Firewall Patents (Class 726/11)
  • Patent number: 11968217
    Abstract: Techniques for providing domain name and URL visual verifications to increase security of operations on a device. The techniques include a visual indicator and/or warning to a user on the user's computing device that a domain or URL requested by the user and the device is unpopular, new, unknown, inauthentic, associated with malware or phishing, or in some other way, risky. The techniques include identifying a domain name in a communication received by a computing device and then determining a popularity ranking and/or an age of the domain name. The device can render, for display on a screen of the device, a visual indicator having the popularity ranking and/or the age of the domain name. Also, the techniques can include identifying a URL in a communication received by a computing device and then rendering, for display on a screen of the device, a visual indicator having the entire URL.
    Type: Grant
    Filed: December 27, 2021
    Date of Patent: April 23, 2024
    Assignee: Lookout, Inc.
    Inventor: Brian James Buck
  • Patent number: 11962622
    Abstract: To prevent un-authorized accesses to data and resources available in workloads on an organization's or enterprise's computer network, various improvements to automated computer network security processes to enable them to enforce network security policies using native network security mechanisms to control communications to and/or from workload units of applications running on different nodes within hybrid computer network infrastructures having both traditional hardware resources and virtual resources provided by private and public cloud infrastructure services.
    Type: Grant
    Filed: February 6, 2023
    Date of Patent: April 16, 2024
    Assignee: FireEye Security Holdings US LLC
    Inventors: Lisun Joao Kung, Jose Renato Goncalves Santos, Sarowar Golam Sikder
  • Patent number: 11956269
    Abstract: The methods and systems relate to improvements to threat modeling systems through the use of crowdsourcing. Specifically, the methods and systems relate to generating recommendations based on crowdsourced threat modeling contributions. For example, the methods and systems automate the threat modeling process by leveraging data in order to drive consistent and measurable quality of threat models and enable threat models to provide aggregated views of risk concentration at any altitude.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: April 9, 2024
    Assignee: Capital One Services, LLC
    Inventors: Jonathan Underwood, Neil Barlow, Fraser Richard Scott
  • Patent number: 11956209
    Abstract: Disclosed herein are systems and methods for storing patient medical information on a local processing device, anonymizing a portion of that medical information and storing it on a second processing device, exposing that anonymized medical information to a third processing device coupled to the second processing device through a network, and restricting users of the third processing device to only accessing HIPAA compliant medical information. Alarms are included for indicating the improper transfer of HIPAA data.
    Type: Grant
    Filed: October 6, 2021
    Date of Patent: April 9, 2024
    Inventor: Volker Rudolph
  • Patent number: 11956328
    Abstract: In some implementations, a user plane (UP) device may receive a control packet indicating a logout associated with a subscriber session. The UP device may store an indication of the logout associated with the subscriber session. The UP device may determine, after storing the indication, that the logout associated with the subscriber session has not been completed within a subscriber logout period. The UP device may transmit an error indication indicating that the logout has not been completed within the subscriber logout period. In some implementations, a control plane (CP) device may receive the error indication indicating that the logout associated with the subscriber session has not been completed. The CP device may process the logout based at least in part on receiving the error indication. The CP device may transmit, based on processing the logout, a logout notification associated with the logout.
    Type: Grant
    Filed: July 18, 2022
    Date of Patent: April 9, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Subrat Pani, Shirish B. Dandekar
  • Patent number: 11949656
    Abstract: Network traffic inspection is disclosed. An application executing on a client device as an operating system that uses a virtual private network (VPN) stack of the operating system intercepts a first IP packet. The application determines that a policy should be applied to the intercepted first IP packet. The policy is applied to the intercepted first IP packet.
    Type: Grant
    Filed: August 20, 2021
    Date of Patent: April 2, 2024
    Assignee: Barracuda Networks, Inc.
    Inventors: Pablo German Sole, Jose Luis Ferras Pereira, Sinan Eren, Luisa Marina Moya Praca de Araujo Lima
  • Patent number: 11941130
    Abstract: Methods of securely storing and providing data in a data storage system, and a corresponding system are described. A method comprises the steps of: connecting the security module to a remote host only within a predetermined remote access time window, wherein said remote access time window is stored on the security module; receiving a file transfer request from the remote host to the security module; authenticating the file transfer request; receiving the file and caching the file within the security module; isolating the remote host from the security module; connecting the security module and the data storage device; transferring the cached file from the security module to be stored in the data storage device; and isolating the security module and the data storage device once file transfer is complete. This provides a secure system where a data storage device is controllably connected to a remote host.
