455 patents
Page 3 of 23
Utility
Leveraging operation, administration and maintenance protocols (OAM) to add ethernet level intelligence to software-defined wide area network (SD-WAN) functionality
19 Sep 23
System and methods for enabling SD-WAN functionality to respond to Ethernet level OAM-related events are provided.
Martin C. Pueblas
Filed: 29 Dec 20
Utility
Dynamic service-based load balancing in a software-defined wide area network (SD-WAN)
19 Sep 23
Systems and methods for dynamic service-based load balancing in an SD-WAN are provided.
Shangwei Duan, Xin Gu
Filed: 26 Nov 20
Utility
Systems and methods for fine grained forward testing for a ZTNA environment
12 Sep 23
Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network.
Rajiv Sreedhar, Manuel Nedbal, Manoj Ahluwalia, Damodar K. Hegde, Jitendra B. Gaitonde, Suresh Rajanna, Mark Lubeck, Gary Nool
Filed: 15 Jun 21
Utility
Facilitating secure unlocking of a computing device
12 Sep 23
Systems and methods for facilitating secure unlocking of a computing device based on user-defined rules are provided.
Marco Senn
Filed: 31 Mar 20
Utility
Providing secure data replication among nodes of a hierarchical multitenant security orchestration and automated response (SOAR) architecture
12 Sep 23
Systems and methods for facilitating secure and reliable communications among nodes of different tiers of a multi-tenant SOAR deployment are provided.
Abhishek Narula, Alok Agarwal, Pooja Singh, Satish Mishra
Filed: 1 Jan 22
Utility
Management of internet of things (IoT) by security fabric
12 Sep 23
The present invention relates to a method for managing IoT devices by a security fabric.
John Lunsford Gregory Whittle, Jonathan Q. Nguyen-Duy, Michael Craig Woolfe
Filed: 12 Mar 21
Utility
Systems and Methods for Automated Sd-wan Performance Rule Formation
7 Sep 23
Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.
Reid Garrett Clark
Filed: 1 Mar 22
Utility
Systems and Methods for Security Policy Application Based Upon a Dual Bitmap Scheme
7 Sep 23
Systems, devices, and methods are discussed for identifying security policies applicable to a received information packet based upon a dual bitmap scheme accounting for bit position mergers and/or policies common to multiple bit positions.
Shushan Wen, John Cortes, Zhi Guo
Filed: 1 Mar 22
Utility
Systems and Methods for Security Policy Organization Using a Dual Bitmap
7 Sep 23
Systems, devices, and methods are discussed for classifying a number of security policies in relation to criteria for applying those security policies to yield a dual bitmap scheme representing a correlation between security policies and one or more criteria.
SHUSHAN WEN, JOHN CORTES, ZHI GUO
Filed: 1 Mar 22
Utility
Thermistor sensor arrangement for measuring chipset temperature
22 Aug 23
A thermistor sensor arrangement for measuring chipset temperature is provided.
Shan Luo, Shen Sunny Zhong, Qian Yu, Shenghua Jiang
Filed: 10 Oct 20
Utility
Systems and Methods for Enhanced Key Security In an Sd-wan Network Environment
17 Aug 23
Systems, devices, and methods are discussed for leveraging SD-WAN's property of redundant independent paths to enable out of band key exchange using the collection of available paths, dynamically managing link failures to keep the separation whenever possible, and/or signaling availability of quantum-safe data transfer to SD-WAN to enable quantum-safety to be used in SD-WAN policy decisions.
Simon Bryden
Filed: 14 Feb 22
Utility
Wireless multi-factor authentication based on proximity of a registered mobile device to a protected computing device at issue
8 Aug 23
Systems and methods for a passive wireless multi-factor authentication approach are provided.
Eric C. Hastings
Filed: 18 Dec 17
Utility
Multi-path cellular channel extensions to support multiple simultaneous packet data networks
8 Aug 23
Embodiments discussed generally relate to cellular network gateways.
Shashidhar Polepalli
Filed: 23 Apr 21
Utility
Systems and Methods for Container Server Protection
3 Aug 23
Systems, devices, and methods are discussed for enhancing security in a container server environment.
Sergio Henrique Marcelino Castro de Rosa
Filed: 2 Feb 22
Utility
Dynamic Leaf Determination for Tree Creations for High-speed Network Policy Search During Data Packet Scanning
27 Jul 23
During high-speed network policy searching for data packets, an upper limit and a lower limit for a policy count are predefined for a ratio of the policy count to the sum of the policy count and the range count.
Shushan Wen
Filed: 30 Mar 23
Utility
Machine Learning for Visual Similarity-based Phishing Detection
20 Jul 23
In one embodiment, a similarity index is calculated from characteristics of a suspected phishing web page to a database of known phishing web pages.
Haitao Li, Lisheng Ryan Sun
Filed: 24 Mar 23
Utility
Customized Anomaly Detection In Sandbox Software Security Systems Using Graph Convolutional Networks
13 Jul 23
An ML (machine learning) training logs are parsed for generating a set of heterogenous graphs having embedded nodes connected with edges determined with link prediction and denoting a hierarchical relationship between nodes.
Kamran Razi, Jun Cai
Filed: 31 Dec 21
Utility
Analyzing user behavior patterns to detect compromised nodes in an enterprise network
11 Jul 23
Systems and methods for analyzing user behavior patterns to detect compromised computing devices in an enterprise network are provided.
Ernest Mugambi, Partha Bhattacharya
Filed: 18 Dec 18
Utility
Generic Tree Policy Search Optimization for High-speed Network Processor Configuration
6 Jul 23
A raw policy set is received for the network processor and a dimension bitmap corresponding to the raw policy set.
Shushan Wen
Filed: 31 Dec 21
Utility
Distributed Node Discovery and Overlay Path Management on a Data Communication Network
6 Jul 23
An initial provisioning by a management plane of the SD-WAN is received from a centralized SD-WAN gateway with static path overlay between the network edge device on a local LAN and the centralized SD-WAN gateway.
Stephen John Bevan, Dmitry Perets
Filed: 31 Dec 21