Movatterモバイル変換


[0]ホーム

URL:


US20080134330A1 - Systems and methods for processing data flows - Google Patents

Systems and methods for processing data flows
Download PDF

Info

Publication number
US20080134330A1
US20080134330A1US11/877,801US87780107AUS2008134330A1US 20080134330 A1US20080134330 A1US 20080134330A1US 87780107 AUS87780107 AUS 87780107AUS 2008134330 A1US2008134330 A1US 2008134330A1
Authority
US
United States
Prior art keywords
network
data
node
data flow
flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/877,801
Inventor
Harsh Kapoor
Moisey Akerman
Stephen D. Justus
JC Ferguson
Yevgeny Korsunsky
Paul S. Gallo
Charles Ching Lee
Timothy M. Martin
Chunsheng Fu
Weidong Xu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Blue Coat Systems LLC
Original Assignee
Crossbeam Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=46326816&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20080134330(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US11/174,181external-prioritypatent/US8046465B2/en
Application filed by Crossbeam Systems IncfiledCriticalCrossbeam Systems Inc
Priority to US11/877,801priorityCriticalpatent/US20080134330A1/en
Publication of US20080134330A1publicationCriticalpatent/US20080134330A1/en
Assigned to CROSSBEAM SYSTEMS, INC.reassignmentCROSSBEAM SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JUSTUS, STEPHEN D., FU, CHUNSHENG, KAPOOR, HARSH, MARTIN, TIMOTHY M., GALLO, PAUL S., KORSUNSKY, YEVGENY, XU, WEIDONG, AKERMAN, MOISEY, FERGUSON, JOHN C., LEE, CHARLES CHING
Assigned to SILICON VALLEY BANKreassignmentSILICON VALLEY BANKSECURITY AGREEMENTAssignors: CB SYSTEMS ACQUISITION CO., CB SYSTEMS HOLDINGS II, INC., CROSSBEAM SYSTEMS, INC.
Assigned to CROSSBEAM SYSTEMS, INC., CB SYSTEMS ACQUISITION CO., CB SYSTEMS HOLDINGS II, INC.reassignmentCROSSBEAM SYSTEMS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: SILICON VALLEY BANK
Assigned to JEFFERIES FINANCE LLC, AS COLLATERAL AGENTreassignmentJEFFERIES FINANCE LLC, AS COLLATERAL AGENTSECURITY AGREEMENTAssignors: CROSSBEAM SYSTEMS, INC.
Assigned to BLUE COAT SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: CROSSBEAM SYSTEMS, INC.
Assigned to JEFFERIES FINANCE LLC, AS COLLATERAL AGENTreassignmentJEFFERIES FINANCE LLC, AS COLLATERAL AGENTSECOND LIEN PATENT SECURITY AGREEMENTAssignors: BLUE COAT SYSTEMS, INC.
Assigned to BLUE COAT SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC.RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 30740/0181Assignors: JEFFERIES FINANCE LLC
Assigned to BLUE COAT SYSTEMS, INC. AS SUCCESSOR BY MERGER TO CROSSBEAM SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC. AS SUCCESSOR BY MERGER TO CROSSBEAM SYSTEMS, INC.RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 29877/0668Assignors: JEFFERIES FINANCE LLC
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

Description

Claims (1)

US11/877,8012005-07-012007-10-24Systems and methods for processing data flowsAbandonedUS20080134330A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/877,801US20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Applications Claiming Priority (11)

Application NumberPriority DateFiling DateTitle
US11/174,181US8046465B2 (en)2000-09-252005-07-01Flow scheduling for network application apparatus
US11/173,923US7836443B2 (en)2000-09-252005-07-01Network application apparatus
US74991505P2005-12-132005-12-13
US75066405P2005-12-142005-12-14
US79571206P2006-04-272006-04-27
US79570806P2006-04-272006-04-27
US79570706P2006-04-272006-04-27
US79588506P2006-04-272006-04-27
US79588606P2006-04-272006-04-27
US11/610,296US20070192863A1 (en)2005-07-012006-12-13Systems and methods for processing data flows
US11/877,801US20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US11/610,296ContinuationUS20070192863A1 (en)2000-09-252006-12-13Systems and methods for processing data flows

Publications (1)

Publication NumberPublication Date
US20080134330A1true US20080134330A1 (en)2008-06-05

Family

ID=46326816

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US11/610,296AbandonedUS20070192863A1 (en)2000-09-252006-12-13Systems and methods for processing data flows
US11/877,819Expired - Fee RelatedUS8402540B2 (en)2000-09-252007-10-24Systems and methods for processing data flows
US11/877,813AbandonedUS20080133518A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,801AbandonedUS20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,792AbandonedUS20080133517A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US11/610,296AbandonedUS20070192863A1 (en)2000-09-252006-12-13Systems and methods for processing data flows
US11/877,819Expired - Fee RelatedUS8402540B2 (en)2000-09-252007-10-24Systems and methods for processing data flows
US11/877,813AbandonedUS20080133518A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US11/877,792AbandonedUS20080133517A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Country Status (1)

CountryLink
US (5)US20070192863A1 (en)

Cited By (110)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060035563A1 (en)*2004-07-022006-02-16StrasbaughMethod, apparatus and system for use in processing wafers
US20060143499A1 (en)*2000-09-252006-06-29Crossbeam Systems, Inc.Flow scheduling for network application
US20070136541A1 (en)*2005-12-082007-06-14Herz William SData backup services
US20070168715A1 (en)*2005-12-082007-07-19Herz William SEmergency data preservation services
US20070192863A1 (en)*2005-07-012007-08-16Harsh KapoorSystems and methods for processing data flows
US20090319677A1 (en)*2006-08-142009-12-24Deutsche Borse AgSystem and method for sharing information and causing an action based on that information
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US20100121903A1 (en)*2008-11-072010-05-13Sun Microsystems, Inc.Distributed denial of service deterrence using outbound packet rewriting
US20100188994A1 (en)*2009-01-282010-07-29Gregory G. RaleighVerifiable service billing for intermediate networking devices
US20100287613A1 (en)*2009-05-082010-11-11Microsoft CorporationSanitization of packets
US20110145887A1 (en)*2009-12-142011-06-16At&T Intellectual Property I, L.P.System and Method of Selectively Applying Security Measures to Data Services
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110214157A1 (en)*2000-09-252011-09-01Yevgeny KorsunskySecuring a network with data flow processing
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US20110225644A1 (en)*2010-03-092011-09-15Microsoft CorporationBehavior-based security system
US8099784B1 (en)*2009-02-132012-01-17Symantec CorporationBehavioral detection based on uninstaller modification or removal
US20120054867A1 (en)*2010-08-252012-03-01International Business Machines CorporationTwo-tier deep analysis of html traffic
WO2012030419A1 (en)*2010-08-302012-03-08Bank Of AmericaOrganization resource allocation based on forecasted change outcomes
US8135657B2 (en)2000-09-252012-03-13Crossbeam Systems, Inc.Systems and methods for processing data flows
CN102427415A (en)*2011-12-072012-04-25广东石油化工学院 Network Intrusion Immune Detection Method Based on Self-set Scale Constraint
US8275830B2 (en)2009-01-282012-09-25Headwater Partners I LlcDevice assisted CDR creation, aggregation, mediation and billing
US8340634B2 (en)2009-01-282012-12-25Headwater Partners I, LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US8346225B2 (en)2009-01-282013-01-01Headwater Partners I, LlcQuality of service for device assisted services
US8351898B2 (en)2009-01-282013-01-08Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8391834B2 (en)2009-01-282013-03-05Headwater Partners I LlcSecurity techniques for device assisted services
US20130061283A1 (en)*2010-11-022013-03-07Ian Henry Stuart CullimoreUltra-Low Power Single-Chip Firewall Security Device, System and Method
US8402111B2 (en)2009-01-282013-03-19Headwater Partners I, LlcDevice assisted services install
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
US20130247183A1 (en)*2010-08-132013-09-19Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US8548428B2 (en)2009-01-282013-10-01Headwater Partners I LlcDevice group partitions and settlement platform
US8589541B2 (en)2009-01-282013-11-19Headwater Partners I LlcDevice-assisted services for protecting network capacity
US8606911B2 (en)2009-03-022013-12-10Headwater Partners I LlcFlow tagging for service policy implementation
US8626115B2 (en)2009-01-282014-01-07Headwater Partners I LlcWireless network service interfaces
US8635335B2 (en)2009-01-282014-01-21Headwater Partners I LlcSystem and method for wireless network offloading
US8725123B2 (en)2008-06-052014-05-13Headwater Partners I LlcCommunications device with secure data path processing agents
US8745220B2 (en)2009-01-282014-06-03Headwater Partners I LlcSystem and method for providing user notifications
US8793758B2 (en)2009-01-282014-07-29Headwater Partners I LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US8893009B2 (en)2009-01-282014-11-18Headwater Partners I LlcEnd user device that secures an association of application to service policy with an application certificate check
US8898293B2 (en)2009-01-282014-11-25Headwater Partners I LlcService offer set publishing to device agent with on-device service selection
US8924543B2 (en)2009-01-282014-12-30Headwater Partners I LlcService design center for device assisted services
US8924469B2 (en)2008-06-052014-12-30Headwater Partners I LlcEnterprise access control and accounting allocation for access networks
US9049169B1 (en)*2013-05-302015-06-02Trend Micro IncorporatedMobile email protection for private computer networks
US9094311B2 (en)2009-01-282015-07-28Headwater Partners I, LlcTechniques for attribution of mobile device data traffic to initiating end-user application
US9154826B2 (en)2011-04-062015-10-06Headwater Partners Ii LlcDistributing content and service launch objects to mobile devices
CN105144653A (en)*2013-03-152015-12-09赛门铁克公司Techniques for predicting and protecting spearphishing targets
US9253663B2 (en)2009-01-282016-02-02Headwater Partners I LlcControlling mobile device communications on a roaming network based on device state
US20160077873A1 (en)*2012-04-252016-03-17Reservoir Labs, Inc.Efficient packet forwarding using cyber-security aware policies
US9351193B2 (en)2009-01-282016-05-24Headwater Partners I LlcIntermediate networking devices
US20160191568A1 (en)*2013-03-152016-06-30Extreme Networks, Inc.System and related method for network monitoring and control based on applications
US9392462B2 (en)2009-01-282016-07-12Headwater Partners I LlcMobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9436521B2 (en)2009-11-032016-09-06Iota Computing, Inc.TCP/IP stack-based operating system
US9525696B2 (en)2000-09-252016-12-20Blue Coat Systems, Inc.Systems and methods for processing data flows
US9557889B2 (en)2009-01-282017-01-31Headwater Partners I LlcService plan design, user interfaces, application programming interfaces, and device management
US9565707B2 (en)2009-01-282017-02-07Headwater Partners I LlcWireless end-user device with wireless data attribution to multiple personas
US9572019B2 (en)2009-01-282017-02-14Headwater Partners LLCService selection set published to device agent with on-device service selection
US9578182B2 (en)2009-01-282017-02-21Headwater Partners I LlcMobile device and service management
CN106599997A (en)*2016-12-202017-04-26中兴软创科技股份有限公司Zero dynamic-based industrial control attack detection and identification method and system
US9647918B2 (en)2009-01-282017-05-09Headwater Research LlcMobile device and method attributing media services network usage to requesting application
US9706061B2 (en)2009-01-282017-07-11Headwater Partners I LlcService design center for device assisted services
US9755842B2 (en)2009-01-282017-09-05Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9800608B2 (en)2000-09-252017-10-24Symantec CorporationProcessing data flows with a data flow processor
US20170337374A1 (en)*2016-05-232017-11-23Wistron CorporationProtecting method and system for malicious code, and monitor apparatus
US9858559B2 (en)2009-01-282018-01-02Headwater Research LlcNetwork service plan design
US9955332B2 (en)2009-01-282018-04-24Headwater Research LlcMethod for child wireless device activation to subscriber account of a master wireless device
US9954975B2 (en)2009-01-282018-04-24Headwater Research LlcEnhanced curfew and protection associated with a device group
US9980146B2 (en)2009-01-282018-05-22Headwater Research LlcCommunications device with secure data path processing agents
US10057775B2 (en)2009-01-282018-08-21Headwater Research LlcVirtualized policy and charging system
US10064055B2 (en)2009-01-282018-08-28Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
CN108737406A (en)*2018-05-102018-11-02北京邮电大学A kind of detection method and system of abnormal flow data
US10171995B2 (en)2013-03-142019-01-01Headwater Research LlcAutomated credential porting for mobile devices
US10200541B2 (en)2009-01-282019-02-05Headwater Research LlcWireless end-user device with divided user space/kernel space traffic policy system
US10237757B2 (en)2009-01-282019-03-19Headwater Research LlcSystem and method for wireless network offloading
US10248996B2 (en)2009-01-282019-04-02Headwater Research LlcMethod for operating a wireless end-user device mobile payment agent
US10264138B2 (en)2009-01-282019-04-16Headwater Research LlcMobile device and service management
US10326800B2 (en)2009-01-282019-06-18Headwater Research LlcWireless network service interfaces
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US20190303208A1 (en)*2018-03-292019-10-03Servicenow, Inc.Management instrumentation and discovery (mid) server support for executing automated flows within a cloud based system
US10492102B2 (en)2009-01-282019-11-26Headwater Research LlcIntermediate networking devices
US10715342B2 (en)2009-01-282020-07-14Headwater Research LlcManaging service user discovery and service launch object placement on a device
US10779177B2 (en)2009-01-282020-09-15Headwater Research LlcDevice group partitions and settlement platform
US10783581B2 (en)2009-01-282020-09-22Headwater Research LlcWireless end-user device providing ambient or sponsored services
US10798252B2 (en)2009-01-282020-10-06Headwater Research LlcSystem and method for providing user notifications
US10841839B2 (en)2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US11218854B2 (en)2009-01-282022-01-04Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US11388072B2 (en)*2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11412366B2 (en)2009-01-282022-08-09Headwater Research LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US11431744B2 (en)2018-02-092022-08-30Extrahop Networks, Inc.Detection of denial of service attacks
US11438247B2 (en)2019-08-052022-09-06Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
US11463465B2 (en)2019-09-042022-10-04Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US11463299B2 (en)2018-02-072022-10-04Extrahop Networks, Inc.Ranking alerts based on network monitoring
US11496378B2 (en)2018-08-092022-11-08Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US11546153B2 (en)2017-03-222023-01-03Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US11558413B2 (en)2020-09-232023-01-17Extrahop Networks, Inc.Monitoring encrypted network traffic
US11568236B2 (en)2018-01-252023-01-31The Research Foundation For The State University Of New YorkFramework and methods of diverse exploration for fast and safe policy improvement
US11665207B2 (en)2017-10-252023-05-30Extrahop Networks, Inc.Inline secret sharing
US11706233B2 (en)2019-05-282023-07-18Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
CN116756225A (en)*2023-08-142023-09-15南京展研信息技术有限公司Situation data information processing method based on computer network security
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
US11916771B2 (en)2021-09-232024-02-27Extrahop Networks, Inc.Combining passive network analysis and active probing
US11973804B2 (en)2009-01-282024-04-30Headwater Research LlcNetwork service plan design
US11985155B2 (en)2009-01-282024-05-14Headwater Research LlcCommunications device with secure data path processing agents
US12107888B2 (en)2019-12-172024-10-01Extrahop Networks, Inc.Automated preemptive polymorphic deception
US12137004B2 (en)2009-01-282024-11-05Headwater Research LlcDevice group partitions and settlement platform
US12225030B2 (en)2021-06-182025-02-11Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US12309192B2 (en)2019-07-292025-05-20Extrahop Networks, Inc.Modifying triage information based on network monitoring
US12388810B2 (en)2009-01-282025-08-12Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US12389218B2 (en)2009-01-282025-08-12Headwater Research LlcService selection set publishing to device agent with on-device service selection
US12432130B2 (en)2009-01-282025-09-30Headwater Research LlcFlow tagging for service policy implementation