    Type: Grant
    Filed: August 14, 2020
    Date of Patent: March 26, 2024
    Inventors: Ken Stratford, Ivan Knezovich
  • Patent number: 11936738
    Abstract: A system, method, and computer program product are provided for managing a connection between a device and a network. In use, a first device coupled between a second device and a network is identified. Further, the first device is controlled based on predefined criteria utilizing the second device, for managing a connection between the second device and the network.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: March 19, 2024
    Assignee: McAfee, LLC
    Inventor: Efrain Ortiz, Jr.
  • Patent number: 11924377
    Abstract: Disclosed here is a method to determine a user intent when a user device initiates an interactive voice response (IVR) call with a wireless telecommunication network. A processor can detect the IVR call initiated with the network and determine whether the user device is a member of the network. Upon determining that the user device is a member of the network, the processor can obtain user history including interaction history between the user and the network. Based on the user history, the processor can predict the user intent when the user initiates the IVR call. The processor can detect whether user device is a 5G capable device. Upon the determining that the device is 5G capable and based on the predicted user intent, the processor can suggest to the user an application configured to execute on the user device and configured to address the predicted user intent.
    Type: Grant
    Filed: January 5, 2023
    Date of Patent: March 5, 2024
    Assignee: T-Mobile USA, Inc.
    Inventors: Phi Nguyen, Nathaniel Blodgett
  • Patent number: 11909845
    Abstract: Examples herein involve a multi-access edge computing (MEC) environment. An example process may include receiving a tenant application that is to be hosted in a MEC environment. The MEC environment may be situated between a user device and an external platform. The process may include assigning an edge service identifier (ESID) to the tenant application. The ESID may be used to indicate that a message, associated with the user device, involves the tenant application. The process may include assigning a host identifier to the tenant application. The host identifier may be used to indicate that report data, associated with execution of the tenant application within the MEC environment, is to be provided to the external platform. The process may include routing communications associated with the tenant application using the ESID and the host identifier.
    Type: Grant
    Filed: February 24, 2022
    Date of Patent: February 20, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Cheul Shim, Mahadevan Viswanathan, Thierry R. Sender
  • Patent number: 11888982
    Abstract: In the IKE or IPSec SA rekeying, whether the rekey exchange includes the cryptographic suite in the payload depends on whether the cryptographic suite used in the old SA is changed on both ends, e.g., the initiator and the responder. If the cryptographic suite is not changed, then the rekey exchange does not include the cryptographic suite. Additionally, in the IPSec SA rekey, if the flowing information is not changed in either end, the rekey exchange further does not include the Traffic Selector (TS). As such, the size of the payload is decreased, which saves bandwidth, more processing time and power in the course of the IKE SA or the IPSec SA rekey.
    Type: Grant
    Filed: May 16, 2021
    Date of Patent: January 30, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Sandeep Kampati, De Sheng, Dharmanandana Reddy Pothula, Bharath Soma Satya Meduri
  • Patent number: 11876780
    Abstract: A facility controlling a communication device to create a disconnected ad hoc network and then to rejoin an internetwork is described. The communication device makes a direct or indirect wireless connection with a participant in a network in which the communication device was formerly a participant. In response to making the connection, the communication device: (1) communicates with a registration authority of the network to synchronize a provisional registration authority state established by the first communication device during a period after the communication device was formally a participant in the network and before the connection was made; and (2) communicates with a security authority of the network to synchronize a security authority state established by the communication device during the period.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: January 16, 2024
    Assignee: QUIXOTIC HOLDINGS, LLC
    Inventor: Anthony Samuel Jacobs
  • Patent number: 11874932
    Abstract: Approaches presented herein enable a security risk manager embedded in an application to manage security vulnerabilities of the application. More specifically, the application comprises code entities such as components, packages, libraries, or microservices. The entities are modified as part of the application development process to have an enabled state, in which these entities are permitted to run normally when called, and a disabled state, in which these entities do not run when called but instead perform a back-out behavior such as generating an error message. At runtime, the application periodically accesses a security vulnerabilities database to check for security alerts. When a relevant security alert is found, the application changes any code entities that are affected by the security alert to the disabled state pending investigation by an operations team. The application notifies the operations team by sending a notification of the security alert to an external security monitoring tool.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: January 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Matthew Paul Chapman, Chengxuan Xing, Ashley Donald Harrison, Vlad Balanescu
  • Patent number: 11861524
    Abstract: A method includes receiving, in a first networking platform, an electronic message directed from a first party to a workflow to a second party of the workflow. The method also includes identifying a document attached to the electronic message as relevant to the workflow, and identifying at least a portion of a text content in the electronic message as relevant to the workflow. The method also includes updating the workflow associated with the workflow based on the document attached to the electronic message, when the second party provides the input and storing the document attached to the electronic message in a database, as a new version of the workflow. A system and a non-transitory, computer-readable medium storing instructions to perform the above method are also provided.
