Firewall Patents (Class 726/11)
-
Patent number: 9699142Abstract: Method and apparatus for cross-site scripting defense using document object model template are disclosed. In the method and apparatus, a document object model template is generated based at least in part on representative information for web content. The document object model template is provided for use in determining whether received web content is permissible.Type: GrantFiled: May 7, 2014Date of Patent: July 4, 2017Assignee: Amazon Technologies, Inc.Inventor: Nicholas Alexander Allen
-
Patent number: 9693185Abstract: Method and Over The TOP (OTT) service providing node for retrieval of geographic location information of a communication device communicatively coupled to the OTT service providing node. A request for an OTT service is received from the communication device, and an identifier of the communication device is determined. An operator of the communication device is determined, by utilizing the determined identifier of the communication device. An identifier of an Operator Location Service (OLS) node of the operator is determined. A location request is sent to the OLS node for requesting geographic location information of the communication device, the location request comprising the identifier of the communication device, the identifier of the communication device to be utilized by the OLS node for retrieving the requested geographic location information from a location server, and the retrieved geographic location information to be sent by the OLS node to the OTT service providing node.Type: GrantFiled: November 20, 2014Date of Patent: June 27, 2017Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Tomas Thyni, Mats Forsman, Annikki Welin
-
Patent number: 9692727Abstract: A context-aware distributed firewall scheme is provided. A firewall engine tasked to provide firewall protection for a set of network addresses applies a reduced set of firewall rules that are relevant to the set of addresses associated with the machine. A hypervisor implements a search structure that allows each virtual machine's filter to quickly identify relevant rules from all of the received rules. The search structure is constructed as a binary prefix tree, each node corresponding to an IP CIDR (Classless Inter-Domain Routing) block. A query for relevant rules traverses nodes of the search structure according to a queried IP address and collect all rules that are associated with the traversed nodes.Type: GrantFiled: December 2, 2014Date of Patent: June 27, 2017Assignee: NICIRA, INC.Inventors: Jingmin Zhou, Anirban Sengupta
-
Patent number: 9679040Abstract: The disclosed embodiments provide techniques for performing deduplication for a distributed filesystem. Two or more cloud controllers collectively manage distributed filesystem data that is stored in one or more cloud storage systems; the cloud controllers cache and ensure data consistency for the stored data. During operation, a cloud controller receives an incremental metadata snapshot that references new data that was added to the distributed filesystem by a remote cloud controller. The cloud controller extracts a set of deduplication information from this incremental metadata snapshot. Upon receiving a subsequent client write request (e.g., a file write that includes one or more data blocks), the cloud controller uses the extracted deduplication information to determine that one or more data blocks in the client write request have already been written to the distributed filesystem.Type: GrantFiled: February 15, 2013Date of Patent: June 13, 2017Assignee: PANZURA, INC.Inventors: Andrew P. Davis, John Richard Taylor, Randy Yen-pang Chou
-
Patent number: 9680795Abstract: Techniques for destination domain extraction for secure protocols are disclosed. In some embodiments, destination domain extraction for secure protocols includes monitoring network communications between a client and a remote server; determining if the client sends a request to create a secure connection with the remote server (e.g., in which the network communications are initiating a setup for a secure protocol-based connection); and extracting a destination domain from the request to create the secure connection with the remote server. In some embodiments, the secure protocol is a secure sockets layer (SSL) protocol or transport layer security (TLS) protocol, and the destination domain is extracted from the server name indication (SNI) of a client hello message sent from the client to the remote server. In some embodiments, destination domain extraction for secure protocols further includes applying a policy (e.g.Type: GrantFiled: June 30, 2016Date of Patent: June 13, 2017Assignee: Palo Alto Networks, Inc.Inventors: Shivakumar Buruganahalli, Song Wang
-
Patent number: 9674217Abstract: A system and method for mitigating the effects of malicious internet traffic, including DDOS attacks and email bombs, by utilizing a DNS Traffic Analyzer and Firewall to analyze network traffic intended for a DNS server and preventing some network traffic from accessing the DNS server.Type: GrantFiled: February 26, 2016Date of Patent: June 6, 2017Inventor: John Wong
-
