Patents by Inventor Michael Soren Jacobsen

Michael Soren Jacobsen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10637863
    Abstract: Enforcing a policy is described. A mapping between an IP address of a device and a user identity is identified at a first appliance, at least in part by correlating event information. The mapping is transmitted to a second appliance. A policy is applied by the second appliance to the device based at least in part on the user identity.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: April 28, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Song Wang, Michael Soren Jacobsen, Martin Walter, Suiqiang Deng, Zhipu Jin
  • Patent number: 10560478
    Abstract: Enforcing a policy is described. System log messages are received, via an interface, from a network device. At least a portion of the received system log messages are parsed to obtain an IP address and to obtain a user identifier. A policy to apply to a session associated with the IP address is determined, based at least in part on the user identifier. The policy is applied to the session.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: February 11, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Amro A. Younes, Zhipu Jin, Martin Walter, Michael Soren Jacobsen, Nicholai Gian Piagentini
  • Patent number: 10200412
    Abstract: Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, network-based security for mobile devices based on device state includes receiving a Host Information Profile (HIP) report for a mobile device from a mobile device management (MDM) service at the security device, in which the HIP report includes device state information for the mobile device; applying a policy based on the HIP report for the mobile device and the device state; and performing access control at the security device based on the policy based on the HIP report for the mobile device.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: February 5, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Michael Soren Jacobsen, Joby Menon, Song Wang
  • Patent number: 10165008
    Abstract: Enforcing a policy is described. Event data generated in response to a device authenticating to a node on a first network is received. A request for a resource that is external to the first network is received from the device. A mapping between an IP address of the device and a user identity is determined, at least in part by using at least a portion of the received event data. A policy is applied to the device based at least in part on the user identity.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: December 25, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Michael Soren Jacobsen, Song Wang, Wilson Xu
  • Patent number: 10104128
    Abstract: Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report includes receiving a Host Information Profile (HIP) report for a mobile device; performing a policy match based on the HIP report for the mobile device; and performing an action based on the policy match based on the HIP report for the mobile device.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: October 16, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Michael Soren Jacobsen, Joby Menon, Song Wang
  • Publication number: 20180139241
    Abstract: Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report includes receiving a Host Information Profile (HIP) report for a mobile device; performing a policy match based on the HIP report for the mobile device; and performing an action based on the policy match based on the HIP report for the mobile device.
    Type: Application
    Filed: September 27, 2017
    Publication date: May 17, 2018
    Inventors: Michael Soren Jacobsen, Joby Menon, Song Wang
  • Patent number: 9894099
    Abstract: Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report includes receiving a Host Information Profile (HIP) report for a mobile device; performing a policy match based on the HIP report for the mobile device; and performing an action based on the policy match based on the HIP report for the mobile device.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: February 13, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Michael Soren Jacobsen, Joby Menon, Song Wang
  • Patent number: 9843593
    Abstract: Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.
    Type: Grant
    Filed: September 3, 2014
    Date of Patent: December 12, 2017
    Assignee: Palo Alto Networks, Inc.
    Inventors: Shadi Rostami-Hesarsorkh, Michael Soren Jacobsen
  • Publication number: 20170353500
    Abstract: Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, network-based security for mobile devices based on device state includes receiving a Host Information Profile (HIP) report for a mobile device from a mobile device management (MDM) service at the security device, in which the HIP report includes device state information for the mobile device; applying a policy based on the HIP report for the mobile device and the device state; and performing access control at the security device based on the policy based on the HIP report for the mobile device.
    Type: Application
    Filed: June 5, 2017
    Publication date: December 7, 2017
    Inventors: Michael Soren Jacobsen, Joby Menon, Song Wang
  • Patent number: 9705919
    Abstract: Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, network-based security for mobile devices based on device state includes receiving a Host Information Profile (HIP) report for a mobile device from a mobile device management (MDM) service at the security device, in which the HIP report includes device state information for the mobile device; applying a policy based on the HIP report for the mobile device and the device state; and performing access control at the security device based on the policy based on the HIP report for the mobile device.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: July 11, 2017
    Assignee: Palo Alto Networks, Inc.
    Inventors: Michael Soren Jacobsen, Joby Menon, Song Wang
  • Publication number: 20160028771
    Abstract: Enforcing a policy is described. Event data generated in response to a device authenticating to a node on a first network is received. A request for a resource that is external to the first network is received from the device. A mapping between an IP address of the device and a user identity is determined, at least in part by using at least a portion of the received event data. A policy is applied to the device based at least in part on the user identity.
    Type: Application
    Filed: June 5, 2015
    Publication date: January 28, 2016
    Inventors: Michael Soren Jacobsen, Song Wang, Wilson Xu
  • Publication number: 20150058916
    Abstract: Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.
    Type: Application
    Filed: September 3, 2014
    Publication date: February 26, 2015
    Inventors: Shadi Rostami-Hesarsorkh, Michael Soren Jacobsen