    Type: Grant
    Filed: August 26, 2020
    Date of Patent: January 2, 2024
    Assignee: Ironclad, Inc.
    Inventors: Jason Li, Cai Gogwilt, Kevin Verdieck, Mary Zhuang, Blake Reary
  • Patent number: 11860724
    Abstract: An event analysis system is provided. During operation, the system can determine an event description associated with the switch from an event log of the switch. The event description can correspond to an entry in a table in a switch configuration database of the switch. A respective database in the switch can be a relational database. The system can then obtain an event log segment, which is a portion of the event log, comprising the event description based on a range of entries. Subsequently, the system can apply a pattern recognition technique on the event log segment based on the entry in the switch configuration database to determine one or more patterns corresponding to an event associated with the event description. The switch can then apply a machine learning technique using the one or more patterns to determine a recovery action for mitigating the event.
    Type: Grant
    Filed: June 25, 2020
    Date of Patent: January 2, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Chinlin Chen, Anu Mercian, Renato Chaves de Aguiar
  • Patent number: 11855896
    Abstract: A computerized method for directing transmission of a data packet within a distributed cloud computing system is disclosed that includes receiving the data packet by a receiving gateway instance deployed within the distributed cloud computing system, when a session corresponding to the data packet is found via a session lookup, forwarding the data packet to a destination in accordance with the session lookup, when the session is not found via the session lookup, determining whether one least one peer firewall instance is available, and when a first peer firewall instance is available and the data packet is a synchronize packet, forwarding the data packet to the first peer firewall instance. In some instances, the data packet is a TCP packet and in others, the data packet is received from either of a spoke gateway or a transit gateway that is deployed within the distributed cloud computing system.
    Type: Grant
    Filed: March 29, 2021
    Date of Patent: December 26, 2023
    Assignee: Aviatrix Systems, Inc.
    Inventors: Lee-Chik Cheung, Xiaobo Sherry Wei, Shanshan Xu, Praveen Vannarath
  • Patent number: 11853426
    Abstract: The portable peripheral (100) of communication with the data network (105) utilizing the internet protocol, comprises: a connector (110) to mechanically connect and establish a removable wired connection between the peripheral and a portable terminal, a first means (115) of wired bidirectional communication with the portable terminal, a second means (120) of bidirectional communication with a data network and a unit security (122) protecting the communication between the first and the second means of communication, this communication being established between the first and the second means of communication, the security unit (122) comprising a system (127) of autonomous DNS management, the means of communication and the security unit being embedded in a unique housing (130) removable from the portable terminal.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: December 26, 2023
    Inventor: Vladimir Mickael Leal Monteiro
  • Patent number: 11855961
    Abstract: Techniques are provided that rotate a device address used to identify a wireless client device on a wireless network. The wireless client device and at least one network infrastructure component identify a plurality of device addresses associated with the wireless client device. In some embodiments, the plurality of device addresses are generated via a corresponding plurality of invocations of a stateful random number generator, such as a cryptographically secure pseudorandom number generator.
    Type: Grant
    Filed: May 25, 2021
    Date of Patent: December 26, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Roberto Muccifora, Domenico Ficara, Amine Choukir, Anirban Karmakar, Vincent Cuissard, Sudhir Kumar Jain
  • Patent number: 11848872
    Abstract: Described herein is a system for automatically capturing configuration changes to the cloud computing resources. The system for automatically capturing configuration changes may detect changes to configurations of cloud computing resources across the geographic regions, in real-time. The changes may be stored in a central data storage device instantiated by a central cloud computing account. Furthermore, a relationship graph indicating the relationships between the different cloud computing resources may be generated.