Families Citing this family (676)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8380854B2 (en)*2000-03-212013-02-19F5 Networks, Inc.Simplified method for processing multiple connections from the same client
US7343413B2 (en)2000-03-212008-03-11F5 Networks, Inc.Method and system for optimizing a network by independently scaling control segments and data flow
US7480715B1 (en)*2002-01-252009-01-20Vig Acquisitions Ltd., L.L.C.System and method for performing a predictive threat assessment based on risk factors
US7716742B1 (en)2003-05-122010-05-11Sourcefire, Inc.Systems and methods for determining characteristics of a network and analyzing vulnerabilities
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US20070113272A2 (en)2003-07-012007-05-17Securityprofiling, Inc.Real-time vulnerability monitoring
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US7853996B1 (en)*2003-10-032010-12-14Verizon Services Corp.Methodology, measurements and analysis of performance and scalability of stateful border gateways
US7886350B2 (en)2003-10-032011-02-08Verizon Services Corp.Methodology for measurements and analysis of protocol conformance, performance and scalability of stateful border gateways
US7421734B2 (en)*2003-10-032008-09-02Verizon Services Corp.Network firewall test methods and apparatus
US7886348B2 (en)2003-10-032011-02-08Verizon Services Corp.Security management system for monitoring firewall operation
US8782654B2 (en)2004-03-132014-07-15Adaptive Computing Enterprises, Inc.Co-allocating a reservation spanning different compute resources types
US8151103B2 (en)2004-03-132012-04-03Adaptive Computing Enterprises, Inc.System and method for providing object triggers
US11244545B2 (en)2004-03-162022-02-08Icontrol Networks, Inc.Cross-client sensor user interface in an integrated security network
US11916870B2 (en)2004-03-162024-02-27Icontrol Networks, Inc.Gateway registry methods and systems
US12063220B2 (en)2004-03-162024-08-13Icontrol Networks, Inc.Communication protocols in integrated systems
US9729342B2 (en)2010-12-202017-08-08Icontrol Networks, Inc.Defining and implementing sensor triggered response rules
US11582065B2 (en)2007-06-122023-02-14Icontrol Networks, Inc.Systems and methods for device communication
US10062273B2 (en)2010-09-282018-08-28Icontrol Networks, Inc.Integrated security system with parallel processing architecture
US11811845B2 (en)2004-03-162023-11-07Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
JP2007529826A (en)2004-03-162007-10-25アイコントロール ネットワークス, インコーポレイテッド Object management network
US10237237B2 (en)2007-06-122019-03-19Icontrol Networks, Inc.Communication protocols in integrated systems
US10339791B2 (en)2007-06-122019-07-02Icontrol Networks, Inc.Security network integrated with premise security system
US11368429B2 (en)2004-03-162022-06-21Icontrol Networks, Inc.Premises management configuration and control
US11343380B2 (en)2004-03-162022-05-24Icontrol Networks, Inc.Premises system automation
US20170118037A1 (en)2008-08-112017-04-27Icontrol Networks, Inc.Integrated cloud system for premises automation
US10721087B2 (en)2005-03-162020-07-21Icontrol Networks, Inc.Method for networked touchscreen with integrated interfaces
US8584239B2 (en)2004-04-012013-11-12Fireeye, Inc.Virtual machine with dynamic data flow analysis
US7966658B2 (en)*2004-04-082011-06-21The Regents Of The University Of CaliforniaDetecting public network attacks using signatures and fast content analysis
US20070266388A1 (en)2004-06-182007-11-15Cluster Resources, Inc.System and method for providing advanced reservations in a compute environment
US7539681B2 (en)*2004-07-262009-05-26Sourcefire, Inc.Methods and systems for multi-pattern searching
US8176490B1 (en)2004-08-202012-05-08Adaptive Computing Enterprises, Inc.System and method of interfacing a workload manager and scheduler with an identity manager
WO2006053093A2 (en)2004-11-082006-05-18Cluster Resources, Inc.System and method of providing system jobs within a compute environment
US8010685B2 (en)*2004-11-092011-08-30Cisco Technology, Inc.Method and apparatus for content classification
US7936682B2 (en)*2004-11-092011-05-03Cisco Technology, Inc.Detecting malicious attacks using network behavior and header analysis
US7610610B2 (en)*2005-01-102009-10-27Mcafee, Inc.Integrated firewall, IPS, and virus scanner system and method
EP1850235A1 (en)*2005-02-182007-10-31Duaxes CorporationCommunication control device
US20060259950A1 (en)*2005-02-182006-11-16Ulf MattssonMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
US8863143B2 (en)2006-03-162014-10-14Adaptive Computing Enterprises, Inc.System and method for managing a hybrid compute environment
US9413687B2 (en)2005-03-162016-08-09Adaptive Computing Enterprises, Inc.Automatic workload transfer to an on-demand center
US20120324566A1 (en)2005-03-162012-12-20Marc BaumTakeover Processes In Security Network Integrated With Premise Security System
US11615697B2 (en)2005-03-162023-03-28Icontrol Networks, Inc.Premise management systems and methods
US20110128378A1 (en)2005-03-162011-06-02Reza RajiModular Electronic Display Platform
US9231886B2 (en)2005-03-162016-01-05Adaptive Computing Enterprises, Inc.Simple integration of an on-demand compute environment
US10999254B2 (en)2005-03-162021-05-04Icontrol Networks, Inc.System for data routing in networks
US11700142B2 (en)2005-03-162023-07-11Icontrol Networks, Inc.Security network integrating security system and network devices
ES2614751T3 (en)2005-04-072017-06-01Iii Holdings 12, Llc Access on demand to computer resources
US7860006B1 (en)*2005-04-272010-12-28Extreme Networks, Inc.Integrated methods of performing network switch functions
US7979368B2 (en)*2005-07-012011-07-12Crossbeam Systems, Inc.Systems and methods for processing data flows
US20080229415A1 (en)*2005-07-012008-09-18Harsh KapoorSystems and methods for processing data flows
US7992208B2 (en)*2005-09-192011-08-02University Of MarylandDetection of nonconforming network traffic flow aggregates for mitigating distributed denial of service attacks
US7908357B2 (en)*2005-09-212011-03-15Battelle Memorial InstituteMethods and systems for detecting abnormal digital traffic
US8027251B2 (en)2005-11-082011-09-27Verizon Services Corp.Systems and methods for implementing protocol-aware network firewall
US9374342B2 (en)2005-11-082016-06-21Verizon Patent And Licensing Inc.System and method for testing network firewall using fine granularity measurements
US8046833B2 (en)*2005-11-142011-10-25Sourcefire, Inc.Intrusion event correlation with network discovery information
US7733803B2 (en)2005-11-142010-06-08Sourcefire, Inc.Systems and methods for modifying network map attributes
DE602005013540D1 (en)*2005-12-022009-05-07Alcatel Lucent Network node with modular, multi-level packet classification
US8392999B2 (en)*2005-12-192013-03-05White Cyber Knight Ltd.Apparatus and methods for assessing and maintaining security of a computerized system under development
US20070143849A1 (en)*2005-12-192007-06-21Eyal AdarMethod and a software system for end-to-end security assessment for security and CIP professionals
US8255996B2 (en)2005-12-302012-08-28Extreme Networks, Inc.Network threat detection and mitigation
US8280805B1 (en)2006-01-102012-10-02Sas Institute Inc.Computer-implemented risk evaluation systems and methods
US7899611B2 (en)*2006-03-032011-03-01Inrix, Inc.Detecting anomalous road traffic conditions
US7912628B2 (en)2006-03-032011-03-22Inrix, Inc.Determining road traffic conditions using data from multiple data sources
US7813870B2 (en)*2006-03-032010-10-12Inrix, Inc.Dynamic time series prediction of future traffic conditions
US20070208498A1 (en)*2006-03-032007-09-06Inrix, Inc.Displaying road traffic condition information and user controls
US8700296B2 (en)2006-03-032014-04-15Inrix, Inc.Dynamic prediction of road traffic conditions
US7912773B1 (en)*2006-03-242011-03-22Sas Institute Inc.Computer-implemented data storage systems and methods for use with predictive model systems
WO2007117636A2 (en)*2006-04-062007-10-18Smobile Systems, Inc.Malware detection system and method for comprssed data on mobile platforms
US12063221B2 (en)2006-06-122024-08-13Icontrol Networks, Inc.Activation of gateway device
US7948988B2 (en)*2006-07-272011-05-24Sourcefire, Inc.Device, system and method for analysis of fragments in a fragment train
KR100772523B1 (en)*2006-08-012007-11-01한국전자통신연구원 Intrusion Detection apparatus using pattern and its method
US7672238B2 (en)*2006-08-082010-03-02Opnet Technologies, Inc.Mapping off-network traffic to an administered network
US8220047B1 (en)2006-08-092012-07-10Google Inc.Anti-phishing system and method
US7701945B2 (en)*2006-08-102010-04-20Sourcefire, Inc.Device, system and method for analysis of segments in a transmission control protocol (TCP) session
US20080040373A1 (en)*2006-08-102008-02-14Business Objects, S.A.Apparatus and method for implementing match transforms in an enterprise information management system
US7908076B2 (en)*2006-08-182011-03-15Inrix, Inc.Representative road traffic flow information based on historical data
US8353031B1 (en)*2006-09-252013-01-08Symantec CorporationVirtual security appliance
KR20090110291A (en)*2006-10-262009-10-21인터랙틱 홀딩스 엘엘시 Network Interface Cards for Parallel Computing Systems
US8966619B2 (en)*2006-11-082015-02-24Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
US9473529B2 (en)2006-11-082016-10-18Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
US20080183520A1 (en)*2006-11-172008-07-31Norwich UniversityMethods and apparatus for evaluating an organization
US20100073202A1 (en)*2008-09-252010-03-25Mazed Mohammad APortable internet appliance
US8051022B2 (en)*2006-12-082011-11-01Pandya Ashish AEmbedded programmable intelligent search memory (PRISM) that simultaneously performs regular expression based search and signature pattern based search
US7996348B2 (en)2006-12-082011-08-09Pandya Ashish A100GBPS security and search architecture using programmable intelligent search memory (PRISM) that comprises one or more bit interval counters
US9141557B2 (en)2006-12-082015-09-22Ashish A. PandyaDynamic random access memory (DRAM) that comprises a programmable intelligent search memory (PRISM) and a cryptography processing engine
US20110029549A1 (en)*2006-12-082011-02-03Pandya Ashish ASignature search architecture for programmable intelligent search memory
WO2008073824A1 (en)*2006-12-082008-06-19Pandya Ashish ADynamic programmable intelligent search memory
US7890692B2 (en)*2007-08-172011-02-15Pandya Ashish AFSA context switch architecture for programmable intelligent search memory
US8041641B1 (en)*2006-12-192011-10-18Symantec Operating CorporationBackup service and appliance with single-instance storage of encrypted data
US8156557B2 (en)*2007-01-042012-04-10Cisco Technology, Inc.Protection against reflection distributed denial of service attacks
US11706279B2 (en)2007-01-242023-07-18Icontrol Networks, Inc.Methods and systems for data communication
US7647326B2 (en)*2007-01-292010-01-12Sharp Laboratories Of America, Inc.Method and system for evaluating media-playing sets
US8745179B2 (en)*2007-01-312014-06-03Cisco Technology, Inc.Managing multiple application configuration versions in a heterogeneous network
US8631497B1 (en)2007-02-012014-01-14Mcafee, Inc.Systems and methods for automating blind detection of computational vulnerabilities
WO2008098260A1 (en)*2007-02-092008-08-14Smobile Systems, Inc.Off-line mms malware scanning system and method
US8190512B1 (en)2007-02-202012-05-29Sas Institute Inc.Computer-implemented clustering systems and methods for action determination
US7630982B2 (en)2007-02-242009-12-08Trend Micro IncorporatedFast identification of complex strings in a data stream
US8291021B2 (en)*2007-02-262012-10-16Red Hat, Inc.Graphical spam detection and filtering
US7633385B2 (en)2007-02-282009-12-15Ucontrol, Inc.Method and system for communicating with and controlling an alarm system from a remote server
US8069352B2 (en)*2007-02-282011-11-29Sourcefire, Inc.Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
US20090328193A1 (en)*2007-07-202009-12-31Hezi MooreSystem and Method for Implementing a Virtualized Security Platform
US8484220B2 (en)*2007-03-062013-07-09Mcafee, Inc.Clustered index with differentiated subfields
KR100773416B1 (en)*2007-03-212007-11-05(주)소만사 Method and system for controlling network traffic of P2P and instant messenger
EP1983755A1 (en)*2007-04-172008-10-22Thomson LicensingMethod to transmit video data in a data stream and associated metadata
US8451986B2 (en)2007-04-232013-05-28Icontrol Networks, Inc.Method and system for automatically providing alternate network access for telecommunications
US8127353B2 (en)*2007-04-302012-02-28Sourcefire, Inc.Real-time user awareness for a computer network
US7788402B1 (en)*2007-05-032010-08-31Xilinx, Inc.Circuit for modification of a network packet by insertion or removal of a data segment
US7792117B1 (en)2007-05-032010-09-07Xilinx, Inc.Method for simulating a processor of network packets
US7784014B1 (en)2007-05-032010-08-24Xilinx, Inc.Generation of a specification of a network packet processor
US7990867B1 (en)2007-05-032011-08-02Xilinx, Inc.Pipeline for processing network packets
US8284772B1 (en)2007-05-032012-10-09Xilinx, Inc.Method for scheduling a network packet processor
US8179803B2 (en)*2007-05-142012-05-15Advanced Media Systems Ltd.Methods, systems and apparatus for monitoring and/or generating communications in a communications network
US8464346B2 (en)*2007-05-242013-06-11Iviz Techno Solutions Pvt. LtdMethod and system simulating a hacking attack on a network
US12184443B2 (en)2007-06-122024-12-31Icontrol Networks, Inc.Controlling data routing among networks
US11601810B2 (en)2007-06-122023-03-07Icontrol Networks, Inc.Communication protocols in integrated systems
US11316753B2 (en)2007-06-122022-04-26Icontrol Networks, Inc.Communication protocols in integrated systems
US11212192B2 (en)2007-06-122021-12-28Icontrol Networks, Inc.Communication protocols in integrated systems
US12283172B2 (en)2007-06-122025-04-22Icontrol Networks, Inc.Communication protocols in integrated systems
US11237714B2 (en)2007-06-122022-02-01Control Networks, Inc.Control system user interface
US12003387B2 (en)2012-06-272024-06-04Comcast Cable Communications, LlcControl system user interface
US11218878B2 (en)*2007-06-122022-01-04Icontrol Networks, Inc.Communication protocols in integrated systems
US11646907B2 (en)2007-06-122023-05-09Icontrol Networks, Inc.Communication protocols in integrated systems
US20080313026A1 (en)*2007-06-152008-12-18Robert RoseSystem and method for voting in online competitions
US8788334B2 (en)*2007-06-152014-07-22Social Mecca, Inc.Online marketing platform
US8117657B1 (en)*2007-06-202012-02-14Extreme Networks, Inc.Detection and mitigation of rapidly propagating threats from P2P, IRC and gaming
US8522344B2 (en)*2007-06-292013-08-27Verizon Patent And Licensing Inc.Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems
US8302186B2 (en)*2007-06-292012-10-30Verizon Patent And Licensing Inc.System and method for testing network firewall for denial-of-service (DOS) detection and prevention in signaling channel
US8055599B1 (en)*2007-07-132011-11-08Werth Larry JPattern recognition using cycles or traces in an associative pattern memory (APM), vertical sensors, amplitude sampling, adjacent hashes and fuzzy hashes
US8024473B1 (en)2007-07-192011-09-20Mcafee, Inc.System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted
US8874572B1 (en)*2007-07-312014-10-28Megree, Inc.Method and computer program product for operating a social networking site
US8291495B1 (en)*2007-08-082012-10-16Juniper Networks, Inc.Identifying applications for intrusion detection systems
US7805639B2 (en)2007-08-162010-09-28International Business Machines CorporationTool to report the status and drill-down of an application in an automated manufacturing environment
US7493236B1 (en)*2007-08-162009-02-17International Business Machines CorporationMethod for reporting the status of a control application in an automated manufacturing environment
US20100094849A1 (en)*2007-08-172010-04-15Robert RoseSystems and methods for creating user generated content incorporating content from a content catalog
US11831462B2 (en)2007-08-242023-11-28Icontrol Networks, Inc.Controlling data routing in premises management systems
US8069315B2 (en)*2007-08-302011-11-29Nokia CorporationSystem and method for parallel scanning
US8689330B2 (en)*2007-09-052014-04-01Yahoo! Inc.Instant messaging malware protection
CA2630938C (en)2007-09-192016-10-04Kevin Gerard BoyceMethod and system for dynamic protocol decoding and analysis
US8041773B2 (en)2007-09-242011-10-18The Research Foundation Of State University Of New YorkAutomatic clustering for self-organizing grids
US8042185B1 (en)*2007-09-272011-10-18Netapp, Inc.Anti-virus blade
US20090089359A1 (en)*2007-09-272009-04-02Rockwell Automation Technologies, Inc.Subscription and notification in industrial systems
US7908360B2 (en)*2007-09-282011-03-15Rockwell Automation Technologies, Inc.Correlation of non-times series events in industrial systems
JP5427181B2 (en)*2007-10-032014-02-26ヴァーテラ テクノロジー サーヴィシズ インコーポレイテッド Virtualization application acceleration infrastructure
GB0719964D0 (en)*2007-10-122007-11-21Katholleke Universiteit LeuvenMethod for detecting and resolving hidden text salting
US8286243B2 (en)*2007-10-232012-10-09International Business Machines CorporationBlocking intrusion attacks at an offending host
US7917446B2 (en)*2007-10-312011-03-29American Express Travel Related Services Company, Inc.Latency locator
CN100550712C (en)*2007-11-052009-10-14华为技术有限公司A kind of signal processing method and processing unit
CN101207665B (en)*2007-11-052010-12-08华为技术有限公司 A method for obtaining attenuation factor
US8112800B1 (en)2007-11-082012-02-07Juniper Networks, Inc.Multi-layered application classification and decoding
US20090138794A1 (en)*2007-11-272009-05-28Joseph BeckerSystem and method for securing web applications
US8793362B2 (en)*2007-11-292014-07-29Barclays Capital Inc.Communications enterprise server monitor
US8656298B2 (en)*2007-11-302014-02-18Social Mecca, Inc.System and method for conducting online campaigns
US8010522B2 (en)*2007-12-072011-08-30International Business Machines CorporationSystem, method and program product for detecting SQL queries injected into data fields of requests made to applications
KR100949808B1 (en)*2007-12-072010-03-30한국전자통신연구원 P2P traffic management device and method
US20090154363A1 (en)*2007-12-182009-06-18Josh StephensMethod of resolving network address to host names in network flows for network device
US20090157473A1 (en)*2007-12-182009-06-18Att Knowledge Ventures L.P.System and method for sending targeted marketing data using proximity data
KR20090065977A (en)*2007-12-182009-06-23삼성에스디에스 주식회사 How to determine whether a file is infected with a virus
US7792959B2 (en)*2008-01-092010-09-07International Business Machines CorporationSystems, methods and computer program products for extracting port-level information of web services with flow-based network monitoring
US11916928B2 (en)2008-01-242024-02-27Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US9578055B1 (en)*2008-01-252017-02-21F5 Networks, Inc.Thwarting drone-waged denial of service attacks on a network
US9076342B2 (en)*2008-02-192015-07-07Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US7849146B2 (en)*2008-02-212010-12-07Yahoo! Inc.Identifying IP addresses for spammers
US20100198830A1 (en)*2008-03-062010-08-05Nitrosecurity, Inc.Dynamic data distribution aggregation
JP5094487B2 (en)*2008-03-172012-12-12三菱電機株式会社 Information leakage inspection apparatus, computer program, and information leakage inspection method
US20090252041A1 (en)*2008-04-032009-10-08Alcatel LucentOptimized statistics processing in integrated DPI service-oriented router deployments
US8474043B2 (en)2008-04-172013-06-25Sourcefire, Inc.Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
US8806053B1 (en)2008-04-292014-08-12F5 Networks, Inc.Methods and systems for optimizing network traffic using preemptive acknowledgment signals
US8621608B2 (en)*2008-04-292013-12-31Mcafee, Inc.System, method, and computer program product for dynamically adjusting a level of security applied to a system
CN101577662B (en)2008-05-052012-04-04华为技术有限公司Method and device for matching longest prefix based on tree form data structure
US8339954B2 (en)2008-05-162012-12-25Cisco Technology, Inc.Providing trigger based traffic management
US8108323B2 (en)*2008-05-192012-01-31Yahoo! Inc.Distributed spam filtering utilizing a plurality of global classifiers and a local classifier
US8800043B2 (en)*2008-05-192014-08-05Microsoft CorporationPre-emptive pre-indexing of sensitive and vulnerable assets
US8339959B1 (en)2008-05-202012-12-25Juniper Networks, Inc.Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US9032503B2 (en)*2008-05-202015-05-12Shakeel MustafaDiversity string based pattern matching
US8805995B1 (en)*2008-05-232014-08-12Symantec CorporationCapturing data relating to a threat
US8365259B2 (en)*2008-05-282013-01-29Zscaler, Inc.Security message processing
US8521631B2 (en)2008-05-292013-08-27Sas Institute Inc.Computer-implemented systems and methods for loan evaluation using a credit assessment framework
US9185122B2 (en)*2008-05-312015-11-10Hewlett-Packard Development Company, L.P.Methods and systems for managing security in a network
JP2009301456A (en)*2008-06-172009-12-24Fujitsu LtdData conversion program, data conversion apparatus, and data conversion method
US20170185278A1 (en)2008-08-112017-06-29Icontrol Networks, Inc.Automation system user interface
US20090327943A1 (en)*2008-06-262009-12-31Microsoft CorporationIdentifying application program threats through structural analysis
DE102008030125A1 (en)*2008-06-272010-01-14Klüver, Christina, Dr.Electronically stored text evaluating and searching method, involves assigning search words to neuron such that combining weights depends in frequency of search word in text with neuronal network, and calculating end activation of networks
US9717021B2 (en)2008-07-032017-07-25Silver Peak Systems, Inc.Virtual network overlay
US10805840B2 (en)2008-07-032020-10-13Silver Peak Systems, Inc.Data transmission via a virtual wide area network overlay
US10164861B2 (en)2015-12-282018-12-25Silver Peak Systems, Inc.Dynamic monitoring and visualization for network health characteristics
JP5224953B2 (en)*2008-07-172013-07-03インターナショナル・ビジネス・マシーンズ・コーポレーション Information processing apparatus, information processing method, and program
EP2150022A1 (en)*2008-07-282010-02-03THOMSON LicensingData stream comprising RTP packets, and method and device for encoding/decoding such data stream
US8069128B2 (en)*2008-08-082011-11-29Yahoo! Inc.Real-time ad-hoc spam filtering of email
US11792036B2 (en)2008-08-112023-10-17Icontrol Networks, Inc.Mobile premises automation platform
US11729255B2 (en)2008-08-112023-08-15Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US11758026B2 (en)2008-08-112023-09-12Icontrol Networks, Inc.Virtual device systems and methods
US10530839B2 (en)2008-08-112020-01-07Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US20100058475A1 (en)*2008-08-262010-03-04Nec Laboratories America, Inc.Feedback-guided fuzz testing for learning inputs of coma
US8218442B2 (en)2008-09-112012-07-10Juniper Networks, Inc.Methods and apparatus for flow-controllable multi-staged queues
US8955107B2 (en)*2008-09-122015-02-10Juniper Networks, Inc.Hierarchical application of security services within a computer network
US8826450B2 (en)*2008-09-192014-09-02Yahoo! Inc.Detecting bulk fraudulent registration of email accounts
US8868791B2 (en)*2008-09-292014-10-21Toshiba America Research, Inc.System and method for evaluating multiple connectivity options
US8272055B2 (en)2008-10-082012-09-18Sourcefire, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US8572717B2 (en)*2008-10-092013-10-29Juniper Networks, Inc.Dynamic access control policy with port restrictions for a network security appliance
US8040808B1 (en)2008-10-202011-10-18Juniper Networks, Inc.Service aware path selection with a network acceleration device
US8312542B2 (en)*2008-10-292012-11-13Lockheed Martin CorporationNetwork intrusion detection using MDL compress for deep packet inspection
US8566444B1 (en)*2008-10-302013-10-22F5 Networks, Inc.Methods and system for simultaneous multiple rules checking
TWI369623B (en)*2008-11-072012-08-01Chunghwa Telecom Co LtdControl system and protection method for integrated information security service
US8931087B1 (en)*2008-12-032015-01-06Verizon Patent And Licensing Inc.Reconfigurable virtualized remote computer security system
US8364766B2 (en)*2008-12-042013-01-29Yahoo! Inc.Spam filtering based on statistics and token frequency modeling
US9258217B2 (en)*2008-12-162016-02-09At&T Intellectual Property I, L.P.Systems and methods for rule-based anomaly detection on IP network flow
US20100150006A1 (en)*2008-12-172010-06-17Telefonaktiebolaget L M Ericsson (Publ)Detection of particular traffic in communication networks
US20100162399A1 (en)*2008-12-182010-06-24At&T Intellectual Property I, L.P.Methods, apparatus, and computer program products that monitor and protect home and small office networks from botnet and malware activity
US8239948B1 (en)*2008-12-192012-08-07Symantec CorporationSelecting malware signatures to reduce false-positive detections
US7916635B2 (en)2008-12-232011-03-29Qwest Communications International, Inc.Transparent network traffic inspection
US20100161537A1 (en)*2008-12-232010-06-24At&T Intellectual Property I, L.P.System and Method for Detecting Email Spammers
US8201220B2 (en)2008-12-232012-06-12Qwest Communications International Inc.Network user usage profiling
US8898623B2 (en)*2008-12-302014-11-25The Regents Of The University Of CaliforniaApplication design and data flow analysis
US8631046B2 (en)2009-01-072014-01-14Oracle International CorporationGeneric ontology based semantic business policy engine
US8843523B2 (en)*2009-01-122014-09-23Micron Technology, Inc.Devices, systems, and methods for communicating pattern matching results of a parallel pattern search engine
US9571559B2 (en)2009-01-282017-02-14Headwater Partners I LlcEnhanced curfew and protection associated with a device group
CN102395950B (en)*2009-02-132016-03-16起元技术有限责任公司With the communication of data-storage system
US20100211645A1 (en)*2009-02-182010-08-19Yahoo! Inc.Identification of a trusted message sender with traceable receipts
US9672478B2 (en)*2009-02-262017-06-06Oracle International CorporationTechniques for semantic business policy composition
US20100235909A1 (en)*2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis
US20100235908A1 (en)*2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis
US20100235914A1 (en)*2009-03-132010-09-16Alcatel LucentIntrusion detection for virtual layer-2 services
US9398043B1 (en)2009-03-242016-07-19Juniper Networks, Inc.Applying fine-grain policy action to encapsulated network attacks
US8539221B2 (en)*2009-03-272013-09-17Guavus, Inc.Method and system for identifying an application type of encrypted traffic
