322 patents
Page 7 of 17
Utility
Automated Orchestration of Large-scale Flow Log Transformation
17 Nov 22
When a transformation job of flow logs generated for a cloud environment is triggered, a security service determines a parameterized template for batch data processing operations offered by the cloud service provider (CSP) to use based on the type of transformation job.
Krishnan Shankar Narayan
Filed: 1 Aug 22
Utility
Automated Clustering of Sessions of Unstructured Traffic
17 Nov 22
A natural language processor extracts features from batches of unstructured traffic.
Stefan Achleitner
Filed: 17 May 21
Utility
Pattern-based Malicious Url Detection
17 Nov 22
To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository.
Fang Liu, Yuchen Zhou, Jun Wang
Filed: 7 Jul 22
Utility
Whitelisting Clients Accessing Resources Via a Secure Web Gateway with Time-based One Time Passwords for Authentication
10 Nov 22
Each tenant of a secure web gateway (SWG) is issued a secret key.
Mohit Sahni
Filed: 7 May 21
Utility
Using Browser Context In Evasive Web-based Malware Detection
10 Nov 22
The use of browser context in detecting malware is disclosed.
Tongbo Luo, Xin Ouyang, Zhaoyan Xu, Xing Jin
Filed: 21 Jul 22
Utility
Distributed Offload Leveraging Different Offload Devices
3 Nov 22
Techniques for distributed offload leveraging different offload devices are disclosed.
John Edward McDowall, James Sugg, Charles Bransi
Filed: 30 Apr 21
Utility
Intelligent Signature-based Anti-cloaking Web Recrawling
27 Oct 22
Web sites are crawled using multiple browser profiles to avoid malicious cloaking.
Oleksii Starov, Zhanhao Chen, Yuchen Zhou, Fang Liu
Filed: 12 Jul 22
Utility
Mitigating Multiple Authentications for a Geo-distributed Security Service Using an Authentication Cache
20 Oct 22
Mitigating multiple authentications for a geo-distributed security service is disclosed.
Suraj Kumar Jaiswal, Krishna Murthy Pokuri, Manish Pathak, Aditya Srinivasa Ivaturi
Filed: 13 Sep 21
Utility
Securing Application Behavior In Serverless Computing
13 Oct 22
A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.
Ory Segal, Yuri Shapira, Avraham Shulman, Benny Nissimov, Shaked Zin
Filed: 20 Jun 22
Utility
Dynamic Path Selection and Data Flow Forwarding
13 Oct 22
Various techniques for dynamic path selection and data flow forwarding are disclosed.
Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy
Filed: 29 Apr 22
Utility
Increased Coverage of Application-based Traffic Classification with Local and Cloud Classification Services
13 Oct 22
A cloud-based traffic classification engine maintains a catalog of application-based traffic classes which have been developed based on known applications, and a local traffic classification engine maintains a subset of these classes.
Mengying Jiang, Shengming Xu, Menglan Fang, Ho Yu Lam
Filed: 26 Aug 21
Utility
Generation of a Causality Tree Representation of Threat Analysis Report Data
6 Oct 22
A report generated from analysis of a software sample is obtained and parsed.
Swati Vaibhav Bhosale, Eyal Firstenberg, Edward Thomas Spencer, Christopher Jacobs
Filed: 31 Mar 21
Utility
Iot Device Application Workload Capture
6 Oct 22
Internet of Things (IoT) device application workload capture is disclosed.
Jun Du
Filed: 31 Mar 21
Utility
Domain-independent Resource Security and Management
6 Oct 22
A resource database which stores structured data describing resources from a diverse array of origins (e.g., an application or cloud environment) is built and maintained to support querying, policy enforcement, and remediation of resources from any origin.
Angad Abhay Mehata, Chandra Biksheswaran Mouleeswaran, Varun Badhwar, Wayne Jens Jensen
Filed: 5 Apr 21
Utility
Hierarchical Scanning of Internet Connected Assets
6 Oct 22
Hierarchical scanning begins with communicating probes over the Internet to ports and networks addresses to determine publicly accessible devices.
Connor Leete Gilbert, Michael Haggblade
Filed: 2 Mar 22
Utility
Feedback Mechanism to Enforce a Security Policy
6 Oct 22
Techniques for providing a feedback mechanism to enforce a security policy are provided.
Zhou Olivier Zheng
Filed: 30 Mar 21
Utility
Analyzing Multiple Cpu Architecture Malware Samples
29 Sep 22
A sample is received for analysis.
Zihang Xiao, Cong Zheng, ChienHua Lu
Filed: 10 Jun 22
Utility
Iot Device Risk Assessment and Scoring
29 Sep 22
Techniques for establishing a risk score for Internet of Things (IoT) device parameters and acting in response thereto are disclosed.
Jun Du
Filed: 14 Jun 22
Utility
Packet Classification for Network Routing
29 Sep 22
Techniques for packet classification for network routing are disclosed.
Nir Zuk, Marc Joseph Benoit
Filed: 14 Jun 22
Utility
Software Package Analysis for Detection of Malicious Properties
1 Sep 22
A system facilitates detection of malicious properties of software packages.
Ory Segal, Yuri Shapira, Avraham Shulman, Benny Nissimov, Shaked Yosef Zin
Filed: 20 May 22