262 patents
Page 11 of 14
Utility
Identifying a Denial-of-Service Attack in a Cloud-Based Proxy Service
7 Oct 20
A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud-based proxy service; and responsive to determining that there are a plurality of domains that resolve to that IP address, identifying the one of the plurality of domains that is the target of the DoS attack.
Lee Hahn Holloway, Srikanth N. Rao, Matthew Browning Prince, Matthieu Philippe François Tourne, Ian Gerald Pye, Ray Raymond Bejjani, Terry Paul Rodery, JR.
Filed: 24 Feb 20
Utility
Third Party Validation of Web Content
7 Oct 20
A client network application transmits a request for a network resource to a server.
Dane Orion Knecht
Filed: 22 Jun 20
Utility
Method and apparatus for reducing network resource transmission size using delta compression
5 Oct 20
A method and computing device for delta compression techniques for reducing network resource transmission size are described.
John Graham-Cumming
Filed: 16 Jun 19
Utility
Validating Firewall Rules Using Data at Rest
30 Sep 20
A control server receives configuration data from a domain owner device associated with a domain owner of a resource, where the resource is hosted by an origin server.
Alex CRUZ FARMER, Andrew GALLONI
Filed: 28 Mar 19
Utility
Server-side Resource Prioritization
30 Sep 20
A process for prioritizing content responses executed by a first server in a distributed cloud platform.
Patrick MEENAN, Dane Orion KNECHT
Filed: 26 Mar 19
Utility
Virtual Private Network (VPN) Whose Traffic Is Intelligently Routed
30 Sep 20
A request is received from a client device over a Virtual Private Network (VPN) tunnel.
Christopher Philip Branch, Naga Sunil Tripirineni, Rustam Xing Lalkaka, Nick Wondra, Mohd Irtefa, Matthew Browning Prince, Andrew Taylor Plunk, Oliver Yu, Vlad Krasnov
Filed: 30 Mar 20
Utility
Mobile Application Accelerator
30 Sep 20
Techniques for providing mobile device content delivery acceleration for mobile applications are discussed herein.
Jeff Sesung Kim, Junho Choi, Sang Jo Lee, Young Keun Park, Tianyu Shi
Filed: 14 Jun 20
Utility
Secure session capability using public-key cryptography without access to the private key
28 Sep 20
A first server receives a set of cryptographic parameters from a second server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Albertus Strasheim
Filed: 11 Oct 18
Utility
Certificate authority framework
28 Sep 20
A server receives a single certificate signature request from a requestor and determines that the requestor is authorized for a certificate corresponding to the single certificate signature request.
Lee Hahn Holloway, Nicholas Thomas Sullivan
Filed: 7 Jul 16
Utility
Secure session capability using public-key cryptography without access to the private key
21 Sep 20
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Albertus Strasheim
Filed: 11 Nov 18
Utility
Methods and Apparatuses for Providing Internet-based Proxy Services
16 Sep 20
A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers.
Lee Hahn Holloway, Matthew Browning Prince, Ian Gerald Pye, Matthieu Philippe François Tourne, Michelle Marie Zatlyn
Filed: 31 May 20
Utility
Method and apparatus for traffic optimization in virtual private networks (VPNs)
14 Sep 20
Method and apparatus for traffic optimization in virtual private networks (VPNs).
Christopher Philip Branch, Dane Orion Knecht
Filed: 17 Jun 19
Utility
Delivering video in a content delivery network
14 Sep 20
A server in a content delivery network (CDN) receives a request for a web page of a domain handled by an origin server.
Dane Orion Knecht, Igor Postelnik, Oliver Yu, John Graham-Cumming, Dani Grant, Nitin Rao
Filed: 4 Oct 17
Utility
Establishing and Using a Tunnel from an Origin Server In a Distributed Edge Compute and Routing Service
9 Sep 20
An edge server of a distributed edge compute and routing service receives a tunnel connection request from a tunnel client residing on an origin server, that requests a tunnel be established between the edge server and the tunnel client.
Dane Orion KNECHT, John GRAHAM-CUMMING, Dani GRANT, Christopher Philip BRANCH, Tom PASEKA
Filed: 25 May 20
Utility
Method and apparatus for transparently enabling compatibility between multiple versions of an application programming interface (API)
7 Sep 20
Methods and apparatuses for enabling compatibility between multiple versions of an application programming interface (API) are described.
Andrew Taylor Plunk, Dane Orion Knecht, Oliver Zi-gang Yu
Filed: 26 Aug 19
Utility
Secure Session Capability Using Public-key Cryptography without Access to the Private Key
2 Sep 20
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Nicholas Thomas Sullivan, Albertus Strasheim
Filed: 15 Mar 20
Utility
Web Browser Remoting Across a Network Using Draw Commands
5 Aug 20
A server receives from a client device that is executing a web browser application a request to initiate a remote application in the server.
Trevor Sundberg, Killian Koenig, Darren Remington, Benjamin Buzbee, Michael Conrad, David Harnett
Filed: 3 Feb 20
Utility
Theft Prevention for Sensitive Information
5 Aug 20
Methods, systems, and techniques for application isolation by remote-enabling applications are provided.
Darren Remington, Michael Conrad, Killian Koenig, Trevor Sundberg, David Harnett
Filed: 18 Apr 19
Utility
Application Remoting Across a Network Using Draw Commands
5 Aug 20
A server receives from a client device that is executing a client application a request to initiate a remote application in the server.
Darren Remington, Trevor Sundberg, Killian Koenig, Benjamin Buzbee, Michael Conrad, David Harnett
Filed: 3 Feb 20
Utility
Remoting Application Across a Network Using Draw Commands with an Isolator Application
5 Aug 20
A client device instantiates an isolator application.
Benjamin Buzbee, Killian Koenig, Trevor Sundberg, Michael Conrad, Darren Remington, David Harnett
Filed: 3 Feb 20