Patents Examined by Ka Shan Choy
  • Patent number: 11601456
    Abstract: A method is provided for inspecting network traffic. The method, performed in a single contained device, includes receiving network traffic inbound from an external host that is external to the protected network flowing to a protected host of the protected network, wherein the network traffic is transported by a secure protocol that implements ephemeral keys that endure for a limited time. The method further includes performing a first transmission control protocol (TCP) handshake with the external host, obtaining source and destination data during the first TCP handshake, the source and destination data including source and destination link and internet addresses obtained, caching the source and destination data, and using the cached source and destination data to obtain a Layer-7 request from the external host to the protected host and to pass a Layer-7 response from the protected host to the external host.
    Type: Grant
    Filed: August 11, 2020
    Date of Patent: March 7, 2023
    Assignee: Arbor Networks, Inc.
    Inventors: Sean O'Hara, Archana A. Rajaram
  • Patent number: 11601458
    Abstract: The current document is directed to methods and systems that generate microsegmentation quotients for computational entities and components of a distributed-computer-system. In the described implementation, microsegmentation quotients are generated for each component, subsystem, or computational entity, collectively referred to as “system entities,” of a set of specified system-entity types within the distributed computer system. Microsegmentation quotients are generated for system entities at any of the various hierarchical levels within a distributed computer system, including for the entire distributed computer system. Microsegmentation quotients are generated by an iterative process that refines initial estimates of the microsegmentation quotients for system entities within the distributed computer system.
    Type: Grant
    Filed: October 4, 2020
    Date of Patent: March 7, 2023
    Assignee: VMware, Inc.
    Inventors: Jayant Jain, Anirban Sengupta, Rick Lund, Kausum Kumar
  • Patent number: 11601459
    Abstract: A method and system is provided for setting network policies based on electronic devices connected to a network. The electronic devices present on the network are detected and their behavior is captured using profiles. These profiles are then used to generate network policies based on the electronic devices connected to the network. Instead of reacting to behavior of the electronic devices (e.g., anomaly detection to detect malware), the method and system sets the network policies to prevent unauthorized communications (e.g., before malware is present in the system).
    Type: Grant
    Filed: January 27, 2021
    Date of Patent: March 7, 2023
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Daniel Cohen-Sason, Pini Shamgar, Yevgeny Fabrikant
  • Patent number: 11595356
    Abstract: Embodiments of the present disclosure disclose a method, apparatus, device, and storage medium for processing a network request. The method comprises: activating a domain name server proxy based on local socket service in a preset application; in accordance with a determination that the preset application invokes a preset connect function, acquiring the preset connect function and replacing a destination file path in the preset connect function with a target file path corresponding to the domain name server proxy to establish a connection between the preset application and the domain name server proxy, wherein the target file path is pre-written in the preset application; receiving via the domain name server proxy a network request from the preset application, and parsing a domain name of the network request, and determining a first processing way of the network request based on a result of the parsing of the domain name.
    Type: Grant
    Filed: April 11, 2022
    Date of Patent: February 28, 2023
    Assignee: BEIJING BYTEDANCE NETWORK TECHNOLOGY CO., LTD.
    Inventor: Chaoyang Shang
  • Patent number: 11595418
    Abstract: A cyber security threat tool may detect, analyze and alert of cyber security threats in, for example, a communication network of a service provider. For example, the tool may receive network connection data associated with a plurality of network connections between a plurality of computing devices, generate, based at least in part on the network connection data, a graphical database comprising a plurality of graph nodes corresponding to the plurality of computing devices and a plurality of graph edges corresponding to the plurality of network connections and performing a database query on the graphical database to generate query results, the database query including a connection pattern to be matched by the query results generated by the performing the database query. The cyber security threat tool may then render at least a portion of the query results in a graph view and cause the graph view to be output to a user.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: February 28, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Joseph Kim Huffman
  • Patent number: 11588859
    Abstract: Systems and methods include implementing dynamic runtime code manipulation to modify application code associated with calls related to networking, with the calls implemented by application software executed as a serverless workload; intercepting the calls from the application software based on the modified application code; determining whether to permit the calls based on a set of policies; responsive to permitting a call, making the call to an operating system interface on behalf of the application software; and, responsive to not permitting the call, providing a failure notification to the application software.
    Type: Grant
    Filed: March 15, 2021
    Date of Patent: February 21, 2023
    Assignee: Zscaler, Inc.