Patent number: 9665458Abstract: A method and system of making information from an application accessible to an electronic device, comprising: checking, via a log monitor, a third party log file for a new log entry; sending any new log entries in the third party log file to a rules engine, the rules engine comprising at least one rule; determining if any of the new log entries violate any rules in the rules engine; making accessible any new log entries that violate any rules to the electronic device; creating an alert based on the new log entry that violates at least one rule; and notifying users of the alert using alert criteria to determine who should receive the alerts and when, wherein different users receive different alerts based on the alert criteria.Type: GrantFiled: June 1, 2012Date of Patent: May 30, 2017Assignee: Data Security Solutions, LLCInventors: Thomas Edward Stevenson, Allan Michael Matyger, Jr., Paul Smith, Sean Sachen
-
Patent number: 9665711Abstract: A first identifier associated with a first routine is received as input. A determination of whether a first list includes the first identifier is made. In response to the determination, a first action is performed in the event the first list includes the first identifier. A second action that is different from the first action is performed in the event the first list does not include the first identifier.Type: GrantFiled: December 6, 2013Date of Patent: May 30, 2017Assignee: QUALCOMM IncorporatedInventors: Bjorn Markus Jakobsson, Karl-Anders R. Johansson
-
Patent number: 9648006Abstract: A system and method for communicating with a client application that can include at a communication platform, receiving an authorization token of a first client application; verifying at least one permission associated with the authorization token; at a first server of the communication platform, accepting an incoming communication request; retrieving communication instructions from a server according to the incoming communication request; identifying an instruction to communicate with a communication destination of the first client application; and establishing communication with the first client application.Type: GrantFiled: September 21, 2012Date of Patent: May 9, 2017Assignee: Twilio, Inc.Inventors: Jeffrey Lawson, John Wolthuis, Evan Cooke, Jonas Borjesson, Rob Simutis
-
Patent number: 9634987Abstract: A non-transitory computer readable medium storing instructions which, when executed on one or more processors, cause performance of operations. The operations include: receiving a first message from a device; determining, in response to the first message, a media access control (MAC) address of the device; and transmitting, in response to the first message, a second message comprising the MAC address to the device.Type: GrantFiled: January 31, 2014Date of Patent: April 25, 2017Assignee: Aruba Networks, Inc.Inventors: Cameron Esdaile, Kiyo Kubo, Nicholas Farina
-
Patent number: 9635060Abstract: In illustrative embodiments, methods in accordance with the present invention utilize a thin kernel module operating in the kernel space of an operating system to redirect all TCP flows to user space for application analysis and processing. Redirected data is presented to the user space application as a data stream, allowing the processing of information contained within the data stream from the user space on a mobile device. This allows the user space application to inspect and take action on incoming data before allowing the data to continue to pass through the device. This enables parental controls, firewalls, real-time anti-virus scanning, tethering/hot-spot, bandwidth optimization, and similar programs to effectively operate across different mobile devices as user downloadable/actuatable applications.Type: GrantFiled: April 13, 2015Date of Patent: April 25, 2017Assignee: CONTENT WATCH HOLDINGS, INC.Inventors: James D. Hegge, Bryan D. Ashby, Hugh C. Davis, William F. Phillips
-
Patent number: 9635581Abstract: Local breakout mechanisms can be performed by a femto access point (FAP) to facilitate efficient utilization of backhaul and/or macro networks. In particular, a slave Gateway GPRS Support Node (GGSN) can be integrated within the FAP to directly route the incoming traffic from a user equipment (UE) at the FAP. In one example, Internet bound traffic can be directly routed to the Internet, without employing macro network resources. Further, the system can avoid hairpinning by routing traffic between the UE and a home Local Area Network (LAN) by a anchoring a call or a session in the slave GGSN and facilitate integration of UEs with home applications by employing a UE Digital Home Agent. In addition, the FAP can perform UE-to-UE CS media breakout to facilitate communication between UEs attached to the FAP, without routing the traffic through the core macro network.Type: GrantFiled: June 10, 2015Date of Patent: April 25, 2017Assignees: AT&T INTELLECTUAL PROPERTY I, L.P., AT&T MOBILITY II LLCInventors: Cheng P. Liu, Alireza Faryar, Kurt Huber
-
Patent number: 9628497Abstract: An intrusion detection method for detecting an intrusion in data traffic on a data communication network parses the data traffic to extract at least one protocol field of a protocol message of the data traffic, and associates the extracted protocol field with a model for that protocol field. The model is selected from a set of models. An assessment is made to determine if a contents of the extracted protocol field is in a safe region as defined by the model, and an intrusion detection signal is generated in case it is established that the contents of the extracted protocol field is outside the safe region. The set of models may comprise a corresponding model for each protocol field of a set of protocol fields.Type: GrantFiled: July 26, 2012Date of Patent: April 18, 2017Assignee: Security Matters B.V.Inventor: Emmanuele Zambon
