Patents Assigned to Netskope, Inc.
  • Patent number: 12284206
    Abstract: The technology disclosed relates to detecting a ransomware attack on a cloud-based file storage system. The detecting includes collecting metadata on files at they are manipulated, storing the collected metadata as historical metadata, detecting multiple artifacts of the ransomware attack resulting from ransomware manipulation of the files by (i) comparing at least one of the extension, the magic number and the size included in the historical metadata to at least one of the extension, the magic number and the size included in current metadata of the files to identify a volume of changes in the files, and (ii) detecting that the identified volume of changes exceeds a change volume to determine that the ransomware attack is in progress, and identifying a user/machine that manipulated the files and responding to the determination that the ransomware attack is in progress by restricting further manipulation of other files by the identified user/machine.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: April 22, 2025
    Assignee: Netskope, Inc.
    Inventors: Sean Hittel, Krishna Narayanaswamy, Ravindra K. Balupari, Ravi Ithal
  • Patent number: 12282545
    Abstract: Disclosed is a training data generation system for generating training data used to train machine learning models to inspect GenAI traffic to identify security and privacy concerns related to GenAI use. The training data generation system is seeded with initial prompts. The initial prompts include benign prompts, prompt injection attacks, and uploaded files. Each initial prompt is submitted to multiple GenAI applications to obtain responses. The corresponding prompts and responses are stored in a training data repository. Variations of the initial prompts are generated using, for example, one of the GenAI applications. Each variation is submitted to each of the GenAI applications as well, and the corresponding prompts and responses are stored. Another machine learning model, regex patterns, a combination, or the like may be used to label the prompts and responses in the training data repository to generate a large training data set quickly and efficiently.
    Type: Grant
    Filed: May 21, 2024
    Date of Patent: April 22, 2025
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Siying Yang
  • Patent number: 12284222
    Abstract: Disclosed is a cloud-based security system implemented in a reverse proxy that provides bidirectional traffic inspection to protect against privacy and security concerns related to the GenAI services. The security system intercepts requests directed to the GenAI service protected by the reverse proxy implementation of the network security system. The security system includes a GenAI request classifier trained to classify prompts submitted to the GenAI application as one of benign, prompt injection attack, or uploaded files. The security system further includes a GenAI response classifier trained to classify responses from the GenAI application as one of normal, leaked system prompt, leaked user uploaded files, or leaked training data.
    Type: Grant
    Filed: May 21, 2024
    Date of Patent: April 22, 2025
    Assignee: Netskope, Inc.
    Inventors: Siying Yang, Krishna Narayanaswamy
  • Publication number: 20250126099
    Abstract: A remote access system for policy-controlled computing with a client device connected to a remote software environment is disclosed. The client device communicates with the remote software environment that securely runs applications. Restrictions for a local application that runs on the client device are enforced using a first plurality of policies. A mid-link server enforces restrictions on the remote software environment using a second plurality of policies. An authentication function that perform periodic authentication of the client device for continued authorization to access a remote instance associated with the remote software environment. A mirror function that emulates sensor input from the client device as if it is happening inside the remote software environment.
    Type: Application
    Filed: October 28, 2024
    Publication date: April 17, 2025
    Applicant: Netskope, Inc.
    Inventor: Bradley B. Harvell
  • Patent number: 12278845
    Abstract: Disclosed is a cloud-based security system implemented using API notifications provided by a GenAI service or application. The security system provides bidirectional traffic inspection to protect against privacy and security concerns related to the GenAI services. The security system receives notifications of traffic including requests directed to the GenAI service from endpoints as well as the GenAI responses. The security system includes a GenAI request classifier trained to classify prompts as benign, prompt injection attack, or uploaded files. The security system further includes a GenAI response classifier trained to classify responses as normal, leaked system prompt, leaked user uploaded files, or leaked training data. Based on the classification, and optionally other security analysis, the security system may enforce security policies based on both the requests and responses that may include triggering alerts to administrators, deleting data stored by the GenAI service, and the like.
