215 patents
Utility
Selective Traffic Processing In a Distributed Cloud Computing Network
23 Mar 23
A server receives internet traffic from a client device.
Achiel Paul van der Mandele, Eric Reeves
Filed: 29 Nov 22
Utility
Generating Early Hints Informational Responses at an Intermediary Server
23 Mar 23
An intermediary server receives a request from a client that identifies an asset that is handled by an origin server.
Alex Krivit, Rustam Xing Lalkaka, Samantha Aki Shugaeva, Edward H. Wang, Yuchen Wu
Filed: 2 May 22
Utility
Mobile Accelerator
16 Mar 23
A mobile accelerator system includes point of presences (POPs) that includes an entry POP.
Jeff Sesung Kim, Jun Ho Choi
Filed: 16 Aug 22
Utility
Protecting Internet of Things (IoT) Devices at the Network Level
16 Mar 23
An Internet of Things (IoT) protection service at the network level is described.
Dani Grant
Filed: 1 Aug 22
Utility
Responding to Search Requests Based on Referrer Information
9 Mar 23
For each network resource request received at a server of a cloud-based service, a determination of whether that request originated from a second network resource is made.
Marek Przemyslaw MAJKOWSKI, Maciej BILAS, David Paul WRAGG
Filed: 8 Aug 22
Utility
Internet Protocol Security (Ipsec) Tunnel Using Anycast at a Distributed Cloud Computing Network
9 Mar 23
An IPsec tunnel request for establishing an IPsec tunnel from a customer router to an anycast IP address of a distributed cloud computing network is received.
Michael John Vanderwater, Adam Simon Chalmers, Nuno Miguel Lourenço Diegues, Arég Harutyunyan, Erich Alfred Heine, Nicholas Alexander Wondra
Filed: 31 Oct 22
Utility
Modifying the Congestion Control Algorithm Applied to a Connection Based on Request Characteristics
23 Feb 23
An edge server receives a first request message for transmission to the host device.
Jun Ho Choi
Filed: 7 Nov 22
Utility
Secure Private Traffic Exchange In a Unified Network Service
16 Feb 23
Traffic is received at an interface of a compute server.
Nicholas Alexander Wondra
Filed: 31 Oct 22
Utility
Method and System for Reliable Application Layer Data Transmission Through Unreliable Transport Layer Connections In a Network
16 Feb 23
A first transport protocol connection is established between a first proxy network element and a second proxy network element.
Michael John VANDERWATER, Nicholas Alexander WONDRA
Filed: 1 Nov 22
Utility
Concurrency Control In an Asynchronous Event-loop Based Program Environment
9 Feb 23
Concurrency control in an asynchronous event-loop based program environment is described.
Kenton Taylor Varda, Alex Dwane Robinson
Filed: 2 May 22
Utility
Mobile Application Accelerator
9 Feb 23
Techniques for providing mobile device content delivery acceleration for mobile applications are discussed herein.
Jeff Sesung Kim, Junho Choi, Sang Jo Lee, Young Keun Park, Tianyu Shi
Filed: 25 Oct 22
Utility
Establishing and Using a Tunnel from an Origin Server In a Distributed Edge Compute and Routing Service
9 Feb 23
An edge server of a distributed edge compute and routing service receives a tunnel connection request from a tunnel client residing on an origin server, that requests a tunnel be established between the edge server and the tunnel client.
Dane Orion KNECHT, John GRAHAM-CUMMING, Dani GRANT, Christopher Philip BRANCH, Tom PASEKA
Filed: 25 Apr 22
Utility
Implementing a Queuing System In a Distributed Network
26 Jan 23
A web application has a limit on the total number of concurrent users.
George Thomas, Dimitrios Antonellis, Mathew Jacob, Fabienne Heitiare Semeria
Filed: 29 Sep 22
Utility
State Management and Object Storage In a Distributed Cloud Computing Network
26 Jan 23
A first compute server of a distributed cloud computing network receives a request from a first client device for an object to be handled by an object worker that includes a single instantiation of a piece of code that solely controls reading and writing access to the first object.
Kenton Taylor Varda, Kyle Kloepper
Filed: 30 Sep 22
Utility
Cloud computing platform that executes third-party code in a distributed cloud computing network
24 Jan 23
A compute server receives a request from a client device that triggers execution of a third-party code piece.
Kenton Taylor Varda, Zachary Aaron Bloom, Marek Przemyslaw Majkowski, Ingvar Stepanyan, Kyle Kloepper, Dane Orion Knecht, John Graham-Cumming, Dani Grant
Filed: 7 Dec 20
Utility
Applying filter expressions to requests at an edge server
24 Jan 23
An edge server receives a request from a client device for an action to be performed on a resource.
David Alexander Kitchen
Filed: 15 Nov 18
Utility
Loading and managing third-party tools on a website
24 Jan 23
Managing the loading of third-party tools on a website is described.
Yair Dovrat, Yoav Moshe
Filed: 28 Mar 22
Utility
Method and apparatus for traffic optimization in virtual private networks (VPNs)
24 Jan 23
Method and apparatus for traffic optimization in virtual private networks (VPNs).
Christopher Philip Branch, Dane Orion Knecht
Filed: 22 Dec 21
Utility
Intelligently Routing a Response Packet along a Same Connection As a Request Packet
19 Jan 23
A first edge server of multiple edge servers of a distributed edge computing network receives a request from a client device regarding a resource hosted at an origin server according to an anycast implementation.
Marek Przemyslaw MAJKOWSKI, Alexander FORSTER, Maciej BILAS
Filed: 29 Sep 22
Utility
Machine learning-based malicious attachment detector
17 Jan 23
In an embodiment, a computer-implemented method includes receiving, from a pre-processor, an output file; where the output file is created by the pre-processor in response to input of an electronic file to the pre-processor; where the electronic file is an attachment to a message that is in-transit to a recipient computer on a network; where the output file contains features that are created by the pre-processor analyzing one or more sub-features of the electronic file; receiving, from a machine learning-based classifier, malware classification data that indicates whether the electronic file does or does not contain malware; where the malware classification data is output by the machine learning-based classifier in response to the machine learning-based classifier determining that the features are or are not indicators of obfuscation; where data used to create the machine learning-based classifier includes output files previously created by the pre-processor; in response to the malware classification data matching a criterion, causing the network to modify, delay, or block transmission of the electronic file to the recipient computer.
Torsten Zeppenfeld, Javier Castro
Filed: 24 Dec 18