262 patents
Page 5 of 14
Utility
Intelligently routing a response packet along a same connection as a request packet
1 Nov 22
A first edge server of multiple edge servers of a distributed edge computing network receives a request from a client device regarding a resource hosted at an origin server according to an anycast implementation.
Marek Przemyslaw Majkowski, Alexander Forster, Maciej Biłas
Filed: 22 Dec 20
Utility
Non-HTTP layer 7 protocol applications running in the browser
1 Nov 22
Layer 7 protocol (non-HTTP) client applications are executed in the browser.
Killian Koenig, Dane Orion Knecht, James Royal
Filed: 22 Dec 21
Utility
Mobile application accelerator
25 Oct 22
Techniques for providing mobile device content delivery acceleration for mobile applications are discussed herein.
Jeff Sesung Kim, Junho Choi, Sang Jo Lee, Young Keun Park, Tianyu Shi
Filed: 22 Dec 20
Utility
Method and Apparatus of Automatic Generation of a Content Security Policy for a Network Resource
20 Oct 22
Methods and apparatuses for automatic determination of a content security policy for a network resource are described.
Jesse Kipp, Patrick Meenan
Filed: 15 Feb 22
Utility
Non-http Layer 7 Protocol Applications Running In the Browser
20 Oct 22
Layer 7 protocol (non-HTTP) client applications are executed in the browser.
Killian Koenig, Dane Orion Knecht, James Royal
Filed: 22 Dec 21
Utility
Isolating internet-of-things (IoT) devices using a secure overlay network
11 Oct 22
A server of a distributed cloud computing network receives, over a tunnel established between a customer-premises equipment and the compute server, traffic from an Internet-of-Things (IoT) device that is connected to the CPE.
Derek Chamorro, Molly Rose Cinnamon, Tom Paseka, Nicholas Wondra
Filed: 18 Mar 22
Utility
Using a Zero-knowledge Proof to Prove Knowledge That a Website Visitor Is a Legitimate Human User
6 Oct 22
A client device receives a challenge request from a server to prove that internet traffic was initiated by a human user through verifying a physical interaction between a human user and a hardware component.
Watson Bernard Ladd, Alexander Andrew Davidson, Marwan Fayed, Armando Faz Hernández, Sai Krishna Deepak Maram, Nicholas Thomas Sullivan
Filed: 30 Mar 21
Utility
Unified Network Service That Connects Multiple Disparate Private Networks and End User Client Devices Operating on Separate Networks
22 Sep 22
A unified network service that connects multiple disparate private networks and end user client devices operating on separate networks is described.
Nicholas Alexander Wondra, Igor Postelnik, Michael John Vanderwater, Adam Simon Chalmers, Nuno Miguel Lourenço Diegues, Arég Harutyunyan, Erich Alfred Heine
Filed: 21 Mar 22
Utility
Persisting Encrypted Remote Browser Data At a Local Browser for Use in a Remote Browser
22 Sep 22
A remote browsing session is initiated between a remote browser client executing on a client device and a remote browser host executing on a remote browser server.
Joshua Thomas Claeys, Benjamin Buzbee, Pierre Cauchois, Killian Koenig, Trevor Sundberg
Filed: 19 Mar 21
Utility
Selection of an Egress Ip Address for Egress Traffic of a Distributed Cloud Computing Network
8 Sep 22
A map of IP addresses of a distributed cloud computing network to one or more groupings is stored.
Marek Przemyslaw Majkowski, Braden Michael Ehrat, Sergi Isasi, Dane Orion Knecht, Dina Kozlov, Rustam Xing Lalkaka, Eric Reeves, Oliver Zi-gang Yu
Filed: 23 Aug 21
Utility
Selection of an egress IP address for egress traffic of a distributed cloud computing network
6 Sep 22
A map of IP addresses of a distributed cloud computing network to one or more groupings is stored.
Marek Przemyslaw Majkowski, Braden Michael Ehrat, Sergi Isasi, Dane Orion Knecht, Dina Kozlov, Rustam Xing Lalkaka, Eric Reeves, Oliver Zi-Gang Yu
Filed: 23 Aug 21
Utility
Secure session capability using public-key cryptography without access to the private key
6 Sep 22
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server.
Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Nicholas Thomas Sullivan, Albertus Strasheim
Filed: 16 Mar 20
Utility
Virtual private network (VPN) whose traffic is intelligently routed
23 Aug 22
A request is received from a client device over a Virtual Private Network (VPN) tunnel.
Christopher Philip Branch, Naga Sunil Tripirineni, Rustam Xing Lalkaka, Nick Wondra, Mohd Irtefa, Matthew Browning Prince, Andrew Taylor Plunk, Oliver Yu, Vlad Krasnov
Filed: 31 Mar 20
Utility
Mobile accelerator
16 Aug 22
A mobile accelerator system includes point of presences (POPs) that includes an entry POP.
Jeff Sesung Kim, Jun Ho Choi
Filed: 8 Jul 19
Utility
Implementing a tiered cache topology with anycast networks
9 Aug 22
A control server receives probe data from a plurality of data centers indicating measured latencies with a first IP address associated with an origin server.
Zaidoon Abd Al Hadi, Samantha Aki Shugaeva, Yuchen Wu, Brian C. Bradley
Filed: 10 Jun 21
Utility
Methods and systems for detection of security threats on network resources based on referrer information
9 Aug 22
A method and system for detection of security threats on network resources based on referrer indications are presented.
Marek Przemyslaw Majkowski, Maciej Biłas, David Paul Wragg
Filed: 24 Mar 20
Utility
Protecting internet of things (IoT) devices at the network level
2 Aug 22
An Internet of Things (IoT) protection service at the network level is described.
Dani Grant
Filed: 29 Apr 19
Utility
Deep learning-based detection of phishing links
26 Jul 22
In an embodiment, the disclosed technologies include extracting, from a link contained in an electronic message received from an upstream device on a network, first unit-level input data of a first semantic type and second unit-level input data of a second semantic type; in response to inputting the first and second unit-level input data into first and second deep learning models, respectively, outputting, by the first and second deep learning models, first and second unit-level classification data that corresponds to the first and second unit-level input data, respectively, the first deep learning model having been trained to recognize, in unit-level data of the first semantic type, first patterns of syntactic features and semantic features that are predictive of phishing and the second deep learning model having been trained to recognize, in unit-level data of the second semantic type, second patterns of syntactic features and semantic features that are predictive of phishing; combining the first and second unit-level classification data with at least one numeric feature that has been extracted from context data to produce link-level input data; in response to inputting the link-level input data into a third deep learning model, outputting, by the third deep learning model, link-level classification data, the third deep learning model having been trained to recognize patterns of syntactic features and semantic features and numeric features that are predictive of phishing; in response to the link-level classification data matching a criterion, causing the network to modify, delay, or block transmission of the electronic message to a downstream device.
Umalatha Batchu
Filed: 4 Jun 19
Utility
Business Email Compromise Detection System
21 Jul 22
In an embodiment, the disclosed technologies monitor electronic message traffic between a network and a recipient computer system.
Umalatha Batchu, Torsten Zeppenfeld, Blake Darche, Philip Syme
Filed: 15 Jan 21
Utility
Identity proxy and access gateway
19 Jul 22
A server transmits to a third-party application a request for a resource that is received from a client.
James Howard Royal, Samuel Douglas Rhea
Filed: 13 Oct 21