Fortinet, Inc.

United States of America

Back to Profile

1-100 of 935 for Fortinet, Inc. Sort by
Query
Patent
United States - USPTO
Excluding Subsidiaries
Aggregations Reset Report
Date
New (last 4 weeks) 15
2024 April (MTD) 14
2024 March 2
2024 February 4
2024 January 7
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 444
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 126
H04L 12/24 - Arrangements for maintenance or administration 107
H04W 84/12 - WLAN [Wireless Local Area Networks] 95
H04L 12/26 - Monitoring arrangements; Testing arrangements 90
See more
Status
Pending 120
Registered / In Force 815
Found results for  patents
  1     2     3     ...     10        Next Page

1.

SYSTEMS AND METHODS FOR AUTOMATED SD-WAN PERFORMANCE RULE FORMATION

      
Application Number 18393121
Status Pending
Filing Date 2023-12-21
First Publication Date 2024-04-18
Owner Fortinet, Inc. (USA)
Inventor Clark, Reid Garrett

Abstract

Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.

IPC Classes  ?

  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
  • H04L 41/5003 - Managing SLA; Interaction between SLA and QoS
  • H04L 43/00 - Arrangements for monitoring or testing data switching networks

2.

SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE

      
Application Number 18396393
Status Pending
Filing Date 2023-12-26
First Publication Date 2024-04-18
Owner Fortinet, Inc. (USA)
Inventor Borbolla Galindo, Emilio

Abstract

Various approaches for securing networks against access from off network devices. In some cases, embodiments discussed relate to systems and methods for identifying potential threats included in a remote network by a network access device prior to requesting access to a known secure network via the remote network.

IPC Classes  ?

3.

UNSUPERVISED MACHINE LEARNING TO DERIVE OPTIMAL WIRELESS CONNECTIVITY THRESHOLDS FOR BEST NETWORK PERFORMANCE

      
Application Number 17958026
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-11
Owner Fortinet, Inc. (USA)
Inventor
  • Chopra, Vedaang
  • Girish, Deepti
  • Jupudi, Siva Rama Krishna Rao Yogendra

Abstract

Dynamic thresholds are derived for each connection phase, using machine learning (e.g., K-means clustering) for an enterprise network. A time interval can be tracked between samples of collected data packets for each phase of connections, including the association phase, the authentication phase and the DHCP phase of connecting. A specific dynamic threshold for one of the connection phases is detected as out-of-range. Responsive to the out-of-range detection, network issues corresponding to the phase of the specific dynamic threshold are checked and automatically remediated.

IPC Classes  ?

  • H04W 24/02 - Arrangements for optimising operational condition
  • G06N 5/022 - Knowledge engineering; Knowledge acquisition
  • H04W 24/08 - Testing using real traffic
  • H04W 76/11 - Allocation or use of connection identifiers

4.

OPTIMIZING POLICY TREE SEARCHES WITH HYBRID RANGES OF POLICY SETS WHILE EXAMINING NETWORK TRAFFIC

      
Application Number 17957516
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor
  • Wen, Shushan
  • Wei, Tianrui

Abstract

To activate side nodes, a traversal node is partitioned into deeper traversal nodes and leaf nodes. A limit is set on a number of leaf node policies. Each traversal node above the limit is cut into a deeper level with a new traversal node. Each traversal node at or below the limit is converted to a leaf node populated with a list of policies within the limit. Once reaching a leaf node, during policy tree searching mode, linear searching a policy set corresponding to the leaf node to select a policy, and the selected policy to the data packet is applied

IPC Classes  ?

5.

ATTAINING RAPID RADIO FREQUENCY (RF) CHANNEL INSPECTION USING INTELLIGENT TRANSCEIVER SCANNING IN WLAN NETWORKS

      
Application Number 17957762
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor Neeli, Srinivasa Subbarao

Abstract

Scan mode is configured in an access point to monitor WLAN conditions. A channel list is progressively scanned using full capabilities available from MIMO transceivers. During a hop period, each MIMO transceiver is configured to a first set of channels from the channel list within an RF band. During a dwell period, an RF analysis is performed for the set of channels to identify conditions on the WLAN.

IPC Classes  ?

  • H04W 24/10 - Scheduling measurement reports
  • H04W 12/121 - Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]

6.

UTILIZING COLOR SWITCH ANNOUNCEMENT FRAMES TO REDUCE FRAME COLLISIONS AND RETRIES FOR OVERLAPPING UPLINK NETWORK TRAFFIC

      
Application Number 17958044
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor Jain, Ankur

Abstract

Responsive to receiving uplink traffic from a specific edge client on the edge client table, in-service monitoring for frame retries and collisions associated with the specific edge client is performed. Responsive to detecting that a rate of frame retries and collisions exceed a threshold, a BSS color change announcement frame is transmitted to the specific edge client comprising a second color. The BSS color change announcement directs the specific edge client to contend for medium access based on preambles observed from a specific overlapping BSS associated with the second BSS color rather than its home BSS. The default color can be restored after the uplink.

IPC Classes  ?

  • H04W 74/08 - Non-scheduled access, e.g. random access, ALOHA or CSMA [Carrier Sense Multiple Access]
  • H04W 24/08 - Testing using real traffic

7.

REMOTE COST BASED NETWORK TRAFFIC STEERING FOR HETEROGENEOUS LINKS IN A SDWAN (SOFTWARE DEFINED WIDE AREA NETWORK)

      
Application Number 17958267
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor
  • Wei, Shengyang
  • Duan, Shangwei

Abstract

During authentication of an SDWAN tunnel, Intent ISAKMP packets authenticate the local SDWAN controller and the remote SDWAN controller with each other, wherein the ISAKMP packets include a notify payload. Configured link costs associated with at least two member paths at the remote SDWAN controller that have heterogeneous physical attributes from the notify payload of the ISAKMP packets are retrieved. The configured link-cost of the at least two member paths is reflective of link physical attributes. One of the at least two member paths is identified based on a lowest link-cost between the at least two member paths, for steering SDWAN network traffic.

IPC Classes  ?

  • H04W 40/12 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
  • H04L 9/08 - Key distribution
  • H04W 40/30 - Connectivity information management, e.g. connectivity discovery or connectivity update for proactive routing

8.

REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC)

      
Application Number 17958562
Status Pending
Filing Date 2022-10-03
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor
  • May, Robert A.
  • Thompson, Jordan E.

Abstract

Systems and methods for remote monitoring of a Security Operations Center (SOC) via a mobile application are provided. According to one embodiment, a management service retrieves information regarding multiple network elements that are associated with an enterprise network and extracts parameters of the monitored network elements from the retrieved information. The management service prioritizes the monitored network elements by determining a severity level associated with security-related issues of the network elements and generates various monitoring views that summarize in real time various categories of potential security-related issues detected by the SOC. Further, the management service assigns a priority to each monitoring view and displays a video on the display device that cycles through monitoring views in accordance with their respective assigned priorities.

IPC Classes  ?

9.

SYSTEMS AND METHODS FOR IDENTIFYING SECURITY REQUIREMENTS IN A ZTNA SYSTEM

      
Application Number 17958608
Status Pending
Filing Date 2022-10-03
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor May, Robert A.

Abstract

Various embodiments provide systems and methods for providing security in a ZTNA system.

IPC Classes  ?

10.

INTERNET OF THINGS (IOT) DEVICE IDENTIFICATION USING TRAFFIC PATTERNS

      
Application Number 17957337
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor Li, Haitao

Abstract

Flow pair values are identified from flow pairs of labeled devices as candidates by comparing individual flows of the unknown device that surpass a candidate threshold by generating a difference flow matrix from the individual flows of the unknown device and the labeled device. Known devices can be identified as device candidates from a sum of flow pair values for each candidate device in relation to the unknown device. A device type can be retrieved for each candidate device, and one of the device types can be selected based on at least a closeness or a frequency of each device type to the unknown device.

IPC Classes  ?

11.

ADAPTIVE MULTICAST DATA RATE CONFIGURATION IN MANAGED WI-FI NETWORKS TO IMPROVE THROUGHPUT USING UNSUPERVISED MACHINE LEARNING

      
Application Number 17957447
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor
  • Girish, Deepti
  • Srinivas, Lavanya Lingaraju

Abstract

A baseline multicast traffic is derived for an SSID from the network traffic statistics using unsupervised machine learning. Responsive to detecting a deterioration in the real-time network traffic statistics for the SSID in relation to the baseline throughput and the baseline multicast traffic, the multicast data rate can be adjusted to match the lowest unicast data rate for the SSID.

IPC Classes  ?

  • H04W 28/02 - Traffic management, e.g. flow control or congestion control
  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received

12.

FIREWALL PANIC BUTTON FOR QUARANTINING OPERATIONAL TECHNOLOGY (OT) SYSTEMS FROM REAL-TIME ATTACKS ON INTERNET INFORMATION TECHNOLOGY (IT) SYSTEMS

      
Application Number 17957666
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor Mendel, Gerardo Andrés

Abstract

A panic button is configured and disposed outside a network gateway, managing integrated OT network devices and IT devices, for access by a user. Responsive to physical activation of the panic button, a 2 factor MFA authorizes the action with an authorized user. Upon authorization, the OT network devices are quarantined from the IT network devices to prevent malicious actions.

