|
Found results for
patents
1.
|
INCREASED COVERAGE OF APPLICATION-BASED TRAFFIC CLASSIFICATION WITH LOCAL AND CLOUD CLASSIFICATION SERVICES
Document Number |
03212858 |
Status |
Pending |
Filing Date |
2022-04-05 |
Open to Public Date |
2022-10-13 |
Owner |
PALO ALTO NETWORKS, INC. (USA)
|
Inventor |
- Jiang, Mengying
- Xu, Shengming
- Fang, Menglan
- Lam, Ho Yu
|
Abstract
A cloud-based traffic classification engine maintains a catalog of application-based traffic classes which have been developed based on known applications, and a local traffic classification engine maintains a subset of these classes. Network traffic intercepted by the firewall which cannot be classified by the local engine is forwarded to the cloud-based engine for classification. Upon determination of a class of the traffic, the cloud-based engine forwards the determined class and corresponding signature to the local engine. The firewall maintains a cache which is updated with the signatures corresponding to the class communicated by the cloud-based engine. Subsequent network traffic sent from the application can be determined to correspond to the application and classified according locally at the firewall based on the cached signatures. Localization of the cache to the firewall reduces latency of traffic classification operations as the catalog of classification information stored in the cloud scales.
IPC Classes ?
- H04L 9/40 - Network security protocols
- H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
|
2.
|
MULTI-ACCESS DISTRIBUTED EDGE SECURITY IN MOBILE NETWORKS
Document Number |
03088359 |
Status |
In Force |
Filing Date |
2020-03-23 |
Open to Public Date |
2020-09-28 |
Grant Date |
2021-09-14 |
Owner |
PALO ALTO NETWORKS, INC. (USA)
|
Inventor |
- Verma, Sachin
- Burakovsky, Leonid
|
Abstract
Techniques for providing multi-access distributed edge security in mobile networks (e.g., service provider networks for mobile subscribers, such as for 5G networks) are disclosed. In some embodiments, a system/process/computer program product for multi- access distributed edge security in mobile networks in accordance with some embodiments includes monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the service provider network includes a 5G network or a converged 5G network; extracting subscription and/or equipment identifier information for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information.
|
3.
|
AUTOMATED SDK INGESTION
Document Number |
02928729 |
Status |
In Force |
Filing Date |
2014-11-13 |
Open to Public Date |
2015-05-21 |
Grant Date |
2023-08-08 |
Owner |
PALO ALTO NETWORKS, INC. (USA)
|
Inventor |
- Medeiros, Claire
- Lundy, Justin
|
Abstract
In an assessment or audit of a computer system, an auditing subsystem will parse software development kit ("SDK") interfaces and obtain customer usage, configuration and security information by applying requests for information to the application programming interfaces provided by the SDK interfaces.
IPC Classes ?
- G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F 9/44 - Arrangements for executing specific programs
|
4.
|
MALWARE ANALYSIS SYSTEM
Document Number |
02835954 |
Status |
In Force |
Filing Date |
2012-05-17 |
Open to Public Date |
2012-11-29 |
Grant Date |
2017-09-12 |
Owner |
PALO ALTO NETWORKS, INC. (USA)
|
Inventor |
- Xie, Huagang
- Wang, Xinran
- Liu, Jiangxia
|
Abstract
In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a virtual machine to determine if the potential malware sample is malware; and automatically generating a signature if the potential malware sample is determined to be malware. In some embodiments, the potential malware sample does not match a preexisting signature, and the malware is a zero-day attack.
IPC Classes ?
- G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
|
5.
|
ACCESS CONTROL LIST CHECKING
Document Number |
02510633 |
Status |
In Force |
Filing Date |
2005-06-23 |
Open to Public Date |
2006-12-23 |
Grant Date |
2010-11-09 |
Owner |
PALO ALTO NETWORKS, INC. (USA)
|
Inventor |
- Graveline, Marc
- Viney, Ulf
- Masson, Matt
|
Abstract
Method and system for dynamically checking an access control list during the data transfers between a client web browser and a web server. The method and system allow checking of access control list by an application firewall, independent from the web application. The rules, upon which the checking is based, can be easily updated without affecting the web application.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
- H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation
|
|