7 patents
Utility
Metadata Based Efficient Packet Processing
11 Jan 24
A method and device are presented for decreasing processing cycles spent forwarding packets of a communication from receive queues to at least one transmit queue of a network interface controller.
Oren Markovitz
Filed: 6 Jul 22
Utility
Network Traffic Routing In an Sd-wan
11 Jan 24
A method and network gateway are provided for routing network traffic between internet service providers (ISPs) based on dynamic communication quality of the ISPs.
Tal Vainshtein, Ofer Raz
Filed: 11 Jul 22
Utility
System and Method for Performing Hierarchical and Incremental Workload Scanning
14 Dec 23
A computer executed method is presented for identifying security issues in a workload.
Ohad Tanami, Itay Harush
Filed: 8 Jun 22
Utility
System and Method for Protecting Against Data Storage Attacks
12 Oct 23
A system, method, and device are provided for detecting and mitigating a storage attack at the block level by generating canary blocks by marking blocks of data (referred to as memory blocks) such that other programs do not modify these canary blocks that are monitored to detect data storage attacks that attempt to modify the canary blocks and/or by monitoring statistical and behavioral features of activities over blocks, whether they can be modified by other programs or not.
Liran Orevi, Haggai David
Filed: 24 Mar 22
Utility
Methods and Systems for Identifying Malware Enabled by Automatically Generated Domain Names
23 Sep 20
Computerized methods and systems identify malware enabled by automatically generated domain names.
Aliaksandr CHAILYTKO
Filed: 8 Jun 20
Utility
Method for Performing TLS/SSL Inspection Based on Verified Subject Name
24 Jun 20
Methods and systems for processing cryptographically secured connections by a gateway, between a client and a server, are performed.
Pavel ISAEV, Idan SAYAG, Alexey VOLODIN, Tamir ZEGMAN
Filed: 19 Dec 18
Utility
Method And System For Modeling All Operations And Executions Of An Attack And Malicious Process Entry
11 Mar 20
Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like.
Anandabrata PAL, Lior ARZI, Tamara LEIDERFARB
Filed: 14 Sep 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first