IPC Classes  ?

13.

DISTRIBUTED SECURITY FABRIC GENERATION OVER MULTIPLE LEVELS OF NETWORK GATEWAYS

      
Application Number 17958272
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor Lum, Justin William

Abstract

Responsive to the request for a security fabric report, an upper-level node transits a request to a lower-level node for a subtree security report. If there are additional network gateways at lower hierarchical levels, the next level down repeats the process. A root level network gateway will transmit the first request, as the high level of the hierarchy, and a last leaf receives the last request, as the lowest level. An overall security fabric report is returned from the root node.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

14.

SYSTEMS AND METHODS FOR SD-WAN SETUP AUTOMATION

      
Application Number 17958616
Status Pending
Filing Date 2022-10-03
First Publication Date 2024-04-04
Owner Fortinet, Inc. (USA)
Inventor May, Robert A.

Abstract

Various embodiments provide systems and methods for automating an SD-WAN setup process.

IPC Classes  ?

  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play

15.

INTENT-BASED ORCHESTRATION OF INDEPENDENT AUTOMATIONS

      
Application Number 18524345
Status Pending
Filing Date 2023-11-30
First Publication Date 2024-03-28
Owner Fortinet, Inc. (USA)
Inventor
  • Starr, Michael C.
  • Kamenik, John T.

Abstract

Systems and methods for intent-based orchestration of independent automations are provided. Examples described herein alleviate the complexities and technical challenges associated with deploying, provisioning, configuring, and managing configurable endpoints, including network devices, network security systems, cloud-based security services (e.g., provided by or representing a Secure Access Service Edge (SASE) platform), and other infrastructure, on behalf of numerous customers (or tenants). For example, customer intent may be automatically translated into concrete jobs and tasks that operate to make changes to one or more of the configurable endpoints so as to insulate the user from being required to know which configurable endpoint(s) need(s) to change, which vendor supports a given configurable endpoint, and/or vendor specific issues involved in changing the configurable endpoints.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

16.

SYSTEMS AND METHODS FOR ARBITRATED FAILOVER CONTROL USING COUNTERMEASURES

      
Application Number 17901075
Status Pending
Filing Date 2022-09-01
First Publication Date 2024-03-07
Owner Fortinel, Inc. (USA)
Inventor
  • Abate, Jason
  • Nandane, Niraj
  • Singh, Pooja
  • Karimi, Shabbir

Abstract

Various approaches for multi-node network cluster systems and methods. In some cases systems and methods for incident detection and/or recovery in multi-node processors are discussed.

IPC Classes  ?

  • H04L 41/0668 - Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
  • H04L 41/0663 - Performing the actions predefined by failover planning, e.g. switching to standby network elements

17.

DETECTING MALICIOUS BEHAVIOR IN A NETWORK USING SECURITY ANALYTICS BY ANALYZING PROCESS INTERACTION RATIOS

      
Application Number 18499076
Status Pending
Filing Date 2023-10-31
First Publication Date 2024-02-29
Owner Fortinet, Inc. (USA)
Inventor
  • Mugambi, Ernest
  • Bhattacharya, Partha
  • Sumlut, Gun

Abstract

Systems and methods for detecting malicious behavior in a network by analyzing process interaction ratios (PIRs) are provided. According to one embodiment, information regarding historical process activity is maintained. The historical process activity includes information regarding various processes hosted by computing devices of a private network. Information regarding process activity within the private network is received for a current observation period. For each process, for each testing time period of a number of testing time periods within the current observation period, a PIR is determined based on (i) a number of unique computing devices that hosted the process and (ii) a number of unique users that executed the process. A particular process is identified as potentially malicious when a measure of deviation of the PIR of the particular process from a historical PIR mean of the particular process exceeds a pre-defined or configurable threshold during a testing time period.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

18.

Systems and methods for four dimensional network session authorization

      
Application Number 17980246
Grant Number 11909826
Status In Force
Filing Date 2022-11-03
First Publication Date 2024-02-20
Grant Date 2024-02-20
Owner Fortinet, Inc. (USA)
Inventor May, Robert A.

Abstract

Various embodiments provide systems and methods for automatically defining and enforcing network sessions based upon at least four dimensions of segmentation.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 67/141 - Setup of application sessions
  • H04L 9/40 - Network security protocols
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 67/146 - Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

19.

Generating and managing message correction and retraction history from a chat server

      
Application Number 17957963
Grant Number 11902230
Status In Force
Filing Date 2022-09-30
First Publication Date 2024-02-13
Grant Date 2024-02-13
Owner Fortinet, Inc. (USA)
Inventor Teng, Teng

Abstract

Changes on a chat client, such as one or more edits or retractions, and is characterized relative to an original chat string, and uploaded to a chat server for storage. The chat server combines the message change with at least a second change to the specific chat string uploaded from a different chat client. Responsive to a regeneration of the chat string on the chat client, the chat daemon downloads the combined message change from the chat server. The edits and retractions originating from the chat client and the edits and retractions originating from the second chat client are downloaded and applied to the specific chat string for display in the chat client.

IPC Classes  ?

  • H04L 51/063 - Content adaptation, e.g. replacement of unsuitable content
  • H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
  • H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]

20.

SYSTEMS AND METHODS FOR FINE GRAINED FORWARD TESTING FOR A ZTNA ENVIRONMENT

      
Application Number 18230406
Status Pending
Filing Date 2023-08-04
First Publication Date 2024-02-08
Owner Fortinet, Inc. (USA)
Inventor
  • Sreedhar, Rajiv
  • Nedbal, Manuel
  • Ahluwalia, Manoj
  • Hegde, Damodar K.
  • Gaitonde, Jitendra B.
  • Rajanna, Suresh
  • Lubeck, Mark
  • Nool, Gary

Abstract

Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.

IPC Classes  ?

21.

Systems and methods for generating soar playbooks

      
Application Number 17901069
Grant Number 11894981
Status In Force
Filing Date 2022-09-01
First Publication Date 2024-02-06
Grant Date 2024-02-06
Owner Fortinet, Inc. (USA)
Inventor
  • Bharathram, Bk
  • Narula, Abhishek
  • Singh, Pooja

Abstract

Various approaches are discussed for generation of SOAR playbooks using a variety playbook sources.

IPC Classes  ?

  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 41/14 - Network analysis or design

22.

SYSTEMS AND METHODS FOR SECURITY ENHANCED DOMAIN CATEGORIZATION

      
Application Number 17859148
Status Pending
Filing Date 2022-07-07
First Publication Date 2024-01-11
Owner Fortinet, Inc. (USA)
Inventor Pretli, Jochen

Abstract

Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.

IPC Classes  ?

23.

SYSTEMS AND METHODS FOR PREVENTING DATA LEAKS OVER RTP OR SIP

      
Application Number 17859162
Status Pending
Filing Date 2022-07-07
First Publication Date 2024-01-11
Owner Fortinet, Inc. (USA)
Inventor Pretli, Jochen

Abstract

Systems, devices, and methods are discussed for avoiding data thefts in real-time transactions.

IPC Classes  ?

24.

STEERING WI-FI 6E WIRELESS CLIENTS TO WI-FI 6E ACCESS POINTS ON HYBRID WIRELESS NETWORKS

      
Application Number 17854826
Status Pending
Filing Date 2022-06-30
First Publication Date 2024-01-04
Owner Fortinet, Inc. (USA)
Inventor V, Vijayakumar

Abstract

A probe request sent from a Wi-Fi 6E wireless client to the legacy access point is received by a Wi-Fi controller. To process, a Wi-Fi 6E access point for connection from the plurality of access points, proximate to the Wi-Fi 6E wireless client is selected for service. Reduced Neighbor Report (RNR) RNR information is collected about the Wi-Fi 6E access point by the access point the Wi-Fi 6E wireless client. The RNR information is transmitted to the legacy access point, wherein the legacy access point forwards the RNR information to the Wi-Fi 6E wireless client as part of a probe response sent responsive to the probe request. A subsequent probe request is detected, sent from the Wi-Fi 6E wireless client to initiate association with the Wi-Fi 6E access point using the RNR information.

IPC Classes  ?

  • H04W 48/20 - Selecting an access point
  • H04W 48/16 - Discovering; Processing access restriction or access information

25.

CAPTURING MULTIUSER DATA PACKETS BY GROUPING ACCESS POINTS ON A WIRELESS NETWORK

      
Application Number 17855502
Status Pending
Filing Date 2022-06-30
First Publication Date 2024-01-04
Owner Fortinet, Inc. (USA)
Inventor V, Vijayakumar

Abstract

A capture group of access points formed from the plurality of access points dedicate at least one radio from each of the access points for capturing data packets. Captured data packets are received by wireless transmission from each of access point of the capture group of access points. The access points of the capture group are preferably geographically dispersed to increase capture range. The captured data packets are analyzed to identify a set of multiuser data packets. To do so, the set of multiuser data packets is checked against a set of rules for multiuser data packets to troubleshoot wireless network issues.

IPC Classes  ?

26.