    Type: Grant
    Filed: August 1, 2022
    Date of Patent: December 19, 2023
    Assignee: Capital One Services, LLC
    Inventor: Matthew Gladney
  • Patent number: 11848951
    Abstract: A hybrid-fabric apparatus comprises a black box memory configured to store a plurality of behavior metrics and an anomaly agent coupled to the black box. The anomaly agent determines a baseline vector corresponding to nominal behavior of the fabric, wherein the baseline vector comprises at least two different behavior metrics that are correlated with each other. The anomaly agent disaggregates anomaly detection criteria into a plurality of anomaly criterion to be distributed among network nodes in the fabric, the anomaly detection criteria characterizing a variation from the baseline vector, and each of the plurality of anomaly criterion comprising a function of a measured vector of behavior metrics. The variation can be calculated based on a variation function applied to a vector of measured behavior metrics having elements corresponding to member elements of the baseline vector. Anomaly criterion statuses calculated by at least some of the network nodes are aggregated.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: December 19, 2023
    Assignee: Nant Holdings IP, LLC
    Inventor: Thomas M. Wittenschlaeger
  • Patent number: 11843605
    Abstract: The present disclosure relates to traffic monitoring through one or more access control servers configured for (i) routing server resource request messages to resource server(s), (ii) extracting information identifying a target server resource from data packets corresponding to one or more received server resource request messages, and (iii) selectively transmitting the received server resource request message to a resource server. The security server(s) is configured to receive a server resource request message data extracted from a server resource request message and initiate a first security response, wherein the initiated first security response is dependent on analysis of the server resource request message data.
    Type: Grant
    Filed: October 31, 2022
    Date of Patent: December 12, 2023
    Assignee: Ping Identity Corporation
    Inventors: Bernard Harguindeguy, Udayakumar Subbarayan, Isidore Rosenblum, Abduraheem Poonthiruthi, Anoop Krishnan Gopalakrishnan, Ashwani Kumar
  • Patent number: 11830043
    Abstract: A system and method for providing digital audio services is described. One embodiment is a method for proving digital audio services, comprising receiving, using a communications interface, an audio stream from a content provider; determining a timestamp for a first audio stream segment; determining a timestamp for a second audio stream segment; updating a playlist with a representation of the audio stream; receiving a query for content information; and sending offer information, in response to receiving the query for content information.
    Type: Grant
    Filed: February 3, 2023
    Date of Patent: November 28, 2023
    Assignee: Auddia Inc.
    Inventor: Jeffrey Thramann
  • Patent number: 11829504
    Abstract: A system and method for data loss prevention (DLP) is disclosed, the system and method including at least: receiving, by one or more computing devices and from one or more remote sources, one or more data streams each containing a textual data; consolidating, by the one or more computing devices, the one or more data streams into a single data stream, wherein the single data stream includes a field indicating from which of the one or more remote sources the textual data for each of the one or more data streams originates; transmitting, by the one or more computing devices, the single data stream to an analytics engine; determining, with the analytics engine, whether the textual data of each of the one or more data streams contains a sensitive data using a reference table; and based on the determining, transmitting, by the one or more computing devices, a request to the one or more remote sources to delete the textual data.
    Type: Grant
    Filed: September 30, 2020
    Date of Patent: November 28, 2023
    Assignee: Capital One Services, LLC
    Inventors: Aleksandr Markenzon, Kyle Flaherty, Somkanti Biswas
  • Patent number: 11822653
    Abstract: A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.
    Type: Grant
    Filed: October 4, 2022
    Date of Patent: November 21, 2023
    Assignee: CUPP Computing AS
    Inventor: Shlomo Touboul
  • Patent number: 11822521
    Abstract: A method of accessing data includes storing a table that includes a plurality of tablets corresponding to distinct non-overlapping table portions. Respective pluralities of tablet access objects and application objects are stored in a plurality of servers. A distinct application object and distinct tablet are associated with each tablet access object. Each application object corresponds to a distinct instantiation of an application associated with the table. The tablet access objects and associated application objects are redistributed among the servers in accordance with a first load-balancing criterion. A first request directed to a respective tablet is received from a client. In response, the tablet access object associated with the respective tablet is used to perform a data access operation on the respective tablet, and the application object associated with the respective tablet is used to perform an additional computational operation to produce a result to be returned to the client.