KR101042729B1 (en)*2009-04-092011-06-20삼성에스디에스 주식회사 Malware Detection Device Based on System-on-Chip and Custom Semiconductor in Mobile Devices
US8964748B2 (en)*2009-04-172015-02-24Genband Us LlcMethods, systems, and computer readable media for performing flow compilation packet processing
EP2422330B1 (en)2009-04-222015-02-25Inrix, Inc.Predicting expected road traffic conditions based on historical and current data
US8638211B2 (en)2009-04-302014-01-28Icontrol Networks, Inc.Configurable controller and interface for home SMA, phone and multimedia
US9448964B2 (en)*2009-05-042016-09-20Cypress Semiconductor CorporationAutonomous control in a programmable system
US20130247191A1 (en)*2009-05-072013-09-19Harish BalasubramanianSystem, method, and computer program product for performing a remedial action with respect to a first device utilizing a second device
US20100293618A1 (en)*2009-05-122010-11-18Microsoft CorporationRuntime analysis of software privacy issues
US9871807B2 (en)*2009-06-122018-01-16Microsoft Technology Licensing, LlcGeneric protocol decoder for generic application-level protocol signatures
US8959157B2 (en)*2009-06-262015-02-17Microsoft CorporationReal-time spam look-up system
CN102577304B (en)*2009-08-122015-12-09荷兰皇家Kpn电信集团The method and system of the message of dynamic forwarding first agreement and Controlling vertex thereof
US9734037B1 (en)*2009-09-152017-08-15Symantec CorporationMobile application sampling for performance and network behavior profiling
US10157280B2 (en)2009-09-232018-12-18F5 Networks, Inc.System and method for identifying security breach attempts of a website
US20110106937A1 (en)*2009-10-292011-05-05Fluke CorporationMixed-mode analysis
US11720290B2 (en)2009-10-302023-08-08Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US10877695B2 (en)2009-10-302020-12-29Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US10721269B1 (en)2009-11-062020-07-21F5 Networks, Inc.Methods and system for returning requests with javascript for clients before passing a request to a server
US9313047B2 (en)2009-11-062016-04-12F5 Networks, Inc.Handling high throughput and low latency network data packets in a traffic management device
US8868961B1 (en)2009-11-062014-10-21F5 Networks, Inc.Methods for acquiring hyper transport timing and devices thereof
US8640241B2 (en)2009-11-162014-01-28Quatum CorporationData identification system
US9015318B1 (en)2009-11-182015-04-21Cisco Technology, Inc.System and method for inspecting domain name system flows in a network environment
US9009293B2 (en)2009-11-182015-04-14Cisco Technology, Inc.System and method for reporting packet characteristics in a network environment
US9148380B2 (en)*2009-11-232015-09-29Cisco Technology, Inc.System and method for providing a sequence numbering mechanism in a network environment
US9531670B2 (en)*2009-11-302016-12-27Iwebgate Technology LimitedSystem and method for network virtualization and security using computer systems and software
US9098274B2 (en)2009-12-032015-08-04Intel CorporationMethods and apparatuses to improve turbo performance for events handling
CN102754072B (en)*2009-12-142016-10-19起元技术有限责任公司 Specifies user interface elements
US20110145205A1 (en)*2009-12-142011-06-16Sanjeev JainPacket Boundary Spanning Pattern Matching Based At Least In Part Upon History Information
WO2011073983A1 (en)2009-12-152011-06-23Seeker Security Ltd.Methods and systems of detecting and analyzing correlated operations in a common storage
WO2011073982A1 (en)2009-12-152011-06-23Seeker Security Ltd.Method and system of runtime analysis
US8792495B1 (en)2009-12-192014-07-29Cisco Technology, Inc.System and method for managing out of order packets in a network environment
KR101292887B1 (en)*2009-12-212013-08-02한국전자통신연구원Apparatus and method of monitoring packet stream in router using checking packet identity
US9264321B2 (en)2009-12-232016-02-16Juniper Networks, Inc.Methods and apparatus for tracking data flow based on flow state values
KR101079786B1 (en)*2010-01-062011-11-03충남대학교산학협력단Flow Data Analyze Method by Parallel Computation
US8769685B1 (en)*2010-02-032014-07-01Symantec CorporationSystems and methods for using file paths to identify potentially malicious computer files
US8260958B2 (en)2010-02-242012-09-04F5 Networks, Inc.Reducing energy consumption of servers
US8949236B2 (en)2010-02-262015-02-03Oracle International CorporationTechniques for analyzing data from multiple sources
CN102918494B (en)*2010-04-062016-08-03贾斯通数据库有限公司Data storage based on the storage of database model agnosticism, outline agnosticism and live load agnostic data and Access Model and/or search method and system
JP5809238B2 (en)2010-04-162015-11-10シスコ テクノロジー,インコーポレイテッド System and method for near real-time network attack detection, and system and method for integrated detection by detection routing
US8464345B2 (en)*2010-04-282013-06-11Symantec CorporationBehavioral signature generation using clustering
US9392005B2 (en)*2010-05-272016-07-12Samsung Sds Co., Ltd.System and method for matching pattern
US20110296003A1 (en)*2010-06-012011-12-01Microsoft CorporationUser account behavior techniques
US20110302652A1 (en)2010-06-072011-12-08Novell, Inc.System and method for detecting real-time security threats in a network datacenter
US9558074B2 (en)2010-06-112017-01-31Quantum CorporationData replica control
US8433790B2 (en)2010-06-112013-04-30Sourcefire, Inc.System and method for assigning network blocks to sensors
US9202049B1 (en)2010-06-212015-12-01Pulse Secure, LlcDetecting malware on mobile devices
US9141625B1 (en)2010-06-222015-09-22F5 Networks, Inc.Methods for preserving flow state during virtual machine migration and devices thereof
US8671182B2 (en)2010-06-222014-03-11Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
US10015286B1 (en)2010-06-232018-07-03F5 Networks, Inc.System and method for proxying HTTP single sign on across network domains
US9400958B2 (en)2010-06-302016-07-26Oracle International CorporationTechniques for display of information related to policies
US8527488B1 (en)*2010-07-082013-09-03Netlogic Microsystems, Inc.Negative regular expression search operations
US8908545B1 (en)2010-07-082014-12-09F5 Networks, Inc.System and method for handling TCP performance in network access with driver initiated application tunnel
US8347100B1 (en)2010-07-142013-01-01F5 Networks, Inc.Methods for DNSSEC proxying and deployment amelioration and systems thereof
US8589405B1 (en)2010-07-162013-11-19Netlogic Microsystems, Inc.Token stitcher for a content search system having pipelined engines
US8572106B1 (en)2010-07-162013-10-29Netlogic Microsystems, Inc.Memory management in a token stitcher for a content search system having pipelined engines
US8700593B1 (en)*2010-07-162014-04-15Netlogic Microsystems, Inc.Content search system having pipelined engines and a token stitcher
US9665582B2 (en)*2010-08-042017-05-30Quantum CorporationSoftware, systems, and methods for enhanced replication within virtual machine environments
US9083760B1 (en)2010-08-092015-07-14F5 Networks, Inc.Dynamic cloning and reservation of detached idle connections
DE102010044858B4 (en)*2010-09-092012-04-19Siemens Aktiengesellschaft A method for processing messages in a communication network from a plurality of network nodes
US8630174B1 (en)2010-09-142014-01-14F5 Networks, Inc.System and method for post shaping TCP packetization
US8463909B1 (en)2010-09-152013-06-11F5 Networks, Inc.Systems and methods for managing server resources
US8886981B1 (en)2010-09-152014-11-11F5 Networks, Inc.Systems and methods for idle driven scheduling
US8804504B1 (en)2010-09-162014-08-12F5 Networks, Inc.System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device
WO2012038445A1 (en)*2010-09-242012-03-29Nexios ItSystems and methods for peer-to-peer ims
US8836467B1 (en)2010-09-282014-09-16Icontrol Networks, Inc.Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US20120084423A1 (en)*2010-10-042012-04-05Openwave Systems Inc.Method and system for domain based dynamic traffic steering
US8787303B2 (en)2010-10-052014-07-22Cisco Technology, Inc.Methods and apparatus for data traffic offloading at a router
US8509071B1 (en)2010-10-062013-08-13Juniper Networks, Inc.Multi-dimensional traffic management
US8959571B2 (en)2010-10-292015-02-17F5 Networks, Inc.Automated policy builder
WO2012058643A2 (en)2010-10-292012-05-03F5 Networks, Inc.System and method for on the fly protocol conversion in obtaining policy enforcement information
US8984109B2 (en)*2010-11-022015-03-17International Business Machines CorporationEnsemble having one or more computing systems and a controller thereof
US9081613B2 (en)2010-11-022015-07-14International Business Machines CorporationUnified resource manager providing a single point of control
US9253016B2 (en)2010-11-022016-02-02International Business Machines CorporationManagement of a data network of a computing environment
US8959220B2 (en)2010-11-022015-02-17International Business Machines CorporationManaging a workload of a plurality of virtual servers of a computing environment
US8966020B2 (en)2010-11-022015-02-24International Business Machines CorporationIntegration of heterogeneous computing systems into a hybrid computing system
EP2455922B1 (en)2010-11-172018-12-05Inside SecureNFC transaction method and system
US8683591B2 (en)2010-11-182014-03-25Nant Holdings Ip, LlcVector-based anomaly detection
CN102143148B (en)*2010-11-292014-04-02华为技术有限公司Parameter acquiring and general protocol analyzing method and device
US8533285B2 (en)2010-12-012013-09-10Cisco Technology, Inc.Directing data flows in data centers with clustering services
US11750414B2 (en)2010-12-162023-09-05Icontrol Networks, Inc.Bidirectional security sensor communication for a premises security system
TW201227385A (en)*2010-12-162012-07-01Univ Nat Taiwan Science TechMethod of detecting malicious script and system thereof
US9147337B2 (en)2010-12-172015-09-29Icontrol Networks, Inc.Method and system for logging security event data
CN102014141B (en)*2010-12-302013-02-06电子科技大学 A method for implementing security of network terminal equipment
KR20120078664A (en)*2010-12-302012-07-10정현철Terminal
US9003057B2 (en)2011-01-042015-04-07Cisco Technology, Inc.System and method for exchanging information in a mobile wireless network environment
US8627467B2 (en)2011-01-142014-01-07F5 Networks, Inc.System and method for selectively storing web objects in a cache memory based on policy decisions
US10135831B2 (en)2011-01-282018-11-20F5 Networks, Inc.System and method for combining an access control system with a traffic management system
US9191327B2 (en)2011-02-102015-11-17Varmour Networks, Inc.Distributed service processing of network gateways using virtual machines
US8626682B2 (en)*2011-02-222014-01-07Thomson Reuters Global ResourcesAutomatic data cleaning for machine learning classifiers
CA2827941C (en)*2011-02-242017-09-12The University Of TulsaNetwork-based hyperspeed communication and defense
US9398033B2 (en)2011-02-252016-07-19Cavium, Inc.Regular expression processing automaton
US8601034B2 (en)2011-03-112013-12-03Sourcefire, Inc.System and method for real time data awareness
US9652616B1 (en)*2011-03-142017-05-16Symantec CorporationTechniques for classifying non-process threats
US9122995B2 (en)*2011-03-152015-09-01Microsoft Technology Licensing, LlcClassification of stream-based data using machine learning
US9069930B1 (en)*2011-03-292015-06-30Emc CorporationSecurity information and event management system employing security business objects and workflows
US8738768B2 (en)*2011-03-312014-05-27Meas, LlcMultiple destinations for mainframe event monitoring
US8738767B2 (en)*2011-03-312014-05-27Meas, LlcMainframe management console monitoring
US9104475B2 (en)*2011-04-072015-08-11Qualcomm Innovation Center, Inc.Methods and apparatus for managing operations of a web browser by predicting time period of subsequent script execution activity
US9705977B2 (en)*2011-04-202017-07-11Symantec CorporationLoad balancing for network devices
US8880991B2 (en)2011-04-212014-11-04Qualcomm Innovation Center, Inc.Methods and apparatus for improved browsing performance by precompilation of high-priority JavaScripts in a webpage and delaying the removal of corresponding compiled code
US8751450B1 (en)*2011-04-272014-06-10Netapp, Inc.Method and system for securely capturing workloads at a live network for replaying at a test network
CN102761535A (en)*2011-04-292012-10-31北京瑞星信息技术有限公司Virus monitoring method and equipment
US8151341B1 (en)*2011-05-232012-04-03Kaspersky Lab ZaoSystem and method for reducing false positives during detection of network attacks
US9135405B2 (en)*2011-05-262015-09-15Carnegie Mellon UniversityAutomated exploit generation
US8954309B2 (en)2011-05-312015-02-10Oracle International CorporationTechniques for application tuning
US8898096B2 (en)2011-05-312014-11-25Oracle International CorporationApplication configuration generation
US9665458B2 (en)2011-06-012017-05-30Data Security Solutions, LlcMethod and system for providing information from third party applications to devices
US8737221B1 (en)2011-06-142014-05-27Cisco Technology, Inc.Accelerated processing of aggregate data flows in a network environment
US8676729B1 (en)*2011-06-142014-03-18Narus, Inc.Network traffic classification using subspace clustering techniques
US8948013B1 (en)*2011-06-142015-02-03Cisco Technology, Inc.Selective packet sequence acceleration in a network environment
US8743690B1 (en)2011-06-142014-06-03Cisco Technology, Inc.Selective packet sequence acceleration in a network environment
US8792353B1 (en)*2011-06-142014-07-29Cisco Technology, Inc.Preserving sequencing during selective packet acceleration in a network environment
US9246819B1 (en)2011-06-202016-01-26F5 Networks, Inc.System and method for performing message-based load balancing
US8711861B2 (en)2011-08-022014-04-29Cavium, Inc.Lookup front end packet input processor
US9958280B2 (en)2011-08-162018-05-01Inrix, Inc.Assessing inter-modal passenger travel options
US8707434B2 (en)2011-08-172014-04-22Mcafee, Inc.System and method for indirect interface monitoring and plumb-lining
US9442881B1 (en)2011-08-312016-09-13Yahoo! Inc.Anti-spam transient entity classification
JP5704567B2 (en)*2011-09-132015-04-22株式会社日立製作所 Node device, system, and packet processing method
US9223618B2 (en)2011-09-202015-12-29Intel CorporationMulti-threaded queuing system for pattern matching
DE102012109395B4 (en)*2011-10-032022-09-15Apple Inc. communication devices and flow restriction devices
US8811183B1 (en)2011-10-042014-08-19Juniper Networks, Inc.Methods and apparatus for multi-path flow control within a multi-stage switch fabric
US9071635B1 (en)*2011-10-192015-06-30Wichorus, Inc.Methods and apparatus for identifying paging activities during idle mode
US8768866B2 (en)2011-10-212014-07-01Sas Institute Inc.Computer-implemented systems and methods for forecasting and estimation using grid regression
US8418249B1 (en)*2011-11-102013-04-09Narus, Inc.Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
US9203805B2 (en)*2011-11-232015-12-01Cavium, Inc.Reverse NFA generation and processing
US20130160129A1 (en)*2011-12-192013-06-20Verizon Patent And Licensing Inc.System security evaluation
US9270766B2 (en)2011-12-302016-02-23F5 Networks, Inc.Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof
US9251535B1 (en)2012-01-052016-02-02Juniper Networks, Inc.Offload of data transfer statistics from a mobile access gateway
JP6019586B2 (en)*2012-01-102016-11-02株式会社リコー Network communication equipment
US20130185795A1 (en)*2012-01-122013-07-18Arxceo CorporationMethods and systems for providing network protection by progressive degradation of service
US8726338B2 (en)2012-02-022014-05-13Juniper Networks, Inc.Dynamic threat protection in mobile networks
US10230566B1 (en)2012-02-172019-03-12F5 Networks, Inc.Methods for dynamically constructing a service principal name and devices thereof
US9231879B1 (en)2012-02-202016-01-05F5 Networks, Inc.Methods for policy-based network traffic queue management and devices thereof
US9172753B1 (en)2012-02-202015-10-27F5 Networks, Inc.Methods for optimizing HTTP header based authentication and devices thereof
WO2013163648A2 (en)2012-04-272013-10-31F5 Networks, Inc.Methods for optimizing service of content requests and devices thereof
IL219499B (en)*2012-04-302019-02-28Verint Systems LtdSystem and method for malware detection
US9338095B2 (en)2012-05-012016-05-10F5 Networks, Inc.Data flow segment optimized for hot flows
US9525632B1 (en)2012-05-012016-12-20F5 Networks, Inc.Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance
US9154423B1 (en)2012-05-012015-10-06F5 Networks, Inc.Minimize SYN-flood issues with flow cache while maintaining performance
US9043448B1 (en)*2012-05-082015-05-26Gigamon Inc.Systems and methods for configuring a network component that involves TCAM
US20150200962A1 (en)*2012-06-042015-07-16The Board Of Regents Of The University Of Texas SystemMethod and system for resilient and adaptive detection of malicious websites
US8938511B2 (en)*2012-06-122015-01-20International Business Machines CorporationMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
US9203771B1 (en)2012-07-232015-12-01F5 Networks, Inc.Hot service flow hardware offloads based on service priority and resource usage
US9258321B2 (en)2012-08-232016-02-09Raytheon Foreground Security, Inc.Automated internet threat detection and mitigation system and associated methods
US9392003B2 (en)2012-08-232016-07-12Raytheon Foreground Security, Inc.Internet security cyber threat reporting system and method
US8856057B2 (en)*2012-09-132014-10-07James Albert IonsonCognitive security system and method
US9268598B2 (en)*2012-09-132016-02-23International Business Machines CorporationRecording and profiling transaction failure source addresses and states of validity indicator corresponding to addresses of aborted transaction in hardware transactional memories
US10511497B2 (en)*2012-10-042019-12-17Fortinet, Inc.System and method for dynamic management of network device data
US8918473B1 (en)*2012-10-092014-12-23Whatsapp Inc.System and method for detecting unwanted content
WO2014077615A1 (en)*2012-11-192014-05-22Samsung Sds Co., Ltd.Anti-malware system, method of processing packet in the same, and computing device
US9252972B1 (en)2012-12-202016-02-02Juniper Networks, Inc.Policy control using software defined network (SDN) protocol
US9177139B2 (en)*2012-12-302015-11-03Honeywell International Inc.Control system cyber security
US11733908B2 (en)2013-01-102023-08-22Pure Storage, Inc.Delaying deletion of a dataset
US10908835B1 (en)2013-01-102021-02-02Pure Storage, Inc.Reversing deletion of a virtual machine
US9063967B2 (en)*2013-01-102015-06-23Pure Storage, Inc.Performing copies in a storage system
JP5987701B2 (en)*2013-01-162016-09-07富士通株式会社 Communication monitoring apparatus, prediction method, and prediction program
JP5958354B2 (en)2013-01-162016-07-27富士通株式会社 Communication monitoring apparatus, occurrence prediction method, and occurrence prediction program
IL224482B (en)2013-01-292018-08-30Verint Systems LtdSystem and method for keyword spotting using representative dictionary
US9811233B2 (en)2013-02-122017-11-07Ab Initio Technology LlcBuilding applications for configuring processes
US20140237137A1 (en)*2013-02-182014-08-21Cisco Technology, Inc.System for distributing flow to distributed service nodes using a unified application identifier
US10375155B1 (en)2013-02-192019-08-06F5 Networks, Inc.System and method for achieving hardware acceleration for asymmetric flow connections
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
WO2014137416A1 (en)*2013-03-082014-09-12The Trustees Of Columbia University In The City Of New YorkIdentification of backdoors and backdoor triggers
US9298925B1 (en)*2013-03-082016-03-29Ca, Inc.Supply chain cyber security auditing systems, methods and computer program products
US9251343B1 (en)2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
US8626912B1 (en)*2013-03-152014-01-07Extrahop Networks, Inc.Automated passive discovery of applications
US8867343B2 (en)2013-03-152014-10-21Extrahop Networks, Inc.Trigger based recording of flows with play back
US9106536B2 (en)*2013-04-152015-08-11International Business Machines CorporationIdentification and classification of web traffic inside encrypted network tunnels
US11586956B2 (en)*2013-05-282023-02-21Keysight Technologies, Inc.Searching apparatus utilizing sub-word finite state machines
IL226747B (en)2013-06-042019-01-31Verint Systems LtdSystem and method for malware detection learning
US9654560B2 (en)*2013-06-272017-05-16Hitachi, Ltd.Management system and method
US10769727B1 (en)2013-07-112020-09-08Liberty Mutual Insurance CompanyHome telematics devices and insurance applications
US9461967B2 (en)*2013-07-182016-10-04Palo Alto Networks, Inc.Packet classification for network routing
US9426166B2 (en)2013-08-302016-08-23Cavium, Inc.Method and apparatus for processing finite automata
US9563399B2 (en)2013-08-302017-02-07Cavium, Inc.Generating a non-deterministic finite automata (NFA) graph for regular expression patterns with advanced features
US9426165B2 (en)2013-08-302016-08-23Cavium, Inc.Method and apparatus for compilation of finite automata
US12124586B2 (en)*2013-09-132024-10-22Omnissa, LlcRisk assessment for managed client devices
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US9386103B2 (en)2013-10-042016-07-05Breakingpoint Systems, Inc.Application identification and dynamic signature generation for managing network communications
EP3067805A4 (en)*2013-11-062017-07-26Japan Science and Technology AgencyFluid transition path acquisition device, method for acquiring fluid transition path, and program
US10187317B1 (en)2013-11-152019-01-22F5 Networks, Inc.Methods for traffic rate control and devices thereof
US9189627B1 (en)2013-11-212015-11-17Fireeye, Inc.System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US10749905B2 (en)*2017-07-312020-08-18Amdocs Development LimitedSystem, method, and computer program providing security in network function virtualization (NFV) based communication networks and software defined networks (SDNS)
US10764323B1 (en)*2015-12-212020-09-01Amdocs Development LimitedSystem, method, and computer program for isolating services of a communication network in response to a distributed denial of service (DDoS) attack
US9419943B2 (en)2013-12-302016-08-16Cavium, Inc.Method and apparatus for processing of finite automata
US9544402B2 (en)2013-12-312017-01-10Cavium, Inc.Multi-rule approach to encoding a group of rules
US9275336B2 (en)2013-12-312016-03-01Cavium, Inc.Method and system for skipping over group(s) of rules based on skip group rule
US9667446B2 (en)2014-01-082017-05-30Cavium, Inc.Condition code approach for comparing rule and packet data that are provided in portions
US9602532B2 (en)2014-01-312017-03-21Cavium, Inc.Method and apparatus for optimizing finite automata processing
US9904630B2 (en)2014-01-312018-02-27Cavium, Inc.Finite automata processing based on a top of stack (TOS) memory
US9391771B2 (en)2014-02-062016-07-12Empire Technology Development LlcServer-client secret generation with cached data
US9973472B2 (en)2015-04-022018-05-15Varmour Networks, Inc.Methods and systems for orchestrating physical and virtual switches to enforce security boundaries
US9560081B1 (en)2016-06-242017-01-31Varmour Networks, Inc.Data network microsegmentation
US10264025B2 (en)2016-06-242019-04-16Varmour Networks, Inc.Security policy generation for virtualization, bare-metal server, and cloud computing environments
US10091238B2 (en)2014-02-112018-10-02Varmour Networks, Inc.Deception using distributed threat detection
US11405463B2 (en)2014-03-032022-08-02Icontrol Networks, Inc.Media content management
US9503421B2 (en)2014-03-172016-11-22Fortinet, Inc.Security information and event management
US9432389B1 (en)*2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US10002326B2 (en)2014-04-142018-06-19Cavium, Inc.Compilation of finite automata based on memory hierarchy
US9438561B2 (en)2014-04-142016-09-06Cavium, Inc.Processing of finite automata based on a node cache
US10110558B2 (en)2014-04-142018-10-23Cavium, Inc.Processing of finite automata based on memory hierarchy
US10469531B2 (en)*2014-04-252019-11-05SecureBrain Corporation & Hitachi Systems, Ltd.Fraud detection network system and fraud detection method
US9497100B2 (en)2014-05-052016-11-15IxiaMethods, systems, and computer readable media for providing fuzz testing functionality
US9210181B1 (en)*2014-05-262015-12-08Solana Networks Inc.Detection of anomaly in network flow data
US10015143B1 (en)2014-06-052018-07-03F5 Networks, Inc.Methods for securing one or more license entitlement grants and devices thereof
US9628502B2 (en)*2014-06-092017-04-18Meadow Hills, LLCActive attack detection system
US11838851B1 (en)2014-07-152023-12-05F5, Inc.Methods for managing L7 traffic classification and devices thereof
US9674207B2 (en)*2014-07-232017-06-06Cisco Technology, Inc.Hierarchical attack detection in a network
IL233776B (en)2014-07-242019-02-28Verint Systems LtdSystem and method for range matching
US9948496B1 (en)2014-07-302018-04-17Silver Peak Systems, Inc.Determining a transit appliance for data traffic to a software service
US9800592B2 (en)*2014-08-042017-10-24Microsoft Technology Licensing, LlcData center architecture that supports attack detection and mitigation
US10122630B1 (en)2014-08-152018-11-06F5 Networks, Inc.Methods for network traffic presteering and devices thereof
US10666676B1 (en)*2014-08-182020-05-26Trend Micro IncorporatedDetection of targeted email attacks
WO2016030927A1 (en)*2014-08-282016-03-03三菱電機株式会社Process analysis device, process analysis method, and process analysis program
US9875344B1 (en)2014-09-052018-01-23Silver Peak Systems, Inc.Dynamic monitoring and authorization of an optimization device
US10666544B1 (en)2014-09-262020-05-26Lumeta CorporationMethod and apparatus for providing situational awareness
WO2016046233A1 (en)*2014-09-262016-03-31British Telecommunications Public Limited CompanyEfficient conditional state mapping in a pattern matching automaton
US10846598B2 (en)2014-09-262020-11-24British Telecommunications Public Limited CompanyPattern matching
US9571519B2 (en)2014-09-292017-02-14Juniper Networks, Inc.Targeted attack discovery
US10387804B2 (en)2014-09-302019-08-20BoonLogicImplementations of, and methods of use for a pattern memory engine applying associative pattern memory for pattern recognition
US9374383B2 (en)*2014-10-212016-06-21Cisco Technology, Inc.Events from network flows
US9483742B1 (en)*2014-10-272016-11-01Amazon Technologies, Inc.Intelligent traffic analysis to detect malicious activity
HK1243512A1 (en)2014-11-032018-07-13Level 3 Communications, LlcIdentifying a potential ddos attack using statistical analysis
US10182013B1 (en)2014-12-012019-01-15F5 Networks, Inc.Methods for managing progressive image delivery and devices thereof
US11165812B2 (en)2014-12-032021-11-02Splunk Inc.Containment of security threats within a computing environment
US9934380B2 (en)*2014-12-232018-04-03Mcafee, LlcExecution profiling detection of malicious objects
CN105827472B (en)*2015-01-042019-08-20华为技术有限公司 Network data flow type detection method and device