REMOTE DEBUGGING OF LOCAL GUI RENDERING BY PLAYING BACK A CAPTURE FILE TO RECREATE A REAL-TIME LOCAL NETWORK ENVIRONMENT

      
Application Number 17855784
Status Pending
Filing Date 2022-06-30
First Publication Date 2024-01-04
Owner Fortinet, Inc. (USA)
Inventor Guo, Kai

Abstract

Debug engine receives a capture file over the network interface and initiate playback by executing the capture file with the processor. The capture file comprises real-time local network environment video synchronized with data captured by a local browser at a local station interacting with a local network gateway device over a local network. The capture file is played back, using a mock server including transmitting HTTP requests from the capture file at the developer station to the mock gateway server. Additionally, HTTP responses are received from the capture file at the mock gateway server, in synch with actions in the real-time local network environment video. A GUI engine renders a GUI on the developer computer from real-time GUI code generated from the capture file playback as modified by processing the HTTP responses.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

27.

CHASSIS SYSTEM MANAGEMENT THROUGH DATA PATHS

      
Application Number 17855668
Status Pending
Filing Date 2022-06-30
First Publication Date 2024-01-04
Owner Fortinet, Inc. (USA)
Inventor
  • Yang, Sen
  • Wang, Zicheng
  • Liu, Ting

Abstract

A firewall processing card from a plurality of firewall processing cards coupled to a chassis, is selected by a load balancing engine (or other mechanism) and receives the data packet over the fabric channel. First, if the session match exists to management-type data packets the data packet is returned to the I/O board and if a match exists to user data packets the data packet is sent to a firewall service of the firewall processing card. If no session match exists, the firewall processing card checks for a policy match to the data packet for creating a new session or drops the data packet. The I/O board receives the data packet returned from the processing blade over the base channel and checks for a session matching to the data packet. If a session match exists and the data packet is a management data packet, the data packet is sent to a management service at a user level of the I/O board and if not a management data packet the data packet is dropped. If no session match exists, the I/O board creates a new session or drops the data packet.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 47/32 - Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames

28.

SYSTEMS AND METHODS FOR CLOUD BASED ROOT SERVICE APPLICATION ACROSS MULTIPLE COOPERATIVE SECURITY FABRICS

      
Application Number 17857133
Status Pending
Filing Date 2022-07-04
First Publication Date 2024-01-04
Owner Fortinet, Inc. (USA)
Inventor May, Robert A.

Abstract

Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric using a cloud based root.

IPC Classes  ?

29.

IDENTIFYING HIDDEN SERVICE SET IDENTIFIERS (SSIDS) OF UNAUTHORIZED ACCESS POINTS ON A WIRELESS NETWORK

      
Application Number 17852256
Status Pending
Filing Date 2022-06-28
First Publication Date 2023-12-28
Owner Fortinet, Inc. (USA)
Inventor V, Vijayakumar

Abstract

An unauthorized access point is identified during a periodic scan on the wireless network and storing a MAC address for the unauthorized access point and monitored for connection attempts. The unauthorized access point, due to having a hidden SSID, is monitored by the MAC address for data packets sent and received. At least one client associated to the unauthorized access point is identified from the data packets by MAC address. The at least one client is monitored, by the MAC address, for a probe request sent to the unauthorized access point. Responsive to detecting the probe request, an SSID of the unauthorized access point is parsed. A security action on the unauthorized access point using the SSID.

IPC Classes  ?

  • H04W 12/121 - Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
  • H04W 12/73 - Access point logical identity

30.

SYSTEMS AND METHODS FOR IMPLEMENTING A FAMILY POLICY USING A COOPERATIVE SECURITY FABRIC

      
Application Number 17719175
Status Pending
Filing Date 2022-04-12
First Publication Date 2023-10-12
Owner Fortinel, Inc. (USA)
Inventor
  • Xie, Michael
  • May, Robert A.
  • Xu, Lino
  • Thompson, Jordan E.

Abstract

Systems, devices, and methods are discussed for treating a number of network security devices in a cooperative security fabric as a unified object for configuration purposes.

IPC Classes  ?

31.

SYSTEMS AND METHODS FOR CONTEXT BASED ACCESS CONTROL IN A BRIDGE SERVER

      
Application Number 17719228
Status Pending
Filing Date 2022-04-12
First Publication Date 2023-10-12
Owner Fortinet, Inc. (USA)
Inventor Johnson, Isaac Michael

Abstract

Systems, devices, and methods are discussed for context protected access to an air-gapped network resource via a bridge server.

IPC Classes  ?

32.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO AN UNADVERTISED CLOUD-BASED RESOURCE

      
Application Number 17831155
Status Pending
Filing Date 2022-06-02
First Publication Date 2023-10-12
Owner Fortinet, Inc (USA)
Inventor Johnson, Isaac Michael

Abstract

Systems, devices, and methods are discussed for context protected access to an unadvertised cloud-based resource.

IPC Classes  ?

33.

SMART VERIFICATION OF AUTHENTICATION FOR USER LOG INS BASED ON RISK LEVELS

      
Application Number 17710264
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor Sardiñas, Adonis

Abstract

Failures in authentication credentials are detected by a user prior to presentation of successful credentials. Responsive to the authentication credentials failure, a geo-location for a new geo-location of the user is checked. Responsive to a new location detection, expiration of a verification link is detected. Responsive to failure of the link verification, a failure of a token OTP verification is detected. Access is granted responsive to successful verification. Access can be granted to a digital asset or a physical asset.

IPC Classes  ?

34.

ONE-TIME PROGRAMMING (OTP) KEY REVOCATION FROM A TWO-DIMENSIONAL KEY STORAGE STRUCTURE OF A SYSTEM ON A CHIP (SOC)

      
Application Number 17710656
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor
  • Yan, Dengxue
  • Duan, Zengli

Abstract

A substrate for the SoC includes one or more OTP modules within the substate and comprising memory that can only be programmed once. A BIOS module loads a special BIOS into flash memory in place of a normal BIOS prior to a reboot of the OTP hardware module. The special BIOS is programmed to identify a status bit to burn corresponding to a revoked key. A first key register stored in the OTP module and comprising a plurality of status bits. Each status bit maps to the individual key of the plurality of OTP keys. A key burn module to burn a status bit on the key register corresponding to the special BIOS after the reboot. The BIOS module reloads the normal BIOS into the flash memory in place of the special BIOS prior to a second reboot. The normal BIOS runs after the second reboot.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 9/4401 - Bootstrapping

35.

CONTAINERIZED FIREWALL IN AN EMBEDDED DEVICE FOR PROTECTING AGAINST MALICIOUS DATA TRAFFIC ON A DATA COMMUNICATION NETWORK

      
Application Number 17710715
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor
  • Wang, Wei
  • Li, Dazhi

Abstract

A new container of a pool of containers is spawned in the operating system of the embedded networking device to execute a firewall separate from an operating system of a host device. Each of the containers is generated by a separate toolchain to include custom runtime libraries. The firewall utilizes the custom libraries rather than the host libraries, and wherein user privileges within a container is different from user privileges for the host. The new container executes a firewall instance to inspect data packets processed by the embedded networking device.

IPC Classes  ?

36.

AI (ARTIFICIAL INTELLIGENCE) DRIVEN DYNAMIC SELF-REMEDIATION FOR WIRELESS NETWORKS BY DISPATCHING ROBOTS

      
Application Number 17710739
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor Gorajala Chandra, Sekhar Sumanth

Abstract

An anomalous behavior is detected at an AI server device based on data communications managed by the wireless controller. In response to the detected behavior, a robot module can be deployed to a location of the anomalous behavior for testing. Once at the location, logs can be collected from testing or troubleshooting at the location and involving a remote access point proximate to the anomalous behavior (e.g., sniff and capture at specific channel or multiple channels in real-time). Solutions are generated from AI analysis concerning the anomalous behavior and priority level, including at least one automatically implemented solution to self-remediate the wireless network.

IPC Classes  ?

37.

STEERING FRAGMENTATION OF DATA PACKETS ON DATA COMMUNICATION NETWORKS BASED ON DATA PACKET SIZE

      
Application Number 17710781
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor
  • Sridhar, Pc
  • Mohan, Pradeep
  • Jayaraman, Mohan

Abstract

When a data packet too big frame is received from the access point, activating fragmentation at the station. The data packet too big frame is responsive to a data packet being sent from the station to the access point and then being rejected as too big when sent from the access point to a network device due to the data packet being too large for processing by the network device. The fragmentation activated at the station and configured based on a maximum data packet size allowed by the network device.

IPC Classes  ?

  • H04W 28/06 - Optimising, e.g. header compression, information sizing
  • H04W 76/12 - Setup of transport tunnels

38.

DEVICE IDENTIFICATION FOR NEWLY CONNECTING DEVICES USING MAC RANDOMIZATION ON A NETWORK

      
Application Number 17710208
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor Li, Haitao

Abstract

In identification training, database of known devices is used to identify unlabeled clusters from statistics concerning parameters, vendors and hostnames of the known devices. Relevant clusters of type, brand and model from are identified from the unlabeled clusters using a threshold and labeling the relevant clusters with a key including type, brand and model of the labeled clusters. In real-time identification, a real time connection of a new device, a type, brand and model of the new device is determined using the parameters, vendors and hostnames and to compare against the keys for identifying the new device.