    Type: Grant
    Filed: May 21, 2024
    Date of Patent: April 15, 2025
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Siying Yang
  • Publication number: 20250119457
    Abstract: A policy-controlled access system comprising a client device running a local application, A mid-link server monitors network traffic from the client device. The network traffic includes third-party content accessed by a user on the client device. A request for data from the end-user is received using the local application, a category associated with the request for the data is determined, and multiple administrator accounts of the end-user is identified based on the category. The multiple administrator accounts are associated with multiple policies to access the data. A correspondence is identified between multiple policies of the multiple administrator accounts. A set of policy conflicts are identified among the policies based on the correspondence and a notification is generated to administrator having the policy conflicts. The policy conflicts are resolved based on suggestions from machine learning (ML) models or the administrators. The request is authorized to access the data.
    Type: Application
    Filed: October 22, 2024
    Publication date: April 10, 2025
    Applicant: Netskope, Inc.
    Inventors: Siva Prasad Badana, Naiming Chu
  • Patent number: 12273392
    Abstract: Disclosed is a cloud-based security system implemented in a forward proxy that provides generative artificial intelligence (GenAI) traffic inspection to protect against security and privacy concerns related to GenAI use for protected endpoints. The security system intercepts requests and determines whether those requests are directed to a GenAI application. The security system includes a GenAI request classifier trained to classify prompts submitted to GenAI applications as one of benign, prompt injection attack, or uploaded files. The security system further includes a GenAI response classifier trained to classify responses from GenAI applications as one of normal, leaked system prompt, leaked user uploaded files, or leaked training data.
    Type: Grant
    Filed: May 21, 2024
    Date of Patent: April 8, 2025
    Assignee: Netskope, Inc.
    Inventors: Siying Yang, Krishna Narayanaswamy
  • Publication number: 20250111288
    Abstract: The technology discloses training a classifier to label webpages with categories, extracting from a training database with thousands of webpages tentatively labeled with ground truth categories, dataset A and dataset B; training a classifier using A; and applying it to webpages in B to assign a webpage a label and a classification score. Also disclosed is cleaning B, removing webpages based on evaluation of a decision confidence metric derived from the score assigned for the webpage; and training a second classifier using cleaned B, with second classifier weights initialized independent of trained first classifier weights; and applying the second classifier to webpages in A to assign a webpage the label, score, and decision confidence matrix, and cleaning A, removing webpages from A based on the decision confidence metric. Then combining cleaned A and cleaned B into a combined clean dataset, and training the third classifier using the combined clean dataset.
    Type: Application
    Filed: October 2, 2023
    Publication date: April 3, 2025
    Applicant: Netskope, Inc.
    Inventors: Yi Zhang, Rongrong Tao, Xinjun Zhang, Dong Guo, Hongbo Yang, Jun Ou
  • Publication number: 20250112924
    Abstract: Disclosed technology of training a third classifier to select between sensitive or non-sensitive categories for a webpage including both sensitive and non-sensitive content. The technology involves collecting webpages as a tentatively labeled dataset A and a dataset B, training a first classifier including at least a first sensitive category classifier and a first non-sensitive category classifier using the tentatively labeled dataset A, referring some dual labelled webpages generated by the first classifier to a curator to curate and resolve label conflict, receiving curated labels from the curator and updating dataset B with the curated labels, training a second classifier using the updated dataset B, referring some dual labelled webpages generated by the second classifier to a curator to curate and resolve label conflict, receiving curated labels from the curator and updating dataset A with the curated labels, and training the third classifier with updated dataset A and updated dataset B.
    Type: Application
    Filed: August 8, 2024
    Publication date: April 3, 2025
    Applicant: Netskope, Inc.
    Inventors: Rongrong Tao, Xinjun Zhang, Yi Zhang, Dong Guo, Hongbo Yang, Jun Ou
  • Patent number: 12267355
    Abstract: The technology disclosed relates to detecting a data attack on a file system stored on an independent data store. The detecting includes scanning a list to identify files of the independent data store that have been updated within a timeframe, assembling current metadata for files identified by the scanning, obtaining historical metadata of the files, determining that a malicious activity is in process by analyzing the current metadata of the files and the historical metadata to identify a pattern of changes that exceeds a predetermined change velocity. Further, the detecting includes determining that the malicious activity is in process by analyzing the current metadata of the files and known patterns of malicious metadata to identify a match between the current metadata and the known patterns of malicious metadata, determining a machine/user that initiated the malicious activity, and implementing a response mechanism that restricts file modifications by the determined machine/user.
    Type: Grant
    Filed: November 15, 2021
    Date of Patent: April 1, 2025
    Assignee: Netskope, Inc.