    Type: Grant
    Filed: February 14, 2022
    Date of Patent: November 21, 2023
    Assignee: Google LLC
    Inventors: Jeffrey Adgate Dean, Sanjay Ghemawat, Andrew Fikes, Yasushi Saito
  • Patent number: 11818100
    Abstract: Methods and systems for automatic provisioning of security policies for content streaming control within a Content Delivery Network (CDN) are provided. According to one aspect, a method for automatic provisioning of security policies for content streaming control by a network node within a CDN that supports at least one streaming media protocol comprises: obtaining a manifest, the manifest being generated in response to a user requesting a streaming content from the CDN; determining a first security policy associated with the user and/or the requested streaming content in accordance with the manifest; updating a set of firewall rules for implementing security policies in accordance with the determined first security policy; and applying the updated set of firewall rules to validate requests from the user for the streaming content. The policies are dynamically configured and may be sparsely provisioned, e.g., downloaded only to the pertinent nodes and activated only when necessary.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: November 14, 2023
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Stere Preda, Daniel Migault, Makan Pourzandi
  • Patent number: 11809890
    Abstract: Various systems and methods for managing quality of storage service in a virtual network are described herein. A system for managing quality of service in a virtual network includes an analytic platform configured to analyze input/output operations by a virtual host on a storage array in a virtual network, the virtual host identified with a virtual network identifier (VNI), and the virtual network identified by a virtual host address (VHA); and a security controller to: receive, from the analytic platform, storage array metrics associated with the VNI and the VHA; determine that the storage array metrics violate a threshold condition; and cause a responsive action to adjust the operating environment of the virtual host to maintain quality of input/output service for hosts sharing the storage array.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: November 7, 2023
    Assignee: Intel Corporation
    Inventor: Ziye Yang
  • Patent number: 11805101
    Abstract: Some embodiments provide a novel secure method for suppressing address discovery messaging. In some embodiments, the method receives an address discovery record that provides a network address associated with a machine connected to a network. The method then identifies a set of one or more rules for evaluating the received address discovery record to determine whether the address discovery record or its provided network address should be distributed to one or more hosts and/or devices associated with the network. The method then processes the set of rules to determine whether the received address discovery record violates a rule in the set of rules so as to prevent the distribution of its provided network address. When the address discovery record violates a rule, the method discards it in some embodiments.
    Type: Grant
    Filed: April 6, 2021
    Date of Patent: October 31, 2023
    Assignee: VMWARE, INC.
    Inventors: Li Sun, Parasuramji Rajendran, Yang Ping, Jianjun Shen
  • Patent number: 11805033
    Abstract: The present invention relates to a computer implemented method, preferably a computer implemented method, and a system, which have been designed to bridge a gap in the End User experience monitoring that has been created by the adoption of cloud based services by Enterprise customer by replicating exactly the actions performed by the user on a cloud based application in order to determine the true end user experience and alert in case of unexpected latency and also by analyzing at the same time the impacts of the Internet network and the local infrastructure of the Enterprise user on the end user experience of the cloud based application that is monitored.
    Type: Grant
    Filed: November 9, 2021
    Date of Patent: October 31, 2023
    Assignee: Martello Technologies Corporation
    Inventors: Antoine Leboyer, Gary Steere, Jean-Francois Piot
  • Patent number: 11805566
    Abstract: In a connection reactivation method, a connection of a PDU session established by user equipment on a N3GPP side is reactivated through communications via a 3GPP network. The user equipment accesses both the 3GPP and the N3GPP network and is originally in an idle state on the N3GPP network. An access and mobility management function entity receives a first message from a session management function entity to reactivate the PDU session connection of the user equipment. The access and mobility management function entity sends a second message to the user equipment via the 3GPP access network to instruct the user equipment to reactivate the connection of the PDU session.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: October 31, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Huan Li, Youyang Yu
  • Patent number: 11799904