US10560842B2 (en)2015-01-282020-02-11Verint Systems Ltd.System and method for combined network-side and off-air monitoring of wireless networks
US11895138B1 (en)2015-02-022024-02-06F5, Inc.Methods for improving web scanner accuracy and devices thereof
US9716700B2 (en)*2015-02-192017-07-25International Business Machines CorporationCode analysis for providing data privacy in ETL systems
US9467476B1 (en)2015-03-132016-10-11Varmour Networks, Inc.Context aware microsegmentation
US9609026B2 (en)2015-03-132017-03-28Varmour Networks, Inc.Segmented networks that implement scanning
US10193929B2 (en)2015-03-132019-01-29Varmour Networks, Inc.Methods and systems for improving analytics in distributed networks
US10178070B2 (en)2015-03-132019-01-08Varmour Networks, Inc.Methods and systems for providing security to distributed microservices
US9294442B1 (en)*2015-03-302016-03-22Varmour Networks, Inc.System and method for threat-driven security policy controls
US9438634B1 (en)*2015-03-132016-09-06Varmour Networks, Inc.Microsegmented networks that implement vulnerability scanning
US9917924B2 (en)2015-03-162018-03-13Keysight Technologies Singapore (Holdings) Pte. Ltd.Methods, systems, and computer readable media for simplistic visual representation of complex interdependent network protocol fields for network protocol fuzzing and graphical framework for reporting instantaneous system level progress
US9432394B1 (en)*2015-03-162016-08-30IxiaMethods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence
IL238001B (en)2015-03-292020-05-31Verint Systems LtdSystem and method for identifying communication session participants based on traffic patterns
US10009381B2 (en)*2015-03-302018-06-26Varmour Networks, Inc.System and method for threat-driven security policy controls
US9380027B1 (en)2015-03-302016-06-28Varmour Networks, Inc.Conditional declarative policies
US9560010B1 (en)*2015-03-302017-01-31Amazon Technologies, Inc.Network file transfer
US10834065B1 (en)2015-03-312020-11-10F5 Networks, Inc.Methods for SSL protected NTLM re-authentication and devices thereof
US9525697B2 (en)2015-04-022016-12-20Varmour Networks, Inc.Delivering security functions to distributed networks
US10200254B2 (en)*2015-04-172019-02-05The Boeing CompanyMethods and systems for improved computer network analysis
US9866576B2 (en)2015-04-172018-01-09Centripetal Networks, Inc.Rule-based network-threat detection
US9338147B1 (en)2015-04-242016-05-10Extrahop Networks, Inc.Secure communication secret sharing
US10320813B1 (en)*2015-04-302019-06-11Amazon Technologies, Inc.Threat detection and mitigation in a virtualized computing environment
IL296064B2 (en)*2015-05-042024-09-01Syed Kamran Hasan A method and device for managing security in a computer network
US11350254B1 (en)2015-05-052022-05-31F5, Inc.Methods for enforcing compliance policies and devices thereof
US10505818B1 (en)2015-05-052019-12-10F5 Networks. Inc.Methods for analyzing and load balancing based on server health and devices thereof
US10749985B2 (en)*2015-05-192020-08-18Amazon Technologies, Inc.Custom communication channels for application deployment
US11157800B2 (en)2015-07-242021-10-26Brainchip, Inc.Neural processor based accelerator system and method
US9875045B2 (en)*2015-07-272018-01-23International Business Machines CorporationRegular expression matching with back-references using backtracking
US10083624B2 (en)2015-07-282018-09-25Architecture Technology CorporationReal-time monitoring of network-based training exercises
US10803766B1 (en)2015-07-282020-10-13Architecture Technology CorporationModular training of network-based training exercises
US9483317B1 (en)2015-08-172016-11-01Varmour Networks, Inc.Using multiple central processing unit cores for packet forwarding in virtualized networks
US10348549B1 (en)*2015-08-242019-07-09Virtual Instruments WorldwideStorm detection, analysis, remediation, and other network behavior
US9699205B2 (en)2015-08-312017-07-04Splunk Inc.Network security system
US12223418B1 (en)*2015-09-012025-02-11Netronome Systems, Inc.Communicating a neural network feature vector (NNFV) to a host and receiving back a set of weight values for a neural network
US10313195B2 (en)*2015-09-142019-06-04Huawei Technologies Co., Ltd.Dedicated protection for virtual network embedding
US20170111391A1 (en)*2015-10-152017-04-20International Business Machines CorporationEnhanced intrusion prevention system
KR101703446B1 (en)*2015-10-152017-02-06숭실대학교산학협력단Network capable of detection DoS attacks and Method for controlling thereof, Gateway and Managing server comprising the network
IL242219B (en)2015-10-222020-11-30Verint Systems LtdSystem and method for keyword searching using both static and dynamic dictionaries
IL242218B (en)2015-10-222020-11-30Verint Systems LtdSystem and method for maintaining a dynamic dictionary
US20180322284A1 (en)*2015-10-292018-11-08Kuo ChiangMethods for preventing computer attacks in two-phase filtering and apparatuses using the same
US10021120B1 (en)2015-11-092018-07-108X8, Inc.Delayed replication for protection of replicated databases
US10043026B1 (en)*2015-11-092018-08-078X8, Inc.Restricted replication for protection of replicated databases
US9917754B2 (en)*2015-11-162018-03-13International Business Machines CorporationManagement of decommissioned server assets in a shared data environment
US11159486B2 (en)*2015-11-172021-10-26Zscaler, Inc.Stream scanner for identifying signature matches
US11277383B2 (en)2015-11-172022-03-15Zscaler, Inc.Cloud-based intrusion prevention system
US9894036B2 (en)2015-11-172018-02-13Cyber Adapt, Inc.Cyber threat attenuation using multi-source threat data analysis
US10594710B2 (en)*2015-11-202020-03-17Webroot Inc.Statistical analysis of network behavior using event vectors to identify behavioral anomalies using a composite score
US10007786B1 (en)*2015-11-282018-06-26Symantec CorporationSystems and methods for detecting malware
US9361175B1 (en)2015-12-072016-06-07International Business Machines CorporationDynamic detection of resource management anomalies in a processing system
JP6837064B2 (en)*2015-12-082021-03-03フォーティネット インクFortinet Inc. Systems and methods for detecting malicious code in runtime-generated code
US10191758B2 (en)2015-12-092019-01-29Varmour Networks, Inc.Directing data traffic between intra-server virtual machines
US11757946B1 (en)2015-12-222023-09-12F5, Inc.Methods for analyzing network traffic and enforcing network policies and devices thereof
EP3398088A4 (en)*2015-12-282019-08-21Sixgill Ltd. SYSTEM AND METHOD FOR MONITORING, ANALYZING AND MONITORING DARK WEB
US10075416B2 (en)2015-12-302018-09-11Juniper Networks, Inc.Network session data sharing
WO2017116627A1 (en)*2016-01-032017-07-06Presenso, Ltd.System and method for unsupervised prediction of machine failures
US10404698B1 (en)2016-01-152019-09-03F5 Networks, Inc.Methods for adaptive organization of web application access points in webtops and devices thereof
US10797888B1 (en)2016-01-202020-10-06F5 Networks, Inc.Methods for secured SCEP enrollment for client devices and devices thereof
US11178150B1 (en)2016-01-202021-11-16F5 Networks, Inc.Methods for enforcing access control list based on managed application and devices thereof
US20170214701A1 (en)*2016-01-242017-07-27Syed Kamran HasanComputer security based on artificial intelligence
US9680852B1 (en)2016-01-292017-06-13Varmour Networks, Inc.Recursive multi-layer examination for computer network security remediation
US9762599B2 (en)2016-01-292017-09-12Varmour Networks, Inc.Multi-node affinity-based examination for computer network security remediation
US10204211B2 (en)2016-02-032019-02-12Extrahop Networks, Inc.Healthcare operations with passive network monitoring
US10015139B2 (en)*2016-02-032018-07-03Oracle International CorporationInter-arrival time intrusion-detection technique to provide enhanced cybersecurity
GB201603118D0 (en)2016-02-232016-04-06Eitc Holdings LtdReactive and pre-emptive security system based on choice theory
WO2017147331A1 (en)*2016-02-242017-08-31Alibaba Group Holding LimitedUser behavior-based dynamic resource adjustment
WO2017155514A1 (en)*2016-03-082017-09-14Hewlett Packard Enterprise Development LpAction based on advertisement indicator in network packet
US10552763B2 (en)*2016-03-242020-02-04Cisco Technology, Inc.Constraint-aware resource synchronization across hyper-distributed learning systems
US9521115B1 (en)2016-03-242016-12-13Varmour Networks, Inc.Security policy generation using container metadata
US10187413B2 (en)*2016-03-252019-01-22Cisco Technology, Inc.Network-based approach for training supervised learning classifiers
US10762559B2 (en)*2016-04-152020-09-01Adp, LlcManagement of payroll lending within an enterprise system
IL245299B (en)2016-04-252021-05-31Verint Systems LtdSystem and method for decrypting communication exchanged on a wireless local area network
US10255459B2 (en)2016-05-182019-04-09International Business Machines CorporationPrivacy enabled runtime
US10769285B2 (en)2016-05-182020-09-08International Business Machines CorporationPrivacy enabled runtime
US10432484B2 (en)2016-06-132019-10-01Silver Peak Systems, Inc.Aggregating select network traffic statistics
US10791088B1 (en)2016-06-172020-09-29F5 Networks, Inc.Methods for disaggregating subscribers via DHCP address translation and devices thereof
US9787639B1 (en)2016-06-242017-10-10Varmour Networks, Inc.Granular segmentation using events
US10755334B2 (en)2016-06-302020-08-25Varmour Networks, Inc.Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors
US9729416B1 (en)2016-07-112017-08-08Extrahop Networks, Inc.Anomaly detection using device relationship graphs
WO2018017151A1 (en)*2016-07-212018-01-25Level 3 Communications, LlcSystem and method for voice security in a telecommunications network
US9660879B1 (en)2016-07-252017-05-23Extrahop Networks, Inc.Flow deduplication across a cluster of network monitoring devices
US10621314B2 (en)2016-08-012020-04-14Palantir Technologies Inc.Secure deployment of a software package
US9967056B1 (en)2016-08-192018-05-08Silver Peak Systems, Inc.Forward packet recovery with constrained overhead
US10203966B2 (en)*2016-08-262019-02-12Avago Technologies International Sales Pte. LimitedApplication launcher and management framework for a network device
US10958547B2 (en)*2016-09-092021-03-23Hewlett Packard Enterprise Development LpVerify a network function by inquiring a model using a query language
JP6599294B2 (en)2016-09-202019-10-30株式会社東芝 Abnormality detection device, learning device, abnormality detection method, learning method, abnormality detection program, and learning program
US10542071B1 (en)*2016-09-272020-01-21Amazon Technologies, Inc.Event driven health checks for non-HTTP applications
IL248306B (en)2016-10-102019-12-31Verint Systems LtdSystem and method for generating data sets for learning to identify user actions
US11063758B1 (en)2016-11-012021-07-13F5 Networks, Inc.Methods for facilitating cipher selection and devices thereof
US10505792B1 (en)2016-11-022019-12-10F5 Networks, Inc.Methods for facilitating network traffic analytics and devices thereof
US10454961B2 (en)2016-11-022019-10-22Cujo LLCExtracting encryption metadata and terminating malicious connections using machine learning
US10320749B2 (en)*2016-11-072019-06-11Nicira, Inc.Firewall rule creation in a virtualized computing environment
US10904275B2 (en)*2016-11-302021-01-26Cisco Technology, Inc.Leveraging synthetic traffic data samples for flow classifier training
US10931685B2 (en)*2016-12-122021-02-23Ut-Battelle, LlcMalware analysis and recovery
WO2018124672A1 (en)*2016-12-282018-07-05Samsung Electronics Co., Ltd.Apparatus for detecting anomaly and operating method for the same
US10771483B2 (en)*2016-12-302020-09-08British Telecommunications Public Limited CompanyIdentifying an attacked computing device
US10375098B2 (en)*2017-01-312019-08-06Splunk Inc.Anomaly detection based on relationships between multiple time series
US10771394B2 (en)*2017-02-062020-09-08Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows on a first packet from DNS data
US10892978B2 (en)2017-02-062021-01-12Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows from first packet data
US11044202B2 (en)2017-02-062021-06-22Silver Peak Systems, Inc.Multi-level learning for predicting and classifying traffic flows from first packet data
US10257082B2 (en)*2017-02-062019-04-09Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows
US11496438B1 (en)2017-02-072022-11-08F5, Inc.Methods for improved network security using asymmetric traffic delivery and devices thereof
US11777963B2 (en)2017-02-242023-10-03LogRhythm Inc.Analytics for processing information system data
CN107070883B (en)*2017-02-282019-12-31青岛海信移动通信技术股份有限公司Method and device for carrying out security detection on wireless network
US10791119B1 (en)2017-03-142020-09-29F5 Networks, Inc.Methods for temporal password injection and devices thereof
US10812266B1 (en)2017-03-172020-10-20F5 Networks, Inc.Methods for managing security tokens based on security violations and devices thereof
US10475174B2 (en)2017-04-062019-11-12General Electric CompanyVisual anomaly detection system
US10931662B1 (en)2017-04-102021-02-23F5 Networks, Inc.Methods for ephemeral authentication screening and devices thereof
IL252041B (en)2017-04-302020-09-30Verint Systems LtdSystem and method for tracking users of computer applications
IL252037B (en)2017-04-302021-12-01Verint Systems LtdSystem and method for identifying relationships between users of computer applications
US10972453B1 (en)2017-05-032021-04-06F5 Networks, Inc.Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof
US11122042B1 (en)2017-05-122021-09-14F5 Networks, Inc.Methods for dynamically managing user access control and devices thereof
US11343237B1 (en)2017-05-122022-05-24F5, Inc.Methods for managing a federated identity environment using security and access control data and devices thereof
US10938855B1 (en)*2017-06-232021-03-02Digi International Inc.Systems and methods for automatically and securely provisioning remote computer network infrastructure
US11874845B2 (en)*2017-06-282024-01-16Fortinet, Inc.Centralized state database storing state information
US10263863B2 (en)2017-08-112019-04-16Extrahop Networks, Inc.Real-time configuration discovery and management
US10931790B2 (en)*2017-08-172021-02-23Saudi Arabian Oil CompanySystems and methods for securely transferring selective datasets between terminals with multi-applications support
US10389685B2 (en)*2017-08-172019-08-20Saudi Arabian Oil CompanySystems and methods for securely transferring selective datasets between terminals
US10063434B1 (en)2017-08-292018-08-28Extrahop Networks, Inc.Classifying applications or activities based on network behavior
US11122083B1 (en)2017-09-082021-09-14F5 Networks, Inc.Methods for managing network connections based on DNS data and network policies and devices thereof
US11140023B2 (en)*2017-09-192021-10-05Intel CorporationTrace network used as a configuration network
US11212210B2 (en)2017-09-212021-12-28Silver Peak Systems, Inc.Selective route exporting using source type
US10587632B1 (en)*2017-09-282020-03-10Amazon Technologies, Inc.Neural network-based malware detection
US10361859B2 (en)2017-10-062019-07-23Stealthpath, Inc.Methods for internet communication security
US10630642B2 (en)2017-10-062020-04-21Stealthpath, Inc.Methods for internet communication security
US10375019B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10397186B2 (en)2017-10-062019-08-27Stealthpath, Inc.Methods for internet communication security
US10367811B2 (en)2017-10-062019-07-30Stealthpath, Inc.Methods for internet communication security
US10374803B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US11423083B2 (en)2017-10-272022-08-23Ab Initio Technology LlcTransforming a specification into a persistent computer program
US10990975B2 (en)*2017-11-082021-04-27Paypal, Inc.Detecting malware by monitoring client-side memory stacks
US12284197B1 (en)2017-11-272025-04-22Fortinet, Inc.Reducing amounts of data ingested into a data warehouse
US10652213B2 (en)*2017-12-182020-05-12Nicira, Inc.Agent-less micro-segmentation of a network
IL256690B (en)2018-01-012022-02-01Cognyte Tech Israel LtdSystem and method for identifying pairs of related application users
US10673733B2 (en)2018-01-202020-06-02Hcl Technologies LimitedSystem for debugging a network environment
US10264003B1 (en)2018-02-072019-04-16Extrahop Networks, Inc.Adaptive network monitoring with tuneable elastic granularity
US10038611B1 (en)2018-02-082018-07-31Extrahop Networks, Inc.Personalization of alerts based on network monitoring
US10659484B2 (en)*2018-02-192020-05-19Cisco Technology, Inc.Hierarchical activation of behavioral modules on a data plane for behavioral analytics
US11962552B2 (en)*2018-02-202024-04-16Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US10637721B2 (en)2018-03-122020-04-28Silver Peak Systems, Inc.Detecting path break conditions while minimizing network overhead
US11658995B1 (en)2018-03-202023-05-23F5, Inc.Methods for dynamically mitigating network attacks and devices thereof
US10116679B1 (en)2018-05-182018-10-30Extrahop Networks, Inc.Privilege inference and monitoring based on network behavior
US10887231B2 (en)*2018-05-182021-01-05Juniper Networks, Inc.Packet fragment forwarding without reassembly
US11061885B2 (en)*2018-06-152021-07-13Intel CorporationAutonomous anomaly detection and event triggering for data series
US10817604B1 (en)2018-06-192020-10-27Architecture Technology CorporationSystems and methods for processing source codes to detect non-malicious faults
US10749890B1 (en)2018-06-192020-08-18Architecture Technology CorporationSystems and methods for improving the ranking and prioritization of attack-related events
US10785108B1 (en)2018-06-212020-09-22Wells Fargo Bank, N.A.Intelligent learning and management of a networked architecture
US11044200B1 (en)2018-07-062021-06-22F5 Networks, Inc.Methods for service stitching using a packet header and devices thereof
US10924504B2 (en)*2018-07-062021-02-16International Business Machines CorporationDual-port mirroring system for analyzing non-stationary data in a network
US10623800B2 (en)*2018-07-162020-04-14Gracenote, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
IL260986B (en)2018-08-052021-09-30Verint Systems LtdSystem and method for using a user-action log to learn to classify encrypted traffic
US10594718B1 (en)2018-08-212020-03-17Extrahop Networks, Inc.Managing incident response operations based on monitored network activity
EP3614285A1 (en)*2018-08-242020-02-26Hewlett-Packard Development Company, L.P.Active testing of access control policy
FR3086481B1 (en)*2018-09-202021-12-10Thales Sa DETECTION AND FILTERING PROCESS OF ILLEGITIMATE FLOWS IN A SATELLITE COMMUNICATION NETWORK
US10708161B2 (en)2018-09-212020-07-07Juniper Networks, Inc.Network performance monitoring using an active measurement protocol and relay mechanism
US20200106793A1 (en)*2018-10-022020-04-02Olympus Infotech, LLCMethods, systems, and computer program products for continuous cyber risk monitoring
US11023576B2 (en)*2018-11-282021-06-01International Business Machines CorporationDetecting malicious activity on a computer system
US10972508B1 (en)*2018-11-302021-04-06Juniper Networks, Inc.Generating a network security policy based on behavior detected after identification of malicious behavior
US11521067B2 (en)*2018-11-302022-12-06International Business Machines CorporationDecentralized distributed deep learning
US10965694B2 (en)*2018-12-112021-03-30Bank Of America CorporationNetwork security intrusion detection
FR3090153B1 (en)*2018-12-172022-01-07Commissariat Energie Atomique Method and system for detecting anomaly in a telecommunications network
US10908895B2 (en)*2018-12-212021-02-02Pensando Systems Inc.State-preserving upgrade of an intelligent server adapter
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US10977080B2 (en)2019-01-302021-04-13Bank Of America CorporationResource instrument for processing a real-time resource event
US11164162B2 (en)2019-01-302021-11-02Bank Of America CorporationClosed-loop real-time resource event processing
US11128654B1 (en)2019-02-042021-09-21Architecture Technology CorporationSystems and methods for unified hierarchical cybersecurity
US11568451B2 (en)*2019-03-042023-01-31Iris.TV Inc.Dual-optimization of targeted digital assets under volume and position constraints
JP7065444B2 (en)*2019-03-142022-05-12パナソニックIpマネジメント株式会社 Information processing equipment and information processing system
EP3942740A1 (en)2019-03-202022-01-26Verint Systems Ltd.System and method for de-anonymizing actions and messages on networks
US11265336B2 (en)*2019-03-282022-03-01Red Hat, Inc.Detecting anomalies in networks
US11887505B1 (en)2019-04-242024-01-30Architecture Technology CorporationSystem for deploying and monitoring network-based training exercises
WO2020223206A1 (en)*2019-04-292020-11-05Massachusetts Institute Of TechnologySuperconducting parametric amplifier neural network
US11575563B2 (en)2019-05-312023-02-07Varmour Networks, Inc.Cloud security management
US11290493B2 (en)2019-05-312022-03-29Varmour Networks, Inc.Template-driven intent-based security
US11711374B2 (en)2019-05-312023-07-25Varmour Networks, Inc.Systems and methods for understanding identity and organizational access to applications within an enterprise environment
US11310284B2 (en)2019-05-312022-04-19Varmour Networks, Inc.Validation of cloud security policies
US11290494B2 (en)*2019-05-312022-03-29Varmour Networks, Inc.Reliability prediction for cloud security policies
US11863580B2 (en)2019-05-312024-01-02Varmour Networks, Inc.Modeling application dependencies to identify operational risk
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11159387B1 (en)2019-07-232021-10-26Fannie MaeSystems and methods for visualization based on historical network traffic and future projection of infrastructure assets
US11562065B2 (en)*2019-08-222023-01-24International Business Machines CorporationData breach detection
US11201838B2 (en)*2019-09-252021-12-14Intel CorporationSystem, apparatus and method for increasing efficiency of link communications
US11558423B2 (en)2019-09-272023-01-17Stealthpath, Inc.Methods for zero trust security with high quality of service
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US11399016B2 (en)2019-11-032022-07-26Cognyte Technologies Israel Ltd.System and method for identifying exchanges of encrypted communication traffic
US11546354B2 (en)*2019-11-262023-01-03Kyndryl, Inc.Network shutdown for cyber security
TWI777156B (en)*2019-12-102022-09-11威聯通科技股份有限公司Internal network monitoring method and internal network monitoring system using the same
US11570186B2 (en)*2019-12-122023-01-31Intel CorporationSecurity reporting via message tagging
DE102019220248A1 (en)*2019-12-192021-06-24Siemens Mobility GmbH Transmission device for transmitting data
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US11182150B2 (en)2020-01-142021-11-23Pensando Systems Inc.Zero packet loss upgrade of an IO device
GB202004748D0 (en)*2020-03-302020-05-13British TelecommMethod of analysing anomalous network traffic
WO2021211911A1 (en)*2020-04-162021-10-21Blackswan Technologies Inc.Artificial intelligence cloud operating system
EP4091084B1 (en)*2020-04-282025-07-09Absolute Software CorporationEndpoint security using an action prediction model
EP4088217A4 (en)*2020-05-182023-09-06Google LLCInference methods for word or wordpiece tokenization
CN111695115B (en)*2020-05-252023-05-05武汉大学Industrial control system network attack tracing method based on communication time delay and security evaluation
CN111767198A (en)*2020-06-232020-10-13中国工商银行股份有限公司System risk prediction method and device based on classification label sequence matching
US11526553B2 (en)*2020-07-232022-12-13Vmware, Inc.Building a dynamic regular expression from sampled data
US11768933B2 (en)*2020-08-112023-09-26Saudi Arabian Oil CompanySystem and method for protecting against ransomware without the use of signatures or updates
US11799904B2 (en)*2020-12-102023-10-24Cisco Technology, Inc.Malware detection using inverse imbalance subspace searching
US11522883B2 (en)*2020-12-182022-12-06Dell Products, L.P.Creating and handling workspace indicators of compromise (IOC) based upon configuration drift
US11876817B2 (en)2020-12-232024-01-16Varmour Networks, Inc.Modeling queue-based message-oriented middleware relationships in a security system
US11818152B2 (en)2020-12-232023-11-14Varmour Networks, Inc.Modeling topic-based message-oriented middleware within a security system
US11281453B1 (en)2021-01-062022-03-22Pensando Systems, Inc.Methods and systems for a hitless rollback mechanism during software upgrade of a network appliance
US11777978B2 (en)2021-01-292023-10-03Varmour Networks, Inc.Methods and systems for accurately assessing application access risk
US12050693B2 (en)2021-01-292024-07-30Varmour Networks, Inc.System and method for attributing user behavior from multiple technical telemetry sources
US11363048B1 (en)2021-03-252022-06-14Bank Of America CorporationInformation security system and method for security threat detection in data transmission
US11363049B1 (en)2021-03-252022-06-14Bank Of America CorporationInformation security system and method for anomaly detection in data transmission
US11363050B1 (en)2021-03-252022-06-14Bank Of America CorporationInformation security system and method for incompliance detection in data transmission
US11734316B2 (en)2021-07-082023-08-22Varmour Networks, Inc.Relationship-based search in a computing environment
CN113315790B (en)*2021-07-292021-11-02湖南华菱电子商务有限公司 Intrusion traffic detection method, electronic device and storage medium
CN113313216B (en)*2021-07-302021-11-30深圳市永达电子信息股份有限公司Method and device for extracting main body of network data, electronic equipment and storage medium
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system
US12079329B2 (en)*2022-01-262024-09-03Dell Products L.P.Structured data flow identification for proactive issue detection
CN114219374B (en)*2022-02-212022-05-06济南法诺商贸有限公司Big data analysis decision system and method based on block chain
US11995658B2 (en)*2022-05-252024-05-28Dell Products L.P.Machine learning-based detection of potentially malicious behavior on an e-commerce platform
US12355786B2 (en)*2022-06-142025-07-08Microsoft Technology Licensing, LlcMachine learning approach for solving the cold start problem in stateful models
CN115567270A (en)*2022-09-212023-01-03中国工商银行股份有限公司 Service attack processing method, device, computer equipment and storage medium thereof
US12381853B2 (en)2023-01-032025-08-05Bank Of America CorporationSystem and method for protecting non-public information from malicious users
US12335303B2 (en)2023-01-032025-06-17Bank Of America CorporationSystem and method for detecting and countering malicious code
US20250147859A1 (en)*2023-11-022025-05-08Cardinalops Ltd.Inferred Events
CN117879975B (en)*2024-03-112024-05-10广州翔实信息科技有限公司Method based on 5G mobile communication network security
CN120582905B (en)*2025-07-312025-10-03湖南军安信达科技有限公司Data interaction method and system of reinforced switch and switch