    Inventors: Sean Hittel, Krishna Narayanaswamy, Ravindra K. Balupari, Ravi Ithal
  • Patent number: 12266209
    Abstract: A system to generate an image classifier and test it nearly instantaneously is described herein. Image embeddings generated by an image fingerprinting model are indexed and an associated approximate nearest neighbors (ANN) model is generated. The embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model is trained to receive an image embedding as input and return a score and label of the most similar identified embedding. The label may be applied if the score exceeds a threshold value. The image classifier can be tested efficiently using Leave One Out Cross Validation (“LOOCV”) to provide near-instantaneous quality indications of the image classifier to the user. Near-instantaneous indications of outliers in the provided images can also be provided to the user using a distance to the centroid calculation.
    Type: Grant
    Filed: February 26, 2024
    Date of Patent: April 1, 2025
    Assignee: Netskope, Inc.
    Inventors: Jason B. Bryslawskyj, Yi Zhang, Emanoel Daryoush, Ari Azarafrooz, Wayne Xin, Yihua Liao, Niranjan Koduri
  • Publication number: 20250097247
    Abstract: A cloud network for delivering local content to a user at a user location. The cloud network includes a client device comprising a local application, a mid link server and a cloud provider. The mid link server receives from the client device a request for local data from the user at the user location. The user has provided the request for the local data from the user location without a data center. A sub data center for the user location is identified and assigned an Internet Protocol (IP) address for the user location. The sub-data center is a data center nearest to the user location. Each data center has IP addresses for different locations to deliver the local content to the respective IP address for the location. The request is routed to the sub data center which is used to provide the local data to the user by the cloud provider. A cloud network for delivering local content to user locations. The cloud network includes a client device, a mid-link server, and a cloud provider.
    Type: Application
    Filed: October 1, 2024
    Publication date: March 20, 2025
    Applicant: Netskope, Inc.
    Inventors: Jason Hofmann, Jason Eggleston, Piyush Patel, Lonhyn T. Jasinskyj
  • Patent number: 12255877
    Abstract: A cloud-based network security system that includes a packet tap and exposes a synthetic packet stream representing the bidirectional data between enterprise client devices and cloud hosted services is disclosed. The security system intercepts packets of communication sessions and uploads a copy of the packets to cloud storage. A proxy of the security system derives session keys for the communication session and uploads the session keys to the cloud storage. An enterprise stitcher obtains the packets from the cloud storage, stitches the packets together in sequential order, and modifies the Layer 3 and Layer 4 headers to generate synthetic packet streams representing the communication sessions. The stitcher may decrypt the packets or provide the session key with the synthetic packet stream. The stitcher provides the synthetic packet streams to enterprise packet analysis systems for storage, auditing, analysis, and the like.
    Type: Grant
    Filed: May 10, 2024
    Date of Patent: March 18, 2025
    Assignee: Netskope, Inc.
    Inventors: Oleg Murat Smolsky, Vishwanath U. Shenoy, Krishna Narayanaswamy, Piyush Patel
  • Patent number: 12243294
    Abstract: Image fingerprints (embeddings) are generated by an image fingerprinting model and indexed with an approximate nearest neighbors (ANN) model trained to identify the most similar fingerprint based on a subject embedding. For image matching, a score is provided that indicates a similarity between the input embedding and the most similar identified embedding, which allows for matching even when an image has been distorted, rotated, cropped, or otherwise modified. For image classification, the embeddings in the index are clustered and the clusters are labeled. Users can provide just a few images to add to the index as a labeled cluster. The ANN model returns a score and label of the most similar identified embedding for labeling the subject image if the score exceeds a threshold. As improvements are made to the image fingerprinting model, a converter model is trained to convert the original embeddings to be compatible with the new embeddings.
    Type: Grant
    Filed: August 16, 2023
    Date of Patent: March 4, 2025
    Assignee: Netskope, Inc.
    Inventors: Jason B. Bryslawskyj, Yi Zhang, Ari Azarafrooz, Wayne Xin, Yihua Liao, Niranjan Koduri, Emanoel Daryoush
  • Patent number: 12244637
    Abstract: A cloud-based network security system (NSS) is described. The NSS uses a sandbox to safely detonate and extract information about a document and uses machine learning algorithms to analyze the information to predict whether the document contains malicious software. Specifically, during the detonation, static and dynamic information about the document is captured in the sandbox as well as character strings from images in the document. The dynamic information (and sometimes the static information) is input to an AI or machine learning model trained to provide an output indicating a prediction of whether the document contains malware. The character strings are compared with a batch of phishing keywords to generate a heuristic score. A validation engine combines the output from the AI or machine learning model and the heuristic score to classify the document as malicious or clean. Security policies can then be applied based on the classification.