    Inventor: Thomas E. Keiser, Jr.
  • Patent number: 11563721
    Abstract: Systems and methods for bypassing firewalls using a server management protocol is provided. In various embodiments, a proxy component serves as a “man-in-the-middle” between an edge client and a server client. The proxy component can receive a server connection request from the edge client to connect to a requested server client using a managed network name associated with the server client. The proxy component can establish a proxy connection with the requested server client, and routing data packets between the server client and the edge client. The edge client and the server client are connected without the public advertisement of the private addresses of the edge client and the server client.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: January 24, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Christopher Davenport, Kenneth Leach, Jorge Daniel Cisneros, Ivan Farkas
  • Patent number: 11558353
    Abstract: Embodiments of the present disclosure relate to a method, apparatus, and computer readable medium for providing a security service for a data center. According to the method, a packet terminating at or originating from the data center is received. At least one label is determined for the packet, each label indicating a security requirement for the packet. Based on the at least one label, a security service chain is selected for the packet, the security service chain including an ordered set of security functions deployed in the data center and to be applied to the packet. The packet is transmitted to the selected security service chain in association with the at least one label, the packet being processed by the ordered set of security functions in the security service chain.
    Type: Grant
    Filed: February 6, 2018
    Date of Patent: January 17, 2023
    Assignee: Nokia Technologies Oy
    Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin
  • Patent number: 11558406
    Abstract: Systems and methods for using a kernel module to provide computer security are provided herein. In some embodiments, a method for providing computer security may include launching a kernel module at the kernel-level of a computing device, redirecting, using the kernel module, communications traffic away from a browser executing on the computing device, decoding, using the kernel module, the received traffic to create decoded traffic, analyzing the decoded traffic, using the kernel module, for content having particular characteristics and create analyzed traffic, encoding, using the kernel module, at least a portion of the analyzed traffic to create encrypted traffic, and directing the encrypted traffic to the browser.
    Type: Grant
    Filed: February 18, 2022
    Date of Patent: January 17, 2023
    Assignee: UAB 360 IT
    Inventors: Ernestas Kulik, Mohamed Adly Amer Elgaafary, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
  • Patent number: 11552970
    Abstract: A threat intelligence gateway (TIG) may protect TCP/IP networks from network (e.g., Internet) threats by enforcing certain policies on in-transit packets that are crossing network boundaries. The policies may be composed of packet filtering rules with packet-matching criteria derived from cyber threat intelligence (CTI) associated with Internet threats. These CTI-derived packet-filtering rules may be created offline by policy creation and management servers, which may distribute the policies to subscribing TIGs that subsequently enforce the policies on in-transit packets. Each packet filtering rule may specify a disposition that may be applied to a matching in-transit packet, such as deny/block/drop the in-transit packet or pass/allow/forward the in-transit packet, and also may specify directives that may be applied to a matching in-transit packet, such as log, capture, spoof-tcp-rst, etc.
    Type: Grant
    Filed: July 15, 2022
    Date of Patent: January 10, 2023
    Assignee: Centripetal Networks, Inc.
    Inventors: Sean Moore, Jonathan R. Rogers, Vincent Mutolo, Peter P. Geremia
  • Patent number: 11553347
    Abstract: An abnormal traffic analysis apparatus includes receiving means for receiving traffic from a device, analysis means for analyzing whether or not traffic received from the device is abnormal traffic, analysis result recording means for recording a result of analysis performed by the analysis means, and device management means for managing movement of the device between edges. If it is determined by the device management means that a device that is a target of analysis performed by the analysis means moves to an edge, the receiving means creates information for continuing analysis of traffic received from the device and transmits the information to an apparatus for analyzing traffic that is included in the edge to which the device moves.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: January 10, 2023
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Takafumi Harada, Gembu Morohashi, Hiroki Ito
  • Patent number: 11552808
    Abstract: A method and apparatus for generating a dynamic security certificate. The method creates an entropic element from user input, receives metadata from user input and generates a dynamic security certificate using the entropic element and the metadata. The dynamic security certificate is then trusted through user input.