-
Patent number: 9628321Abstract: A receiver of network data dynamically filters packets by packet type from a network device CPU based on usage information, such as time, day, location, and feature (e.g., “video” or “application”) selection.Type: GrantFiled: May 22, 2013Date of Patent: April 18, 2017Assignees: Sony Electronics Inc., SONY CORPORATIONInventors: Fredrik Carpio, Milton Massey Frazier, Nikolaos Georgis
-
Patent number: 9621516Abstract: A method is provided to control the flow of packets within a system that includes one or more computer networks comprising: policy rules are provided that set forth attribute dependent conditions for communications among machines on the one or more networks; machine attributes and corresponding machine identifiers are obtained for respective machines on the networks; and policy rules are transformed to firewall rules that include machine identifiers of machines having attributes from among the obtained machine attributes that satisfy the attribute dependent policy rules.Type: GrantFiled: June 24, 2009Date of Patent: April 11, 2017Assignee: VMware, Inc.Inventors: Debashis Basak, Rohit Toshniwal, Allwyn Sequeira
-
Patent number: 9602527Abstract: Systems and methods for retrospective scanning of network traffic logs for missed threats using updated scan engines are provided. According to an embodiment, a network security device maintains a network traffic log that includes information associated with network activities observed within a private network. Responsive to an event, the network traffic log is retrospectively scanned in an attempt to identify a threat that was missed by a previous signature-based scan or a previous reputation-based scan of the observed network activities. When the threat is identified as a result of the retrospective scan, then remedial and/or preventive action is taken with respect to the threat.Type: GrantFiled: March 19, 2015Date of Patent: March 21, 2017Assignee: Fortinet, Inc.Inventor: Qianyong Yu
-
Patent number: 9590993Abstract: Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.Type: GrantFiled: September 9, 2014Date of Patent: March 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: David Abzarian, Salahuddin Khan, Eran Yariv, Gerardo Diaz Cuellar
-
Patent number: 9591480Abstract: A method, a device, and a communication system are provided for secure communication of at least one of multiple components of a vehicle with at least one external communication partner via a wireless communication link, the multiple components in each case including at least one communication module for data exchange. The method includes exchange of data packets between a transceiver device of the vehicle and an external transceiver station, a communication status of the wireless communication link being ascertained and a data exchange between the at least one component and/or the external communication partner on the one hand, and the others of the multiple components on the other hand and/or an access of the at least one component and/or of the external communication partner to the others of the multiple components being enabled or disabled as a function of the communication status. The device and the communication system are provided for implementing the method.Type: GrantFiled: May 4, 2006Date of Patent: March 7, 2017Assignee: VOLKSWAGEN AGInventor: Amer Aijaz
-
Patent number: 9584544Abstract: A system and method for providing security in a virtual environment are provided. An example system includes a link module that links a secured logical component to a logical entity including a set of virtual machines. The example system also includes a security module that identifies a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity. The example system further includes a control module that controls, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity.Type: GrantFiled: March 12, 2013Date of Patent: February 28, 2017Assignee: Red Hat Israel, Ltd.Inventor: David Botzer
-
Patent number: 9578087Abstract: A method for providing a desired portion of a data object document is disclosed. The method comprises receiving, from a client device, an Application Program Interface (API) request for a data object document, where the API request includes a parameter identifying the desired portion of the data object document, and the desired portion is less than all of the data object document. The method continues with transmitting the API request for the data object document to an origin server, and receiving an API response from the origin server that includes the data object document including more than the desired portion of the data object document. The method further includes automatically selecting, from the received data object document, the desired portion of the data object document based on the parameter, and transmitting, to the client device, the desired portion instead of all of the data object document.Type: GrantFiled: September 18, 2015Date of Patent: February 21, 2017Assignee: CLOUDFLARE, INC.Inventor: David Alexander Kitchen