IPC Classes  ?

  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G16Y 30/10 - Security thereof
  • H04L 9/40 - Network security protocols

39.

VIRTUAL ONE-TIME PROGRAMMING (OTP) TO AVOID DEAD CHIP DURING OTP DEVICE PROGRAMMING

      
Application Number 17710593
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor
  • Yan, Dengxue
  • Duan, Zengli

Abstract

Responsive to OTP device not being enabled for an SoC, the RAMBOOT bootup authenticated by the key or key hash of an OTP is precluded and a determination is made whether the RAMBOOT bootup has been authenticated by the key or key hash on the virtual OTP. Responsive to not being authenticated, authentication of the RAMBOOT bootup is initiated. Responsive to being authenticated, enablement of the OTP device is initiated by burning an enable bit. Content of the virtual OTP is verified. The verified content can then be transferred from the virtual OTP to the OTP hardware module. Finally, authenticated RAMBOOT bootup is enabled from the OTP hardware module using the verified content prior to enablement of the OTP hardware module. ROMBOOT is read-only.

IPC Classes  ?

  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • G06F 21/60 - Protecting data
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 45/02 - Topology update or discovery
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload

40.

EXPLOIT PREDICTIVE INTRUSION PROTECTION SYSTEM (EP-IPS) FOR DATA PACKET TRAFFIC ON DATA COMMUNICATION NETWORKS

      
Application Number 17710632
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor Partovi, Roshanak

Abstract

An exploit probability value is calculated for each of the plurality of signatures learned from a history of exploits against attributes. The exploit probability value represents a likelihood of a particular signature exploiting one or more attributes of the private network. The exploit probability value is sorted or ranked to prioritize which exploit signatures have the highest probability of occurrence. Only a predetermined number of selected exploit signatures with the highest probabilities are scanned in real-time for signature matching.

IPC Classes  ?

41.

IPSEC LOAD BALANCING IN A SESSION-AWARE LOAD BALANCED CLUSTER (SLBC) NETWORK DEVICE

      
Application Number 17710686
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor
  • Lee, Yita
  • Yang, Sen
  • Liu, Ting

Abstract

A processing blade is assigned from the plurality of processing blades to a session of data packets. The load balancing engine manages a session table and an IPsec routing table by updating the session table with a particular security engine card assigned to the session and by updating the IPsec routing table for storing a remote IP address for a particular session. Outbound raw data packets of a particular session are parsed for matching cleartext tuple information prior to IPsec encryption, and inbound encrypted data packets of the particular session are parsed for matching cipher tuple information prior to IPsec decryption. Inbound data packets assigned to the processing blade from the session table are parsed and forwarded to the station.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 45/42 - Centralised routing
  • H04L 45/02 - Topology update or discovery
  • H04L 47/125 - Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering

42.

SYSTEM & METHODS FOR REDUCING DELAY IN BSS FAST TRANSITIONS BETWEEN ACCESS POINTS ON WI-FI WIRELESS NETWORKS USING OPPORTUNISTIC KEY GENERATION TO PREVENT KEY FAILURE

      
Application Number 17710766
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-10-05
Owner Fortinet, Inc. (USA)
Inventor Jain, Ankur

Abstract

A station initiates fast BSS transition by a station from the source access point to the target access point. The target access point detects a failure by the Wi-Fi controller to retrieve a PMK-RO key for a requested PMKROName is detected. The PMKROName is parsed from an authentication request of the station. The failure can result in requiring a fresh BSS connection by the station. Responsive to the failure detection, a PMK-RO key is generated in cooperation with the Wi-Fi controller, to prevent requiring the fresh BSS connection. The PMK-R0 key further helps to support fast transition between access points.

IPC Classes  ?

43.

SYSTEMS AND METHODS FOR SECURITY POLICY APPLICATION BASED UPON A DUAL BITMAP SCHEME

      
Application Number 17683955
Status Pending
Filing Date 2022-03-01
First Publication Date 2023-09-07
Owner Fortinet, Inc. (USA)
Inventor
  • Wen, Shushan
  • Cortes, John
  • Guo, Zhi

Abstract

Systems, devices, and methods are discussed for identifying security policies applicable to a received information packet based upon a dual bitmap scheme accounting for bit position mergers and/or policies common to multiple bit positions.

IPC Classes  ?

44.

Systems and methods for automated SD-WAN performance rule formation

      
Application Number 17683977
Grant Number 11924062
Status In Force
Filing Date 2022-03-01
First Publication Date 2023-09-07
Grant Date 2024-03-05
Owner Fortinet, Inc. (USA)
Inventor Clark, Reid Garrett

Abstract

Systems, devices, and methods are discussed for defining and monitoring network communication performance in an SD-WAN environment.

IPC Classes  ?

  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
  • H04L 41/5003 - Managing SLA; Interaction between SLA and QoS
  • H04L 43/00 - Arrangements for monitoring or testing data switching networks

45.

SYSTEMS AND METHODS FOR SECURITY POLICY ORGANIZATION USING A DUAL BITMAP

      
Application Number 17683919
Status Pending
Filing Date 2022-03-01
First Publication Date 2023-09-07
Owner Fortinet, Inc. (USA)
Inventor
  • Wen, Shushan
  • Cortes, John
  • Guo, Zhi

Abstract

Systems, devices, and methods are discussed for classifying a number of security policies in relation to criteria for applying those security policies to yield a dual bitmap scheme representing a correlation between security policies and one or more criteria.

IPC Classes  ?

46.

MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRIC

      
Application Number 18141973
Status Pending
Filing Date 2023-05-01
First Publication Date 2023-08-24
Owner Fortinet, Inc. (USA)
Inventor
  • Whittle, John Lunsford Gregory
  • Nguyen-Duy, Jonathan Q.
  • Woolfe, Michael Craig

Abstract

The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing tier is configured to control network traffic of IoT devices of a private network; generating, by the executing tier, security policies for IoT devices from PEBs of the IoT devices; and controlling, by the executing tier, network traffic of the IoT devices of the private network to comply with the security policies

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/01 - Protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/303 - Terminal profiles
  • H04L 49/25 - Routing or path finding in a switch fabric

47.

Systems and methods for enhanced key security in an SD-WAN network environment

      
Application Number 17671426
Grant Number 11824973
Status In Force
Filing Date 2022-02-14
First Publication Date 2023-08-17
Grant Date 2023-11-21
Owner Fortinet, Inc. (USA)
Inventor Bryden, Simon

Abstract

Systems, devices, and methods are discussed for leveraging SD-WAN's property of redundant independent paths to enable out of band key exchange using the collection of available paths, dynamically managing link failures to keep the separation whenever possible, and/or signaling availability of quantum-safe data transfer to SD-WAN to enable quantum-safety to be used in SD-WAN policy decisions.

IPC Classes  ?

48.

SYSTEMS AND METHODS FOR CONTAINER SERVER PROTECTION

      
Application Number 17591400
Status Pending
Filing Date 2022-02-02
First Publication Date 2023-08-03
Owner Fortinet, Inc. (USA)
Inventor Castro De Rosa, Sergio Henrique Marcelino

Abstract

Systems, devices, and methods are discussed for enhancing security in a container server environment.

IPC Classes  ?

49.

DYNAMIC LEAF DETERMINATION FOR TREE CREATIONS FOR HIGH-SPEED NETWORK POLICY SEARCH DURING DATA PACKET SCANNING

      
Application Number 18129038
Status Pending
Filing Date 2023-03-30
First Publication Date 2023-07-27
Owner Fortinet, Inc. (USA)
Inventor Wen, Shushan

Abstract

During high-speed network policy searching for data packets, an upper limit and a lower limit for a policy count are predefined for a ratio of the policy count to the sum of the policy count and the range count. A policy tree builder generates a policy tree image from a set of recursive operations on the raw policy set including an on-the-fly determination of whether a specific node is a leaf based on a leaf policy count limit, wherein for a selected dimension, the specific node is converted to the leaf if the policy count does not exceed the leaf policy count limit and the range count for the selected dimension does not exceed a product of the leaf policy count limit and a range count limit coefficient, and otherwise the specific node is converted to two or more child nodes. A network processor configures at least one set of registers, at least one set of tables, and at least one sequence of instructions according to the policy tree image.

IPC Classes  ?

50.

MACHINE LEARNING FOR VISUAL SIMILARITY-BASED PHISHING DETECTION

      
Application Number 18125916
Status Pending
Filing Date 2023-03-24
First Publication Date 2023-07-20
Owner Fortinet, Inc. (USA)
Inventor
  • Li, Haitao
  • Sun, Lisheng Ryan

Abstract

In one embodiment, a similarity index is calculated from characteristics of a suspected phishing web page to a database of known phishing web pages. The characteristics derive from both HTML tags of the suspected phishing web page and a screenshot of the suspected phishing web page. With machine learning using the similarity index as an input, a probability is estimated that the suspected web page comprises a known phishing web page from the database of known phishing web pages. A known phishing web page is selected from one or more candidates known phishing web pages, based on having a highest probability.

IPC Classes  ?

51.

