262 patents
Page 4 of 14
Utility
Implementing a Queuing System In a Distributed Network
26 Jan 23
A web application has a limit on the total number of concurrent users.
George Thomas, Dimitrios Antonellis, Mathew Jacob, Fabienne Heitiare Semeria
Filed: 29 Sep 22
Utility
Cloud computing platform that executes third-party code in a distributed cloud computing network
24 Jan 23
A compute server receives a request from a client device that triggers execution of a third-party code piece.
Kenton Taylor Varda, Zachary Aaron Bloom, Marek Przemyslaw Majkowski, Ingvar Stepanyan, Kyle Kloepper, Dane Orion Knecht, John Graham-Cumming, Dani Grant
Filed: 7 Dec 20
Utility
Applying filter expressions to requests at an edge server
24 Jan 23
An edge server receives a request from a client device for an action to be performed on a resource.
David Alexander Kitchen
Filed: 15 Nov 18
Utility
Loading and managing third-party tools on a website
24 Jan 23
Managing the loading of third-party tools on a website is described.
Yair Dovrat, Yoav Moshe
Filed: 28 Mar 22
Utility
Method and apparatus for traffic optimization in virtual private networks (VPNs)
24 Jan 23
Method and apparatus for traffic optimization in virtual private networks (VPNs).
Christopher Philip Branch, Dane Orion Knecht
Filed: 22 Dec 21
Utility
Intelligently Routing a Response Packet along a Same Connection As a Request Packet
19 Jan 23
A first edge server of multiple edge servers of a distributed edge computing network receives a request from a client device regarding a resource hosted at an origin server according to an anycast implementation.
Marek Przemyslaw MAJKOWSKI, Alexander FORSTER, Maciej BILAS
Filed: 29 Sep 22
Utility
Machine learning-based malicious attachment detector
17 Jan 23
In an embodiment, a computer-implemented method includes receiving, from a pre-processor, an output file; where the output file is created by the pre-processor in response to input of an electronic file to the pre-processor; where the electronic file is an attachment to a message that is in-transit to a recipient computer on a network; where the output file contains features that are created by the pre-processor analyzing one or more sub-features of the electronic file; receiving, from a machine learning-based classifier, malware classification data that indicates whether the electronic file does or does not contain malware; where the malware classification data is output by the machine learning-based classifier in response to the machine learning-based classifier determining that the features are or are not indicators of obfuscation; where data used to create the machine learning-based classifier includes output files previously created by the pre-processor; in response to the malware classification data matching a criterion, causing the network to modify, delay, or block transmission of the electronic file to the recipient computer.
Torsten Zeppenfeld, Javier Castro
Filed: 24 Dec 18
Utility
Detecting and isolating an attack directed at an IP address associated with a digital certificate bound with multiple domains
3 Jan 23
An attack is detected on a first IP address and a determination is made that the first IP address is associated with a primary digital certificate that is bound with multiple different domains.
Matthew Browning Prince, Srikanth N. Rao, Lee Hahn Holloway, Ian Gerald Pye
Filed: 22 Feb 21
Utility
Secure session capability using public-key cryptography without access to the private key
3 Jan 23
A first server receives a set of cryptographic parameters from a second server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Albertus Strasheim
Filed: 29 Sep 20
Utility
Selective traffic processing in a distributed cloud computing network
3 Jan 23
A server receives internet traffic from a client device.
Achiel Paul van der Mandele, Eric Reeves
Filed: 22 Jun 20
Utility
Selection of an Egress Ip Address for Egress Traffic of a Distributed Cloud Computing Network
29 Dec 22
A map of IP addresses of a distributed cloud computing network to one or more groupings is stored.
Marek Przemyslaw Majkowski, Braden Michael Ehrat, Sergi Isasi, Dane Orion Knecht, Dina Kozlov, Rustam Xing Lalkaka, Eric Reeves, Oliver Zi-gang Yu
Filed: 6 Sep 22
Utility
Network layer performance and security provided by a distributed cloud computing network
20 Dec 22
A GRE tunnel is configured between multiple computing devices of a distributed cloud computing network and a single origin router of the origin network.
Nicholas Alexander Wondra, Achiel Paul van der Mandele, Alexander Forster, Eric Reeves, Joaquin Madruga, Rustam Xing Lalkaka, Marek Przemyslaw Majkowski
Filed: 21 Sep 21
Utility
Virtual Private Network (VPN) Whose Traffic Is Intelligently Routed
15 Dec 22
A request is received from a client device over a Virtual Private Network (VPN) tunnel.
Christopher Philip Branch, Naga Sunil Tripirineni, Rustam Xing Lalkaka, Nick Wondra, Mohd Irtefa, Matthew Browning Prince, Andrew Taylor Plunk, Oliver Yu, Vlad Krasnov
Filed: 22 Aug 22
Utility
Implementing a Queuing System In a Distributed Network
8 Dec 22
A web application has a limit on the total number of concurrent users.
George Thomas, Dimitrios Antonellis, Mathew Jacob, Fabienne Heitiare Semeria
Filed: 7 Jun 21
Utility
Implementing a queuing system in a distributed network
15 Nov 22
A web application has a limit on the total number of concurrent users.
George Thomas, Dimitrios Antonellis, Mathew Jacob, Fabienne Heitiare Semeria
Filed: 7 Jun 21
Utility
Modifying the congestion control algorithm applied to a connection based on request characteristics
8 Nov 22
An edge server receives a first request message for transmission to the host device.
Jun Ho Choi
Filed: 24 Feb 20
Utility
Method and apparatus for distributed emulation of behavior of a malicious domain
8 Nov 22
A method and apparatus that provide a malicious domain emulator in a distributed cloud computing network are described.
Justin Matthew Paine
Filed: 30 Dec 20
Utility
Internet-based proxy service to modify internet responses
8 Nov 22
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain.
Lee Hahn Holloway, Matthew Browning Prince, Matthieu Philippe François Tourne
Filed: 9 Mar 20
Utility
Intelligently routing a response packet along a same connection as a request packet
1 Nov 22
A first edge server of multiple edge servers of a distributed edge computing network receives a request from a client device regarding a resource hosted at an origin server according to an anycast implementation.
Marek Przemyslaw Majkowski, Alexander Forster, Maciej Biłas
Filed: 22 Dec 20
Utility
Non-HTTP layer 7 protocol applications running in the browser
1 Nov 22
Layer 7 protocol (non-HTTP) client applications are executed in the browser.
Killian Koenig, Dane Orion Knecht, James Royal
Filed: 22 Dec 21