-
Patent number: 9577919Abstract: DNS wildcard beaconing. In one embodiment, for example, a computer-implemented method comprises: receiving a network request from a resolver to resolve a hostname, the network request from the resolver comprising a network address of the resolver, the hostname comprising a unique wildcard portion; storing first data representing an association between at least the unique wildcard portion and the network address of the resolver; receiving a network request from a client for a resource, the network request from the client comprising a network address of the client and at least the unique wildcard portion; storing second data representing an association between at least the unique wildcard portion and the network address of the client; based on the first data and the second data, associating the client with the resolver; and storing third data representing the association between the client and the resolver.Type: GrantFiled: February 27, 2014Date of Patent: February 21, 2017Assignee: Yahoo! Inc.Inventors: Michael Christian, David Apgar
-
Patent number: 9553891Abstract: Automated locating and disconnection of undesired devices may include receiving both the addresses of the device and the switch coupled to the device and determining whether the switch can blackhole the traffic of the device. If it is determined that the switch cannot blackhole the traffic associated with the device, systems and methods of the present disclosure may further determine whether the switch can reroute the traffic of the device. If, however, the switch can blackhole traffic of the device, a blackhole command may be issued to transform a destination of the traffic associated with the device to a null destination. Alternatively, if it is determined that the switch can reroute traffic of the device, a reroute command may be issued to transform the destination of the traffic associated with the device to a safe zone.Type: GrantFiled: July 27, 2015Date of Patent: January 24, 2017Assignee: Bank of America CorporationInventors: Rahul Isola, Anthony Grossi
-
Patent number: 9548989Abstract: When obtained communication data corresponds to an external communication from the outside of the network to the inside, external communication data is stored. When the obtained communication data corresponds to a service start, external communication data associated with the service start is extracted, and service start data is stored in correlation with the extracted external communication data. When the obtained communication data corresponds to an operation end, operation end data is stored. When the obtained communication data corresponds to a communication from the inside to the outside of the network, operation end data associated with the obtained communication data is extracted. Then, it is determined that a condition is satisfied that external communication data associated with the obtained communication data is stored in correlation with the service start data associated with the extracted operation end data. When the condition is satisfied, an attack for the system is detected.Type: GrantFiled: December 16, 2014Date of Patent: January 17, 2017Assignee: FUJITSU LIMITEDInventors: Masahiro Yamada, Yuki Fujishima, Masanobu Morinaga
-
Patent number: 9544316Abstract: A method, a device and a system for detecting security of a download link are provided. The method comprises: pre-acquiring an information set of download link security (S101); performing a feature matching between information of a download link and content of the information set of download link security (S102); and identifying security of the download link according to a result of the feature matching, and presenting an identification result to a user (S103). In the method, device and system, statistics regarding security of download links in a network are collected in advance to generate an information set, whether a download link in a webpage is secure is determined according to the preset information set, and a corresponding prompt is provided to a user, so that the user can know the security of the download link before downloading, thereby reducing ineffective download behaviors and the consumption of network bandwidth resources.Type: GrantFiled: September 21, 2012Date of Patent: January 10, 2017Assignee: Beijing Qihoo Technology Company LimitedInventors: Ningyi Chen, Yipeng Zhu
-
Patent number: 9542433Abstract: Systems and methods for ensuring the quality of identity and access management information at a computing system are described. Access right information that respectively corresponds to one or more access rights may be stored at a data store. The access right information may be stored in accordance with a data model that defines respective relationships between the access rights and both the users having access to the computing system and the computing resources of the computing system. At least a portion of the access right information may be retrieved, and quality assurance tasks may be performed using the portion of the access right information retrieved.Type: GrantFiled: May 1, 2014Date of Patent: January 10, 2017Assignee: Bank of America CorporationInventors: Armen Moloian, Ronald W. Ritchey
