290 patents
Page 3 of 15
Utility
Cobalt strike beacon HTTP C2 heuristic detection
26 Sep 23
Techniques for Cobalt Strike Beacon HTTP C2 heuristic detection are disclosed.
Yanhui Jia, Christian Elihu Navarrete Discua, Durgesh Madhavrao Sangvikar, Ajaya Neupane, Yu Fu, Shengming Xu
Filed: 29 Jul 22
Utility
Domain-independent resource security and management
26 Sep 23
A resource database which stores structured data describing resources from a diverse array of origins (e.g., an application or cloud environment) is built and maintained to support querying, policy enforcement, and remediation of resources from any origin.
Angad Abhay Mehata, Chandra Biksheswaran Mouleeswaran, Varun Badhwar, Wayne Jens Jensen
Filed: 5 Apr 21
Utility
Browser storage for clientless VPN
19 Sep 23
A native web storage function call is received at a client device.
Qi Zhang, Jiangxia Liu
Filed: 23 Sep 20
Utility
Automated content tagging with latent dirichlet allocation of contextual word embeddings
19 Sep 23
Dynamic content tags are generated as content is received by a dynamic content tagging system.
Nandan Gautam Thor, Vasiliki Arvaniti, Jere Armas Michael Helenius, Erik Michael Bower
Filed: 25 Feb 20
Utility
Whitelisting clients accessing resources via a secure web gateway with time-based one time passwords for authentication
19 Sep 23
Each tenant of a secure web gateway (SWG) is issued a secret key.
Mohit Sahni
Filed: 7 May 21
Utility
Securely publishing applications from private networks
12 Sep 23
A controller can securely publish an application of a tenant by securely extending a network fabric into the networks of the tenant with virtual private networks and NAT.
Jayant Jain, Brian Russell Kean, Aditya Srinivasa Ivaturi, Mohit Sahni, Mingfei Peng
Filed: 1 Dec 22
Utility
Smart proxy for a large scale high-interaction honeypot farm
12 Sep 23
Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are disclosed.
Zihang Xiao, Cong Zheng, Jiangxia Liu
Filed: 13 Jan 22
Utility
Large scale high-interactive honeypot farm
12 Sep 23
Techniques for providing a large scale high-interaction honeypot farm are disclosed.
Zihang Xiao, Cong Zheng, Jiangxia Liu
Filed: 13 Jan 22
Utility
Explorable visual analytics system having reduced latency in loading data
5 Sep 23
A method and system for processing datasets having a number of data points are described.
Seyed Amir Yahyavi Firouz Abadi, Saman Amirpour Amraii, Laleh Roosta Pour
Filed: 29 Apr 21
Utility
Communicating URL categorization information
5 Sep 23
A URL categorization query is received.
Dao-Chen Zheng, Wei Cao, William Redington Hewlett, II, Shangde Zhou
Filed: 16 Aug 19
Utility
Multi-access edge computing services security in mobile networks by parsing application programming interfaces
5 Sep 23
Techniques for providing multi-access edge computing (MEC) services security in mobile networks (e.g., service provider networks for mobile subscribers, such as for 5G networks) by parsing Application Programming Interfaces (APIs) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 13 Apr 22
Utility
Flow metadata exchanges between network and security functions for a security service
5 Sep 23
Techniques for providing flow meta data exchanges between network and security functions for a security service are disclosed.
Anand Oswal, Arivu Mani Ramasamy, Bhaskar Bhupalam, Shu Lin
Filed: 14 Jul 21
Utility
Enhanced SD-WAN path quality measurement and selection
22 Aug 23
Techniques for enhanced Software-Defined Wide Area Network (SD-WAN) path quality measurement and selection are disclosed.
Chunqing Cai, Philip Kwan, Lin Wang, Lei Chang, Sameer Kumar, Pulikeshi Ramanath, Santosh Narayankhedkar
Filed: 7 Dec 21
Utility
Object property getter and setter for clientless VPN
22 Aug 23
Content obtained from a remote server by a clientless VPN is received in response to a request made by a client browser executing on a client device.
Jiangxia Liu, Qi Zhang
Filed: 14 Jan 22
Utility
In-line detection of algorithmically generated domains
15 Aug 23
Detection of algorithmically generated domains is disclosed.
Daiping Liu, Martin Walter, Ben Hua, Suquan Li, Fan Fei, Seokkyung Chung, Jun Wang, Wei Xu
Filed: 30 Sep 19
Utility
Preventing ransomware from encrypting files on a target machine
8 Aug 23
Techniques for preventing ransomware from encrypting files on a target machine are disclosed.
Eldar Aharoni, Vadim Goldstein, Mashav Sapir, Jenny Kitaichik
Filed: 17 Nov 22
Utility
Application-level sandboxing on devices
8 Aug 23
Execution of an application in an application-level sandbox is disclosed.
Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
Filed: 21 Oct 21
Utility
Security for cellular internet of things in mobile networks based on subscriber identity and application identifier
8 Aug 23
Techniques for providing security for Cellular Internet of Things (CIoT) in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky, Jesse C. Shu, Lei Chang
Filed: 8 Mar 22
Utility
IoT device discovery and identification
8 Aug 23
Techniques for performing Internet of Things (IoT) device identification are disclosed.
Jun Du, Yilin Zhao
Filed: 20 Jul 21
Utility
Sample traffic based self-learning malware detection
1 Aug 23
Techniques for sample traffic based self-learning malware detection are disclosed.
Yanhui Jia, Matthew W. Tennis, Stefan Achleitner, Taojie Wang, Hui Gao, Shengming Xu
Filed: 29 Jul 22