Citations (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5062037A (en)*1988-10-241991-10-29Ibm Corp.Method to provide concurrent execution of distributed application programs by a host computer and an intelligent work station on an sna network
US5134691A (en)*1986-04-011992-07-28Westinghouse Electric Corp.Bidirectional communication and control network with programmable microcontroller interfacing digital ICs transmitting in serial format to controlled product
US5446680A (en)*1991-08-091995-08-29Ibm Business Machines CorporationSystem and method for obtaining network performance data
US5522070A (en)*1992-03-191996-05-28Fujitsu LimitedComputer resource distributing method and system for distributing a multiplicity of processes to a plurality of computers connected in a network
US5675797A (en)*1994-05-241997-10-07International Business Machines CorporationGoal-oriented resource allocation manager and performance index technique for servers
US5771234A (en)*1995-12-061998-06-23Industrial Technology Research InstituteMethod and system for ATM cell multiplexing under constant bit rate, variable bit rate and best-effort traffic
US5774668A (en)*1995-06-071998-06-30Microsoft CorporationSystem for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
US5790176A (en)*1992-07-081998-08-04Bell Atlantic Network Services, Inc.Media server for supplying video and multi-media data over the public switched telephone network
US5867716A (en)*1994-06-141999-02-02Hitachi, Ltd.Distributed computer system and method of generating automatic operation schedule for the same
US5975945A (en)*1997-08-291999-11-02Lucent Technologies Inc.All-purpose network interface devices using conventional plug-in protectors
US5978843A (en)*1995-12-061999-11-02Industrial Technology Research InstituteScalable architecture for media-on-demand servers
US6006264A (en)*1997-08-011999-12-21Arrowpoint Communications, Inc.Method and system for directing a flow between a client and a server
US6014700A (en)*1997-05-082000-01-11International Business Machines CorporationWorkload management in a client-server network with distributed objects
US6058434A (en)*1997-11-262000-05-02Acuity Imaging, LlcApparent network interface for and between embedded and host processors
US6067546A (en)*1997-02-182000-05-23Ameritech CorporationMethod and system for providing computer-network related information about a calling party
US6088451A (en)*1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6092218A (en)*1992-07-172000-07-18Sun Microsystems, Inc.System and method for self-referential accesses in a multiprocessor computer
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6182123B1 (en)*1988-07-152001-01-30Ibm Corp.Interactive computer network and method of operation
US6226700B1 (en)*1998-03-132001-05-01Compaq Computer CorporationComputer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices
US20010003831A1 (en)*1998-05-292001-06-14Vernon K. BolandMethod and apparatus for allocating network resources and changing the allocation based on dynamic workload changes
US6279028B1 (en)*1995-12-082001-08-21Silicon Graphics, Inc.Operating system having a mechanism for handling a group of related processes residing on separate machines
US6314463B1 (en)*1998-05-292001-11-06Webspective Software, Inc.Method and system for measuring queue length and delay
US6317775B1 (en)*1995-11-032001-11-13Cisco Technology, Inc.System for distributing load over multiple servers at an internet site
US6347398B1 (en)*1996-12-122002-02-12Microsoft CorporationAutomatic software downloading from a computer network
US6393569B1 (en)*1996-12-182002-05-21Alexander S. OrenshteynSecured system for accessing application services from a remote station
US6405246B1 (en)*1998-09-222002-06-11International Business Machines CorporationAutomatic and dynamic software code management
US6411986B1 (en)*1998-11-102002-06-25Netscaler, Inc.Internet client-server multiplexer
US6430570B1 (en)*1999-03-012002-08-06Hewlett-Packard CompanyJava application manager for embedded device
US6442599B1 (en)*1995-08-112002-08-27Lsi Logic CorporationVideo storage unit architecture
US6446109B2 (en)*1998-06-292002-09-03Sun Microsystems, Inc.Application computing environment
US6466965B1 (en)*1999-04-152002-10-15International Business Machines CorporationCentralized affinity maintenance in a workload managed client/server data processing system
US20020165947A1 (en)*2000-09-252002-11-07Crossbeam Systems, Inc.Network application apparatus
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6578066B1 (en)*1999-09-172003-06-10Alteon WebsystemsDistributed load-balancing internet servers
US6597684B1 (en)*1997-12-242003-07-22Nortel Networks Ltd.Distributed architecture and associated protocols for efficient quality of service-based route computation
US20040025044A1 (en)*2002-07-302004-02-05Day Christopher W.Intrusion detection system
US6728808B1 (en)*2000-02-072004-04-273Com CorporationMechanism for optimizing transaction retries within a system utilizing a PCI bus architecture
US6735206B1 (en)*2000-01-102004-05-11Sun Microsystems, Inc.Method and apparatus for performing a fast service lookup in cluster networking
US6816903B1 (en)*1997-05-272004-11-09Novell, Inc.Directory enabled policy management tool for intelligent traffic management
US20040225895A1 (en)*2003-05-052004-11-11Lucent Technologies Inc.Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs)
US20050076228A1 (en)*2003-10-022005-04-07Davis John M.System and method for a secure I/O interface
US20050081058A1 (en)*2003-10-092005-04-14International Business Machines CorporationVLAN router with firewall supporting multiple security layers
US20050086520A1 (en)*2003-08-142005-04-21Sarang DharmapurikarMethod and apparatus for detecting predefined signatures in packet payload using bloom filters
US20060020595A1 (en)*2004-07-262006-01-26Norton Marc AMethods and systems for multi-pattern searching
US6999952B1 (en)*2001-04-182006-02-14Cisco Technology, Inc.Linear associative memory-based hardware architecture for fault tolerant ASIC/FPGA work-around
US7013333B1 (en)*1998-12-032006-03-14British Telecommunications Public Limited CompanyNetwork management system
US7023825B1 (en)*1998-08-102006-04-04Nokia Networks OyControlling quality of service in a mobile communications system
US7062556B1 (en)*1999-11-222006-06-13Motorola, Inc.Load balancing method in a communication network
US7069293B2 (en)*1998-12-142006-06-27International Business Machines CorporationMethods, systems and computer program products for distribution of application programs to a target station on a network
US20070192863A1 (en)*2005-07-012007-08-16Harsh KapoorSystems and methods for processing data flows
US7577623B2 (en)*2006-01-182009-08-18International Business Machines CorporationMethod for controlling risk in a computer security artificial neural network expert system