    Abstract: Inverse imbalance subspace searching techniques are used to detect potential malware among samples of network communication data. A large number of samples of network communication data, such as proxy log data and/or network flows, are received and analyzed by a malware detection system. A number of the samples are associated with known malware, while other unlabeled samples are either benign or may be associated with unknown malware. An inverse imbalance subspace search may be performed, in which the sample sets are divided into subsets based on random feature thresholds, and each subset is evaluated based on the ratio of known malware samples to unlabeled samples. Unlabeled samples within subsets having high malware sample ratios may be identified, aggregated, and processed as potential malware.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: October 24, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Tomas Komarek, Jan Brabec, Cenek Skarda
  • Patent number: 11799675
    Abstract: A method may be provided to operate a first network node of a wireless communication network. The method may include receiving a request from a second network node to activate packet flow descriptor PFD extraction with respect to a session for a wireless device, and receiving application traffic for the wireless device, wherein an address is provided to route the application traffic. The method may also include determining an application identifier for the address responsive to the address for the application traffic being unknown to the first network node, and transmitting a PFD notification to the second network node, wherein the PFD notification includes the application identifier.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: October 24, 2023
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Esperanza Alonso Franco, Miguel Angel Puente Pestaña, Maria Luisa Mas Rosique, Miguel Angel Muñoz De La Torre Alonso
  • Patent number: 11783724
    Abstract: Disclosed herein is a security training apparatus configured to operate an interactive cybersecurity training application, which provides customized and tailored cybersecurity training to each employee of an organization. The security training apparatus uses augmented reality to facilitate customized cybersecurity training for each user. The augmented reality is a computer application, which deals with the combination of real world images of personal workspace environment of each user where the cyber-crime may occur and computer generated data associated with cybersecurity risk objects that may aid the cyber-crime. The interactive cybersecurity training comprises the use of live video imagery of the personal workspace environment of each user, which is digitally processed and augmented by the addition of computer generated graphics associated with the cybersecurity risk objects. The cybersecurity risk objects are selected based on the items within the personal workspace environment for each user.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: October 10, 2023
    Assignee: Massachusetts Mutual Life Insurance Company
    Inventors: Payton A Shubrick, Damon Ryan Depaolo
  • Patent number: 11785112
    Abstract: It is made possible to realize bidirectional communication safely on the cloud side, and on-premises side in a job execution system. It is checked whether or not there is an agent with the same logical name at time of agent registration. In a case that there is the same logical name, transfer performance required of each agent is checked, and communication is performed by rewriting a logical name during transfer by using an existing logical name for an agent required of the highest transfer performance, and using a logical name which is a new unique alias for the other agent.
    Type: Grant
    Filed: February 15, 2022
    Date of Patent: October 10, 2023
    Assignee: HITACHI, LTD.
    Inventors: Jun Mizuno, Takahiro Sagara
  • Patent number: 11775309
    Abstract: The present disclosure provides an exception stack handling method, system, electronic device and storage medium and relates to the field of mobile Internet. The method may include: at the level of any executor in a distributed stream-type processing system including at least two executors, performing the following processing of: obtaining at least one exception stack from a message middleware when the executor in an idle state each time, collected exception stacks generated by users being stored in the message middleware; as for any exception stack, obtaining an anti-obfuscation map file corresponding to the exception stack, and performing anti-obfuscation processing for the exception stack by using the anti-obfuscation map file. The solution of the present disclosure may be applied to improve the processing speed.
    Type: Grant
    Filed: November 26, 2020
    Date of Patent: October 3, 2023
    Assignee: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY CO., LTD.
    Inventors: Yang Peng, Hao Yang, Jing Zou, Lei Feng, Hongliang Sui
  • Patent number: 11769152
    Abstract: The disclosure herein describes enabling authentication of a user's identity based on a user identification (ID) token. An enrollment request is received by an identity platform from a computing device of the user. The enrollment request includes face data and payment account data associated with a payment account of the user. A face identification template of the user is generated based on the face data. Based on verifying the user's identity using data in the enrollment request, an ID token is generated including the face identification template and the payment account data. The ID token is then provided to the computing device of the user, wherein the computing device is enabled to verify the user's identity based on comparison of the captured image data of the face of the user to the face identification template of the ID token during transactions associated with the computing device.
