301 patents
Utility
Production Build Integrity Verification
11 Jan 24
The present disclosure relates to systems and methods for production build integrity verification.
Abhishek Surpur, Kaushik Bhattacharjee, Vishal Gautam
Filed: 23 Aug 22
Utility
Encrypted traffic inspection in a cloud-based security system
4 Jan 24
A node configured as any of a proxy, a Secure Web Gateway, and a Secure Internet Gateway is configured to perform steps of, responsive to establishing a connection with a user device having a user associated with a tenant and obtaining policy for the user, monitoring traffic between the user device and the Internet where the monitoring is at a middle location, inline between the user device and an endpoint; responsive to the traffic being encrypted as a tunnel, performing one or more operations to enable accessing the encrypted traffic; analyzing the traffic based on the policy, including at least checking for malicious traffic and Data Loss Prevention (DLP) for the tenant; and one of allowing, blocking, or limiting the traffic based on the analyzing.
Srikanth Devarajan, Vijay Bulusu, Leslie McCutcheon
Filed: 1 Aug 23
Utility
Distributed telemetry and policy gateway in the cloud for remote devices
2 Jan 24
Systems and methods include connecting to and authenticating a plurality of user devices; utilizing a plurality of RESTful (Representational State Transfer web service) endpoints to communicate with the plurality of user devices; providing any of policy and configuration to the plurality of user devices utilizing version number via a RESTful endpoint; caching the any of policy and configuration for each device of the plurality of user devices; and receiving metrics based on measurements at the plurality of user devices according to corresponding policy and configuration, via a RESTful endpoint.
Sushil Pangeni, Srikanth Devarajan, Ajit Singh, Chenglong Zheng, Sandeep Kamath, Di Wang
Filed: 4 Jun 21
Utility
Systems and methods for alerting administrators of a monitored digital user experience
2 Jan 24
Systems and methods for alerting administrators of a monitored digital user experience include performing inline monitoring of network access between one or more users each with an associated user device executing an agent application, the Internet, and one or more cloud applications and private applications.
Chakkaravarthy Periyasamy Balaiah, Kd Mazboudi, Dhawal Sharma, Satish Kalipatnapu
Filed: 24 Feb 20
Utility
Determining endpoint and application behavior for monitoring user experience
2 Jan 24
Techniques for using trace with tunnels and cloud-based systems for determining measures of network performance are presented.
Chakkaravarthy Periyasamy Balaiah, Sandeep Kamath, Khaireddine Mazboudi, Pankaj Chhabra
Filed: 10 Nov 22
Utility
Automatic network application security policy expansion
2 Jan 24
A system validates the establishment and/or continuation of a connection between two applications over a network.
Peter Nahas, Peter Smith, Harry Sverdlove, John O'Neil, Scott Laplante, Andriy Kochura
Filed: 18 May 22
Utility
DLP appliance and method for protecting data sources used in data matching
2 Jan 24
Systems and methods of Exact Data Matching (EDM) for identifying related tokens in data content using structured signature data implemented in a cloud-based system receiving data sets and customer configuration from a customer, wherein the data sets include customer specific sensitive data from a structured data source with each token represented by a hash value and the customer configuration includes one or more primary keys for a plurality of records in the data sets; distributing the data sets and the customer configuration to a plurality of nodes in the cloud-based system; performing monitoring of content between a client of the customer and an external network; detecting a presence of a plurality of tokens associated with a record in the customer specific sensitive data based on the monitoring; and performing a policy-based action in the cloud-based system based on the detecting.
Balakrishna Bayar, Arun Bhallamudi, Srikanth Devarajan, Siva Udupa, Pooja Deshmukh
Filed: 23 Dec 20
Utility
Machine learning model abstraction layer for runtime efficiency
2 Jan 24
Systems and methods include receiving a trained machine learning model that has been processed with training information removed therefrom, wherein the training information is utilized in training of the trained machine learning model; monitoring traffic, inline at the node, including processing the traffic with the trained machine learning model; obtaining a verdict on the traffic based on the trained machine learning model; and performing an action on the traffic based on the verdict.
Rex Shang, Dianhuan Lin, Changsha Ma, Douglas A. Koch, Shashank Gupta, Parnit Sainion, Visvanathan Thothathri, Narinder Paul, Howie Xu
Filed: 29 Sep 22
Utility
Egress Handling for Networks with Public Internet Protocol (IP) Address
28 Dec 23
The present disclosure relates to systems and methods for egress handling for networks with Public Internet Protocol (IP) address.
Pankaj Chhabra
Filed: 28 Jun 22
Utility
Hyperfine network slicing
28 Dec 23
A method implemented via a cloud-based system for network slicing in a 5G network includes connecting with a device that connects to the 5G network, wherein the cloud-based system includes a plurality of nodes interconnected to one another and including one or more nodes integrated in a user plane of the 5G network; inline monitoring traffic between the device and destinations including any of the Internet, cloud services, private applications, edge compute, Multiaccess Edge Compute (MEC), public/private data centers, and public/private clouds; and enforcing bandwidth control, in the 5G network, to a defined Quality of Service for a slice associated with the device.
