcement, and remediation of resources from any origin.
Angad Abhay Mehata, Chandra Biksheswaran Mouleeswaran, Varun Badhwar, Wayne Jens Jensen
Filed: 5 Apr 21
Utility
Enforcing a Dynamically Modifiable Geofence Based on Conditions of a Cellular Network
21 Sep 23
A geofencing service establishes an initial geofence for monitoring devices connected to a cellular network.
Arun Athrey Chandrasekaran, Avaneesh Anandrao Kadam
Filed: 21 Mar 22
Utility
Browser storage for clientless VPN
19 Sep 23
A native web storage function call is received at a client device.
Qi Zhang, Jiangxia Liu
Filed: 23 Sep 20
Utility
Automated content tagging with latent dirichlet allocation of contextual word embeddings
19 Sep 23
Dynamic content tags are generated as content is received by a dynamic content tagging system.
Nandan Gautam Thor, Vasiliki Arvaniti, Jere Armas Michael Helenius, Erik Michael Bower
Filed: 25 Feb 20
Utility
Whitelisting clients accessing resources via a secure web gateway with time-based one time passwords for authentication
19 Sep 23
Each tenant of a secure web gateway (SWG) is issued a secret key.
Mohit Sahni
Filed: 7 May 21
Utility
Securely publishing applications from private networks
12 Sep 23
A controller can securely publish an application of a tenant by securely extending a network fabric into the networks of the tenant with virtual private networks and NAT.
Jayant Jain, Brian Russell Kean, Aditya Srinivasa Ivaturi, Mohit Sahni, Mingfei Peng
Filed: 1 Dec 22
Utility
Smart proxy for a large scale high-interaction honeypot farm
12 Sep 23
Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are disclosed.
Zihang Xiao, Cong Zheng, Jiangxia Liu
Filed: 13 Jan 22
Utility
Large scale high-interactive honeypot farm
12 Sep 23
Techniques for providing a large scale high-interaction honeypot farm are disclosed.
Zihang Xiao, Cong Zheng, Jiangxia Liu
Filed: 13 Jan 22
Utility
Explorable visual analytics system having reduced latency in loading data
5 Sep 23
A method and system for processing datasets having a number of data points are described.
Seyed Amir Yahyavi Firouz Abadi, Saman Amirpour Amraii, Laleh Roosta Pour
Filed: 29 Apr 21
Utility
Communicating URL categorization information
5 Sep 23
A URL categorization query is received.
Dao-Chen Zheng, Wei Cao, William Redington Hewlett, II, Shangde Zhou
Filed: 16 Aug 19
Utility
Multi-access edge computing services security in mobile networks by parsing application programming interfaces
5 Sep 23
Techniques for providing multi-access edge computing (MEC) services security in mobile networks (e.g., service provider networks for mobile subscribers, such as for 5G networks) by parsing Application Programming Interfaces (APIs) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 13 Apr 22
Utility
Flow metadata exchanges between network and security functions for a security service
5 Sep 23
Techniques for providing flow meta data exchanges between network and security functions for a security service are disclosed.
Anand Oswal, Arivu Mani Ramasamy, Bhaskar Bhupalam, Shu Lin
Filed: 14 Jul 21
Utility
Detecting Malicious Activity on an Endpoint Based on Real-time System Events
31 Aug 23
Techniques for detecting malicious activity on an endpoint based on real-time system events are disclosed.
Roni Moshitzky, Elad Wexler, Marat Khousid, Guy Pilosof
Filed: 2 May 23
Utility
Multi-layered Policy Management
31 Aug 23
Techniques for enforcing policy on multiple levels are disclosed.
Jun Du
Filed: 3 May 23