Family Cites Families (52)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US723726A (en)*1902-12-061903-03-24George W PerksFountain-pen.
US4814979A (en)*1981-04-011989-03-21Teradata CorporationNetwork to transmit prioritized subtask pockets to dedicated processors
KR920006283B1 (en)1988-02-191992-08-03미쯔비시덴끼 가부시끼가이샤 Digital signal processing method
JPH0328911A (en)*1989-06-261991-02-07Mitsubishi Electric Corp microprocessor
FR2706652B1 (en)*1993-06-091995-08-18Alsthom Cge Alcatel Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device.
GB2281793A (en)1993-09-111995-03-15IbmA data processing system for providing user load levelling in a network
US5557742A (en)*1994-03-071996-09-17Haystack Labs, Inc.Method and system for detecting intrusion into and misuse of a data processing system
US5486982A (en)*1994-06-101996-01-23Hsu; WinstonModular electronic packaging for computer servers
US5740231A (en)*1994-09-161998-04-14Octel Communications CorporationNetwork-based multimedia communications and directory system and method of operation
US5621727A (en)*1994-09-161997-04-15Octel Communications CorporationSystem and method for private addressing plans using community addressing
US5878420A (en)*1995-08-311999-03-02Compuware CorporationNetwork monitoring and management system
US6185207B1 (en)*1997-06-192001-02-06International Business Machines CorporationCommunication system having a local area network adapter for selectively deleting information and method therefor
US6279113B1 (en)*1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US6370648B1 (en)*1998-12-082002-04-09Visa International Service AssociationComputer network intrusion detection
JP4501280B2 (en)*1998-12-092010-07-14インターナショナル・ビジネス・マシーンズ・コーポレーション Method and apparatus for providing network and computer system security
US6278694B1 (en)*1999-04-162001-08-21Concord Communications Inc.Collecting and reporting monitoring data from remote network probes
US6662223B1 (en)*1999-07-012003-12-09Cisco Technology, Inc.Protocol to coordinate network end points to measure network latency
US6460120B1 (en)*1999-08-272002-10-01International Business Machines CorporationNetwork processor, memory organization and methods
US6769066B1 (en)*1999-10-252004-07-27Visa International Service AssociationMethod and apparatus for training a neural network model for use in computer network intrusion detection
US7107347B1 (en)*1999-11-152006-09-12Fred CohenMethod and apparatus for network deception/emulation
US6532446B1 (en)*1999-11-242003-03-11Openwave Systems Inc.Server based speech recognition user interface for wireless devices
US6952728B1 (en)*1999-12-012005-10-04Nortel Networks LimitedProviding desired service policies to subscribers accessing internet
US6385205B1 (en)*2000-02-082002-05-07The United States Of America As Represented By The National Security AgencyFilter system for information network traffic
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US7574740B1 (en)*2000-04-282009-08-11International Business Machines CorporationMethod and system for intrusion detection in a computer network
AU2001261275A1 (en)*2000-05-052001-11-20Aprisma Management Technologies, Inc.Systems and methods for isolating faults in computer networks
US9800608B2 (en)*2000-09-252017-10-24Symantec CorporationProcessing data flows with a data flow processor
US20110231564A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US8010469B2 (en)*2000-09-252011-08-30Crossbeam Systems, Inc.Systems and methods for processing data flows
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US9525696B2 (en)*2000-09-252016-12-20Blue Coat Systems, Inc.Systems and methods for processing data flows
US20110238855A1 (en)*2000-09-252011-09-29Yevgeny KorsunskyProcessing data flows with a data flow processor
CA2443688A1 (en)*2001-04-092002-10-17Colubris Networks Inc.Authentication and encryption method and apparatus for a wireless local access network
US7774492B2 (en)*2001-07-262010-08-10Citrix Systems, Inc.System, method and computer program product to maximize server throughput while avoiding server overload by controlling the rate of establishing server-side net work connections
US20090006659A1 (en)*2001-10-192009-01-01Collins Jack MAdvanced mezzanine card for digital network data inspection
US7539726B1 (en)*2002-07-162009-05-26Sonicwall, Inc.Message testing
US7913303B1 (en)*2003-01-212011-03-22International Business Machines CorporationMethod and system for dynamically protecting a computer system from attack
US7463590B2 (en)*2003-07-252008-12-09Reflex Security, Inc.System and method for threat detection and response
JP2005184792A (en)*2003-11-272005-07-07Nec Corp BAND CONTROL DEVICE, BAND CONTROL METHOD, AND BAND CONTROL PROGRAM
US7450568B2 (en)*2003-12-052008-11-11Cisco Technology, Inc.System and method for managing a VolP network
US7296018B2 (en)*2004-01-022007-11-13International Business Machines CorporationResource-light method and apparatus for outlier detection
US7179096B2 (en)*2004-07-302007-02-20Finisar CorporationFirst protocol to second protocol adapter
US7392323B2 (en)*2004-11-162008-06-24Seiko Epson CorporationMethod and apparatus for tunneling data using a single simulated stateful TCP connection
US7979368B2 (en)*2005-07-012011-07-12Crossbeam Systems, Inc.Systems and methods for processing data flows
US20080229415A1 (en)*2005-07-012008-09-18Harsh KapoorSystems and methods for processing data flows
US7489690B2 (en)*2005-08-122009-02-10Cellco PartnershipIntegrated packet latency aware QoS scheduling algorithm using proportional fairness and weighted fair queuing for wireless integrated multimedia packet services
EP2442525A1 (en)2005-12-132012-04-18Crossbeam Systems, Inc.Systems and methods for processing data flows
US20070174429A1 (en)*2006-01-242007-07-26Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
WO2008130753A2 (en)*2007-04-182008-10-30The Nielsen CompanyMethods and apparatus to facilitate sales estimates

