301 patents
Page 9 of 16
Utility
Explaining internals of Machine Learning classification of URL content
21 Apr 22
Systems and methods include obtaining Uniform Resource Locator (URL) transactions that were either undetected by a machine learning model or mischaracterized by the machine learning model; filtering the URL transactions based on any of size and transaction count; utilizing one or more techniques to determine words that provide an explanation for a category of a plurality of categories of the filtered URL transactions; and utilizing a label for the filtered URL transactions and the determined words for each as training data to update the machine learning model.
Shashank Gupta, Pankhuri Chadha, Narinder Paul
Filed: 3 Dec 20
Utility
Granular SaaS tenant restriction systems and methods
14 Apr 22
Systems and methods include obtaining a profile for an application, wherein the profile includes one or more tenants, rules for use of the application by the one or more tenants, and users for the rules; monitoring a user of a tenant of the one or more tenants inline via a node in a cloud-based system; identifying an application of the one or more applications based on the monitoring and associated rules for the user; and enforcing the associated rules for the user for the application.
Pooja Deshmukh, Narinder Paul, Naresh Kumar, Santhosh Kumar, Sravani Manukonda, Vijay Bulusu
Filed: 24 Nov 20
Utility
o580taft8ae39e1h85v89
5 Apr 22
Systems and methods include, in a cloud node, receiving Mobile Device Management (MDM) data from a central authority, wherein the MDM data includes policy metadata specifying MDM functions for mobile devices associated with users of an enterprise; communicating to an application on a mobile device associated with a user, via a tunnel, wherein the application is configured for service discovery and connectivity; and providing the MDM data to the mobile device associated with the user via the tunnel.
Ajit Singh, Vivek Raman, Tejus Gangadharappa
Filed: 4 Mar 20
Utility
gyrumb8k18etz4grjlegpod8 sd0qjfpzqwyyuvqj5jwfv7bv
29 Mar 22
A mobile application notification system that includes a cloud node including a subscription service and a publication service, each executed on the cloud node, wherein the subscription service is configured to manage a plurality of users associated with a tenant of multiple tenants, each of the plurality of users have a corresponding user device that executes a monitoring application thereon, wherein management via the subscription service includes subscribing each of the plurality of users and configuring the tenant and associated messages, and wherein the publication service is configured to communicate with the corresponding user device of the plurality of users and to communication to a plurality of publisher threads, for exchanging messages therebetween, based on the subscribing and the configuring, and wherein at least two corresponding user device of the plurality of users utilize a different operating system and platform from one another.
Jasbir Singh Kaushal, Sichao Zhang, Varun Singh, Muralidharan Manickam, Priyanka Pani
Filed: 15 Jul 20
Utility
xs2w5tkz2a3z7h1hvxd3uej m1
17 Mar 22
Systems and methods for selectively exposing Application Programming Interfaces (APIs) dynamically and in a scalable manner include, when a new API is exposed in a microservice, making it accessible via a gateway if it is indicated to be exposed.
Arvind Nadendla, Subramanian Srinivasan, Vivek Dhiman
Filed: 29 Oct 20
Utility
f184zzdjc9ivz5bpf6nasaid z399s6
17 Mar 22
Systems and methods include determining a plurality of features associated with executable files, wherein the plurality of features are each based on static properties in predefined structure of the executable files; obtaining training data that includes samples of benign executable files and malicious executable files; extracting the plurality of features from the training data; and utilizing the extracted plurality of features to train a machine learning model to detect malicious executable files.
Changsha Ma, Nirmal Singh, Naveen Selvan, Tarun Dewan, Uday Pratap Singh, Deepen Desai, Bharath Meesala, Rakshitha Hedge, Parnit Sainion, Shashank Gupta, Narinder Paul, Rex Shang, Howie Xu
Filed: 26 Oct 20
Utility
o9qxxitxssa7s62r8uobg9di4q1 3xtza1r0t9unt01cd
17 Mar 22
Systems and methods include, based on monitoring of content including Office documents, determining distribution of malicious Office documents between documents having malicious macros and documents having malicious embedded objects; determining features for the documents having malicious macros and for the documents having malicious embedded objects; selecting training data for a machine learning model based on the distribution and the features; and training the machine learning model with the selected training data.