-
Patent number: 9544194Abstract: A network management service system includes a policy management apparatus that receives updating of a communication policy from an user and manages the communication policy for each user; a control apparatus that generates a packet handling operation of a packet associated with the communication policy of the user, in response to a request from the user, and sets the generated packet handling operation in a forwarding node(s); and the forwarding node(s) that processes the packet using the packet handling operation generated by the control apparatus.Type: GrantFiled: September 7, 2012Date of Patent: January 10, 2017Assignee: NEC CORPORATIONInventors: Kentaro Sonoda, Hideyuki Shimonishi, Toshio Koide, Yoichi Hatano
-
Patent number: 9537891Abstract: A policy that includes an address group is received. The policy is compiled into a set of one or more rules. The compiling is performed at least in part by determining members of the address group. The compiling can further include substituting one or more IP addresses of the members for the address group. At least one rule included in the set of rules is enforced.Type: GrantFiled: December 20, 2013Date of Patent: January 3, 2017Assignee: Palo Alto Networks, Inc.Inventors: Martin Walter, Jeffrey Fitz-Gerald
-
Patent number: 9531590Abstract: Some embodiments provide an elastic architecture for providing a service in a computing system. To perform a service on the data messages, the service architecture uses a service node (SN) group that includes one primary service node (PSN) and zero or more secondary service nodes (SSNs). The service can be performed on a data message by either the PSN or one of the SSN. However, in addition to performing the service, the PSN also performs a load balancing operation that assesses the load on each service node (i.e., on the PSN or each SSN), and based on this assessment, has the data messages distributed to the service node(s) in its SN group. Based on the assessed load, the PSN in some embodiments also has one or more SSNs added to or removed from its SN group. To add or remove an SSN to or from the service node group, the PSN in some embodiments directs a set of controllers to add (e.g., instantiate or allocate) or remove the SSN to or from the SN group.Type: GrantFiled: December 12, 2014Date of Patent: December 27, 2016Assignee: NICIRA, INC.Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy
-
Patent number: 9509660Abstract: A computer-implemented method according to one embodiment of the present disclosure includes identifying, by a computer system, an asset associated with a logical zone; detecting a change in an attribute of the asset; and in response to detecting the change in the attribute of the asset, modifying, by the computer system, a configuration setting for a firewall. Among other things, the embodiments of the present disclosure can perform dynamically configure and control security features in response to changes in the computing environment, including asset attribute changes, security events, operational events, user input and environmental changes. Embodiments of the present disclosure thereby help to quickly maintain or change the security posture of a system and maintain the level of compliance with set of predefined security benchmarks or codified best practices.Type: GrantFiled: June 1, 2015Date of Patent: November 29, 2016Assignee: CATBIRD NETWORKS, INC.Inventors: Malcolm Rieke, James Sebastian Dennis, Michael Berman
-
Patent number: 9497622Abstract: A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.Type: GrantFiled: November 27, 2013Date of Patent: November 15, 2016Assignee: CUPP Computing ASInventor: Shlomo Touboul
-
Patent number: 9495537Abstract: Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources.Type: GrantFiled: June 21, 2013Date of Patent: November 15, 2016Assignee: QUALCOMM IncorporatedInventors: Rajarshi Gupta, Vinay Sridhara, Anil Gathala, Xuetao Wei
-
Patent number: 9497503Abstract: The present invention teaches methods and systems for subscriber blocking of unauthorized network traffic in a cable data network. The cable modem termination system (CMTS) incorporates a data gateway agent that filters unauthorized traffic thereby eliminating consumption based subscribers from being responsible for related service charges. Embodiments incorporate the use of packet filtering, hybrid stateful packet filtering, content filtering, application layer filtering and time based filtering. Greater acceptance of consumption based billing is achieved by having the filter settings directed by the subscriber.Type: GrantFiled: July 26, 2010Date of Patent: November 15, 2016Assignee: TIME WARNER CABLE ENTERPRISES LLCInventors: Kenneth Gould, Andrew Danforth
-
Patent number: 9497220Abstract: Systems and techniques relating to securely managing electronic resources are described. A described technique includes receiving a request to add to a mobile device an account setting for a server resource account. Detecting a trigger event for a new perimeter based on the account setting. In response to a parameter or a pattern associated with the account setting, retrieving a security policy from a resource server for the server resource account, and generating, by the mobile device, a new perimeter including the server resource account based on the security policy. The new perimeter is configured to prevent transferring data associated with the server resource account being transferred to mobile-device resources external to the new perimeter.Type: GrantFiled: October 17, 2011Date of Patent: November 15, 2016Assignees: BlackBerry Limited, 2236008 Ontario Inc.Inventors: Daniel Cardamore, Darrell Reginald May, Sivakumar Nagarajan, Carl Lloyd Cherry