    Type: Grant
    Filed: November 23, 2021
    Date of Patent: January 10, 2023
    Assignee: UAB 360 IT
    Inventor: Emanuelis Norbutas
  • Patent number: 11539701
    Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: December 27, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventor: Joshua Daniel
  • Patent number: 11533326
    Abstract: Techniques are disclosed for summarizing, diagnosing, and correcting the cause of anomalous behavior in computing systems. In some embodiments, a system identifies a plurality of time series that track different metrics over time for a set of one or more computing resources. The system detects a first set of anomalies in a first time series that tracks a first metric and assigns a different respective range of time to each anomaly. The system determines whether the respective range of time assigned to an anomaly overlaps with timestamps or ranges of time associated with anomalies from one or more other time series. The system generates at least one cluster that groups metrics based on how many anomalies have respective ranges of time and/or timestamps that overlap. The system may preform, based on the cluster, one or more automated actions for diagnosing or correcting a cause of anomalous behavior.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: December 20, 2022
    Assignee: Oracle International Corporation
    Inventors: Sampanna Shahaji Salunke, Dario Bahena Tapia, Dustin Garvey, Sumathi Gopalakrishnan, Neil Goodman
  • Patent number: 11533619
    Abstract: In some embodiments, an exemplary access controlling network architecture may include: a computer platform configured to: receive, from an online entity, an action performance request; request, from an access controlling platform, an expected access control digital key to be presented to the online entity; receive the expected access control digital key; instruct to display the expected access control digital key at a computing device; cause a mobile originating communication, having the expected access control digital key and an identity linked to the computing device; determine a lack of a receipt of the access authentication indicator associated with the online entity from the access controlling platform; and perform, due to, for example, the online entity being a BOT, one of: modifying a visual schema of the online entity, disabling the online entity, or suspending one of: a performance of the online entity or the performance of the action by the online entity.
    Type: Grant
    Filed: May 22, 2022
    Date of Patent: December 20, 2022
    Assignee: STARKEYS LLC
    Inventor: Ari Kahn
  • Patent number: 11533186
    Abstract: A terminal A transmits an owner identity confirmation start request to a terminal B including owner server association information capable of identifying an owner of the terminal and a terminal management server A of the terminal. The terminal B transmits an owner identity confirmation request to the terminal management server B of the terminal, the owner identity confirmation request including the owner server association information received and the owner server association information including information of the terminal B. The terminal management server B transmits, to the terminal management server A, an inter-server owner identity confirmation request including the identity confirmation information of the owner of the terminal B and the owner server association information of the terminal A.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: December 20, 2022
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Yoshihiko Omori, Takao Yamashita
  • Patent number: 11503078
    Abstract: An apparatus comprises a processing device configured to receive, at a user interface of a trust platform configured to manage cloud assets operating in clouds of two or more cloud service providers, a specification of security and compliance controls to be implemented for workloads of a given entity running on a subset of the cloud assets. The processing device is also configured to obtain, utilizing application programming interfaces of the trust platform, information characterizing deployed security and compliance controls for the subset of the plurality of cloud assets from first and second pluralities of monitoring tools operating in tenant and management environments of the clouds.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: November 15, 2022
    Assignee: Virtustream IP Holding Company LLC
    Inventors: Pritesh Parekh, Nicholas Kathmann, Qintao Zhao
  • Patent number: 11489693
    Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record, wherein the network access point provides access to a local network inacces
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: November 1, 2022
    Inventors: Joshua Daniel, Paul Kearney
  • Patent number: 11477223
    Abstract: Methods and systems for the detection, identification, analysis of cybersecurity events in order to support prevention of the persistence of threats, malware or other harmful events are provided. The methods and systems of the present invention enable a user to find similar anomalous network traffic within a single network or across multiple networks. The methods and systems identify and correlate activity in order to analyze potential threats within a network by providing broader contextual information about how those threats relate to other activity within the network or across a sector or country.
    Type: Grant
    Filed: January 15, 2020
    Date of Patent: October 18, 2022
    Assignee: IronNet Cybersecurity, Inc.
    Inventors: Michael Lowney, Phillip Baker Schafer, Alexander Michael Conn, Patrick Collard, Stephen Kinser
  • Patent number: 11477284
    Abstract: A programmable network architecture that employs a software based, modular functional infrastructure with standard interfaces is utilized for mobile core networks. In one aspect, network services and/or functions can be built and addressed as resources that are configured and/or accessed with standard and/or open application program interfaces (APIs). The disclosed network architecture provides real-time and on-demand network configurations and dynamic service provisioning.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: October 18, 2022
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Qingmin Hu, Brian Daly