CUSTOMIZED ANOMALY DETECTION IN SANDBOX SOFTWARE SECURITY SYSTEMS USING GRAPH CONVOLUTIONAL NETWORKS

      
Application Number 17566806
Status Pending
Filing Date 2021-12-31
First Publication Date 2023-07-13
Owner Fortinet, Inc. (USA)
Inventor
  • Razi, Kamran
  • Cai, Jun

Abstract

An ML (machine learning) training logs are parsed for generating a set of heterogenous graphs having embedded nodes connected with edges determined with link prediction and denoting a hierarchical relationship between nodes. Each graph represents benign behavior from executing one of the files of a training database in the sandbox, wherein the nodes are embedded in the graph using GCN (graph convolution network) to calculate a real-valued vector with fixed dimension. A runtime module to receive an untagged file in real-time for analysis from a network component, and generates a graph of runtime behavior from sandbox of the suspicious file for comparison against the training graphs.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods

52.

DISTRIBUTED NODE DISCOVERY AND OVERLAY PATH MANAGEMENT ON A DATA COMMUNICATION NETWORK

      
Application Number 17566801
Status Pending
Filing Date 2021-12-31
First Publication Date 2023-07-06
Owner Fortinet, Inc. (USA)
Inventor
  • Bevan, Stephen John
  • Perets, Dmitry

Abstract

An initial provisioning by a management plane of the SD-WAN is received from a centralized SD-WAN gateway with static path overlay between the network edge device on a local LAN and the centralized SD-WAN gateway. At runtime, intelligent decision are made about which overlay path to select and when for the new flow over a control plane of the SD-WAN, based on the topology of the remote network edge and the local SDWAN policy, and to build the selected overlay path.

IPC Classes  ?

  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer

53.

FILE SHARING FRAMEWORK IN NETWORK SECURITY SYSTEMS TO SYNCHRONIZE DATA AND CONFIGURATION FILES ACROSS VIRTUAL MACHINE CLUSTERS INDEPENDENT OF FILE SHARING TECHNOLOGIES

      
Application Number 17566863
Status Pending
Filing Date 2021-12-31
First Publication Date 2023-07-06
Owner Fortinet, Inc. (USA)
Inventor
  • Singh, Chaturbhuj
  • Nandane, Niraj
  • Singh, Pooja

Abstract

A source node from the cluster of nodes, responsive to receiving the file sharing command from other applications on the same node (e.g., on a virtual machine in the cluster of nodes), copies the shared file to a source workspace directory and compress, and then copy the compressed file to the file sync database. The command comprises a configuration template with file retrieval information. A target node from the cluster of nodes, listens for commands from other nodes in the cluster of nodes. Responsive to receiving the file sharing command, the compressed file is copied from the file sync database to a target workspace directory and decompress, and then copy the shared file to node.

IPC Classes  ?

  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

54.

AUTOMATED RESPONSE TO COMPUTER VULNERABILITIES

      
Application Number 17566810
Status Pending
Filing Date 2021-12-31
First Publication Date 2023-07-06
Owner Fortinet, Inc. (USA)
Inventor
  • Barbosa, Michel Ferreira
  • Raponi, Paulo Cesar

Abstract

Each of the plurality of network assets on the private network is identified and categorized according to a CPE for storage in a device inventory database, and to generate an asset profile for each of the plurality of network assets. Attacks on the plurality of assets related to each of the identified CPEs are identified and monitored according to a CVE (common vulnerabilities exposures) format, and determine whether the CVE is relevant against the asset profile. Responsive to detecting a relevant CVE notification including CVE-id, impact on one or more network assets affected by the CVE based on the asset profiles is determined. The impact is either low impact, high impact and blocked, or high impact and unblocked.

IPC Classes  ?

55.

Dynamically employing constant power spectral density in mesh WLAN transmissions

      
Application Number 17566829
Grant Number 11743175
Status In Force
Filing Date 2021-12-31
First Publication Date 2023-07-06
Grant Date 2023-08-29
Owner Fortinet, Inc. (USA)
Inventor Neeli, Srinivasa Subbarao

Abstract

Redundant upstream mesh links are formed with a gateway access point for each of the radio capabilities. A resource load is measured across each of the redundant upstream mesh links. During runtime, a packet is received for upstream (or downstream) transmission from a specific client from the plurality of clients. An upstream link is selected for transmission of the packet from the redundant upstream mesh links for transmission of the packet and packets of the packet session, based on a highest link quality available from the plurality of mesh links according to the resource load measurement.

IPC Classes  ?

  • H04L 45/24 - Multipath
  • H04L 45/16 - Multipoint routing
  • H04W 28/02 - Traffic management, e.g. flow control or congestion control
  • H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
  • H04W 72/542 - Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality

56.

EMBEDDING AN ARTIFICIALLY INTELLIGENT NEURON CAPABLE OF PACKET INSPECTION AND SYSTEM OPTIMIZATION IN IPV6 ENABLED WLAN NETWORKS

      
Application Number 17566838
Status Pending
Filing Date 2021-12-31
First Publication Date 2023-07-06
Owner Fortinet, Inc. (USA)
Inventor Neeli, Srinivasa Subbarao

Abstract

Responsive to matching a site prefix to IPv6 network traffic from clients, the traffic as intended, and responsive to not matching the site prefix, classifying the corresponding traffic as unintended. An initial rate of packet occurrence and predict load caused by intended traffic and predicting load caused by unintended traffic is calculated, based on an initial rate of packet occurrence. The predicted traffic loads are fed back by configuring behavior of network modules according to the predictions of intended traffic load and unintended traffic load. Packet processing traffic at the network modules is based on traffic classification from the outcome of the AI-neuron.

IPC Classes  ?

  • H04L 47/127 - Avoiding congestion; Recovering from congestion by using congestion prediction
  • G06N 20/00 - Machine learning
  • H04L 45/74 - Address processing for routing

57.

SYSTEMS AND METHODS FOR PROACTIVELY UPGRADING LOW QUALITY ACCESS CREDENTIALS

      
Application Number 17540819
Status Pending
Filing Date 2021-12-02
First Publication Date 2023-06-08
Owner Fortinet, Inc (USA)
Inventor Paixao, Pedro Miguel

Abstract

Systems, devices, and methods are discussed for proactively addressing low quality access credentials in a network environment.

IPC Classes  ?

58.

SYSTEMS AND METHODS FOR BIOMETRIC AIDED NETWORK ACCESS CONTROL

      
Application Number 17540867
Status Pending
Filing Date 2021-12-02
First Publication Date 2023-06-08
Owner Fortinet, Inc. (USA)
Inventor Longval, Sr., Philip R.

Abstract

Various embodiments discussed generally relate to network security, and more particularly to systems and methods for using biometric data to enhance security in network access authorization.

IPC Classes  ?

59.

Leveraging user-behavior analytics for improved security event classification

      
Application Number 18155186
Grant Number 11924235
Status In Force
Filing Date 2023-01-17
First Publication Date 2023-06-08
Grant Date 2024-03-05
Owner Fortinet, Inc. (USA)
Inventor
  • Yavo, Udi
  • Katmor, Roy
  • Kelson, Ido

Abstract

Systems and methods for improving security event classification by leveraging user-behavior analytics are provided. According to an embodiment, a UEBA-based security event classification service of a cloud-based security platform maintains information regarding historical user behavior of various users of an enterprise network. An endpoint protection platform running on an endpoint device that is part of the enterprise network performs an initial classification of the event, based on which the endpoint protection platform blocks activity by the process. The endpoint production platform requests input from the cloud-based security platform which causes the cloud-based security platform performs a reclassification of the event based on contextual information, multiple data feeds and the UEBA-based security event classification service. Based on the reclassification of the event, the cloud-based security platform causes the endpoint protection platform to allow the process to proceed by providing the resulting security event classification to the endpoint protection platform.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06N 20/00 - Machine learning

60.

Systems and methods for application integrated malicious behavior mitigation

      
Application Number 17540834
Grant Number 11816207
Status In Force
Filing Date 2021-12-02
First Publication Date 2023-06-08
Grant Date 2023-11-14
Owner Fortinet, Inc. (USA)
Inventor Paixao, Pedro Miguel

Abstract

Various embodiments discussed generally relate to securing applications that work across networks, and more particularly to systems and methods for mitigating malicious behavior integrated within an application that directly calls a separate cloud based malicious behavior mitigation system.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

61.

ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION

      
Application Number 18155610
Status Pending
Filing Date 2023-01-17
First Publication Date 2023-05-18
Owner Fortinet, Inc. (USA)
Inventor
  • Galloway, Gregory L.
  • Melcher, Karl D.
  • Starr, Michael C.
  • Davis, Scott M.

Abstract

Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the endpoint device is within a trusted network of multiple trusted networks that have been previously registered with the cloud-based security service by querying a trusted network determination service associated with the cloud-based security service. When the determination is affirmative, the particular security feature is configured for operating inside a trusted network. When the determination is negative, the particular security feature is configured for operating outside a trusted network.

IPC Classes  ?

62.

