Fortinet, Inc.

United States of America

Back to Profile

1-3 of 3 for Fortinet, Inc. Sort by
Query
Patent
Canada - CIPO
Excluding Subsidiaries
Aggregations Reset Report
IPC Class
H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation 2
G06F 8/41 - Compilation 1
G06F 9/44 - Arrangements for executing specific programs 1
H04L 12/12 - Arrangements for remote connection or disconnection of substations or of equipment thereof 1
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system 1
Status
Pending 1
Registered / In Force 2
Found results for  patents

1.

SECURE JUST-IN-TIME (JIT) CODE GENERATION

      
Document Number 02996747
Status Pending
Filing Date 2018-02-28
Open to Public Date 2018-09-05
Owner FORTINET, INC. (USA)
Inventor Yavo, Udi

Abstract

A method of securely executing a Just-In-Time (JIT) compiled code in a runtime environment, comprising using one or more processors for receiving from a JIT executing process a request to compile in runtime a code segment, initiating a JIT compiling process to compile the code segment in order to generate an executable code segment, storing the executable code segment in a shared memory and providing to the JIT executing process a pointer to the executable code segment in the shared memory. Wherein the JIT executing process having read-execute access rights to the shared memory and the JIT executing process and the JIT compiling process are different processes.

IPC Classes  ?

2.

SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION ACCURACY ASSURANCE

      
Document Number 02968327
Status In Force
Filing Date 2015-11-24
Open to Public Date 2016-06-02
Grant Date 2021-04-06
Owner FORTINET, INC. (USA)
Inventor
  • Katmor, Roy
  • Bitton, Tomer
  • Yavo, Udi
  • Kelson, Ido

Abstract

There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.

IPC Classes  ?

  • H04L 12/12 - Arrangements for remote connection or disconnection of substations or of equipment thereof
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation

3.

SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION

      
Document Number 02968201
Status In Force
Filing Date 2015-11-24
Open to Public Date 2016-06-02
Grant Date 2021-01-05
Owner FORTINET, INC. (USA)
Inventor
  • Katmor, Roy
  • Bitton, Tomer
  • Yavo, Udi
  • Kelson, Ido

Abstract

There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.

IPC Classes  ?

  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation