301 patents
Page 8 of 16
Utility
Accurate differential traceroute latency calculation between hops
14 Jul 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Pankaj Chhabra, Sandeep Kamath
Filed: 14 Jan 21
Utility
Detection of network hops and latency through an opaque tunnel and detection misconfiguration of tunnels
14 Jul 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Srikanth Devarajan, Chenglong Zheng, Ajit Singh, Sandeep Kamath, Chakkaravarthy Periyasamy Balaiah, Vladimir Stepanenko
Filed: 14 Jan 21
Utility
TCP traceroute using RST and SYN-ACK to determine destination reachability
14 Jul 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Sandeep Kamath, Chenglong Zheng, Vladimir Stepanenko, Srikanth Devarajan
Filed: 14 Jan 21
Utility
Adaptive probing to discover a protocol for network tracing
14 Jul 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Sandeep Kamath, Pankaj Chhabra
Filed: 14 Jan 21
Utility
Detection of latency, packet drops, and network hops through a tunnel by tracing hops therein
14 Jul 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Srikanth Devarajan
Filed: 14 Jan 21
Utility
Adaptive tracing using one of a plurality of protocols
14 Jul 22
Techniques for using trace with tunnels and cloud-based systems for determining measures of network performance are presented.
Pankaj Chhabra, Sandeep Kamath
Filed: 15 Sep 21
Utility
Systems and methods for security and control of internet of things and ZeroConf devices using cloud services
12 Jul 22
Systems and methods for security and control of Internet of Things (IOT) and ZeroConf devices using cloud services.
Abhinav Bansal
Filed: 30 Oct 19
Utility
Automatic segment naming in microsegmentation
5 Jul 22
Systems and methods include obtaining network communication information about hosts in a network and applications executed on the hosts; automatically generating one or more microsegments in the network based on analysis of the obtained network communication information, wherein each microsegment of the one or more microsegments is a grouping of resources including the hosts and the applications executed on the hosts that have rules for network communication; automatically generating a meaningful name for the one or more microsegments based on a plurality of techniques applied to information associated with the hosts; and displaying the automatically generated one or more microsegments and the corresponding automatically generated meaningful name.
John O'Neil, Peter Smith
Filed: 23 Nov 20
Utility
Data owner controls in DLP
23 Jun 22
Systems and methods include receiving an index of data for exact data matching, wherein the index includes Personally Identifiable Information (PII); receiving policy related to actions to perform for any violations associated with the exact data matching; loading the index and the policy into memory; monitoring traffic for violations, wherein the violations include detection of any values in the index in the traffic; and performing an action responsive to any violations and associated policy.
Pooja Deshmukh
Filed: 30 Dec 21
Utility
Microsegmentation for serverless computing
23 Jun 22
Systems and methods include obtaining a set of policies to in the serverless computing system, wherein the set of policies specify which applications are authorized for communication with the serverless computing system; and modifying rules in a network Access Control List (ACL) associated with the serverless computing system based on the set of policies, wherein the network ACL includes rules that specify allowing and blocking communication.
Peter Smith
Filed: 17 Dec 20
Utility
Administrative policy override in microsegmentation
23 Jun 22
Systems and methods include responsive to monitoring network communications of a network, generating a network communication model that labels the network communications, and generating policies based on the network communication model, wherein the policies specify which applications are authorized to communicate with one another, providing corresponding policies to a plurality systems in the network, wherein each system utilizes the corresponding policies to allow or block communications; responsive to one or more unauthorized communications being needed, performing two-factor authorization to determine if an exception is acceptable; and responsive to the two-factor authorization, providing temporary policies for the exception to allow the one or more unauthorized communications for a period of time.
Thomas E. Keiser, JR., Peter Smith, Lakshmi Suresh
Filed: 23 Dec 20
Utility
Distributed cloud-based security systems and methods
21 Jun 22
A distributed security system includes a plurality of content processing nodes that are located external to a network edge of an enterprise and located external from one of a computer device and a mobile device associated with a user, and a content processing node is configured to monitor a content item that is sent from or requested by the external system; classify the content item via a plurality of data inspection engines that utilize policy data and threat data; and one of distribute the content item, preclude distribution of the content item, allow distribution of the content item after a cleaning process, or perform threat detection on the content item, based on classification by the plurality of data inspection engines; and an authority node communicatively coupled to the plurality of content processing nodes and configured to provide the policy data and the threat data for threat classification.
