322 patents
Page 8 of 17
Utility
Context Profiling for Malware Detection
1 Sep 22
Analysis of samples for maliciousness is disclosed.
Jun Wang, Wei Xu
Filed: 11 Feb 22
Utility
Application Layer Signaling Security with Next Generation Firewall
25 Aug 22
Techniques for application layer signaling security with next generation firewall are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 9 Feb 22
Utility
Reduction and Acceleration of a Deterministic Finite Automaton
25 Aug 22
Techniques for reduction and acceleration of a deterministic finite automaton (DFA) are disclosed.
Subramani Ganesh, Sidong Li, Lei Chang
Filed: 10 May 22
Utility
Automated Extraction and Classification of Malicious Indicators
25 Aug 22
Techniques for generating actionable indicators of compromise (IOCs) are disclosed.
Janos Szurdi, Daiping Liu, Jun Wang
Filed: 25 Feb 21
Utility
Software Packer-agnostic Unpacking of Packed Executables
18 Aug 22
To unpack packed executables generated with a packer or packing technique that cannot be identified, a universal unpacker unpacks the executable by running the packed executable in a controlled environment and monitoring execution of the program code which unpacks the executable and memory accessed as a result.
James Thomas Fitzgerald
Filed: 12 Feb 21
Utility
Dynamic Path Selection and Data Flow Forwarding
18 Aug 22
Various techniques for dynamic path selection and data flow forwarding are disclosed.
Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy
Filed: 6 May 22
Utility
Iot Device Risk Assessment
11 Aug 22
A first device governs operation of a second device based on a network security risk posed by the second device.
Gong Cheng, Mayuresh Ektare, Mei Wang
Filed: 26 Apr 22
Utility
Execution Behavior Analysis Text-based Ensemble Malware Detector
11 Aug 22
A malware detector has been designed that uses a combination of NLP techniques on dynamic malware analysis reports for malware classification of files.
Sujit Rokka Chhetri, William Redington Hewlett, II
Filed: 10 Feb 21
Utility
Specific File Detection Baked into Machine Learning Pipelines
4 Aug 22
A set of features including a first feature and a second feature is received at a server.
William Redington Hewlett, II, Anirudh Mittal, Ashwin Kumar Dewan, Tyler Pals Halfpop
Filed: 24 Jan 22
Utility
Multi-access Edge Computing Services Security In Mobile Networks by Parsing Application Programming Interfaces
4 Aug 22
Techniques for providing multi-access edge computing (MEC) services security in mobile networks (e.g., service provider networks for mobile subscribers, such as for 5G networks) by parsing Application Programming Interfaces (APIs) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 13 Apr 22
Utility
Combination Rule Mining for Malware Signature Generation
4 Aug 22
Malware signature generation through combination rule mining is disclosed.
Min Du, Wenjun Hu, William Redington Hewlett, II
Filed: 30 Jun 21
Utility
Security Appliance to Monitor Networked Computing Environment
28 Jul 22
A security appliance is used to evaluate the software defined infrastructure.
Chandra Mouleeswaran, Wayne Jensen
Filed: 11 Apr 22
Utility
Joining Javascript Object Notation (Json) Queries Across Cloud Resources
21 Jul 22
A cloud resource join query for join operations across cloud resources is parsed to extract join rules and queries to each cloud resource in the cloud resource join query.
Chandra Biksheswaran Mouleeswaran, Rama Teja Repaka, Xiaoyan Wang, Parul Shukla
Filed: 20 Jan 21
Utility
Autoscaling of Data Processing Computing Systems Based on Predictive Queue Length
14 Jul 22
To enhance the scaling of data processing systems in a computing environment, a number of data objects indicated in an allocation queue and a first attribute of the allocation queue are determined, where the allocation queue is accessible to a plurality of data processing systems.
Philip Simon Tuffs
Filed: 13 Jan 22
Utility
Malware Detection Using Watermark Cookies
14 Jul 22
Techniques for malware detection using watermark cookies are disclosed.
Zhaoyan Xu, Wei Xu, Kyle Sanders
Filed: 31 Mar 22
Utility
Dynamically Scalable Application Firewall Deployment for Cloud Native Applications
30 Jun 22
A configuration of a cloud application exposed via a public IP address is duplicated with modifications to include a private IP address to expose the application internally.
Liron Levin, Isaac Schnitzer, Elad Shuster, Ory Segal
Filed: 31 Dec 20
Utility
Security for Cellular Internet of Things In Mobile Networks Based on Subscriber Identity and Application Identifier
23 Jun 22
Techniques for providing security for Cellular Internet of Things (CIoT) in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky, Jesse C. Shu, Lei Chang
Filed: 8 Mar 22
Utility
Evaluation of Javascript Object Notation (Json) Queries with First-order Logic Using Context-free Grammar
16 Jun 22
A JavaScript Object Notation (“JSON”) query parser parses cloud database JSON queries with first order logic.
Chandra Biksheswaran Mouleeswaran, Kasiviswanathan Annamalai
Filed: 16 Dec 20
Utility
Mobile Equipment Identity And/or Iot Equipment Identity and Application Identity Based Security Enforcement In Service Provider Networks
16 Jun 22
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky, Jesse C. Shu, Chang Li
Filed: 7 Mar 22
Utility
Dynamic Application Firewall Configuration for Cloud Native Applications
9 Jun 22
To dynamically determine and apply WAF protections for an application deployed to the cloud, exposed entities, are identified.
Liron Levin, Isaac Schnitzer, Elad Shuster, Ory Segal
Filed: 30 Dec 21