Patent Citations (56)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5134691A (en)*1986-04-011992-07-28Westinghouse Electric Corp.Bidirectional communication and control network with programmable microcontroller interfacing digital ICs transmitting in serial format to controlled product
US6182123B1 (en)*1988-07-152001-01-30Ibm Corp.Interactive computer network and method of operation
US5062037A (en)*1988-10-241991-10-29Ibm Corp.Method to provide concurrent execution of distributed application programs by a host computer and an intelligent work station on an sna network
US5446680A (en)*1991-08-091995-08-29Ibm Business Machines CorporationSystem and method for obtaining network performance data
US5522070A (en)*1992-03-191996-05-28Fujitsu LimitedComputer resource distributing method and system for distributing a multiplicity of processes to a plurality of computers connected in a network
US5790176A (en)*1992-07-081998-08-04Bell Atlantic Network Services, Inc.Media server for supplying video and multi-media data over the public switched telephone network
US6092218A (en)*1992-07-172000-07-18Sun Microsystems, Inc.System and method for self-referential accesses in a multiprocessor computer
US5675797A (en)*1994-05-241997-10-07International Business Machines CorporationGoal-oriented resource allocation manager and performance index technique for servers
US5867716A (en)*1994-06-141999-02-02Hitachi, Ltd.Distributed computer system and method of generating automatic operation schedule for the same
US5774668A (en)*1995-06-071998-06-30Microsoft CorporationSystem for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
US6442599B1 (en)*1995-08-112002-08-27Lsi Logic CorporationVideo storage unit architecture
US6317775B1 (en)*1995-11-032001-11-13Cisco Technology, Inc.System for distributing load over multiple servers at an internet site
US5771234A (en)*1995-12-061998-06-23Industrial Technology Research InstituteMethod and system for ATM cell multiplexing under constant bit rate, variable bit rate and best-effort traffic
US5978843A (en)*1995-12-061999-11-02Industrial Technology Research InstituteScalable architecture for media-on-demand servers
US6279028B1 (en)*1995-12-082001-08-21Silicon Graphics, Inc.Operating system having a mechanism for handling a group of related processes residing on separate machines
US6088451A (en)*1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6347398B1 (en)*1996-12-122002-02-12Microsoft CorporationAutomatic software downloading from a computer network
US6393569B1 (en)*1996-12-182002-05-21Alexander S. OrenshteynSecured system for accessing application services from a remote station
US6067546A (en)*1997-02-182000-05-23Ameritech CorporationMethod and system for providing computer-network related information about a calling party
US6014700A (en)*1997-05-082000-01-11International Business Machines CorporationWorkload management in a client-server network with distributed objects
US6816903B1 (en)*1997-05-272004-11-09Novell, Inc.Directory enabled policy management tool for intelligent traffic management
US6006264A (en)*1997-08-011999-12-21Arrowpoint Communications, Inc.Method and system for directing a flow between a client and a server
US5975945A (en)*1997-08-291999-11-02Lucent Technologies Inc.All-purpose network interface devices using conventional plug-in protectors
US6058434A (en)*1997-11-262000-05-02Acuity Imaging, LlcApparent network interface for and between embedded and host processors
US6597684B1 (en)*1997-12-242003-07-22Nortel Networks Ltd.Distributed architecture and associated protocols for efficient quality of service-based route computation
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6226700B1 (en)*1998-03-132001-05-01Compaq Computer CorporationComputer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices
US6314463B1 (en)*1998-05-292001-11-06Webspective Software, Inc.Method and system for measuring queue length and delay
US20010003831A1 (en)*1998-05-292001-06-14Vernon K. BolandMethod and apparatus for allocating network resources and changing the allocation based on dynamic workload changes
US6446109B2 (en)*1998-06-292002-09-03Sun Microsystems, Inc.Application computing environment
US7023825B1 (en)*1998-08-102006-04-04Nokia Networks OyControlling quality of service in a mobile communications system
US6405246B1 (en)*1998-09-222002-06-11International Business Machines CorporationAutomatic and dynamic software code management
US6411986B1 (en)*1998-11-102002-06-25Netscaler, Inc.Internet client-server multiplexer
US7013333B1 (en)*1998-12-032006-03-14British Telecommunications Public Limited CompanyNetwork management system
US7069293B2 (en)*1998-12-142006-06-27International Business Machines CorporationMethods, systems and computer program products for distribution of application programs to a target station on a network
US6430570B1 (en)*1999-03-012002-08-06Hewlett-Packard CompanyJava application manager for embedded device
US6466965B1 (en)*1999-04-152002-10-15International Business Machines CorporationCentralized affinity maintenance in a workload managed client/server data processing system
US6578066B1 (en)*1999-09-172003-06-10Alteon WebsystemsDistributed load-balancing internet servers
US7062556B1 (en)*1999-11-222006-06-13Motorola, Inc.Load balancing method in a communication network
US6735206B1 (en)*2000-01-102004-05-11Sun Microsystems, Inc.Method and apparatus for performing a fast service lookup in cluster networking
US6728808B1 (en)*2000-02-072004-04-273Com CorporationMechanism for optimizing transaction retries within a system utilizing a PCI bus architecture
US20080162390A1 (en)*2000-09-252008-07-03Harsh KapoorSystems and methods for processing data flows
US20020165947A1 (en)*2000-09-252002-11-07Crossbeam Systems, Inc.Network application apparatus
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6999952B1 (en)*2001-04-182006-02-14Cisco Technology, Inc.Linear associative memory-based hardware architecture for fault tolerant ASIC/FPGA work-around
US20040025044A1 (en)*2002-07-302004-02-05Day Christopher W.Intrusion detection system
US20040225895A1 (en)*2003-05-052004-11-11Lucent Technologies Inc.Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs)
US20050086520A1 (en)*2003-08-142005-04-21Sarang DharmapurikarMethod and apparatus for detecting predefined signatures in packet payload using bloom filters
US20050076228A1 (en)*2003-10-022005-04-07Davis John M.System and method for a secure I/O interface
US20050081058A1 (en)*2003-10-092005-04-14International Business Machines CorporationVLAN router with firewall supporting multiple security layers
US20060020595A1 (en)*2004-07-262006-01-26Norton Marc AMethods and systems for multi-pattern searching
US20070192863A1 (en)*2005-07-012007-08-16Harsh KapoorSystems and methods for processing data flows
US20080133518A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080133517A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US7577623B2 (en)*2006-01-182009-08-18International Business Machines CorporationMethod for controlling risk in a computer security artificial neural network expert system