Changsha Ma, Nirmal Singh, Naveen Selvan, Tarun Dewan, Uday Pratap Singh, Deepen Desai, Bharath Meesala, Rakshitha Hedge, Parnit Sainion, Shashank Gupta, Narinder Paul, Rex Shang, Howie Xu
Filed: 26 Oct 20
Utility
5sjuui53hi86ykzih4oawr58f ultcu9w
15 Mar 22
Cloud-based Intrusion Prevention Systems (IPS) include receiving traffic associated with a user of a plurality of users, wherein each user is associated with a customer of a plurality of customers for a cloud-based security system, and wherein the traffic is between the user and the Internet; analyzing the traffic based on a set of signatures including stream-based signatures and security patterns; blocking the traffic responsive to a match of a signature of the set of signatures; and performing one or more of providing an alert based on the blocking and updating a log based on the blocking.
Srikanth Devarajan, Sushil Pangeni, Vladimir Stepanenko, Ravinder Verma, Naresh kumar Povlavaram Munirathnam
Filed: 27 Apr 20
Utility
h79o557b2lgbhu77txj10x2g
10 Mar 22
Techniques for deep tracing of one or more users via a cloud-based system include receiving a request from an administrator to actively troubleshoot a user; causing a user device associated with the user to create a deep tracing session based on the request; assisting the user device in performing one or more traces of a plurality of traces to a destination; receiving results from any of the plurality of traces and results from metrics collected at the user device; and displaying a network map between the user device and the destination.
Amit Sinha, Srikanth Devarajan, Chakkaravarthy Periyasamy Balaiah, Khaireddine Mazboudi, Sandeep Kamath Voderbet, Sushil Pangeni, Pratap Ramachandra, Amber Wu
Filed: 16 Nov 21
Utility
7ve0c8axtnn0y ven2q40pfie
3 Mar 22
Systems and methods for detecting malicious mobile applications using machine learning in a cloud-based system utilize a traffic forwarding technique and a cloud-based Machine Learning (ML) model to assess the security of apps installed on a user device.
Rohit Goyal
Filed: 7 Oct 20
Utility
ni2xy7awrq79j38nwpi491
3 Mar 22
Systems and methods include obtaining data from Uniform Resource Locator (URL) transactions monitored by a cloud-based system; labeling the data for the URL transactions with a category of a plurality of categories that describe the content of a page associated with the URL; performing preprocessing of raw Hypertext Markup Language (HTML) files for the URL transactions; extracting features from the preprocessed raw HTML files; and creating a machine learning model based on the features, wherein the machine learning model is configured to score content associated with an unknown URL to determine a category of the plurality of categories.
Santhosh Kumar, Shashank Gupta, Dianhuan Lin, Pankhuri Chadha, Narinder Paul, Rex Shang, Howie Xu
Filed: 21 Oct 20
Utility
q5q95q8xvog6os8m3bs9aviz0bo5gi 46ua
24 Feb 22
Systems and methods include receiving a record associated with an incident that was detected by the CASB system in a Software-as-a-Service (SaaS) application; determining a hash based on a plurality of levels for the record; determining if the record exists in a data store based on the hash, and if the record exists, deleting an old record; and inserting the record in the data store based on the hash, wherein the data store is maintained in-memory and includes records at leaf nodes in a multi-level hash based on the plurality of levels
Abhishek Bathla, Kumar Gaurav, Raman Madaan, Chakkaravarthy Periyasamy Balaiah, Shweta Gupta
Filed: 2 Oct 20
Utility
jlyvdlwffeb 2xu25deem
17 Feb 22
A technique for microsegmentation includes receiving information related to hosts and applications operating in a network where the information was obtained based on a survey of the network; identifying a plurality of microsegments utilizing the information, each microsegment includes a set of hosts similar to one another; for each of the plurality of microsegments, identifying security policies that control access to hosts in each microsegment; and providing the plurality of microsegments and corresponding security policies for approval thereof.
Peter Smith, Aparna Ayikkara, Omar Baba, Daniel Einspanjer, Anthony Gelsomini, Thomas C. Hickman, Peter Kahn, Thomas Evan Keiser, JR., Andriy Kochura, Nikitha Koppu, Scott Laplante, Xing Li, Raymond Brian Liu, Sean Lutner, Michael J. Melson, Peter Nahas, John O'Neil, Herman Parfenov, Joseph Riopel, Suji Suresh, Harry Sverdlove
Filed: 28 Oct 21
Utility
r50oavyp2rm339pcvtvtx30hpa561fyo41wnpg1w4fp54gwtgaem8o4y
10 Feb 22
Systems and methods for visualization monitoring data from a cloud-based system include obtaining the monitoring data, wherein the monitoring data is based on transactions associated with a plurality of users of the cloud-based system; providing a Graphical User Interface (GUI); obtaining a plurality of filter selections for a plurality of filter types; and displaying a visualization comprising a Sankey diagram of the monitoring data with nodes in the Sankey diagram including each of the plurality of filter types and links between the nodes indicative of the transactions in the monitoring data.
