301 patents
Page 7 of 16
Utility
Cloud-based 5G security network architectures
8 Sep 22
A Multi-Access Edge Compute (MEC) system includes a plurality of compute resources including one or more processors configured to implement services; wherein the services include any of edge services, routing functions, and hosted services; and wherein the services further include cloud-based security services implemented in the MEC in conjunction with a cloud-based security system that includes a plurality of nodes and offers multi-tenant cloud-based security services, and wherein the cloud-based security services implemented in the MEC are for subscribers of a service provider associated with the MEC.
Nathan Howe, Kenneth B. Urquhart
Filed: 9 Jul 21
Utility
Intelligent steering in 5G
8 Sep 22
The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering.
Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
Filed: 21 Mar 22
Utility
ssv4v0 2volwify0ng2bvup44fypc813cem9yynyfziextvcdo
8 Sep 22
Cloud-based 5G security, implemented in a Multi-Access Edge Compute (MEC) system, includes steps of receiving a request for a workload from User Equipment (UE); determining a type of traffic for the workflow and querying a machine learning engine based on the traffic type; informing the UE of how the workflow should be accessed; and receiving an updated request for the workflow and steering the traffic based on how the workflow should be steered.
Nathan Howe, Kenneth B. Urquhart
Filed: 1 Oct 21
Utility
60rgsyh bspetnsrzzlo2n4y9aagiqmfo
8 Sep 22
The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering.
Nathan Howe, Kenneth B. Urquhart, Subramanian Srinivasan, Sridhar Kartik Kumar Chatnalli Deshpande, Patrick Foxhoven
Filed: 21 Mar 22
Utility
fg3f gb7pujv1uv12okcdow6tlp1hfkq
8 Sep 22
A method, implemented in a cloud-based system, includes, responsive to a client device having a Subscriber Identity Module (SIM) card therein connecting to a mobile network from a mobile network operator, receiving authentication of the client device based on the SIM card; receiving forwarded traffic from the client device; and processing the forwarded traffic according to policy, wherein the policy is determined based on one of a user of the client device and a type of the client device, each being determined based on the SIM card.
Nathan Howe
Filed: 8 Mar 21
Utility
c8eypxg39xggkx7cslc75vvi2m16zbe4lskj5tsw907vh371lzgf3phl3ar
6 Sep 22
Systems and methods include receiving a domain of interest; performing an analysis of the domain to extract namespaces of the domain, hosts associated with the domain, subdomains associated with the domain, namespaces of the subdomains, and addresses including address ranges of any identified namespaces; performing a Common Vulnerabilities and Exposures (CVE) search based on the analysis to identify a CVE list associated with the domain; determining weightings of the namespaces of the domain and the subdomains to provide a name list; obtaining cloud monitoring content associated with the domain; and utilizing the name list, the CVE list, and the cloud monitoring content to determine a risk associated with the domain.
Nathan Howe
Filed: 3 Apr 20
Utility
72he1nl v8dp2l9goulko780lox0c3
1 Sep 22
Systems and methods include monitoring user experience of one or more users accessing any of the Internet, cloud applications, and private applications; determining a user experience score for the one or more users; responsive to detecting a low user experience score for a user, performing one or more analyses on the user experience of the user; and determining a root cause of the low user experience score based on the one or more analyses.
Prasannakumar Jobigenahally Malleshaiah, Satish Kalipatnapu, Chakkaravarthy Periyasamy Balaiah, Javier Rodriguez Gonzalez, Jay Makwana, Sandeep Kamath, Pankaj Chhabra
Filed: 21 Mar 22
Utility
9hwaw9z w234d26vpab5k9g2u6hz5k8o3z44tx
1 Sep 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Sandeep Kamath Voderbet, Chakkaravarthy Periyasamy Balaiah, Srikanth Devarajan
Filed: 1 Mar 21
Utility
xgjzv8zx2ab50x0t27pup0khgv3rl4lnmg4o
1 Sep 22
A system validates the establishment and/or continuation of a connection between two applications over a network.
Peter Nahas, Peter Smith, Harry Sverdlove, John O'Neil, Scott Laplante, Andriy Kochura
Filed: 18 May 22
Utility
hv45jxn0gvjk7axz28jmph2tpwjvw3
30 Aug 22
Systems and methods include obtaining a file to be checked for Data Loss Prevention (DLP); determining a cryptographic hash of the file and comparing the cryptographic hash to corresponding cryptographic hashes of indexed files; responsive to a match between the cryptographic hash and one of the corresponding cryptographic hashes, determining a DLP match and performing an action based thereon; responsive to no match, extracting text from the file and creating an ordered sequence of hashes of variable length chunks of the extracted text; and determining the DLP match with one of the indexed files based on comparing the ordered sequence of hashes with corresponding ordered sequence of hashes of the indexed files.