DETECTING ACCESS POINTS LOCATED WITHIN PROXIMITY OF A COMPUTING DEVICE FOR TROUBLESHOOTING OF A NETWORK

      
Application Number 18155153
Status Pending
Filing Date 2023-01-17
First Publication Date 2023-05-18
Owner Fortinet, Inc. (USA)
Inventor
  • Thompson, Jordan E.
  • Gottardo, Andrea

Abstract

Systems and methods for detecting access points proximate to a mobile computing device to facilitate wireless network troubleshooting and management of the access points are provided. According to an embodiment, a mobile application, running on a mobile device that is operating within a physical environment, discovers a subset of wireless access points (APs) of various managed APs of a private network that are proximate to the mobile device by receiving short-range beacons originated by the subset of APs. The mobile application presents a list of the subset of APs within a user interface of the mobile application and bridges the physical environment and a network environment containing information regarding the private network. The mobile application facilitates management of a particular AP of the subset of APs by presenting configuration information or operating information for the particular AP within the user interface.

IPC Classes  ?

  • H04L 41/12 - Discovery or management of network topologies
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • H04B 17/27 - Monitoring; Testing of receivers for locating or positioning the transmitter
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

63.

Machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration, automation and response (SOAR) platform

      
Application Number 18093412
Grant Number 11882135
Status In Force
Filing Date 2023-01-05
First Publication Date 2023-05-11
Grant Date 2024-01-23
Owner Fortinet, Inc. (USA)
Inventor
  • Narula, Abhishek
  • Carsey, Christopher
  • Jain, Amit
  • Singh, Pooja

Abstract

Systems and methods for a machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration and automated response (SOAR) platform are provided. The SOAR platform captures information regarding execution of a sequence of actions performed by analysts responsive to a first incident of a first type. The captured information is fed into a machine-learning model. When a second incident, observed by the SOAR platform, is similar in nature to the first incident or the first type a recommended sequence of actions is generated based on the machine-learning model for use by an analyst in connection with responding to the second incident. In response to rejection of the recommended sequence by the analyst, revising the recommended sequence based on input provided by the analyst and storing the revised recommendation sequence in a form of a revised playbook for response to subsequent incidents that are similar to the second incident.

IPC Classes  ?

64.

SYSTEMS AND METHODS FOR DEOBFUSCATION OF EXECUTABLE CODE

      
Application Number 17516290
Status Pending
Filing Date 2021-11-01
First Publication Date 2023-05-04
Owner Fortinet, Inc. (USA)
Inventor Wildsmith, Jeremy Allen

Abstract

Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 8/53 - Decompilation; Disassembly
  • G06F 8/34 - Graphical or visual programming
  • G06F 8/75 - Structural analysis for program understanding

65.

Access point with modular internal/external antenna support

      
Application Number 17517648
Grant Number 11791550
Status In Force
Filing Date 2021-11-02
First Publication Date 2023-05-04
Grant Date 2023-10-17
Owner Fortinet, Inc. (USA)
Inventor Gorajala Chandra, Sekhar Sumanth

Abstract

An access point has a housing with at least one connector for at least one external antenna and at least one connector for at least one internal antenna. An RF controller detects whether the at least one external antenna is connected to the at least one connector for the at least one external antenna when an open circuit is closed. Responsive to detecting that the at least one external antenna is connected, a first mode in which the at least one internal antenna supports RF capabilities switches to a second mode wherein the at least one external antenna supports RF capabilities.

IPC Classes  ?

  • H01Q 1/22 - Supports; Mounting means by structural association with other equipment or articles
  • H01Q 1/42 - Housings not intimately mechanically associated with radiating elements, e.g. radome
  • H04W 88/08 - Access point devices

66.

SYSTEMS AND METHODS FOR PREPARING CODE FOR MALICIOUS BEHAVIOR ANALYSIS

      
Application Number 17570223
Status Pending
Filing Date 2022-01-06
First Publication Date 2023-05-04
Owner Fortinet, Inc. (USA)
Inventor Wildsmith, Jeremy Allen

Abstract

Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

67.

Systems and methods for unpacking protected data from obfuscated code

      
Application Number 17516307
Grant Number 11841948
Status In Force
Filing Date 2021-11-01
First Publication Date 2023-05-04
Grant Date 2023-12-12
Owner Fortinet, Inc. (USA)
Inventor Wildsmith, Jeremy Allen

Abstract

Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

68.

REMOTE COST BASED NETWORK TRAFFIC STEERING FOR HETEROGENEOUS LINKS IN A SDWAN (SOFTWARE DEFINED WIDE AREA NETWORK)

      
Application Number 17517655
Status Pending
Filing Date 2021-11-02
First Publication Date 2023-05-04
Owner Fortinet, Inc. (USA)
Inventor Duan, Shangwei

Abstract

A health check is generated for at least two member paths between the local SDWAN controller and a remote SDWAN controller, with a set health check probe packets for transmission by the network interface to remote SDWAN controllers. A link cost is determined for each member path from a set of health check response packets received by the network interface. SDWAN network traffic is prioritized for each member path between the local SDWAN controller and the remote SDWAN controller based at least in part on the link cost.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks

69.

Selectively applying dynamic malware analysis to software files based on compression type in a software security system

      
Application Number 17490076
Grant Number 11790086
Status In Force
Filing Date 2021-09-30
First Publication Date 2023-04-20
Grant Date 2023-10-17
Owner Fortinet, Inc. (USA)
Inventor Moein, Samer

Abstract

A file is received from external to the gateway device and, prior to runtime, the received file is detected as being compressed. Also before runtime, a compression type of the received file is differentiated as packed, protected, and/or archived. Identification of a specific packer, a specific protector or a specific archiver corresponding to the compression type is attempted. Responsive to successful identification, the received file is decompressed and a static type of malware analysis is selected for the received file. Responsive to unsuccessful identification, decompress the received file is attempted with a general unpacker, a general unprotector or a general unarchiver, and responsive to successful decompression, the static type of malware analysis is selected for the received file. Responsive to unsuccessful decompression, a dynamic type of malware analysis on the received file is selected.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

70.

PTIVE RESOURCE PROVISIONING FOR A MULTI-TENANT DISTRIBUTED EVENT DATA STORE

      
Application Number 18074254
Status Pending
Filing Date 2022-12-02
First Publication Date 2023-04-20
Owner Fortinet, Inc. (USA)
Inventor
  • He, Jun
  • Bhattacharya, Partha
  • Yoo, Jae

Abstract

Systems and methods for adaptively provisioning a distributed event data store of a multi-tenant architecture are provided. According to one embodiment, a managed security service provider (MSSP) maintains a distributed event data store on behalf of each tenant of the MSSP. For each tenant, the MSSP periodically determines a provisioning status for a current active partition of the distributed event data store of the tenant. Further, when the determining indicates an under-provisioning condition exits, the MSSP dynamically increases number of resource provision units (RPUs) to be used for a new partition to be added to the partitions for the tenant by a first adjustment ratio. While, when the determining indicates an over-provisioning condition exists, the MSSP dynamically decreases the number of RPUs to be used for subsequent partitions added to the partitions for the tenant by a second adjustment ratio.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/54 - Interprogram communication
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • H04L 9/40 - Network security protocols
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead
  • G06F 16/182 - Distributed file systems
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

71.

SYSTEMS AND METHODS FOR PROCESSING MULTIPLE IP PACKET TYPES IN A NETWORK ENVIRONMENT

      
Application Number 17492456
Status Pending
Filing Date 2021-10-01
First Publication Date 2023-04-06
Owner Fortinet, Inc. (USA)
Inventor Li, Hongwei

Abstract

Systems, devices, and methods are discussed for receiving a first packet type and outputting a second packet type based upon knowledge of a source device and a recipient device.

IPC Classes  ?

  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 12/947 - Address processing within a device, e.g. using internal ID or tags for routing within a switch
  • H04L 5/00 - Arrangements affording multiple use of the transmission path
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

72.

NON-INTERFERING ACCESS LAYER END-TO-END ENCRYPTION FOR IOT DEVICES OVER A DATA COMMUNICATION NETWORK

      
Application Number 17487344
Status Pending
Filing Date 2021-09-28
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor Nawaz, Kaashif Hassan

Abstract

Once a new session of data packets is detected, whether to proxy encrypt the data packets, on behalf of a specific headless endpoint device from the plurality of headless endpoint devices for a session, is determined based on analysis of payload data of a data packet from a session. Responsive to a determination to proxy encrypt data packets, encryption attributes are set up between a local data port on the network device and a remote data port on a remote network device as parsed from a header of the data packet. Outbound and inbound data packets of the session secure OSI layers 4 to 7 of the outbound data packets of the session are encrypted, according to the encryption attributes, without interference to OSI layers 1 to 3.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

73.

PREVENTING DHCP POOL EXHAUSTION AND STARVATION WITH CENTRALIZED ARP PROTOCOL MESSAGES

      
Application Number 17490523
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor Pasta, Alessandro

Abstract

A low number of available IP addresses is detected in an IP pool that available for lease from the DHCP server. A neighbor table from a gateway device behind a firewall that blocks ICMP echo requests from the DHCP server. The gateway device is triggered to broadcast an ARP request to network devices of the neighbor table behind the firewall to determine whether a specific IP address is in use. Responsive to an ARP response not being received, the control module releasing a lease for the specific IP thereby returning to the IP pool available for lease in the DHCP server.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

74.