Kailash Kailash, Shashidhara Mysore Nanjundaswamy, Amarnath Mullick, Jose Kolenchery Rappel
Filed: 17 Feb 20
Utility
Automatic network application security policy expansion
21 Jun 22
A system validates the establishment and/or continuation of a connection between two applications over a network.
Peter Nahas, Peter Smith, Harry Sverdlove, John O'Neil, Scott Laplante, Andriy Kochura
Filed: 11 Jun 20
Utility
Cloud-based Malware Detection
16 Jun 22
Systems, methods and apparatus for malware detection to detect and stop the distribution of malware and other undesirable content before such content reaches computing systems.
Kailash Kailash, Robert L. Voit, Jose Raphel
Filed: 7 Mar 22
Utility
Use of DHCP for location information of a user device for automatic traffic forwarding
14 Jun 22
Systems and methods implemented by an application executed on a user device for service discovery and connectivity include, responsive to joining a new network, performing a Dynamic Host Configuration Protocol (DHCP) operation to obtain network configuration parameters; receiving a DHCP message in response with the network configuration parameters; via an application executed on the user device for service discovery and connectivity analyzing data in the DHCP message to determine one or more forwarding profiles on the new network, wherein the one or more forwarding profiles are based on a location or trust of the new network; and automatically installing the determined one or more forwarding profiles.
Sreedhar Pampati, David Creedy, Vikas Mahajan
Filed: 27 Apr 20
Utility
Cloud application design for efficient troubleshooting
31 May 22
Systems and methods include providing functionality for the user device while operating in background on the user device including providing secure connectivity with a cloud-based system over a network; continuously collecting packets intercepted by the enterprise application over a time interval, wherein the collected packets are collected over the time interval; and responsive to an issue with functionality of the enterprise application, transmitting the collected packets to a back end server for troubleshooting of the issue.
Rohit Goyal, Rishabh Gupta
Filed: 14 Jul 21
Utility
Cloud-based malware detection
31 May 22
Systems, methods and apparatus for malware detection detect and stop the distribution of malware and other undesirable content before such content reaches computing systems.
Kailash Kailash, Robert L. Voit, Jose Raphel
Filed: 28 Dec 17
Utility
Automatic segment naming in microsegmentation
26 May 22
Systems and methods include obtaining network communication information about hosts in a network and applications executed on the hosts; automatically generating one or more microsegments in the network based on analysis of the obtained network communication information, wherein each microsegment of the one or more microsegments is a grouping of resources including the hosts and the applications executed on the hosts that have rules for network communication; automatically generating a meaningful name for the one or more microsegments based on a plurality of techniques applied to information associated with the hosts; and displaying the automatically generated one or more microsegments and the corresponding automatically generated meaningful name.
John O'Neil, Peter Smith
Filed: 23 Nov 20
Utility
System and method for malware detection on a per packet basis
24 May 22
Disclosed is a computer implemented method for malware detection that analyses a file on a per packet basis.
Huihsin Tseng, Hao Xu, Jian L. Zhen
Filed: 12 Oct 20
Utility
Distributed adaptive probability for population selection of remote devices in a network
10 May 22
Systems and methods include connecting to and authenticating a set of user devices of a plurality of user devices; determining an election of a subset of user devices of the set of user devices, wherein the election determines which user devices perform metric collection; providing any of policy and configuration to the plurality of user devices including election information; and receiving metrics based on measurements at the subset of user devices of user devices according to corresponding policy and configuration.
Sushil Pangeni, Srikanth Devarajan, Ajit Singh, Sandeep Kamath, Chenglong Zheng, Chakkaravarthy Periyasamy Balaiah
Filed: 19 Aug 21