Amit Sinha, Jasbir Singh Kaushal, Tiffany Bui, Sundar Rajkumar Jothimani, Priyanka Pani, Varun Singh
Filed: 6 Aug 20
Utility
k7mbhs5 924r009l6bb4m25ar7ds2ef
10 Feb 22
Cloud Security Posture Management (CSPM) systems and methods include, in a node in a cloud-based system, obtaining a plurality of security policies and one or more compliance frameworks for a tenant of a cloud provider where the tenant has a cloud application deployed with the cloud provider, wherein each security policy defines a configuration and an expected value, and wherein each compliance framework includes one or more of the security policies; obtaining configurations of the cloud application; identifying misconfigurations of the cloud application based on a comparison of the obtained configurations with the plurality of security policies; analyzing the misconfigurations to determine risks including prioritization of the risks based on their likelihood of exposure to security breaches; and causing remediation of the identified misconfigurations and the determined risks, wherein the cloud-based system performs the CSPM service in addition to one or more additional cloud services.
Gururaj Pandurangi, Pravin Kulkarni, Rahul Khengare, Unmesh Meshram, Santosh Kumar Abhayraj Yadav, Shraddha Agrawal, Ankit Rao, Himalay Kondekar, Girish Murlidhar Jaju
Filed: 22 Sep 20
Utility
tjr8nbxv0o8jdem1x7j2w2rk40knw 0y
27 Jan 22
Systems and methods implemented via a broker in a cloud-based system include steps of, responsive to a user and associated user device executing a client connector being authenticated, receiving a notification from the client connector; determining private applications accessible by the user based on policy, wherein the private applications are located in one of a public cloud, a private cloud, and an enterprise network; and sending a Top-Level Domain+1 (TLD+1) list of the accessible private applications to the user device, wherein the TLD+1 includes a TLD and a domain name.
John A. Chanak, Xiang Yu, Ramesh Kumar Somasundaram, Anjali Anjali, Andrey Tverdokhleb, Vikas Mahajan
Filed: 30 Sep 21
Utility
ktio6hcfsdc1m8oh005mojy0kg3nffu 6zn9b
27 Jan 22
Systems and methods for implemented by a user device for Real User Monitoring (RUM) include operating an add on for a web browser; receiving a list of domains or Uniform Resource Locators (URLs) to calculate RUM data thereon; responsive to the web browser accessing any of the domains or URLs in the list, calculating and storing RUM data; and periodically sending the stored RUM data to a cloud-based system.
Chenglong Zheng, Srikanth Devarajan, Sandeep Kamath Voderbet, Sanjit Ganguli
Filed: 11 Oct 21
Utility
k64jz27uk5 knubjook8
27 Jan 22
Systems and methods include causing a scan by Cloud Access Security Broker (CASB) system of a plurality of users associated with a tenant in a Software-as-a-Service (SaaS) application where the scan includes any of identifying malware in content in the SaaS application and identifying confidential data in the content in the SaaS application; during the scan which is covering historical data in the SaaS application, receiving notifications of the content being actively modified by any of the plurality of users; and including the content being actively modified in the scan with the historical data.
Shankar Vivekanandan, Narinder Paul, Arun Bhallamudi, Sakshi Agrawal, Sonal Choudhary, Parth Shah, Huan Chen
Filed: 22 Jul 20
Utility
98ksj2u3vs00d5p4myiclu8j25dkhz2sdfvo3yyivie65bx4a6my
18 Jan 22
Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented.
Srikanth Devarajan, Chenglong Zheng, Sandeep Kamath, Chakkaravarthy Periyasamy Balaiah, Vladimir Stepanenko, Vikas Mahajan, Pankaj Chhabra
Filed: 5 Mar 21
Utility
2njtke3 be2j7vvqghn16lv5vzooqo9xeo
4 Jan 22
Systems and methods include determining log data for a time period at a plurality of senders, wherein each sender is a node in the cloud-based system, and the log data is associated with one or more cloud services; providing the log data to one or more storage clusters, via one or more distributors, for the time period; responsive to all of the plurality of senders performing the providing, moving to a next time period and repeating the determining and the providing; detecting a given sender is a faulty data source or a slow data source; and moving the given sender to a deferred processing list where the given sender does not hold up the moving to the next time period.
Shweta Gupta, Abhishek Bathla, Kumar Gaurav, Chakkaravarthy Periyasamy Balaiah
Filed: 7 Dec 20