442 patents
Utility
Capacity Agnostic Scoring of Network Path Health Based on Packet Loss
23 Mar 23
A network path scoring system is disclosed herein that scores quality of network paths to facilitate identification of poorly performing circuits for investigation.
Gopal Gadekal Reddy
Filed: 11 Jul 22
Utility
Multi-ssid Hidden Wireless Network
23 Mar 23
An access point provides a hidden wireless network that is configured with a set of SSIDs so that the hidden network is discoverable with multiple different SSIDs.
Ta Chien Lin
Filed: 21 Sep 21
Utility
Latency Based Network Path Scoring
23 Mar 23
A network path scoring system is disclosed herein that scores “health” of network paths based on latency data.
Gopal Gadekal Reddy
Filed: 11 Jul 22
Utility
Label Guided Unsupervised Learning Based Network-level Application Signature Generation
23 Mar 23
Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application.
Stefan Achleitner
Filed: 31 Oct 22
Utility
Dynamic Path Selection and Data Flow Forwarding
23 Mar 23
Various techniques for dynamic path selection and data flow forwarding are disclosed.
Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy
Filed: 6 Oct 22
Utility
Preventing Ransomware from Encrypting Files on a Target Machine
16 Mar 23
Techniques for preventing ransomware from encrypting files on a target machine are disclosed.
Eldar Aharoni, Vadim Goldstein, Mashav Sapir, Jenny Kitaichik
Filed: 17 Nov 22
Utility
Dynamic Analysis Techniques for Applications
16 Mar 23
A sample is analyzed to determine a set of events that should be selected for performing by a dynamic analyzer executing the sample in an instrumented, emulated environment.
Cong Zheng, Wenjun Hu, Zhi Xu
Filed: 21 Nov 22
Utility
Causality Detection for Outlier Events In Telemetry Metric Data
16 Mar 23
Identifying causal relationships between outlier telemetry events in telemetry metric data using machine learning ensembles of an autoencoder and an attention mechanism provides an automated framework for root cause analysis.
Zhen Han Si, Claudionor Jose Nunes Coelho, JR., Viswesh Ananthakrishnan, Eyal Firstenberg
Filed: 13 Sep 21
Utility
Automated Fuzzy Hash Based Signature Collecting System for Malware Detection
16 Mar 23
Automated fuzzy hash based signature collection is disclosed.
Yang Ji, Wenjun Hu, Xiao Zhang
Filed: 10 Sep 21
Utility
Supporting Zone-based Policy Enforcement for a Firewall Connected to a One-arm Load Balancer
16 Mar 23
A virtual firewall configured with two interfaces assigned different security zones switches between Layer 3 routing and bump-in-the-wire (BITW) modes between sessions.
Charles Bransi, Steven Alsop
Filed: 16 Sep 21
Utility
Private Cloud Control
16 Mar 23
Management of IoT devices through a private cloud.
Xu Zou, Jianlin Zeng, Mei Wang
Filed: 17 Nov 22
Utility
Distributed Cardinality Optimization
16 Mar 23
A cardinality query associated with a specific attribute is received.
Fan Zhang, Ran Xia
Filed: 21 Oct 22
Utility
Advanced ransomware detection
16 Mar 23
Methods, apparatuses and computer program products implement embodiments of the present invention that include protecting a computer system coupled to a storage device by detecting an executing process that performed a specific type of modification to a number of files stored on the storage device.
Erez Levy, Or Chechik, Liav Zigelbaum, Eldar Aharoni
Filed: 2 Nov 22
Utility
Dynamic analysis techniques for applications
14 Mar 23
A virtualized storage for use in performing dynamic analysis on a sample is configured, at least in part by copying the sample to the virtualized storage.
Wenjun Hu, Cong Zheng, Zhi Xu
Filed: 3 Feb 21
Utility
Behavioral DNS tunneling identification
14 Mar 23
Methods, apparatus and computer software products for protecting a computing system implement embodiments of the present invention that include extracting, from data traffic transmitted over a data network connecting a plurality of computing devices to multiple Internet hosting services, respective sets of transmissions from the computing devices to the Internet hosting services, and identifying, in a given set of the transmissions from a given computing device, multiple domain name system (DNS) requests for an identical second-level domain (2LD) and for different respective sub-domains within the 2LD.
Aviad Meyer, Jonathan Allon, Rony Brailovsky
Filed: 13 Feb 20
Utility
Context-based security over interfaces in O-RAN environments in mobile networks
14 Mar 23
Techniques for applying context-based security over interfaces in O-RAN environments in mobile networks are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 25 Feb 22
Utility
Security Platform for Service Provider Network Environments
9 Mar 23
Techniques for providing a securing platform for service provider network environments are disclosed.
Leonid Burakovsky, Mitchell Rappard
Filed: 8 Nov 22
Utility
Multi-representational Learning Models for Static Analysis of Source Code
9 Mar 23
Techniques for multi-representational learning models for static analysis of source code are disclosed.
Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
Filed: 15 Nov 22
Utility
Inline Detection of Encrypted Malicious Network Sessions
9 Mar 23
An inline malicious traffic detector captures handshake messages in a session with a security protocol.
Lei Xu, Stefan Achleitner, Yu Fu, Shengming Xu
Filed: 7 Sep 21
Utility
Automatic Network Signature Generation
2 Mar 23
Automatic generation of network signatures is disclosed.
Zhanhao Chen, Jun Wang, Wei Xu
Filed: 31 Aug 21