Palo Alto Networks, Inc.

United States of America

Back to Profile

1-5 of 5 for Palo Alto Networks, Inc. Sort by
Query
Patent
Canada - CIPO
Excluding Subsidiaries
Aggregations Reset Report
Date
2022 1
2020 1
Before 2019 3
IPC Class
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 1
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 1
G06F 9/44 - Arrangements for executing specific programs 1
H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation 1
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ] 1
See more
Status
Pending 1
Registered / In Force 4
Found results for  patents

1.

INCREASED COVERAGE OF APPLICATION-BASED TRAFFIC CLASSIFICATION WITH LOCAL AND CLOUD CLASSIFICATION SERVICES

      
Document Number 03212858
Status Pending
Filing Date 2022-04-05
Open to Public Date 2022-10-13
Owner PALO ALTO NETWORKS, INC. (USA)
Inventor
  • Jiang, Mengying
  • Xu, Shengming
  • Fang, Menglan
  • Lam, Ho Yu

Abstract

A cloud-based traffic classification engine maintains a catalog of application-based traffic classes which have been developed based on known applications, and a local traffic classification engine maintains a subset of these classes. Network traffic intercepted by the firewall which cannot be classified by the local engine is forwarded to the cloud-based engine for classification. Upon determination of a class of the traffic, the cloud-based engine forwards the determined class and corresponding signature to the local engine. The firewall maintains a cache which is updated with the signatures corresponding to the class communicated by the cloud-based engine. Subsequent network traffic sent from the application can be determined to correspond to the application and classified according locally at the firewall based on the cached signatures. Localization of the cache to the firewall reduces latency of traffic classification operations as the catalog of classification information stored in the cloud scales.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]

2.

MULTI-ACCESS DISTRIBUTED EDGE SECURITY IN MOBILE NETWORKS

      
Document Number 03088359
Status In Force
Filing Date 2020-03-23
Open to Public Date 2020-09-28
Grant Date 2021-09-14
Owner PALO ALTO NETWORKS, INC. (USA)
Inventor
  • Verma, Sachin
  • Burakovsky, Leonid

Abstract

Techniques for providing multi-access distributed edge security in mobile networks (e.g., service provider networks for mobile subscribers, such as for 5G networks) are disclosed. In some embodiments, a system/process/computer program product for multi- access distributed edge security in mobile networks in accordance with some embodiments includes monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the service provider network includes a 5G network or a converged 5G network; extracting subscription and/or equipment identifier information for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information.

IPC Classes  ?

3.

AUTOMATED SDK INGESTION

      
Document Number 02928729
Status In Force
Filing Date 2014-11-13
Open to Public Date 2015-05-21
Grant Date 2023-08-08
Owner PALO ALTO NETWORKS, INC. (USA)
Inventor
  • Medeiros, Claire
  • Lundy, Justin

Abstract

In an assessment or audit of a computer system, an auditing subsystem will parse software development kit ("SDK") interfaces and obtain customer usage, configuration and security information by applying requests for information to the application programming interfaces provided by the SDK interfaces.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/44 - Arrangements for executing specific programs

4.

MALWARE ANALYSIS SYSTEM

      
Document Number 02835954
Status In Force
Filing Date 2012-05-17
Open to Public Date 2012-11-29
Grant Date 2017-09-12
Owner PALO ALTO NETWORKS, INC. (USA)
Inventor
  • Xie, Huagang
  • Wang, Xinran
  • Liu, Jiangxia

Abstract

In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a virtual machine to determine if the potential malware sample is malware; and automatically generating a signature if the potential malware sample is determined to be malware. In some embodiments, the potential malware sample does not match a preexisting signature, and the malware is a zero-day attack.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

5.

ACCESS CONTROL LIST CHECKING

      
Document Number 02510633
Status In Force
Filing Date 2005-06-23
Open to Public Date 2006-12-23
Grant Date 2010-11-09
Owner PALO ALTO NETWORKS, INC. (USA)
Inventor
  • Graveline, Marc
  • Viney, Ulf
  • Masson, Matt

Abstract

Method and system for dynamically checking an access control list during the data transfers between a client web browser and a web server. The method and system allow checking of access control list by an application firewall, independent from the web application. The rules, upon which the checking is based, can be easily updated without affecting the web application.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation