Abstract: Techniques relate generally to computer networks, and more specifically, for a web browser having a web browser extension for evaluating web requests using internal coordination to make asynchronous information synchronously available, prior to dispatching the web requests.
Type:
Grant
Filed:
September 30, 2023
Date of Patent:
August 12, 2025
Assignee:
Fortinet, Inc.
Inventors:
Jeremy Allen Wildsmith, Mounir Elgharabawy
Abstract: A rogue Wi-Fi 6E access points are identified by on-wire data traffic of authorized Wi-Fi 6E access points. Data traffic is monitored across all access points for the rogue Wi-Fi 6E access points according to an SSID/BSSID scan table. In response, modified CSA values are sent from spoofed action frames that have a source BSSID of the rogue access points rather than the authenticated access point that transmits.
Abstract: Providing unified storage for event streams in an anomaly detection framework, including: receiving, by an event streaming platform, first event data encoded in a first file format; converting, by the event streaming platform, the first event data into second event data encoded in a second file format for storage in a first remote storage system; and providing, to the first remote storage system, a command to load the second event data into the first remote storage system.
Type:
Grant
Filed:
March 2, 2023
Date of Patent:
August 5, 2025
Assignee:
Fortinet, Inc.
Inventors:
Christopher Golden, Derek G. Murray, Yijou Chen
Abstract: An initial provisioning by a management plane of the SD-WAN is received from a centralized SD-WAN gateway with static path overlay between the network edge device on a local LAN and the centralized SD-WAN gateway. At runtime, intelligent decision are made about which overlay path to select and when for the new flow over a control plane of the SD-WAN, based on the topology of the remote network edge and the local SDWAN policy, and to build the selected overlay path.
Abstract: Systems and methods for facilitating traffic steering via an SRv6 network by SD-WAN CE nodes without requiring the SD-WAN CE nodes to have SRv6 routing capabilities is provided. According to one embodiment, an end-to-end SRv6 tunnel is established through the SRv6 network between a source SD-WAN CE node associated with a first LAN and a destination SD-WAN CE node associated with a second LAN. LAN-side traffic originated by the first LAN and destined for the second LAN is received by the source SD-WAN CE node. Based on the LAN-side traffic, the source SD-WAN CE node, may encapsulate the LAN-side traffic as payload of an IPv6 packet, including incorporating path information within an IPv6 SRH to instruct PE/P nodes of the SRv6 network how to steer the IPv6 packet through the SRv6 network. Forwarding the encapsulated LAN-side traffic by the SD-WAN CE node through the SRv6 network via the SRv6 tunnel.
Abstract: A computer-implemented method includes building, with a network security platform, a trusted database having software including software updates and files including file information from trusted third party software providers. The computer-implemented method further includes receiving a software update or file from a third party software provider, determining an identifier for the software update or file, validating the software update or file to determine validity of the software update or file, and determining whether to update the trusted database with the identifier for the software update or file.
Type:
Application
Filed:
January 30, 2024
Publication date:
July 31, 2025
Applicant:
Fortinet, Inc.
Inventors:
Juan Ruiz Sanchez, Jorge Garcia Alvarez
Abstract: A network gateway interrogates a plurality of network devices to collect security state data and operational state data on a periodic basis. A vulnerability resolution module to automatically uploads a security report and downloads actions (e.g., updates to operating system, configurations or policies) from a cloud vulnerability server corresponding to resolution of the vulnerabilities. A security remediation module can remediate on the network device for protection against at least the specific vulnerability of the at least one the peripheral.
Type:
Grant
Filed:
March 31, 2021
Date of Patent:
July 29, 2025
Assignee:
Fortinet, Inc.
Inventors:
Jordan Edward Thompson, Jerrod Robert Seger, Mark Derek Westerhof
Abstract: Systems and methods for providing selective data-replication among nodes of a distributed multi-tenancy MSSP architecture for performing secure orchestration and automated response (SOAR) are provided. According to one embodiment a master SOAR node of an MSSP receives multiple messages via a secure router coupling a computing environment of the MSSP in communication with respective computing environments of multiple customers of the MSSP. The messages contain information regarding alerts relating to network infrastructure of the customers and the information is controlled by data sharing policies implemented by tenant SOAR nodes within the respective computing environments of the customers. Based on an investigation into an alert relating to a network infrastructure of a particular customer, the master SOAR node causes a workflow to be remotely executed by a tenant SOAR node within the computing environment of the particular customer.
Type:
Grant
Filed:
February 6, 2020
Date of Patent:
July 29, 2025
Assignee:
Fortinet, Inc.
Inventors:
Joseph Loomis, Abhishek Narula, Pooja Singh, Amit Jain, Tushar Kanade, Fnu Bharathram, Satish Mishra
Abstract: During an initial bootup in a bootloader of an SOC, a random number that is unique to the device is stored in secured storage. During a first bootup, a two-dimensional random key is stored in secure storage for encoding the ENV parameters. During a second (subsequent) bootup, the ENV parameters that are current in unsecured storage are compared against the ENV parameters that previously existed in order to identify a mismatch. A remediation security action can be taken responsive to a mismatch between the baseline digest and a dynamic digest. Ultimately, an operating system can be loaded in the bootloader.
