243 patents
Utility
Systems and Methods for Preventing Data Leaks Over RTP or Sip
11 Jan 24
Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.
Jochen Pretli
Filed: 7 Jul 22
Utility
Systems and Methods for Security Enhanced Domain Categorization
11 Jan 24
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.
Jochen Pretli
Filed: 7 Jul 22
Utility
Systems and Methods for Cloud Based Root Service Application Across Multiple Cooperative Security Fabrics
4 Jan 24
Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric using a cloud based root.
Robert A. May
Filed: 4 Jul 22
Utility
Capturing Multiuser Data Packets by Grouping Access Points on a Wireless Network
4 Jan 24
A capture group of access points formed from the plurality of access points dedicate at least one radio from each of the access points for capturing data packets.
Vijayakumar V
Filed: 30 Jun 22
Utility
Steering Wi-fi 6E Wireless Clients to Wi-fi 6E Access Points on Hybrid Wireless Networks
4 Jan 24
A probe request sent from a Wi-Fi 6E wireless client to the legacy access point is received by a Wi-Fi controller.
Vijayakumar V
Filed: 30 Jun 22
Utility
Remote Debugging of Local Gui Rendering by Playing Back a Capture File to Recreate a Real-time Local Network Environment
4 Jan 24
Debug engine receives a capture file over the network interface and initiate playback by executing the capture file with the processor.
Kai Guo
Filed: 30 Jun 22
Utility
Chassis System Management Through Data Paths
4 Jan 24
A firewall processing card from a plurality of firewall processing cards coupled to a chassis, is selected by a load balancing engine (or other mechanism) and receives the data packet over the fabric channel.
Sen Yang, Zicheng Wang, Ting Liu
Filed: 30 Jun 22
Utility
Identifying Hidden Service Set Identifiers (Ssids) of Unauthorized Access Points on a Wireless Network
28 Dec 23
An unauthorized access point is identified during a periodic scan on the wireless network and storing a MAC address for the unauthorized access point and monitored for connection attempts.
Vijayakumar V
Filed: 28 Jun 22
Utility
Systems and Methods for Context Based Access Control In a Bridge Server
12 Oct 23
Systems, devices, and methods are discussed for context protected access to an air-gapped network resource via a bridge server.
Isaac Michael Johnson
Filed: 12 Apr 22
Utility
Systems and Methods for Implementing a Family Policy Using a Cooperative Security Fabric
12 Oct 23
Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric as a unified object for configuration purposes.
Michael Xie, Robert A. May, Lino Xu, Jordan E. Thompson
Filed: 12 Apr 22
Utility
Systems and Methods for Controlling Access to an Unadvertised Cloud-based Resource
12 Oct 23
Systems, devices, and methods are discussed for context protected access to an unadvertised cloud-based resource.
Isaac Michael Johnson
Filed: 2 Jun 22
Utility
Virtual One-time Programming (Otp) to Avoid Dead Chip During Otp Device Programming
5 Oct 23
Responsive to OTP device not being enabled for an SoC, the RAMBOOT bootup authenticated by the key or key hash of an OTP is precluded and a determination is made whether the RAMBOOT bootup has been authenticated by the key or key hash on the virtual OTP.
Dengxue Yan, Zengli Duan
Filed: 31 Mar 22
Utility
One-time Programming (Otp) Key Revocation from a Two-dimensional Key Storage Structure of a System on a Chip (Soc)
5 Oct 23
A substrate for the SoC includes one or more OTP modules within the substate and comprising memory that can only be programmed once.
Dengxue Yan, Zengli Duan
Filed: 31 Mar 22
Utility
Containerized Firewall In an Embedded Device for Protecting Against Malicious Data Traffic on a Data Communication Network
5 Oct 23
A new container of a pool of containers is spawned in the operating system of the embedded networking device to execute a firewall separate from an operating system of a host device.
Wei Wang, Dazhi Li
Filed: 31 Mar 22
Utility
Smart Verification of Authentication for User Log Ins Based on Risk Levels
5 Oct 23
Failures in authentication credentials are detected by a user prior to presentation of successful credentials.
Adonis SardiƱas
Filed: 31 Mar 22
Utility
Exploit Predictive Intrusion Protection System (Ep-ips) for Data Packet Traffic on Data Communication Networks
5 Oct 23
An exploit probability value is calculated for each of the plurality of signatures learned from a history of exploits against attributes.
Roshanak Partovi
Filed: 31 Mar 22
Utility
Ai (Artificial Intelligence) Driven Dynamic Self-remediation for Wireless Networks by Dispatching Robots
5 Oct 23
An anomalous behavior is detected at an AI server device based on data communications managed by the wireless controller.
Sekhar Sumanth Gorajala Chandra
Filed: 31 Mar 22
Utility
Ipsec Load Balancing In a Session-aware Load Balanced Cluster (SLBC) Network Device
5 Oct 23
A processing blade is assigned from the plurality of processing blades to a session of data packets.
Yita Lee, Sen Yang, Ting Liu
Filed: 31 Mar 22
Utility
Device Identification for Newly Connecting Devices Using Mac Randomization on a Network
5 Oct 23
In identification training, database of known devices is used to identify unlabeled clusters from statistics concerning parameters, vendors and hostnames of the known devices.
Haitao Li
Filed: 31 Mar 22
Utility
Steering Fragmentation of Data Packets on Data Communication Networks Based on Data Packet Size
5 Oct 23
When a data packet too big frame is received from the access point, activating fragmentation at the station.
PC Sridhar, Pradeep Mohan, Mohan Jayaraman
Filed: 31 Mar 22