Narinder Paul, Arun Bhallamudi, Balakrishna Bayar, James Tan
Filed: 8 Jul 20
Utility
cpz4cz5hvtxbzokeuh83uhimwn1k7k876cn15m6g3hf41
23 Aug 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Pankaj Chhabra, Sandeep Kamath
Filed: 14 Jan 21
Utility
b8k5mx4elyrv1cfyyh5m7wufz876nk2wdu0ukmswfp6kto25xui7ry2
23 Aug 22
Systems and methods include receiving a request, in a cloud system from a user device, to access an application, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user device is remote over the Internet; determining if the user device is permitted to access the application; if the user device is not permitted to access the application, notifying the user device the application does not exist; and if the user device is permitted to access the application, stitching together connections between the cloud system, the application, and the user device to provide access to the application.
Patrick Foxhoven, John A. Chanak, William Fehring, Denzil Wessels, Purvi Desai, Manoj Apte, Sudhindra P. Herle
Filed: 1 Aug 19
Utility
3vka5ooyo0n56pdb0c0h6yo73ii38uov
11 Aug 22
Cloud-based data loss prevention (DLP) systems and methods include monitoring a file to be checked for sensitive data from a user associated with a tenant; obtaining one or more dictionaries for the tenant; identifying a DLP match based on any of identifying exact document matches between the file and files in the one or more dictionaries, identifying same text in the file as in an indexed document in the one or more dictionaries, identifying content in the file that contains a subset of text in an indexed document in the one or more dictionaries, and identifying content that is similar but not exact as the text in an indexed document in the one or more dictionaries; and, responsive to the DLP match, blocking the file in the cloud-based system.
Narinder Paul, Arun Bhallamudi, Balakrishna Bayar, James Tan
Filed: 26 Apr 22
Utility
bzhjhynufzh93t6bpr m0won47gnsjo37q9hv0
11 Aug 22
Systems and methods include providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network; continuously collecting packets intercepted by the enterprise application over a time interval, wherein the collected packets are collected over the time interval; and responsive to an issue with functionality of the enterprise application, transmitting the collected packets to a back end server for troubleshooting of the issue.
Rohit Goyal, Rishabh Gupta
Filed: 25 Apr 22
Utility
pvf6cub y6k3ozqd3wv8o547gccs3oqmn97d
9 Aug 22
Embodiments of the present invention generate network communication policies by applying machine learning to existing network communications, and without using information that labels such communications as healthy or unhealthy.
John O'Neil
Filed: 10 Jun 20
Utility
8njn2diaeze8is1861k46hcplum1310
4 Aug 22
Disclosed is a computer implemented method for malware detection that analyses a file on a per packet basis.
Huihsin Tseng, Hao Xu, Jian L. Zhen
Filed: 20 Apr 22
Utility
8dv7hbprrfhx3vdmjayrxzq1gmde9z
4 Aug 22
Techniques for using trace with tunnels and cloud-based systems for determining measures of network performance are presented.
Sandeep Kamath
Filed: 25 Feb 22
Utility
bykdkcdmqklsun7r1lyvbvio3dpc
28 Jul 22
A system and method for classifying entities accessing computing resources are provided.
Arik KFIR, Hila Paz HERSZFANG
Filed: 27 Jan 21
Utility
faa h0jni6c39r5628dkviry753g33
21 Jul 22
A node configured as any of a proxy, a Secure Web Gateway, and a Secure Internet Gateway is configured to perform steps of establishing a connection with a user device having a user associated with a tenant; obtaining policy for the user; monitoring traffic between the user device and the Internet including snooping session keys for any encrypted traffic; analyzing the traffic based on the policy including utilizing the session keys on the encrypted traffic; and one of allowing, blocking, or limiting the traffic based on the analyzing.
Srikanth Devarajan, Vijay Bulusu, Leslie McCutcheon
Filed: 7 Apr 22
Utility
snncq0czhhlwi0gref22a w5lcriesy47v8hjq5t4sgko2k7u
19 Jul 22
Systems and methods include, in a node operating as a snooping proxy, monitoring traffic between a user device and the Internet; detecting and monitoring a handshake between the user device and an endpoint for determining keys associated with encryption between the user device and the endpoint; monitoring encrypted traffic between the user device and the endpoint subsequent to the handshake based on the keys; and performing one or more security functions on the encrypted traffic based on the monitoring.
Srikanth Devarajan, Vijay Bulusu, Leslie McCutcheon
Filed: 30 Apr 20