ARTIFICIAL VIRTUAL MACHINE FOR PREVENTING MALWARE EXECUTION BY APPLYING VIRTUAL MACHINE CHARACTERISTICS IN REAL COMPUTING ENVIRONMENTS

      
Application Number 17490604
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor
  • Susanto, Jordy Junior
  • Tatasurya, Samuel Radiant

Abstract

A process being initiated for exposure to an operating system of the computer device is detected. A control module can then check whether the process has been whitelisted, and if not, activate an artificial virtual machine to test the process prior to direct exposure to an operating system of the real computing environment. The control module can detect when the process responds to the presumed virtual environment preventing execution. A security action can then be taken on the process including preventing the process from being exposed to the operating system.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/445 - Program loading or initiating

75.

AUTOMATIC CONFIGURATION OF SD-WAN LINK RULES ON A PER APPLICATION BASIS USING REAL-TIME NETWORK CONDITIONS

      
Application Number 17490747
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor Di Mattia, Aldo

Abstract

new link requests are received and an application making the request is identified. SD-WAN parameters are retrieved from an application control database. A first parameter is a JLP loss requirement for the application, and can be either low JLP, medium JLP, or high JLP SLA level. A second parameter a downstream/upstream bandwidth capability requirement. Links are determined from the pool of available links that meet the JLP requirement. One of the links is selected for the new link request, from the pool of available links that meet the JLP requirement, based on a downstream and an upstream bandwidth capability. The best link is automatically activated for the new link request

IPC Classes  ?

  • H04L 12/841 - Flow control actions using time consideration, e.g. round trip time [RTT]
  • H04L 12/813 - Policy-based control, e.g. policing
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
  • H04L 12/46 - Interconnection of networks

76.

Intelligent selection of physical layer transmission types in 802.11AX based Wi-Fi networks

      
Application Number 17490937
Grant Number 11658707
Status In Force
Filing Date 2021-09-30
First Publication Date 2023-03-30
Grant Date 2023-05-23
Owner Fortinet, Inc. (USA)
Inventor Jain, Ankur

Abstract

A transmission type is determined for a specific station on a Wi-Fi network. A transmission type of OFDMA is selected responsive to the mobility value for the specific station meeting a mobility threshold. A transmission type of MU-MIMO is selected responsive to the similarity value for the specific station meeting a similarity threshold. A transmission type of SU-MIMO is selected responsive to the specific station not meeting the similarity threshold. The network interface transmits data packets to stations using OFDMA, SU-MIMO or MU-MIMO as selected.

IPC Classes  ?

  • H04L 23/02 - Apparatus or local circuits for telegraphic systems other than those covered by groups adapted for orthogonal signalling
  • H04B 7/0452 - Multi-user MIMO systems
  • H04L 5/00 - Arrangements affording multiple use of the transmission path
  • H04B 17/327 - Received signal code power [RSCP]
  • H04W 28/18 - Negotiating wireless communication parameters
  • H04B 7/0456 - Selection of precoding matrices or codebooks, e.g. using matrices for antenna weighting

77.

SECURE LINK AGGREGATION

      
Application Number 18074203
Status Pending
Filing Date 2022-12-02
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor
  • Mihelich, Joseph R.
  • Hu, Xiao
  • Srivastav, Amit
  • Cheng, Norman

Abstract

Systems and methods are for securing link aggregation are provided. According to an embodiment, a network device in a secure domain discovers device information associated with a peer network device in an untrusted domain that is connected through a first link directly connecting a first interface of the network device to a first interface of the peer network device, and authenticates the peer while allowing at least some network traffic to continue to be transmitted through the first interface. The network device establishes a secure session between the network device and the peer over the first link when the peer network device is successfully authenticated. The network device then allows the first link to operate as part of a single aggregated logical link, including a second link coupling a second interface of the network device to a second interface of the peer network device.

IPC Classes  ?

  • H04W 12/069 - Authentication using certificates or pre-shared keys
  • H04W 48/16 - Discovering; Processing access restriction or access information
  • H04W 12/037 - Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
  • H04W 76/10 - Connection setup
  • H04W 80/02 - Data link layer protocols

78.

Role based OFDMA subcarriers allocation over wireless networks using radius protocol

      
Application Number 17487258
Grant Number 11683688
Status In Force
Filing Date 2021-09-28
First Publication Date 2023-03-30
Grant Date 2023-06-20
Owner Fortinet, Inc. (USA)
Inventor Jain, Ankur

Abstract

Access credentials for a user of each of the plurality of stations connecting to the Wi-Fi network are forwarded to a RADIUS server. In response to the forwarded access credentials, priority-token values derived from the access credentials of the connecting users for storage in association with a MAC address of each of the plurality of stations, are received from the RADIUS and stored. Priority-token values responsive to detecting multiple users of at least two different priorities needing to access the Wi-Fi network. Available subcarriers are allocated based on the priority-token values for data transmissions.

IPC Classes  ?

  • H04W 48/16 - Discovering; Processing access restriction or access information
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 76/10 - Connection setup
  • H04W 12/084 - Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
  • H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
  • H04L 5/00 - Arrangements affording multiple use of the transmission path
  • H04W 80/12 - Application layer protocols, e.g. WAP [Wireless Application Protocol]

79.

CONTAINER NETWORK INTERFACE FOR APPLYING SECURITY POLICIES TO NETWORK TRAFFIC OF CONTAINERS

      
Application Number 17490137
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor Castro Da Rosa, Sérgio Henrique Marcelino

Abstract

A specific container is spawned by a docker module responsive to Kebernetes control instruction. Network connectivity is provided for the specific container to a data communication network through a networking bridge and a security policy is configured. After configuration, inbound or outbound data packets concerning the specific container are received and forwarded to a security policy KVM for scanning against security policies. Those that pass security scanning are forwarded to containers and external destinations.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/46 - Interconnection of networks
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04W 76/10 - Connection setup

80.

PROXY SSH PUBLIC KEY AUTHENTICATION IN CLOUD ENVIRONMENT

      
Application Number 17491432
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor
  • Xiao, Han
  • Luo, Wenping

Abstract

A SSH (secure shell) public key is received from a client device 120 120 on the enterprise network, and an EMS device 140 is queried based on the SSH public key. Responsive to confirmation of registration from the EMS server, an authentication certificate based on a user and the client device 120 120 is generated. An SSH session is initiated on behalf of the client device 120 120 including submitting the certificate and the SSH public key from the client device 120 120 to the external server.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

81.

ARTIFICIAL INTELLIGENCE FOR REAL-TIME E-MAIL SENTIMENT ANALYSIS FOR BRAND PROTECTION

      
Application Number 17491510
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner Fortinet, Inc. (USA)
Inventor Windsor, Carl Mark

Abstract

An e-mail is detected as being sent or received. The e-mail can be identified as a customer interaction. The e-mail is scanned to determine a sentimental value using artificial intelligence. Responsive to the sentimental value exceeding a sentimental threshold, a network security audit or other action can be performed on the user and the user device using the sentimental value as a factor in determining a security action.

IPC Classes  ?

82.

Systems and methods for indicating connection relevance in a network environment

      
Application Number 17734839
Grant Number 11616693
Status In Force
Filing Date 2022-05-02
First Publication Date 2023-03-28
Grant Date 2023-03-28
Owner Fortinet, Inc. (USA)
Inventor
  • Koehring, Paul
  • Abate, Jason

Abstract

Systems, devices, and methods are discussed for memory efficient network use modeling.

IPC Classes  ?

  • H04L 41/0853 - Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
  • H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components

83.

Systems and methods for incorporating passive wireless monitoring with video surveillance

      
Application Number 17481521
Grant Number 11823538
Status In Force
Filing Date 2021-09-22
First Publication Date 2023-03-23
Grant Date 2023-11-21
Owner Fortinet, Inc. (USA)
Inventor Windsor, Carl

Abstract

Various systems and methods for surveillance using a combination of video image capture and passive wireless detection are described. In some cases, the methods include receiving a device identification information from a first wireless access point at a first location and corresponding to a first time, and receiving the device identification from a second wireless access point at a second location and corresponding to a second time. A video from a camera is received, and a travel path is assembled including a portion of the video.

IPC Classes  ?

  • G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

84.

SYSTEMS AND METHODS FOR RAPID NATURAL LANGUAGE BASED MESSAGE CATEGORIZATION

      
Application Number 17570210
Status Pending
Filing Date 2022-01-06
First Publication Date 2023-03-02
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, devices, and methods are disclosed in relation to a system for natural language based message categorization designed to identify text from a particular topic from a potentially inexhaustible set of potential topics. In one of many possible implementations, a vector space model is first used to translate text into a vector representation. This vector is used to determine if the text can be recreated by swapping words and phrases from a training corpus of documents. This is done by determining if the vector is within the conical span of the vector representations of the text in the training corpus of documents. Span composition is evaluated by a two vector boolean comparison, enabling great computational complexity and short-circuiting enabling fast real-time topic determination.

IPC Classes  ?

85.

