123 patents
Utility
Cloud-based Security Service That Includes External Evaluation for Accessing a Third-party Application
21 Dec 23
A cloud-based security service that includes external evaluation for accessing a third-party application.
James Howard Royal
Filed: 29 Sep 22
Utility
Web Browser Remoting Across a Network Using Draw Commands
16 Nov 23
A server receives from a client device that is executing a web browser application a request to initiate a remote application in the server.
Trevor Sundberg, Killian Koenig, Darren Remington, Benjamin Buzbee, Michael Conrad, David Harnett
Filed: 20 Jul 23
Utility
Remoting Application Across a Network Using Draw Commands with an Isolator Application
26 Oct 23
A client device instantiates an isolator application.
Benjamin Buzbee, Killian Koenig, Trevor Sundberg, Michael Conrad, Darren Remington, David Harnett
Filed: 12 Jun 23
Utility
Application Remoting Across a Network Using Draw Commands
19 Oct 23
A server receives from a client device that is executing a client application a request to initiate a remote application in the server.
Darren Remington, Trevor Sundberg, Killian Koenig, Benjamin Buzbee, Michael Conrad, David Harnett
Filed: 20 Jun 23
Utility
Methods and Apparatuses for Providing Internet-based Proxy Services
12 Oct 23
A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers.
Lee Hahn Holloway, Matthew Browning Prince, Ian Gerald Pye, Matthieu Philippe François Tourne, Michelle Marie Zatlyn
Filed: 12 Jun 23
Utility
Establishing a Cryptographic Tunnel Between a First Tunnel Endpoint and a Second Tunnel Endpoint Where a Private Key Used During the Tunnel Establishment Is Remotely Located from the Second Tunnel Endpoint
12 Oct 23
A responder device receives, from an initiator device, a request to initiate a cryptographic tunnel between the initiator device and the responder device.
Watson Bernard Ladd, Vladislav Krasnov
Filed: 12 Jun 23
Utility
Method and System for Determining a Path Maximum Transmission Unit (Mtu) Between Endpoints of a Generic Routing Encapsulation (Gre) Tunnel
12 Oct 23
A method of path MTU determination in Generic Routing Encapsulation (GRE) tunnel is presented.
Nicholas Alexander WONDRA, Erich Alfred HEINE, Yan ZHAI
Filed: 12 Jun 23
Utility
Unified Network Service That Connects Multiple Disparate Private Networks and End User Client Devices Operating on Separate Networks
28 Sep 23
A unified network service that connects multiple disparate private networks and end user client devices operating on separate networks is described.
Nicholas Alexander Wondra, Igor Postelnik, Michael John Vanderwater, Adam Simon Chalmers, Nuno Miguel Lourenço Diegues, Arég Harutyunyan, Erich Alfred Heine
Filed: 31 May 23
Utility
Isolating Internet-of-Things (IoT) Devices Using a Secure Overlay Network
21 Sep 23
A server of a distributed cloud computing network receives, over a tunnel established between a customer-premises equipment and the compute server, traffic from an Internet-of-Things (IoT) device that is connected to the CPE.
Derek Chamorro, Molly Rose Cinnamon, Tom Paseka, Nicholas Wondra
Filed: 10 Oct 22
Utility
Secure Session Capability Using Public-key Cryptography without Access to the Private Key
13 Jul 23
A server establishes a secure session with a client device where a private key used in the handshake is stored in a different server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Albertus Strasheim
Filed: 3 Jan 23
Utility
Verification of Selected Inbound Electronic Mail Messages
13 Jul 23
An email verification system is described.
Michael J. Flester
Filed: 11 Jan 23
Utility
Method and Apparatus for Traffic Optimization In Virtual Private Networks (VPNS)
25 May 23
Method and apparatus for traffic optimization in virtual private networks (VPNs).
Christopher Philip BRANCH, Dane Orion KNECHT
Filed: 24 Jan 23
Utility
Machine Learning-based Malicious Attachment Detector
18 May 23
In an embodiment, a computer-implemented method includes receiving, from a pre-processor, an output file; where the output file is created by the pre-processor in response to input of an electronic file to the pre-processor; where the electronic file is an attachment to a message that is in-transit to a recipient computer on a network; where the output file contains features that are created by the pre-processor analyzing one or more sub-features of the electronic file; receiving, from a machine learning-based classifier, malware classification data that indicates whether the electronic file does or does not contain malware; where the malware classification data is output by the machine learning-based classifier in response to the machine learning-based classifier determining that the features are or are not indicators of obfuscation; where data used to create the machine learning-based classifier includes output files previously created by the pre-processor; in response to the malware classification data matching a criterion, causing the network to modify, delay, or block transmission of the electronic file to the recipient computer.
Torsten Zeppenfeld, Javier Castro
Filed: 17 Jan 23
Utility
Intelligently Routing Internet Traffic
4 May 23
A request from a client device is received at a first one of a plurality of compute nodes at a first one of a plurality of data centers of a distributed cloud computing network.
Braden Ehrat, Jay A. Kreibich, Jérôme Fleury, Michael Vanderwater, Nicholas Alexander Wondra, Richard Thompson
Filed: 28 Dec 22
Utility
Cloud Computing Platform That Executes Third-Party Code in A Distributed Cloud Computing Network
4 May 23
A compute server receives a first request from a client device that triggers execution of a first third-party code piece.
Kenton Taylor Varda, Zachary Aaron Bloom, Marek Przemyslaw Majkowski, Ingvar Stepanyan, Kyle Kloepper, Dane Orion Knecht, John Graham-Cumming, Dani Grant
Filed: 30 Dec 22
Utility
Implementing a Tiered Cache Topology with Anycast Networks
20 Apr 23
A control server receives probe data from a plurality of data centers indicating measured latencies with a first IP address associated with an origin server.
Zaidoon Abd Al Hadi, Samantha Aki Shugaeva, Yuchen Wu, Brian C. Bradley
Filed: 8 Aug 22
Utility
Network Layer Performance and Security Provided By a Distributed Cloud Computing Network
20 Apr 23
A GRE tunnel is configured between multiple computing devices of a distributed cloud computing network and a single origin router of the origin network.
Nicholas Alexander Wondra, Achiel Paul van der Mandele, Alexander Forster, Eric Reeves, Joaquin Madruga, Rustam Xing Lalkaka, Marek Przemyslaw Majkowski
Filed: 18 Dec 22
Utility
Identity Proxy and Access Gateway
13 Apr 23
A server transmits to a third-party application a request for a resource that is received from a client.
James Howard Royal, Samuel Douglas Rhea
Filed: 18 Jul 22
Utility
Selective Traffic Processing In a Distributed Cloud Computing Network
23 Mar 23
A server receives internet traffic from a client device.
Achiel Paul van der Mandele, Eric Reeves
Filed: 29 Nov 22
Utility
Generating Early Hints Informational Responses at an Intermediary Server
23 Mar 23
An intermediary server receives a request from a client that identifies an asset that is handled by an origin server.
Alex Krivit, Rustam Xing Lalkaka, Samantha Aki Shugaeva, Edward H. Wang, Yuchen Wu
Filed: 2 May 22