262 patents
Page 12 of 14
Utility
Transparent inspection of responses from origin servers to identify protected data
3 Aug 20
A compute server receives a request from a client device, where the plurality of compute servers are part of a distributed cloud computing platform, and wherein the request is a request for a network resource.
Benedikt Christoph Wolters, David Kitchen, Alex Cruz Farmer, Andrew Galloni
Filed: 26 Mar 19
Utility
Internet-based Proxy Service to Limit Internet Visitor Connection Speed
29 Jul 20
A proxy server for limiting Internet connection speed of visitors that pose a threat.
Lee Hahn Holloway, Matthew Browning Prince, Ian Gerald Pye
Filed: 13 Apr 20
Utility
Method and Apparatus for Traffic Optimization In Virtual Private Networks (VPNS)
22 Jul 20
Method and apparatus for traffic optimization in virtual private networks (VPNs).
Christopher Philip BRANCH, Dane Orion KNECHT
Filed: 17 Jun 19
Utility
Registering for Internet-based Proxy Services
15 Jul 20
A domain name is received from a customer.
Matthew Browning Prince, Lee Hahn Holloway, Michelle Marie Zatlyn
Filed: 29 Mar 20
Utility
Internet-based Proxy Service to Modify Internet Responses
1 Jul 20
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain.
Lee Hahn Holloway, Matthew Browning Prince, Matthieu Philippe François Tourne
Filed: 8 Mar 20
Utility
Third party validation of web content
22 Jun 20
A first server receives, from a client network application, a request for a network resource.
Dane Orion Knecht
Filed: 12 Mar 18
Utility
Mobile application accelerator
15 Jun 20
Techniques for providing mobile device content delivery acceleration for mobile applications are discussed herein.
Jeff Sesung Kim, Junho Choi, Sang Jo Lee, Young Keun Park, Tianyu Shi
Filed: 7 Apr 16
Utility
Multiply-Encrypting Data Requiring Multiple Keys for Decryption
10 Jun 20
A server receives a piece of data for encryption.
Nicholas Thomas Sullivan
Filed: 17 Nov 19
Utility
Methods and apparatuses for providing internet-based proxy services
1 Jun 20
A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers.
Lee Hahn Holloway, Matthew Browning Prince, Ian Gerald Pye, Matthieu Philippe François Tourne, Michelle Marie Zatlyn
Filed: 24 Mar 19
Utility
Establishing and using a tunnel from an origin server in a distributed edge compute and routing service
25 May 20
An edge server of a distributed edge compute and routing service receives a tunnel connection request from a tunnel client residing on an origin server, that requests a tunnel be established between the edge server and the tunnel client.
Dane Orion Knecht, John Graham-Cumming, Dani Grant, Christopher Philip Branch, Tom Paseka
Filed: 14 Oct 18
Utility
Applying Filter Expressions to Requests at an Edge Server
20 May 20
An edge server receives a request from a client device for an action to be performed on a resource.
David Alexander Kitchen
Filed: 14 Nov 18
Utility
Custom Responses for Resource Unavailable Errors
20 May 20
A proxy server receives from a client device a request for a network resource hosted at an origins server for a domain.
Matthew Browning Prince, Lee Hahn Holloway, Michelle Marie Zatlyn
Filed: 20 Oct 19
Utility
Application remoting using network vector rendering
11 May 20
Methods, systems, and techniques for application isolation by remote-enabling applications are provided.
Trevor Sundberg, Killian Koenig, Darren Remington, Benjamin Buzbee, Michael Conrad, David Harnett
Filed: 20 Oct 19
Utility
Cloud Computing Platform That Executes Third-Party Code in A Distributed Cloud Computing Network
6 May 20
A compute server receives a request from a client device that triggers execution of a code piece.
Kenton Taylor Varda, Zachary Aaron Bloom, Marek Przemyslaw Majkowski, Ingvar Stepanyan, Kyle Kloepper, Dane Orion Knecht, John Graham-Cumming, Dani Grant
Filed: 23 Jun 19
Utility
Methods and systems for identification of a domain of a command and control server of a botnet
4 May 20
Methods and apparatuses for identifying a domain of a command and control server of a botnet are described.
Nicholas Thomas Sullivan
Filed: 4 Sep 18
Utility
Internet-based proxy service to limit internet visitor connection speed
13 Apr 20
A proxy server for limiting Internet connection speed of visitors that pose a threat.
Lee Hahn Holloway, Matthew Browning Prince, Ian Gerald Pye
Filed: 30 Dec 18
Utility
Providing cross site request forgery protection at an edge server
30 Mar 20
A request from a computing device for accessing a resource is received by an edge server, where the request includes a cookie containing a first token value and a second token value.
Evan Johnson
Filed: 13 Aug 18
Utility
Registering for internet-based proxy services
30 Mar 20
A domain name is received from a customer.
Matthew Browning Prince, Lee Hahn Holloway, Michelle Marie Zatlyn
Filed: 31 Jul 17
Utility
Method and apparatus for optimization of advertisement elements in network resources
23 Mar 20
A method and system for optimization of an advertisement in a network resource in a proxy server of a cloud-based proxy service are described.
Igor Postelnik, John Fawcett, Dane Orion Knecht, Oliver Zi-gang Yu, Dani Grant
Filed: 27 Nov 18
Utility
Secure session capability using public-key cryptography without access to the private key
16 Mar 20
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Nicholas Thomas Sullivan, Albertus Strasheim
Filed: 25 Jun 18