-
Patent number: 9491185Abstract: One embodiment disclosed relates to a method of proactive containment of network security attacks. Filtering parameters corresponding to a specific system vulnerability are determined. These parameters are distributed to network infrastructure components, and the network infrastructure components examine packets using these parameters to detect occurrence of an attack. Once an attack is detected, the network infrastructure components take action to inhibit the attack. Other embodiments are also disclosed.Type: GrantFiled: May 13, 2013Date of Patent: November 8, 2016Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: John Selep, Mauricio Sanchez
-
Patent number: 9473420Abstract: Techniques are provided for providing access control lists in a distributed network switch. The distributed network switch made of switch units is divided into logical switch partitions, or logical networks. Physical ports of the switch units are partitioned into logical ports, where each logical port is associated with a logical switch partition. A control point of the distributed network switch manages and assigns a service tag (S-Tag) used to identify which logical port ingress and egress frames are associated with. To generate metrics and other forwarding actions for a given logical switch partition, the control point sets up access control list (ACLs) targeting the logical port associated with the S-Tags associated with the given logical switch partition.Type: GrantFiled: March 14, 2013Date of Patent: October 18, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Josep Cors, Ward R. Nelson, Daniel E. Pradilla, Chandramouli Radhakrishnan
-
Patent number: 9467324Abstract: A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the identity and current status of one or more traffic requesters and at least one device for receiving instructions from a user. Communication data packets associated with the one or more traffic requesters are allowed for communication via the network or denied and blocked by the firewall security platform based on the current status of each of the one or more traffic requesters. The user's instructions include making a selection, with the selection including members that are at least one of the one or more traffic requesters. The current status of each member of the selection is altered in response to the making of the selection.Type: GrantFiled: May 7, 2015Date of Patent: October 11, 2016Inventor: Michael C. Wood
-
Patent number: 9462001Abstract: Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received packet can be communicated from the ACN to a secure access server (SAS) of the enclave. The admissibility, to the first enclave, of each received packet for which characteristics are communicated, can be determined by the first secure access server. For each packet determined to be inadmissible, the technology can communicate, from the SAS to a plurality of ACNs of the first enclave, an instruction to deny admission to packets having the characteristics of the inadmissible packet. At each access control node receiving the instruction, the technology can deny admission to packets having the characteristics of the inadmissible packet based on the instruction to deny admission to packets having the characteristics of the inadmissible packet.Type: GrantFiled: January 15, 2014Date of Patent: October 4, 2016Assignee: CISCO TECHNOLOGY, INC.Inventors: Gary Michael Willhite, Lauren Suzanne Lomanto
-
Patent number: 9460299Abstract: A computer-implemented subject monitoring method is provided. The method includes providing an online-monitoring agent configured for monitoring a personal computing device, receiving identifying information associated with at least one of an account, email address, site, and service from the personal computing device via the online-monitoring agent, and monitoring via a network the at least one of the account, email address, site, and service based on the identifying information received via the online-monitoring agent.Type: GrantFiled: December 1, 2011Date of Patent: October 4, 2016Assignee: Location Labs, Inc.Inventors: Andrew Weiss, Daniel Hodges, Joseph Anakata
-
Patent number: 9455954Abstract: A system and a method initiate a data transmission from a first computer to at least a second computer or approve access to the data on a first computer by a second computer. The computers are interconnected through a network connection. The first computer is protected against access through the network connection by a firewall. Another communication connection, which the first computer does not use for transmitting data, is provided for initiating the access authorization to the first computer or the data transmission from the first computer to at least the second computer. A printing machine is provided with the system.Type: GrantFiled: May 4, 2005Date of Patent: September 27, 2016Assignee: Heidelberger Druckmaschinen AGInventor: Tom Oelsner