Systems and methods for internal secure network resolution

      
Application Number 17463787
Grant Number 11956211
Status In Force
Filing Date 2021-09-01
First Publication Date 2023-03-02
Grant Date 2024-04-09
Owner Fortinet, Inc. (USA)
Inventor
  • Wu, Weining
  • Marwah, Kunal
  • Yang, Jinhai
  • Zheng, Xu

Abstract

Systems, devices, and methods are discussed for limiting exposure of internal network operations beyond the boundary of a secure network.

IPC Classes  ?

  • H04L 41/0233 - Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • H04L 9/40 - Network security protocols
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/0226 - Mapping or translating multiple network management protocols

86.

Systems and Methods for Automated Risk-Based Network Security Focus

      
Application Number 17408730
Status Pending
Filing Date 2021-08-23
First Publication Date 2023-03-02
Owner Fortinet, Inc (USA)
Inventor
  • Sreedhar, Rajiv
  • Nedbal, Manuel
  • Ahluwalia, Manoj
  • Krishnamurthi, Latha
  • Rao, Rajeshwari
  • Hegde, Damodar K.
  • Gaitonde, Jitendra B.
  • Karp, Dave
  • Lubeck, Mark

Abstract

Systems, devices, and methods are discussed for automatically determining a risk-based focus in determining zero trust network access policy on one or more network elements.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

87.

SYSTEMS AND METHODS FOR ENCODING BEHAVIORAL INFORMATION INTO AN IMAGE DOMAIN FOR PROCESSING

      
Application Number 17831172
Status Pending
Filing Date 2022-06-02
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, devices, and methods are disclosed for encoding behavioral information into an image format to facilitate image based behavioral identification.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

88.

SYSTEMS AND METHODS FOR GENERATING SYNTHETIC DATA REPRESENTING INSIDER ATTACKS

      
Application Number 17888675
Status Pending
Filing Date 2022-08-16
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, methods, devices, and apparatus are discussed for generating data that appears to be an insider attack.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data

89.

SYSTEMS AND METHODS FOR DETECTING INSIDER ATTACKS ON A COMMUNICATION NETWORK

      
Application Number 17888683
Status Pending
Filing Date 2022-08-16
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, methods, devices, and apparatus are discussed for detecting relatively rare attacks in a communication network, and in some cases for detecting insider attacks on a communication network.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

90.

SYSTEMS AND METHODS FOR USING VECTOR MODEL NORMAL EXCLUSION IN NATURAL LANGUAGE PROCESSING TO CHARACTERIZE A CATEGORY OF MESSAGES

      
Application Number 17570196
Status Pending
Filing Date 2022-01-06
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, devices, and methods are disclosed in relation to a vector space model that may be used to characterize a category of messages. In one of many possible implementations, the frequency of words found within a piece of text is determined. These frequencies are compared against the frequencies of words within a given corpus like the Oxford English Corpus by first converting the frequencies to probabilities via the inverse cumulative distribution function assuming a normal distribution of frequencies then via taking the absolute difference in frequencies. A small difference reduces the weight of the given word whereas a large weight increases the weight of the word, leading to excellent word ranking for automated feature selection filtering without the need for a negative corpus.

IPC Classes  ?

91.

SYSTEMS AND METHODS FOR QUANTIFYING FILE ACCESS RISK EXPOSURE BY AN ENDPOINT IN A NETWORK ENVIRONMENT

      
Application Number 17464413
Status Pending
Filing Date 2021-09-01
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer T.

Abstract

Systems, devices, and methods are discussed for identifying possible improper file accesses by an endpoint device. In some cases an agent is placed on each system to be surveilled that records the absolute paths for each file accessed for each user. This information may be accumulated and sent to a central server or computer for analysis of all such file accesses on a user basis. In some cases, a file access tree is created, and in some implementations be pruned of branches and leaves if deemed to be duplicates or very similar to other branched and leaves via a Levenshtein distance threshold. The resulting tree's edges may be scaled in particular implementations based on the deviation of a user's file accesses from their sphere of permissions. A variance metric may be computed from the final tree's form to capture the user's access patterns.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

92.

SYSTEMS AND METHODS FOR ENABLING DETECTION OF THREATS BASED UPON COLOR

      
Application Number 17831185
Status Pending
Filing Date 2022-06-02
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, devices, and methods are disclosed for encoding behavioral information into an image format to facilitate image based behavioral identification.

IPC Classes  ?

  • G06V 40/20 - Movements or behaviour, e.g. gesture recognition
  • G06V 10/56 - Extraction of image or video features relating to colour

93.

SYSTEMS AND METHODS FOR TRAINING AN INSIDER ATTACK MODEL USING IMAGES HAVING BOTH REGION SPECIFICITY AND SPATIAL RELATIONSHIPS

      
Application Number 17888665
Status Pending
Filing Date 2022-08-16
First Publication Date 2023-02-23
Owner Fortinet, Inc. (USA)
Inventor Khanna, Sameer

Abstract

Systems, devices, and methods are disclosed that may be used for identifying potential insider attacks on a computer network.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
  • G06V 10/776 - Validation; Performance evaluation

94.

Systems and methods for hierarchical facial image clustering

      
Application Number 17980218
Grant Number 11881053
Status In Force
Filing Date 2022-11-03
First Publication Date 2023-02-16
Grant Date 2024-01-23
Owner Fortinet, Inc. (USA)
Inventor Dong, Xihua

Abstract

Various systems and methods for for clustering facial images in, for example, surveillance systems.

IPC Classes  ?

  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
  • G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
  • G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects

95.

Systems and methods for governing VPN access using a remote device in proximity to a VPN endpoint

      
Application Number 17393307
Grant Number 11792043
Status In Force
Filing Date 2021-08-03
First Publication Date 2023-02-09
Grant Date 2023-10-17
Owner Fortinet, Inc. (USA)
Inventor Seanor, Jonathan Karl

Abstract

Various embodiments provide for governing VPN access using a device remote from a VPN endpoint.

IPC Classes  ?

  • H04L 12/46 - Interconnection of networks
  • H04L 67/143 - Termination or inactivation of sessions, e.g. event-controlled end of session

96.

SYSTEMS AND METHODS FOR POSTURE CHECKING ACROSS LOCAL NETWORK ZONE ZTNA CONTROL

      
Application Number 17396960
Status Pending
Filing Date 2021-08-09
First Publication Date 2023-02-09
Owner Fortinet, Inc. (USA)
Inventor May, Robert A.

Abstract

Systems, devices, and methods are discussed for providing ZTNA control across multiple related, but independently provisioned networks.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

97.

Machine Learning Systems and Methods for API Discovery and Protection by URL Clustering With Schema Awareness

      
Application Number 17374692
Status Pending
Filing Date 2021-07-13
First Publication Date 2023-02-02
Owner Fortinet, Inc. (USA)
Inventor Dong, Xihua

Abstract

Various embodiments provide systems and methods for discovering APIs for use in relation to network application security.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06K 9/62 - Methods or arrangements for recognition using electronic means

98.

Cloud-based orchestration of incident response using multi-feed security event classifications

      
Application Number 17958579
Grant Number 11930022
Status In Force
Filing Date 2022-10-03
First Publication Date 2023-02-02
Grant Date 2024-03-12
Owner Fortinet, Inc. (USA)
Inventor
  • Yavo, Udi
  • Katmor, Roy
  • Kelson, Ido

Abstract

Systems and methods for performing multi-feed classification of security events to facilitate automated IR orchestration are provided. According to one embodiment a cloud-based security service protecting a private network provides a plurality of data feeds, wherein each data feed of the plurality of data feeds independently classify a given security event and produce a classification result. In response to an event associated with a process of an endpoint device that is part of the private network an endpoint protection platform running on the endpoint device performs an initial classification of the event and transmits the classification result to the cloud-based security service for final classification.

IPC Classes  ?

99.

RECOMMENDATION OF GRANULAR TRAFFIC THRESHOLDS FROM MULTIPLE SENSOR APPLIANCES

      
Application Number 17364673
Status Pending
Filing Date 2021-06-30
First Publication Date 2023-01-05
Owner Fortinet, Inc. (USA)
Inventor Jain, Hemant Kumar

Abstract

Recommendations are made for granular traffic thresholds for a plurality of DDoS attack mitigation appliances that act as a set appliances. The set of appliances can be those commonly found in highly available networks, active-active or active-passive appliances, disaster recovery data centers, backup appliances, etc.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

100.

AUTOMATIC LINK AGGREGATION FOR INCOMPATIBLE DATA PORTS ON A COMPUTER NETWORK

      
Application Number 17364848
Status Pending
Filing Date 2021-06-30
First Publication Date 2023-01-05
Owner Fortinet, Inc. (USA)
Inventor Gorajala Chandra, Sekhar Sumanth

Abstract

An aggregate port selection is received from user to bundle at least two individual data ports of the network device for single channel data transfer. The lowest common denominators of physical capabilities (speed and duplex) of selected ports on the network device is determined through an operating system. Downgraded physical capabilities of at least one of the at least two data ports are committed to match lowest common denominators of the at least two data ports. Data exchanges are conducted over the at least two ports of the network device according to LACP.

IPC Classes  ?

  • H04L 12/709 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy using M+N parallel active paths
  • H04L 12/751 - Topology update or discovery
  • H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
  • H04L 12/725 - Selecting a path with suitable quality of service [QoS]
  1     2     3     ...     10        Next Page