322 patents
Page 2 of 17
Utility
Firewall Switchover with Minimized Traffic Disruption
16 Nov 23
A pseudo-active/active firewall configuration handles firewall switchover events without traffic disruption.
Tapraj Singh, Nazanin Magharei, Rimu Bhardwaj, Harshavardhan Parandekar, Vikram Guleria
Filed: 13 May 22
Utility
Firewall Switchover with Minimized Session Disconnection
16 Nov 23
A pseudo-active/active firewall configuration handles firewall switchover events with minimized session disconnection.
Tapraj Singh, Harshavardhan Parandekar, Nazanin Magharei, Rimu Bhardwaj, Vikram Guleria
Filed: 13 May 22
Utility
Pattern Match-based Detection In Iot Security
16 Nov 23
Techniques for providing Internet of Things (IoT) security are disclosed.
Jun Du, Mei Wang, Hector Daniel Regalado, Jianhong Xia
Filed: 25 Jul 23
Utility
Identify and Block Domains Used for Nxns-based Ddos Attack
16 Nov 23
Techniques for identifying and blocking domains used for NXNS-based distributed denial of service (DDos) attacks are disclosed.
Ruian Duan, Daiping Liu
Filed: 27 May 22
Utility
Securing Application Behavior In Serverless Computing
9 Nov 23
A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.
Ory Segal, Yuri Shapira, Avraham Shulman, Benny Nissimov, Shaked Zin
Filed: 17 Jul 23
Utility
System and Method for Locating Dga Compromised Ip Addresses
9 Nov 23
A system and method for locating DGA compromised IP addresses is provided.
Weihan Jiang, David Qianshan He, Xuya Jiang
Filed: 3 May 22
Utility
Content-based Deep Learning for Inline Phishing Detection
2 Nov 23
An inline and offline machine learning pipeline for detection of phishing attacks with a holistic, easily upgradeable framework is presented herein.
Lucas Mingyuan Hu, Seokkyung Chung, Jingwei Fan, Wei Wang, Brody James Kutt, William Redington Hewlett, II
Filed: 29 Apr 22
Utility
Communicating Url Categorization Information
2 Nov 23
A URL categorization query is received.
Dao-Chen Zheng, Wei Cao, William Redington Hewlett, II, Shangde Zhou
Filed: 10 Jul 23
Utility
Optimized Adaptive Pooling Layer Hyperparameters for Variably Sized Inputs
2 Nov 23
Adaptive pooling layers for compressing variably sized inputs use window sizes and stride lengths specific to variable input size and fixed output size at the pooling layer.
Brody James Kutt, William Redington Hewlett, II
Filed: 29 Apr 22
Utility
Firewall Load Balancing with Tunnel Switching Protocols
26 Oct 23
An auto scale monitoring service performs load balancing on a cloud firewall with minimized traffic disruption using eager and lazy load balancing protocols.
Avaneesh Anandrao Kadam, Bhaskar Bhupalam, Ketan Gunawant Kulkarni
Filed: 21 Apr 22
Utility
Detecting Microsoft .Net Malware Using Machine Learning on .Net Structure
26 Oct 23
The present application discloses a method, system, and computer system for detecting malicious .NET files.
Akshata Krishnamoorthy Rao, Yaron Samuel, Dominik Reichel, Robert Jung
Filed: 26 Apr 22
Utility
Detection of User Anomalies for Software As a Service Application Traffic with High and Low Variance Feature Modeling
26 Oct 23
Low variance clustering models and high variance clustering models comprising low and high variance features of user Software as a Service application traffic detect anomalous user behavior and, when risk thresholds are exceeded, trigger behavioral alerts.
Muhammad Aurangzeb Akhtar
Filed: 21 Apr 22
Utility
Combination Rule Mining for Malware Signature Generation
26 Oct 23
Malware signature generation through combination rule mining is disclosed.
Min Du, Wenjun Hu, William Redington Hewlett, II
Filed: 30 Jun 23
Utility
Application Identification for Phishing Detection
26 Oct 23
Techniques for application identification for phishing detection are disclosed.
Rongbo Shao, Bo Qu, Zhanglin He, Shengming Xu, Amy Lee
Filed: 26 Apr 22
Utility
Detecting Phishing PDFS with an Image-based Deep Learning Approach
26 Oct 23
The detection of phishing Portable Document Format (PDF) files using an image-based deep learning approach is disclosed.
Min Du, Hao Huang, Curtis Leland Carmony, Wenjun Hu, Daniel Raygoza, Tyler Pals Halfpop, Jeff White, Esmid Idrizovic
Filed: 2 May 22
Utility
Application-level Sandboxing on Devices
26 Oct 23
Execution of an application in an application-level sandbox is disclosed.
Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
Filed: 12 May 23
Utility
Malware Detection for Documents with Deep Mutual Learning
26 Oct 23
The detection of malicious documents using deep mutual learning is disclosed.
Min Du, Curtis Leland Carmony, Wenjun Hu
Filed: 29 Jun 22
Utility
Malware Detection for Documents Using Knowledge Distillation Assisted Learning
26 Oct 23
The detection of malicious documents using knowledge distillation assisted learning is disclosed.
Min Du, Curtis Leland Carmony, Wenjun Hu
Filed: 29 Jun 22
Utility
Infrastructure as code resource definition correction system
19 Oct 23
A method, including accessing a corpus or infrastructure as code modules including respective resource definitions for provisioning and deploying a plurality of computing resources configured to execute one or more software applications.
Tohar Zand, Nimrod Kor, Rotem Avni, Naor David, Ariel Kruszyn
Filed: 18 Apr 22
Utility
In-line Detection of Algorithmically Generated Domains
19 Oct 23
Detection of algorithmically generated domains is disclosed.
Daiping Liu, Martin Walter, Ben Hua, Suquan Li, Fan Fei, Seokkyung Chung, Jun Wang, Wei Xu
Filed: 21 Jun 23