Abstract: Groups of Wi-Fi 7 stations are created including identifying Wi-Fi 7 stations accessing the channel for multimedia traffic and creating a group of stations accessing the channel for multimedia traffic. Responsive to reaching the threshold usage for channel usage, a high usage priority mode is activated to prioritize multimedia traffic. In high usage priority mode, notifying the group of Wi-Fi 7 stations of EDCA channel contention parameters using broadcast, management action frame, including notifying the group of multimedia Wi-Fi 7 stations. Values of EDCA parameters in the broadcast management action frame for the at least one multimedia group are modified during high usage to allow more aggressive contention to the at least one multimedia group with multimedia traffic.
Abstract: Systems and methods for identifying a source of an attack chain based on network security scanning events triggered by movement of a decoy file are provided. A decoy file is stored on a deception host deployed by a deception-based intrusion detection system (IDS) within a private network. The decoy file contains therein a traceable object that is detectable by network security scanning performed by multiple network security devices protecting the private network. Information regarding an attack chain associated with an access to the decoy file or a transmission of the decoy file through the one or more network security devices is received by the deception-based IDS from the one or more network security devices. The information is created responsive to detection of a security incident by the network security scanning. Finally, an Internet Protocol (IP) address of a computer system that originated the attack chain is determined.
Abstract: Example systems and methods monitor a cloud compute environment. An example method includes: opening, by an agent deployed in a cloud environment, a communication channel between the agent and a kernel of an operating system of a node within the cloud environment; determining, by the agent and via the communication channel, an event associated with a namespace of the operating system; determining, by the agent and based on the event, a status of a container associated with the node; and providing, by the agent to a data platform, a message indicative of the status of the container.
Type:
Grant
Filed:
February 24, 2022
Date of Patent:
July 29, 2025
Assignee:
Fortinet, Inc.
Inventors:
Anil K. Nanduri, Prakash Jalan, Matti A. Vanninen, Ammar G. Ekbote, Alex Ramachandran Nirmala, Yijou Chen
Abstract: During authentication of an SDWAN tunnel, Intent ISAKMP packets authenticate the local SDWAN controller and the remote SDWAN controller with each other, wherein the ISAKMP packets include a notify payload. Configured link costs associated with at least two member paths at the remote SDWAN controller that have heterogeneous physical attributes from the notify payload of the ISAKMP packets are retrieved. The configured link-cost of the at least two member paths is reflective of link physical attributes. One of the at least two member paths is identified based on a lowest link-cost between the at least two member paths, for steering SDWAN network traffic.
Abstract: An e-mail is detected as being sent or received. The e-mail can be identified as a customer interaction. The e-mail is scanned to determine a sentimental value using artificial intelligence. Responsive to the sentimental value exceeding a sentimental threshold, a network security audit or other action can be performed on the user and the user device using the sentimental value as a factor in determining a security action.
Abstract: A health check is generated for at least two member paths between the local SDWAN controller and a remote SDWAN controller, with a set health check probe packets for transmission by the network interface to remote SDWAN controllers. A link cost is determined for each member path from a set of health check response packets received by the network interface. SDWAN network traffic is prioritized for each member path between the local SDWAN controller and the remote SDWAN controller based at least in part on the link cost.
Abstract: A raw policy set is received for the network processor and a dimension bitmap corresponding to the raw policy set. From the raw policy set, a policy tree builder generates a policy tree image from a set of recursive operations on the raw policy set including selecting boundaries of the raw policy set from cuts on a given dimension of the raw policy set, the dimension cut based on a dimension selection and a partition number selection for the raw policy set. Network processor hardware is configured according to the policy tree image including at least one set of registers, at least one set of tables, and at least one sequence of instructions. At runtime, the network processor applies the optimized policy set to processing of the packet session from the data communication network by the network processor hardware.
Abstract: A list is received from the Wi-Fi controller of rogue Wi-Fi 6E access points identified by BSSID within a vicinity of the Wi-Fi 6E access points based on RSSI measurements sent to the Wi-Fi controller. A rogue Wi-Fi 6E access point of the Wi-Fi controller list from the periodic beacon scanning. In response, prior to connection of any station to the rogue Wi-Fi 6E access point, broadcasts spoofed beacons on behalf of the rogue Wi-Fi 6E access point, using SSID and BSSID over the current operating channel of the rogue Wi-Fi 6E access point. The beacons are spoofed by modifying the MFP field value to indicate no encryption capability and also to indicate no encryption requirement for management frames.
Abstract: A threshold usage of the primary channel transmission bandwidth is detected exceeding a predetermined value, triggering a second mode. Responsive to reaching the threshold usage detection, a puncturing pattern is activated to transmit data frames over the remaining channel transmission bandwidth while continuing to transmit management frames over the primary channel transmission bandwidth. Responsive to reaching the threshold usage detection, data packets are separated using RU allocations for multiple wireless clients over the remaining channel transmission bandwidth. Data packets are then transmitted according to bandwidth limitations and spectral limitations.
Abstract: Specific connection request is refused responsive to a match on the MAC ban list. If not on the MAC ban list, and a station has MAC randomization enabled, the specific connection requests is also checked against the hostname ban list, wherein the specific connection request is refused responsive to a match on the hostname ban list. The specific new connection request is allowed to proceed responsive to not matching the MAC ban list and not matching the hostname ban list.