290 patents
Utility
Malicious JS detection based on automated user interaction emulation
16 Jan 24
Detection of malicious JavaScript based on automated user interaction emulation is disclosed.
Jin Chen, Tao Yan, Taojie Wang, Bo Qu
Filed: 2 Nov 21
Utility
Dynamic path selection and data flow forwarding
9 Jan 24
Various techniques for dynamic path selection and data flow forwarding are disclosed.
Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy
Filed: 6 Oct 22
Utility
Using browser context in evasive web-based malware detection
2 Jan 24
The use of browser context in detecting malware is disclosed.
Tongbo Luo, Xin Ouyang, Zhaoyan Xu, Xing Jin
Filed: 21 Jul 22
Utility
Context profiling for malware detection
2 Jan 24
Analysis of samples for maliciousness is disclosed.
Jun Wang, Wei Xu
Filed: 11 Feb 22
Utility
Inline package name based supply chain attack detection and prevention
2 Jan 24
Inline package name based supply chain attack detection and prevention is disclosed.
Ruian Duan, Daiping Liu, Jun Wang, Zihang Xiao
Filed: 30 Sep 22
Utility
Pattern-based malicious URL detection
19 Dec 23
To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository.
Fang Liu, Yuchen Zhou, Jun Wang
Filed: 7 Jul 22
Utility
Infrastructure as code resource definition correction system
12 Dec 23
A method, including accessing a corpus or infrastructure as code modules including respective resource definitions for provisioning and deploying a plurality of computing resources configured to execute one or more software applications.
Tohar Zand, Nimrod Kor, Rotem Avni, Naor David, Ariel Kruszyn
Filed: 18 Apr 22
Utility
Stateful packet inspection and classification
5 Dec 23
Stateful inspection and classification of packets is disclosed.
Philip Kwan, Shu Lin
Filed: 14 Jan 22
Utility
Providing application security using causal graph
5 Dec 23
Computer systems and methods are provided for storing a first path profile.
Subramanian Varadarajan, Rosarin Roy Antonyraj
Filed: 12 Nov 20
Utility
Mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks
5 Dec 23
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky, Jesse C. Shu, Chang Li
Filed: 7 Mar 22
Utility
Encoding-free JavaScript stringify for clientless VPN
5 Dec 23
A client device requests a web page via a clientless VPN.
Jiangxia Liu, Qi Zhang, Bin Zhao
Filed: 21 Oct 22
Utility
Dynamic analysis techniques for applications
21 Nov 23
A sample is analyzed to determine a set of events that should be selected for performing by a dynamic analyzer executing the sample in an instrumented, emulated environment.
Cong Zheng, Wenjun Hu, Zhi Xu
Filed: 21 Nov 22
Utility
Firewall switchover with minimized traffic disruption
21 Nov 23
A pseudo-active/active firewall configuration handles firewall switchover events without traffic disruption.
Tapraj Singh, Nazanin Magharei, Rimu Bhardwaj, Harshavardhan Parandekar, Vikram Guleria
Filed: 13 May 22
Utility
Dynamic security scaling
21 Nov 23
An indication that a change associated with adjusting capacity to provide security services to network traffic in a network environment is received.
Philip Kwan, Sudeep Padiyar
Filed: 22 Dec 21
Utility
Building multi-representational learning models for static analysis of source code
14 Nov 23
A system/process/computer program product for building multi-representational learning models for static analysis of source code includes receiving training data, wherein the training data includes a set of source code files for training a multi-representational learning (MRL) model for classifying malicious source code and benign source code based on a static analysis; generating a first feature vector based on a set of characters extracted from the set of source code files; generating a second feature vector based on a set of tokens extracted from the set of source code files; and performing an ensemble of the first feature vector and the second feature vector to form a target feature vector for classifying malicious source code and benign source code based on the static analysis.
Brody James Kutt, William Redington Hewlett, Oleksii Starov, Yuchen Zhou, Fang Liu
Filed: 2 Feb 23
Utility
Security appliance to monitor networked computing environment
14 Nov 23
A security appliance monitors streams of events and detects anomalous behavior by users with respect to software defined infrastructure.
Chandra Mouleeswaran, Wayne Jensen
Filed: 11 Apr 22
Utility
Identification of malicious domain campaigns using unsupervised clustering
14 Nov 23
The technology presented herein enables the use of a clustering algorithm to identify additional malicious domains based on known malicious domains.
Michael Edward Weber, Jun Wang, Yuchen Zhou, Wei Xu
Filed: 12 Jul 18
Utility
Reducing memory footprint after TLS connection establishment
14 Nov 23
For connection establishment, a system allocates memory that will be occupied by the data and handshake sub-protocol infrastructure that facilitates establishing a TLS connection.
Mohit Sahni, Saurabh Tripathi
Filed: 29 May 20
Utility
Data blaming
7 Nov 23
A copy of a model comprising a plurality of trees is received, as is a copy of training set data comprising a plurality of training set examples.
William Redington Hewlett, II, Seokkyung Chung, Lin Xu
Filed: 6 Aug 22
Utility
Packet classification for network routing
7 Nov 23
Techniques for packet classification for network routing are disclosed.
Nir Zuk, Marc Joseph Benoit
Filed: 14 Jun 22