-
Patent number: 9444840Abstract: Various embodiments provide a method and apparatus of providing a distributed security service that runs light instances in a number of security devices and central instances of the security services in select security devices. A received or transmitted client content segment is directed to a light instance which either applies a security policy corresponding to the client content segment if the client content segment has been previously analyzed and has a valid security policy, or else, the light instance sends the client content segment to a central instance to be analyzed. The central instance may then provide a complete security analysis on the client content segment, determine a security policy corresponding to the client content segment and push the determined security policy to one or more of the light instances. Advantageously, a distributed security service delivery may provide highly secure, network efficient and cost effective security service delivery.Type: GrantFiled: March 13, 2012Date of Patent: September 13, 2016Assignee: Alcatel LucentInventors: Krishna P. Puttaswamy Naga, Thyagarajan Nandagopal
-
Patent number: 9444788Abstract: Methods and systems for Data Leak Prevention (DLP) in a private network are provided. A data structure is maintained within a network security appliance identifying candidate upper layer protocols, corresponding commands of interest and a corresponding suspect field within each of the commands that is to be subjected to DLP scanning as a result of its potential for carrying sensitive information. A packet is received by the network security appliance. A protocol associated with the packet is identified. It is determined whether the identified protocol is among those of the candidate protocols. Responsive to an affirmative determination and when a command represented by the packet is among those of the corresponding commands of interest for the candidate protocol, then a DLP scan is performed on the packet. Otherwise, the packet is allowed to pass through the network security appliance without being subject to a DLP scan.Type: GrantFiled: November 12, 2015Date of Patent: September 13, 2016Assignee: Fortinet, Inc.Inventor: Eric C. Hastings
-
Patent number: 9432263Abstract: A user is provided an interface for selecting network connectivity features for designing a virtual private cloud computing network. Each network connectivity feature has an attribute for connecting tangible storage elements and tangible computing elements in the virtual private cloud computing network. Each network connectivity feature is translatable into a network element configuration statement that instantiates an action particular to the network connectivity feature. Usage rules are defined specifying how the network connectivity features can be used. Selected network connectivity features are accepted from the user. The virtual private cloud computing network is configured in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network.Type: GrantFiled: June 26, 2014Date of Patent: August 30, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Ashley Flavel, Carsten Lund, Han Nguyen
-
Patent number: 9432215Abstract: Some embodiments provide a network system that includes several host machines for hosting virtual machines, divided into several different domains. The network system includes several local domain management servers. A first local domain management server of a first domain is for (i) initiating creation of a set of distributed virtual switch ports associated with a particular logical network identifier on a host machine within its domain and (ii) attaching a first virtual machine on the host machine to a created port associated with the particular logical network identifier in order for the first virtual machine to send traffic over the logical network. The network system includes a second level management server for coordinating the use of logical network identifiers between multiple different logical domain management servers in order for the first virtual machine to communicate via the logical network with a second virtual machine in a second domain.Type: GrantFiled: May 21, 2013Date of Patent: August 30, 2016Assignee: NICIRA, INC.Inventors: James Joseph Stabile, Debashis Basak, Amol Palshikar, Sachin Thakkar
-
Patent number: 9426178Abstract: A method and apparatus for centralized policy programming and distributive policy enforcement is described. A method comprises centrally maintaining a plurality of policy definitions for one or more subscribers, generating policy configurations using the plurality of policy definitions, each of the policy configurations being specific to one of the plurality of policy definitions, and disseminating the policy configurations to the appropriate ones of the subscribers' networks.Type: GrantFiled: March 25, 2002Date of Patent: August 23, 2016Assignee: DELL SOFTWARE INC.Inventors: Boris Yanovsky, Roman Yanovsky
-
