322 patents
Utility
Sequential Dual Machine Learning Models for Effective Cloud Detection Engines
18 Jan 24
The present application discloses a method, system, and computer system for detecting malicious files.
Yu Fu, Lei Xu, Jin Chen, Zhibin Zhang, Bo Qu, Stefan Achleitner
Filed: 12 Jul 22
Utility
Malicious C&C channel to fixed IP detection
18 Jan 24
Methods, apparatus and computer software products implement embodiments of the present invention that include protecting a computer system, by collecting information from data traffic transmitted between multiple local nodes on a private data network and public IP addresses corresponding to multiple remote nodes on a public data network.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 17 Jul 23
Utility
Network Attack Detection with Targeted Feature Extraction from Exploit Tools
18 Jan 24
The present application discloses a method, system, and computer system for detecting malicious SQL or command injection strings.
Zhibin Zhang, Jin Chen, Yu Fu, Stefan Achleitner, Bo Qu, Lei Xu
Filed: 12 Jul 22
Utility
Supply chain attack detection
11 Jan 24
Methods, storage systems and computer program products implement embodiments of the present invention that include identifying multiple host computers executing respective instances of a specific software application, each given instance on each given host computer including a set of program instructions loaded, by the host computer, from a respective storage device.
Yuval Zan, Erez Levy, Dor Agron, Yarom Dadon, Chen Evgi
Filed: 5 Jul 22
Utility
High Availability of Cloud-based Serivces with Address Translation
4 Jan 24
Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment.
Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
Filed: 12 Sep 23
Utility
Application Traffic Flow Prediction Based on Multi-stage Network Traffic Flow Scanning
28 Dec 23
In a network control plane, a pattern matching database is built and maintained for identifying an application or application level protocol.
Daphne Sang, Harish Patil
Filed: 15 Aug 22
Utility
5G Lan Security
28 Dec 23
Techniques for 5G LAN security in mobile networks are disclosed.
Leonid Burakovsky, Sachin Verma, Sree Koratala
Filed: 28 Jun 22
Utility
Cloud Native Virtual Machine Runtime Protection
28 Dec 23
A system and method for cloud native virtual machine (VM) runtime protection.
Liron Levin, John Morello, Dima Stopel, Michael Velbaum, Itay Abramowsky, Isaac Schnitzer
Filed: 11 Sep 23
Utility
Fast Policy Matching with Runtime Signature Update
21 Dec 23
Techniques for fast policy matching with runtime signature update are disclosed.
Chunqing Cai
Filed: 16 Jun 22
Utility
Securing Control and User Plane Separation In Mobile Networks
21 Dec 23
Techniques for securing control and user plane separation in mobile networks (e.g., service provider networks for mobile subscribers, such as for 4G/5G networks) are disclosed.
Leonid Burakovsky, Sachin Verma, Fengliang Hu, I-Chun Chen, How Tung Lim
Filed: 8 May 23
Utility
Detecting credentials abuse of cloud compute services
21 Dec 23
Methods, storage systems and computer program products implement embodiments of the present invention that include identifying a first autonomous system number (ASN) for a service hosted by a networked entity, and retrieving, from a log file, an entry corresponding to an access by a networked entity to the service and including an Internet Protocol (IP) address of the networked entity and an access token authorizing access to the service.
Dror Alon, Niv Sela, Or Kliger, Guy Arazi
Filed: 20 Jun 22
Utility
Whitelisting Clients Accessing Resources Via a Secure Web Gateway with Time-based One Time Passwords for Authentication
14 Dec 23
Each tenant of a secure web gateway (SWG) is issued a secret key.
Mohit Sahni
Filed: 17 Aug 23
Utility
Rendering Contextual Security Information Determined In-browser with Web Pages of Cloud and Saas Vendors
14 Dec 23
A browser extension produces a single view comprising content of web pages of a target vendor requested by a customer and corresponding security information for the target vendor maintained for the customer.
Krishnan Shankar Narayan
Filed: 9 Jun 22
Utility
Automatically Detecting Unknown Packers
30 Nov 23
Techniques for automatically detecting unknown packers are disclosed.
ChienHua Lu, Wenjun Hu
Filed: 25 May 22
Utility
Automatic and Dynamic Performance Benchmarking and Scoring of Applications Based on Crowdsourced Traffic Data
30 Nov 23
The disclosure describes various aspects of crowdsourcing traffic data for automatic and dynamic benchmarking of applications.
John Bothe, Hristos Siakou, Con Nikolouzakis
Filed: 10 Aug 23
Utility
Automated Matching of Vulnerability Data Between Vulnerability Feeds
30 Nov 23
A system has been designed that examines details of a security advisory against informal vulnerability records.
Ariel M. Zelivansky, Sharon Ben Zeev, Shaul Ben Hai, Liron Levin
Filed: 31 May 22
Utility
Policy Enforcement Using Host Information Profile
30 Nov 23
Embodiments of the present application relate to a method for policy enforcement, a system for policy enforcement, and a computer program product for policy enforcement.
Siu-Wang Leung, Song Wang, Yueh-Zen Chen
Filed: 2 Mar 23
Utility
Domain-independent Resource Security and Management
30 Nov 23
A resource database which stores structured data describing resources from a diverse array of origins (e.g., an application or cloud environment) is built and maintained to support querying, policy enforcement, and remediation of resources from any origin.
Angad Abhay Mehata, Chandra Biksheswaran Mouleeswaran, Varun Badhwar, Wayne Jens Jensen
Filed: 4 Aug 23
Utility
Efficient Virtual Machine Scanning
23 Nov 23
A system and method for scanning of virtual machine images.
Liron Levin, Eran Yanay, Gilad Astrin, Dima Stopel
Filed: 7 Aug 23
Utility
Automated Content Tagging with Latent Dirichlet Allocation of Contextual Word Embeddings
23 Nov 23
Dynamic content tags are generated as content is received by a dynamic content tagging system.
Nandan Gautam Thor, Vasiliki Arvaniti, Jere Armas Michael Helenius, Erik Michael Bower
Filed: 1 Aug 23