    Type: Grant
    Filed: May 1, 2020
    Date of Patent: September 26, 2023
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventor: Rakesh Kumar
  • Patent number: 11755586
    Abstract: A method, system and computer-usable medium for constructing a distribution of interrelated event features. The constructing a distribution of interrelated event features includes receiving a stream of events, the stream of events comprising a plurality of events; extracting features from the plurality of events; constructing a distribution of the features from the plurality of events; and, analyzing the distribution of the features from the plurality of events.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: September 12, 2023
    Assignee: Forcepoint LLC
    Inventors: Christopher Poirel, William Renner, Eduardo Luiggi, Phillip Bracikowski
  • Patent number: 11755585
    Abstract: A method, system and computer-usable medium for constructing a distribution of interrelated event features. The constructing a distribution of interrelated event features includes receiving a stream of events, the stream of events comprising a plurality of events; extracting features from the plurality of events; constructing a distribution of the features from the plurality of events; and, analyzing the distribution of the features from the plurality of events.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: September 12, 2023
    Assignee: Forcepoint LLC
    Inventors: Christopher Poirel, William Renner, Eduardo Luiggi, Phillip Bracikowski
  • Patent number: 11736513
    Abstract: The technology disclosed relates to a method, system, and non-transitory computer-readable media that detects malicious communication between a command and control (C2) cloud resource on a cloud application and malware on an infected host, using a network security system. The network security system reroutes the cloud traffic to the network security system. The incoming requests of the cloud traffic are directed to a cloud application in the plurality of cloud applications, and wherein the cloud application has a plurality of resources. The network security system analyzes the incoming requests, determines that the incoming requests are targeted at one or more malicious resources in the plurality of resources.
    Type: Grant
    Filed: July 12, 2022
    Date of Patent: August 22, 2023
    Assignee: Netskope, Inc.
    Inventors: Dagmawi Mulugeta, Raymond Joseph Canzanese, Jr., Colin Estep, Siying Yang, Jenko Hwong, Gustavo Palazolo Eiras, Yongxing Wang
  • Patent number: 11736443
    Abstract: A segmentation firewall executing on a host enforces a segmentation policy. In a co-existence mode, the segmentation firewall operates in co-existence with a system firewall that enforces a security policy. The segmentation firewall is configured to either drop packets that do not match any permissive rule or pass packets that match a permissive rule to the system firewall to enable the system firewall to determine whether to drop or accept the passed packets. To enable efficient operation of the segmentation firewall when operating in co-existence with the system firewall, the segmentation firewall may include a plurality of rule chains and may be configured to exit a chain and bypass remaining rule chains upon an input packet matching a permissive rule of the segmentation policy.
    Type: Grant
    Filed: April 26, 2022
    Date of Patent: August 22, 2023
    Assignee: Illumio, Inc.
    Inventors: Daniel Richard Cook, Anish Vinodkumar Desai, Thomas Michael McCormick
  • Patent number: 11716311
    Abstract: Aspects of the disclosed technology comprise generating firewall rules based on traffic, outputting the generated firewall rules to an output file, and using the output file to set firewall rules in a network. The firewall rules may be generated without a priori knowledge of the network; alternatively no firewall rules are required. Generated rules may be tuned for user preferences to adjust for the number of generated firewall rules, and their over or under inclusiveness to non-historic traffic data.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: August 1, 2023
    Assignee: Google LLC
    Inventors: Vishal Gupta, Vikas Aggarwal, Kan Cai, Gargi Adhav, Xiaoyu Zhang
  • Patent number: 11706193
    Abstract: Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.
    Type: Grant
    Filed: August 9, 2021
    Date of Patent: July 18, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Weimin Ji, John E. Drake, Jeffrey M. Haas
  • Patent number: 11706195
    Abstract: The technology disclosed herein enables micro-segmentation of virtual computing elements. In a particular embodiment, a method provides identifying one or more multi-tier applications comprising a plurality of virtual machines. Each application tier of the one or more multi-tier applications comprises at least one of the plurality of virtual machines. The method further provides maintaining information about the one or more multi-tier applications. The information at least indicates a security group for each virtual machine of the plurality of virtual machines. Additionally, the method provides identifying communication traffic flows between virtual machines of the plurality of virtual machines and identifying one or more removable traffic flows of the communication traffic flows based, at least in part, on the information. The method then provides blocking the one or more removable traffic flows.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: July 18, 2023
    Assignee: Nicira, Inc.
    Inventors: Laxmikant Gunda, Rajiv Krishnamurthy
  • Patent number: 11700533
    Abstract: Systems, methods, and apparatuses for providing dynamic, prioritized spectrum utilization management. The system includes at least one monitoring sensor, at least one data analysis engine, at least one application, a semantic engine, a programmable rules and policy editor, a tip and cue server, and/or a control panel. The tip and cue server is operable utilize the environmental awareness from the data processed by the at least one data analysis engine in combination with additional information to create actionable data.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: July 11, 2023
    Assignee: DIGITAL GLOBAL SYSTEMS, INC.