Patent number: 9419942Abstract: Techniques for destination domain extraction for secure protocols are disclosed. In some embodiments, destination domain extraction for secure protocols includes monitoring network communications between a client and a remote server; determining if the client sends a request to create a secure connection with the remote server (e.g., in which the network communications are initiating a setup for a secure protocol-based connection); and extracting a destination domain from the request to create the secure connection with the remote server. In some embodiments, the secure protocol is a secure sockets layer (SSL) protocol or transport layer security (TLS) protocol, and the destination domain is extracted from the server name indication (SNI) of a client hello message sent from the client to the remote server. In some embodiments, destination domain extraction for secure protocols further includes applying a policy (e.g.Type: GrantFiled: July 25, 2013Date of Patent: August 16, 2016Assignee: Palo Alto Networks, Inc.Inventors: Shivakumar Buruganahalli, Song Wang
-
Patent number: 9420398Abstract: A remotely provisioned proxy within a wireless/mobile phone that proxies a wireless communication path between a disconnected piconet (e.g., BLUETOOTH™) device and a network resource such as a universal resource locator (URL) via a mating mobile phone. Thus, an application proxy module embodied within the mobile phone provides managed access of a piconet device connected to the mating mobile phone to remote services. A disconnected piconet device uses the full data bandwidth available to a wireless phone, without the need for the disconnected piconet device to include its own separate wireless front end, or to require use of a modem within the mobile phone. Thus, using a mobile phone with application proxy, the user need not pay for the luxury of a tethered data plan.Type: GrantFiled: March 19, 2014Date of Patent: August 16, 2016Assignee: Telecommunication Systems, Inc.Inventors: Kevin Tsurutome, Bob Barcklay, Robert Wang
-
Patent number: 9413748Abstract: A method is provided and may include receiving a request for a network content delivery service from an access device; directing the access device to a network service provider for authentication for the network content delivery service; receiving a network authorization token from the access device, where the network authorization token is associated with the access device; obtaining a network access token from the network service provider; and binding the network access token to a content access token.Type: GrantFiled: March 15, 2013Date of Patent: August 9, 2016Assignee: CISCO TECHNOLOGY, INC.Inventors: Kent K. Leung, Jayaraman R. Iyer, Bruce A. Thompson, Flemming S. Andreasen
-
Patent number: 9413718Abstract: A method for balancing load among firewall security devices in a network is disclosed. According to one embodiment, a switch causes firewall security devices (FSDs) of a cluster to enter into a load balancing mode. Responsive to receiving a heartbeat signal from an FSD, information regarding the FSD and the port on which the heartbeat signal was received are added to a table maintained by the switch that maps outputs of a load balancing function to ports of the switch. A received packet is forwarded to an FSD of the cluster by: (i) extracting a configurable number of bit values from a configurable set of bit positions within the packet; (ii) determining the output of the load balancing function; (iii) identifying the port to which the FSD is coupled based on the output and the table; and (iv) transmitting the packet to the FSD via the identified port.Type: GrantFiled: March 15, 2016Date of Patent: August 9, 2016Assignee: Fortinet, Inc.Inventors: Edward Lopez, Joe Mihelich, Matthew F. Hepburn
-
Patent number: 9413589Abstract: A method for discovering a communication device is disclosed. The method includes: receiving in the communication device a communication including a request for an address and an identification of an application, in response to receiving the communication, associating a dynamic address of the communication device with the identified application, and sending a second communication directly or indirectly to a client device, the second communication including the dynamic address. The communication device may further obtain a dynamic address in response to receiving the communication. The dynamic address may be used for a dedicated purpose, such as for receiving a file for subsequent use by the application.Type: GrantFiled: May 9, 2012Date of Patent: August 9, 2016Assignee: BlackBerry LimitedInventors: Brian Alexander Oliver, Richard John George, Tu Dien Do, Scott Peter Gammon, Kapil Nayar
-
Patent number: 9413794Abstract: Data associated with user identities within an electronic social networking platform is extracted from the electronic social networking platform. A request is received to filter the user identities based on a specified value for a characteristic. Based on data associated with the user identities that was extracted from the electronic social networking platform, a subset of the user identities is identified who have the specified value for the characteristic. An indication of content to be delivered to the identified subset of user identities is received. As a consequence, the content is delivered to at least some of the user identities within the identified subset of user identities.Type: GrantFiled: June 8, 2013Date of Patent: August 9, 2016Assignee: MicroStrategy IncorporatedInventors: Michael J Saylor, Peter Jerome DiDomenico, III, Peng Xiao, Benjamin Z. Li