Kartik Kumar Chatnalli Deshpande Sridhar, Arvind Nadendla, Kenneth B. Urquhart, Subramanian Srinivasan
Filed: 22 Jun 23
Utility
Systems and methods for providing a native browser experience for Cloud Browser Isolation (CBI) environments
21 Dec 23
Systems and methods provide native browser features in Cloud Browser Isolation (CBI) environments.
Catalin Dogaru, Ayush Ghimire, Nicolas Garfinkiel, Alex-Marian Negrea
Filed: 6 Sep 23
Utility
Fingerprinting to identify devices and applications for use in management and policy in the cloud
12 Dec 23
Systems and methods include obtaining a plurality of parameters associated with a host; determining a fingerprint of the host utilizing the plurality of parameters; and providing the fingerprint to cloud service for enrollment and management of the host in the cloud service.
Ajit Singh, Vivek Ashwin Raman, Abhinav Bansal, Thomas Evan Keiser, Jr., John H. O'Neil
Filed: 16 Aug 21
Utility
Advanced Machine Learning Techniques for Internet Outage Detection
7 Dec 23
The present systems and methods provide a user performance monitoring solution that enables the monitoring of application and device performance from the end user's point of view.
Prasannakumar Jobigenahally Malleshaiah, Alexander Frazier, Chakkaravarthy Periyasamy Balaiah, Javier Rodriguez Gonzalez, Ashok Kolachina, Sanjit Ganguli
Filed: 1 Jun 22
Utility
Providing users secure access to business-to-business (B2B) applications
5 Dec 23
Systems and methods include, responsive to a request from a user for one or more Business-to-Business (B2B) applications, redirecting the request, by a cloud-based system, to an identity provider to authorize the user; displaying the one or more B2B applications that the user is authorized to access; responsive to a selection of a B2B application of the one or more B2B applications, creating a first tunnel from the B2B application to the cloud-based system; and stitching the first tunnel between the B2B application and the cloud-based system with a second tunnel between the user and the cloud-based system.
Patrick Foxhoven, John A. Chanak, William Fehring, Manoj Apte, Kunal Shah, Dhawal Sharma
Filed: 30 Oct 20
Utility
Cloud-based web content processing system providing client threat isolation and data integrity
5 Dec 23
Systems and methods include receiving a request for resources that are one of web content and a cloud application from a user device; determining the request requires isolation based on any of policy, category of the web content, type of the user device, and location of the user device; rendering content associated with the request in a secure environment that is isolated from the user device; and providing image content based on the content to the user device.
Uli P. Mittermaier, Alex-Marian Negrea
Filed: 4 Dec 19
Utility
Real User Monitoring statistics from end users via plugin or browser extension
30 Nov 23
A cloud service is executed on a plurality of nodes, each including at least one processor, and the cloud service is configured to communicate with a plurality of user devices, each user device associated with a user from an organization of a plurality of organizations, and each user device includes a plugin or browser extension installed thereon, provide configuration information to any of the plurality of user devices where the configuration information includes a plurality of domains to be monitored by the plugin or browser extension, wherein the plugin or browser extension is configured to monitor and/or determine real user monitoring (RUM) statistics when a given user device accesses one of the plurality of domains; and receive the RUM statistics from any of the plurality of user devices.
Vaibhav Aher, Khaireddine Mazboudi, Sandeep Kamath, Srikanth Devarajan, Chakkaravarthy Periyasamy Balaiah
Filed: 21 Mar 23
Utility
Cloud-based data loss prevention
28 Nov 23
Cloud-based data loss prevention (DLP) systems and methods include monitoring a file to be checked for sensitive data from a user associated with a tenant; obtaining one or more dictionaries for the tenant; identifying a DLP match based on any of identifying exact document matches between the file and files in the one or more dictionaries, identifying same text in the file as in an indexed document in the one or more dictionaries, identifying content in the file that contains a subset of text in an indexed document in the one or more dictionaries, and identifying content that is similar but not exact as the text in an indexed document in the one or more dictionaries; and, responsive to the DLP match, blocking the file in the cloud-based system.
Narinder Paul, Arun Bhallamudi, Balakrishna Bayar, James Tan
Filed: 26 Apr 22
Utility
Dynamic rules engine in a cloud-based sandbox
28 Nov 23
Computer-implemented systems and methods include receiving unknown content in a cloud-based sandbox; performing an analysis of the unknown content in the cloud-based sandbox, to obtain a score to determine whether or not the unknown content is malware; obtaining events based on the analysis; running one or more rules on the events; and adjusting the score based on a result of the one or more.
Nirmal Singh Bhary, Deepen Desai
Filed: 30 Jan 20
Utility
Systems and methods for detecting Destination Network Address Translation (DNAT) in network paths
23 Nov 23
Techniques for detecting Destination Network Address Translation (DNAT) in network paths.
Pankaj Chhabra
Filed: 24 Jul 23
Utility
Utilizing Machine Learning for smart quarantining of potentially malicious files
23 Nov 23
Systems and methods of sandboxing a file include responsive to receiving a file associated with a user, obtaining policy for the user; analyzing the file with a machine learning model; and based on a combination of the policy for the user and a verdict of the machine learning model, one of quarantining the file for analysis in a sandbox and allowing the file to the user.
Changsha Ma, Rex Shang, Douglas A. Koch, Dianhuan Lin, Howie Xu, Bharath Kumar, Shashank Gupta, Parnit Sainion, Narinder Paul, Deepen Desai
Filed: 1 Aug 23