    Inventor: Armando Montalvo
  • Patent number: 11700315
    Abstract: A method for configuring, via a website, a device to provide printing services to a local network is described. The method includes creating, via a website, a service host object that comprises a network address of a device on a local network and a service host name. The method also includes configuring, via the website, one or more printing settings for one or more printing services. The method further includes sending an indication to the device on the local network to run a service manager. The method additionally includes sending an indication to the service manager to run the one or more printing services on the local network based on the one or more printing service settings.
    Type: Grant
    Filed: April 26, 2022
    Date of Patent: July 11, 2023
    Assignee: PrinterLogic, Inc.
    Inventors: Chad Steven Sillitoe, Corey Clint Ercanbrack, Joshua Aaron Harrison
  • Patent number: 11693945
    Abstract: A security configuration file is received from a first application, the security configuration file including information of an authority. The first application assigns the authority to a second application to enable the second application to trigger jobs at the first application, and the second application provides shared services to a plurality of applications including the first application. A query is received from the second application and in response the authority is sent to the second application. A request for a token is received from the second application, the request including the authority. A token including the authority is sent to the second application. The second application sends the token to the first application when the second application triggers jobs at the first application.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: July 4, 2023
    Assignee: SAP SE
    Inventors: Michael Engler, Martijn de Boer, Wolfgang Janzen, Peter Eberlein
  • Patent number: 11693905
    Abstract: Methods and systems for providing a user interface and workflow for interacting with time series data, and applying portions of time series data sets for refining regression models. A system can present a user interface for receiving a first user input selecting a first model from a list of models for modeling the apparatus, generate and display a first chart depicting a first time series data set depicting data from a first sensor, generate and display a second chart depicting a second time series data set depicting a target output of the apparatus, receive a second user input of a portion of the first time series data set, and generate and display a third chart depicting a third time series data set depicting an output of the selected model and aligned with the second chart of the target output and updated in real-time in response to the second user input.
    Type: Grant
    Filed: December 2, 2021
    Date of Patent: July 4, 2023
    Assignee: Palantir Technologies Inc.
    Inventors: Christopher Martin, David Fowler
  • Patent number: 11689576
    Abstract: A system and method for cloud native discovery and protection. The method includes discovering instances of a plurality of cloud assets in a cloud native environment based on a plurality of application programming interface (API) endpoints in the cloud native environment, wherein the plurality of API endpoints is identified based on cloud credentials for each of the plurality of cloud assets; determining at least one cloud asset instance that lacks active security protection based on a configuration of at least one entity deployed in the cloud native environment; and reconfiguring at least a portion of the cloud native environment with respect to the at least one cloud asset instance that lacks active security protection.
    Type: Grant
    Filed: September 24, 2021
    Date of Patent: June 27, 2023
    Assignee: Twistlock, Ltd.
    Inventors: Liron Levin, Michael Kletselman, Dima Stopel, John Morello, Itay Abramowsky, Ami Bizamcher
  • Patent number: 11677716
    Abstract: A system, method, and computer-readable medium are disclosed for management of a distributed web application firewall (WAF) cluster that supports one or more protected applications. A WAF cluster infrastructure is configured for the protected applications. The WAF cluster includes one or more WAFs that are used to route traffic directed to the protected applications. The WAF cluster infrastructure is validated as to be current and updated. The validated WAF cluster infrastructure is then used as routing service.
    Type: Grant
    Filed: October 15, 2019
    Date of Patent: June 13, 2023
    Assignee: Dell Products L.P.
    Inventors: Frank DiRosa, Rene Herrero, Poul C. Frederiksen, Yongliang Li, Rashmi Krishnamurthy
  • Patent number: 11652793
    Abstract: Disclosed are systems and methods for firewall configuration. A request can be transmitted to a DNS server. A response to the DNS request can include an Internet Protocol (IP) address. A firewall rule can be generated permitting access to the IP address. The firewall rule can be configured to be valid until expiration of a time-to-live value in the response to the DNS request. Thus, firewall rules can be automatically created as needed by executed processes, eliminating the need for manual firewall rule creation. As the firewall rule is invalid after the expiration of the time-to-live value, risks associated with maintaining out-of-date firewall rules are eliminated, as is the requirement to manually remove or modify out-of-date firewall rules.
    Type: Grant
    Filed: February 3, 2021
    Date of Patent: May 16, 2023
    Assignee: Comcast Cable Communications, LLC
    Inventor: Alexander Gurney