    Type: Grant
    Filed: February 9, 2024
    Date of Patent: March 4, 2025
    Assignee: Netskope, Inc.
    Inventors: Xinjun Zhang, Ari Azarafrooz, Zhenxin Zhan, Ghanashyam Satpathy, Hung-Ming Chen
  • Patent number: 12245036
    Abstract: A clientless security system to secure cellular devices across a network in a cloud-based environment. The clientless security system includes a tenant with multiple cellular devices, tunnels for transmitting traffic, and a traffic steering module for directing traffic toward a gateway. The clientless security system further includes gateways to apply policies based on a device profile and an alert generator. The traffic steering module provides a SIM with network identifiers, configures the SIM with a custom network identifier, creates a device-to-IP mapping, and distributes the device-to-IP mapping to gateways in real-time. The gateways apply multiple policies based on a device profile, receive traffic from the traffic steering module, and perform a reverse lookup. The gateways further determine a device identity, apply policies, and forward traffic to a destination. The alert generator is also used to notify the tenant of further remediation in case of policy violations.
    Type: Grant
    Filed: July 10, 2024
    Date of Patent: March 4, 2025
    Assignee: Netskope, Inc.
    Inventors: Kallol Banerjee, Jonathan Bosanac, Milind Gunjan
  • Patent number: 12242520
    Abstract: The technology disclosed includes a system to perform multi-label support vector machine (SVM) classification of a document. The system creates document features representing frequencies or semantics of words in the document. Trained SVM classification parameters for a plurality of labels are applied to the document features for the document. The system determines positive and negative distances between SVM hyperplanes for the labels and the feature vector. Labels with positive distance to the feature vector are harvested. When the distribution of negative distances is characterized by a mean and standard deviation, the system further harvests the labels with a negative distance such that the harvested labels include the labels with a negative distance between the mean negative distance and zero and separated from the mean negative distance by a predetermined first number of standard deviations.
    Type: Grant
    Filed: September 28, 2023
    Date of Patent: March 4, 2025
    Assignee: Netskope, Inc.
    Inventors: Ravindra K. Balupari, Sandeep Yadav
  • Patent number: 12242955
    Abstract: Systems and methods to continuously classify temporal communication data associated with a computing device are described. In one embodiment, temporal communication data associated with the computing device is accessed and processed to create a plurality of preprocessing models. The preprocessing models are used to train a neural network. The neural network derives one or more properties associated with the computing device from the temporal communication data. A device fingerprint is defined from the one or more properties. Subsequent to defining the device fingerprint, additional temporal communication data associated with the computing device is accessed. The neural network derives one or more additional properties associated with the computing device from the additional temporal communication data. The one or more additional properties are aggregated into the defined device fingerprint, refining the defined device fingerprint.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: March 4, 2025
    Assignee: NETSKOPE, INC.
    Inventors: Srinivas Akella, Shahab Sheikh-Bahaei
  • Patent number: 12244617
    Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.
    Type: Grant
    Filed: July 5, 2023
    Date of Patent: March 4, 2025
    Assignee: Netskope, Inc.
    Inventors: Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni, Ariel Faigon, Krishna Narayanaswamy
  • Patent number: 12238177
    Abstract: The present disclosure provides an electronic inspection method and system comprising user endpoints, end-link servers belonging to a tenant, and a mid-link server. The mid-link server connects the user endpoints with an end-link server through tunnels. The mid-link server models an interaction in the tunnels using a model of an application layer. The mid-link server receives communication from the user endpoints through the tunnels, differentiates between a data object, and stores the data object based on a plurality of policies and context developed. The mid-link analyzes the model and the data object in the tunnels and determines the context according to a policy. The mid-link server performs the electronic inspection between a plurality of end-link servers and a plurality of user endpoints by inspecting the data object from the plurality of tunnels.
    Type: Grant
    Filed: January 26, 2024
    Date of Patent: February 25, 2025
    Assignee: Netskope, Inc.
    Inventors: James S. Robinson, Vadon Willis, John Khotsyphom