613 patents
Page 7 of 31
Utility
Deep Learning Pipeline to Detect Malicious Command and Control Traffic
20 Jul 23
Detection of command and control malware is disclosed.
Ajaya Neupane, Yuwen Dai, Stefan Achleitner, Yu Fu, Shengming Xu
Filed: 18 Jan 22
Utility
Iot Device Identification by Machine Learning with Time Series Behavioral and Statistical Features
20 Jul 23
Identifying Internet of Things (IoT) devices with packet flow behavior including by using machine learning models is disclosed.
Ke Tian, Yilin Zhao, Xiaoyi Duan, Jun Du
Filed: 18 Jan 22
Utility
Increased Coverage of Application-based Traffic Classification with Local and Cloud Classification Services
20 Jul 23
A cloud-based traffic classification engine maintains a catalog of application-based traffic classes which have been developed based on known applications, and a local traffic classification engine maintains a subset of these classes.
Mengying Jiang, Shengming Xu, Menglan Fang, Ho Yu Lam
Filed: 27 Feb 23
Utility
Multi-perspective Security Context Per Actor
20 Jul 23
A flexible security system has been created that allows for fluid security operations that adapt to the dynamic nature of user behavior while also allowing the security related operations themselves to be dynamic.
Jeffrey James Fitz-Gerald, JR., Ashwath Sreenivasa Murthy
Filed: 24 Mar 23
Utility
Securing application behavior in serverless computing
18 Jul 23
A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.
Ory Segal, Yuri Shapira, Avraham Shulman, Benny Nissimov, Shaked Zin
Filed: 20 Jun 22
Utility
Simulating user interactions for malware analysis
18 Jul 23
Simulating user interactions during dynamic analysis of a sample is disclosed.
Brandon R. Young, Daniel Raygoza, Sebas Sujeen Reymond Johnson, Abhiroop Dabral
Filed: 22 Oct 21
Utility
IOT device risk assessment and scoring
18 Jul 23
Techniques for establishing a risk score for Internet of Things (IoT) device parameters and acting in response thereto are disclosed.
Jun Du
Filed: 14 Jun 22
Utility
Network Adaptive Alert Prioritization System
13 Jul 23
A method, including receiving, from multiple sources, respective sets of incidents, and respective suspiciousness labels for the incidents.
Yinnon Meshi, Rony Brailovsky, Jonathan Allon, Asaf Dahan, Gal Itzhak, Niv Sela
Filed: 10 Jan 22
Utility
Split tunneling based on content type to exclude certain network traffic from a tunnel
11 Jul 23
Various techniques for split tunneling based on content type to exclude certain network traffic from a tunnel (e.g., VPN tunnel) are disclosed.
Yongjie Yin, Joby Menon, Andrey Tverdokhleb, Kevin Yao
Filed: 7 Dec 21
Utility
Auto Generating Build Time Policies from Run Time Policies for Shift Left Security
6 Jul 23
Comprehensive matching allows for automated conversion from runtime policy rules to build time rules that can be applied to an IaC configuration file(s).
Krishnan Shankar Narayan, Shrikumar Narayan Chari
Filed: 31 Dec 21
Utility
Data Driven Customer Churn Analytics
29 Jun 23
A customer analytics ecosystem has been created that identifies factors in customer/account data that have correlations with customer churn based on statistical analysis, uses those factors to then predict likelihood of customer churn for customers, and generates recommendations to retain those customers identified as likely to attrite.
Guangyu Zhu, Julian Levart Aronowitz, Tomena Lionel Some, Venugopal Malyala
Filed: 27 Dec 21
Utility
Enhanced Identification of Sources of Delays In Packet Delivery along a Path
29 Jun 23
An initial test is executed to determine an end-to-end latency of a path between a source and a destination.
John Edward Bothe, Hristos Siakou
Filed: 28 Dec 21
Utility
Outbound/inbound Lateral Traffic Punting Based on Process Risk
29 Jun 23
Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed.
Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
Filed: 23 Feb 23
Utility
Securing control and user plane separation in mobile networks
27 Jun 23
Techniques for securing control and user plane separation in mobile networks (e.g., service provider networks for mobile subscribers, such as for 4G/5G networks) are disclosed.
Leonid Burakovsky, Sachin Verma, Fengliang Hu, I-Chun Chen, How Tung Lim
Filed: 30 Jun 20
Utility
Multi-layered policy management
27 Jun 23
Techniques for enforcing policy on multiple levels, including context-based and/or packet-based, as well as one or more of event-based, activity-based, and behavior-based.
Jun Du
Filed: 31 Dec 19
Utility
Method for distributed application segmentation through authorization
27 Jun 23
Methods and supporting systems for managing secure communications and establishing authenticated communications between processes of a computer application operating across network domains are provided.
Dimitri Styliadis, Satyam Sinha
Filed: 17 May 21
Utility
Autoscaling of data processing computing systems based on predictive queue length
30 May 23
To enhance the scaling of data processing systems in a computing environment, a number of data objects indicated in an allocation queue and a first attribute of the allocation queue are determined, where the allocation queue is accessible to a plurality of data processing systems.
Philip Simon Tuffs
Filed: 13 Jan 22
Utility
Process privilege escalation protection in a computing environment
30 May 23
Techniques for process privilege escalation protection in a computing environment are disclosed.
Yaron Lavi, Eldar Aharoni, Elad Wexler
Filed: 22 Feb 21
Utility
Distributed offload leveraging different offload devices
30 May 23
Techniques for distributed offload leveraging different offload devices are disclosed.
John Edward McDowall, James Sugg, Charles Bransi
Filed: 30 Apr 21
Utility
Enhanced Cloud Infrastructure Security Through Runtime Visibility into Deployed Software
25 May 23
A system retrieves from cloud storage a packet(s) sampled from network traffic detected for software deployed on a cloud instance within a cloud environment.
Krishnan Shankar Narayan, Yonghui Cheng
Filed: 23 Nov 21