Cited By (328)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US20060143499A1 (en)*2000-09-252006-06-29Crossbeam Systems, Inc.Flow scheduling for network application
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US8135657B2 (en)2000-09-252012-03-13Crossbeam Systems, Inc.Systems and methods for processing data flows
US20110231513A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyApplication distribution control network apparatus
US20110238783A1 (en)*2000-09-252011-09-29Yevgeny KorsunskySource-based data flow processing network apparatus
US9244739B2 (en)2000-09-252016-01-26Blue Coat Systems, Inc.Applications processing in a network apparatus
US8046465B2 (en)2000-09-252011-10-25Crossbeam Systems, Inc.Flow scheduling for network application apparatus
US7836443B2 (en)2000-09-252010-11-16Crossbeam Systems, Inc.Network application apparatus
US8402540B2 (en)2000-09-252013-03-19Crossbeam Systems, Inc.Systems and methods for processing data flows
US20110238839A1 (en)*2000-09-252011-09-29Yevgeny KorsunskyNetwork intrusion detection apparatus
US9800608B2 (en)2000-09-252017-10-24Symantec CorporationProcessing data flows with a data flow processor
US9525696B2 (en)2000-09-252016-12-20Blue Coat Systems, Inc.Systems and methods for processing data flows
US20110214157A1 (en)*2000-09-252011-09-01Yevgeny KorsunskySecuring a network with data flow processing
US20080162390A1 (en)*2000-09-252008-07-03Harsh KapoorSystems and methods for processing data flows
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US20060035563A1 (en)*2004-07-022006-02-16StrasbaughMethod, apparatus and system for use in processing wafers
US20080133517A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080133518A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20070192863A1 (en)*2005-07-012007-08-16Harsh KapoorSystems and methods for processing data flows
US20070168715A1 (en)*2005-12-082007-07-19Herz William SEmergency data preservation services
US9122643B2 (en)2005-12-082015-09-01Nvidia CorporationEvent trigger based data backup services
US8402322B2 (en)*2005-12-082013-03-19Nvidia CorporationEmergency data preservation services
US20070136541A1 (en)*2005-12-082007-06-14Herz William SData backup services
US20090319677A1 (en)*2006-08-142009-12-24Deutsche Borse AgSystem and method for sharing information and causing an action based on that information
US8725123B2 (en)2008-06-052014-05-13Headwater Partners I LlcCommunications device with secure data path processing agents
US8924469B2 (en)2008-06-052014-12-30Headwater Partners I LlcEnterprise access control and accounting allocation for access networks
US8001243B2 (en)*2008-11-072011-08-16Oracle America, Inc.Distributed denial of service deterrence using outbound packet rewriting
US20100121903A1 (en)*2008-11-072010-05-13Sun Microsystems, Inc.Distributed denial of service deterrence using outbound packet rewriting
US9386121B2 (en)2009-01-282016-07-05Headwater Partners I LlcMethod for providing an adaptive wireless ambient service to a mobile device
US9578182B2 (en)2009-01-282017-02-21Headwater Partners I LlcMobile device and service management
CN102365633A (en)*2009-01-282012-02-29海德沃特合作I有限公司 Service profile management for intermediate networked devices using user preferences, adaptive policies, net neutrality, and user privacy
US12432130B2 (en)2009-01-282025-09-30Headwater Research LlcFlow tagging for service policy implementation
US12401984B2 (en)2009-01-282025-08-26Headwater Research LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US12389218B2 (en)2009-01-282025-08-12Headwater Research LlcService selection set publishing to device agent with on-device service selection
US12389217B2 (en)2009-01-282025-08-12Headwater Research LlcDevice assisted services install
US8229812B2 (en)2009-01-282012-07-24Headwater Partners I, LlcOpen transaction central billing system
US8250207B2 (en)2009-01-282012-08-21Headwater Partners I, LlcNetwork based ambient services
US8270952B2 (en)2009-01-282012-09-18Headwater Partners I LlcOpen development system for access service providers
US8270310B2 (en)2009-01-282012-09-18Headwater Partners I, LlcVerifiable device assisted service policy implementation
US8275830B2 (en)2009-01-282012-09-25Headwater Partners I LlcDevice assisted CDR creation, aggregation, mediation and billing
US12388810B2 (en)2009-01-282025-08-12Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US8321526B2 (en)2009-01-282012-11-27Headwater Partners I, LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8326958B1 (en)2009-01-282012-12-04Headwater Partners I, LlcService activation tracking system
US8331901B2 (en)2009-01-282012-12-11Headwater Partners I, LlcDevice assisted ambient services
US8340634B2 (en)2009-01-282012-12-25Headwater Partners I, LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US8346225B2 (en)2009-01-282013-01-01Headwater Partners I, LlcQuality of service for device assisted services
US8351898B2 (en)2009-01-282013-01-08Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8355337B2 (en)2009-01-282013-01-15Headwater Partners I LlcNetwork based service profile management with user preference, adaptive policy, network neutrality, and user privacy
US8385916B2 (en)2009-01-282013-02-26Headwater Partners I LlcAutomated device provisioning and activation
US8391834B2 (en)2009-01-282013-03-05Headwater Partners I LlcSecurity techniques for device assisted services
US12309024B2 (en)2009-01-282025-05-20Headwater Research LlcQuality of service for device assisted services
US8396458B2 (en)2009-01-282013-03-12Headwater Partners I LlcAutomated device provisioning and activation
KR20110110832A (en)*2009-01-282011-10-07헤드워터 파트너스 아이 엘엘씨 Network tools for analysis, design, testing and production of services
US8023425B2 (en)2009-01-282011-09-20Headwater Partners IVerifiable service billing for intermediate networking devices
US8402111B2 (en)2009-01-282013-03-19Headwater Partners I, LlcDevice assisted services install
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
US8406733B2 (en)2009-01-282013-03-26Headwater Partners I LlcAutomated device provisioning and activation
US12200786B2 (en)2009-01-282025-01-14Headwater Research LlcEnterprise access control and accounting allocation for access networks
US8437271B2 (en)2009-01-282013-05-07Headwater Partners I LlcVerifiable and accurate service usage monitoring for intermediate networking devices
US8441989B2 (en)2009-01-282013-05-14Headwater Partners I LlcOpen transaction central billing system
US8467312B2 (en)2009-01-282013-06-18Headwater Partners I LlcVerifiable and accurate service usage monitoring for intermediate networking devices
US8478667B2 (en)2009-01-282013-07-02Headwater Partners I LlcAutomated device provisioning and activation
US8516552B2 (en)2009-01-282013-08-20Headwater Partners I LlcVerifiable service policy implementation for intermediate networking devices
US8527630B2 (en)2009-01-282013-09-03Headwater Partners I LlcAdaptive ambient services
US8531986B2 (en)2009-01-282013-09-10Headwater Partners I LlcNetwork tools for analysis, design, testing, and production of services
US12184700B2 (en)2009-01-282024-12-31Headwater Research LlcAutomated device provisioning and activation
US8548428B2 (en)2009-01-282013-10-01Headwater Partners I LlcDevice group partitions and settlement platform
US8547872B2 (en)2009-01-282013-10-01Headwater Partners I LlcVerifiable and accurate service usage monitoring for intermediate networking devices
US8570908B2 (en)2009-01-282013-10-29Headwater Partners I LlcAutomated device provisioning and activation
US8583781B2 (en)2009-01-282013-11-12Headwater Partners I LlcSimplified service network architecture
US8588110B2 (en)2009-01-282013-11-19Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8589541B2 (en)2009-01-282013-11-19Headwater Partners I LlcDevice-assisted services for protecting network capacity
US12166596B2 (en)2009-01-282024-12-10Disney Enterprises, Inc.Device-assisted services for protecting network capacity
US8626115B2 (en)2009-01-282014-01-07Headwater Partners I LlcWireless network service interfaces
US8630611B2 (en)2009-01-282014-01-14Headwater Partners I LlcAutomated device provisioning and activation
US8630630B2 (en)2009-01-282014-01-14Headwater Partners I LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US8630192B2 (en)2009-01-282014-01-14Headwater Partners I LlcVerifiable and accurate service usage monitoring for intermediate networking devices
US8630617B2 (en)2009-01-282014-01-14Headwater Partners I LlcDevice group partitions and settlement platform
US8631102B2 (en)2009-01-282014-01-14Headwater Partners I LlcAutomated device provisioning and activation
US8634805B2 (en)2009-01-282014-01-21Headwater Partners I LlcDevice assisted CDR creation aggregation, mediation and billing
US8635335B2 (en)2009-01-282014-01-21Headwater Partners I LlcSystem and method for wireless network offloading
US8635678B2 (en)2009-01-282014-01-21Headwater Partners I LlcAutomated device provisioning and activation
US8634821B2 (en)2009-01-282014-01-21Headwater Partners I LlcDevice assisted services install
US8639935B2 (en)2009-01-282014-01-28Headwater Partners I LlcAutomated device provisioning and activation
US8639811B2 (en)2009-01-282014-01-28Headwater Partners I LlcAutomated device provisioning and activation
US8640198B2 (en)2009-01-282014-01-28Headwater Partners I LlcAutomated device provisioning and activation
US8667571B2 (en)2009-01-282014-03-04Headwater Partners I LlcAutomated device provisioning and activation
US8666364B2 (en)2009-01-282014-03-04Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8675507B2 (en)2009-01-282014-03-18Headwater Partners I LlcService profile management with user preference, adaptive policy, network neutrality and user privacy for intermediate networking devices
US8688099B2 (en)2009-01-282014-04-01Headwater Partners I LlcOpen development system for access service providers
US8695073B2 (en)2009-01-282014-04-08Headwater Partners I LlcAutomated device provisioning and activation
US8713630B2 (en)2009-01-282014-04-29Headwater Partners I LlcVerifiable service policy implementation for intermediate networking devices
US8724554B2 (en)2009-01-282014-05-13Headwater Partners I LlcOpen transaction central billing system
US12143909B2 (en)2009-01-282024-11-12Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US8737957B2 (en)2009-01-282014-05-27Headwater Partners I LlcAutomated device provisioning and activation
US8745220B2 (en)2009-01-282014-06-03Headwater Partners I LlcSystem and method for providing user notifications
US8745191B2 (en)2009-01-282014-06-03Headwater Partners I LlcSystem and method for providing user notifications
US8788661B2 (en)2009-01-282014-07-22Headwater Partners I LlcDevice assisted CDR creation, aggregation, mediation and billing
US8793758B2 (en)2009-01-282014-07-29Headwater Partners I LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US8799451B2 (en)2009-01-282014-08-05Headwater Partners I LlcVerifiable service policy implementation for intermediate networking devices
US8797908B2 (en)2009-01-282014-08-05Headwater Partners I LlcAutomated device provisioning and activation
US12137004B2 (en)2009-01-282024-11-05Headwater Research LlcDevice group partitions and settlement platform
US8839387B2 (en)2009-01-282014-09-16Headwater Partners I LlcRoaming services network and overlay networks
US8839388B2 (en)2009-01-282014-09-16Headwater Partners I LlcAutomated device provisioning and activation
US8868455B2 (en)2009-01-282014-10-21Headwater Partners I LlcAdaptive ambient services
US12101434B2 (en)2009-01-282024-09-24Headwater Research LlcDevice assisted CDR creation, aggregation, mediation and billing
US8886162B2 (en)2009-01-282014-11-11Headwater Partners I LlcRestricting end-user device communications over a wireless access network associated with a cost
US8893009B2 (en)2009-01-282014-11-18Headwater Partners I LlcEnd user device that secures an association of application to service policy with an application certificate check
US8897744B2 (en)2009-01-282014-11-25Headwater Partners I LlcDevice assisted ambient services
US8898079B2 (en)2009-01-282014-11-25Headwater Partners I LlcNetwork based ambient services
US8898293B2 (en)2009-01-282014-11-25Headwater Partners I LlcService offer set publishing to device agent with on-device service selection
US8897743B2 (en)2009-01-282014-11-25Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8903452B2 (en)2009-01-282014-12-02Headwater Partners I LlcDevice assisted ambient services
US8924543B2 (en)2009-01-282014-12-30Headwater Partners I LlcService design center for device assisted services
US11985155B2 (en)2009-01-282024-05-14Headwater Research LlcCommunications device with secure data path processing agents
US11973804B2 (en)2009-01-282024-04-30Headwater Research LlcNetwork service plan design
US8924549B2 (en)2009-01-282014-12-30Headwater Partners I LlcNetwork based ambient services
US8948025B2 (en)2009-01-282015-02-03Headwater Partners I LlcRemotely configurable device agent for packet routing
US11966464B2 (en)2009-01-282024-04-23Headwater Research LlcSecurity techniques for device assisted services
US9014026B2 (en)2009-01-282015-04-21Headwater Partners I LlcNetwork based service profile management with user preference, adaptive policy, network neutrality, and user privacy
US9026079B2 (en)2009-01-282015-05-05Headwater Partners I LlcWireless network service interfaces
US9037127B2 (en)2009-01-282015-05-19Headwater Partners I LlcDevice agent for remote user configuration of wireless network access
US11968234B2 (en)2009-01-282024-04-23Headwater Research LlcWireless network service interfaces
US9094311B2 (en)2009-01-282015-07-28Headwater Partners I, LlcTechniques for attribution of mobile device data traffic to initiating end-user application
US11923995B2 (en)2009-01-282024-03-05Headwater Research LlcDevice-assisted services for protecting network capacity
US9137739B2 (en)2009-01-282015-09-15Headwater Partners I LlcNetwork based service policy implementation with network neutrality and user privacy
US9137701B2 (en)2009-01-282015-09-15Headwater Partners I LlcWireless end-user device with differentiated network access for background and foreground device applications
US9143976B2 (en)2009-01-282015-09-22Headwater Partners I LlcWireless end-user device with differentiated network access and access status for background and foreground device applications
US11757942B2 (en)2009-01-282023-09-12Headwater Research LlcAutomated device provisioning and activation
US9154428B2 (en)2009-01-282015-10-06Headwater Partners I LlcWireless end-user device with differentiated network access selectively applied to different applications
US9173104B2 (en)2009-01-282015-10-27Headwater Partners I LlcMobile device with device agents to detect a disallowed access to a requested mobile data service and guide a multi-carrier selection and activation sequence
US9179316B2 (en)2009-01-282015-11-03Headwater Partners I LlcMobile device with user controls and policy agent to control application access to device location data
US9179359B2 (en)2009-01-282015-11-03Headwater Partners I LlcWireless end-user device with differentiated network access status for different device applications
US9572019B2 (en)2009-01-282017-02-14Headwater Partners LLCService selection set published to device agent with on-device service selection
US9179308B2 (en)2009-01-282015-11-03Headwater Partners I LlcNetwork tools for analysis, design, testing, and production of services
US9198042B2 (en)2009-01-282015-11-24Headwater Partners I LlcSecurity techniques for device assisted services
US9198076B2 (en)2009-01-282015-11-24Headwater Partners I LlcWireless end-user device with power-control-state-based wireless network access policy for background applications
US9198074B2 (en)2009-01-282015-11-24Headwater Partners I LlcWireless end-user device with differential traffic control policy list and applying foreground classification to roaming wireless data service
US9198075B2 (en)2009-01-282015-11-24Headwater Partners I LlcWireless end-user device with differential traffic control policy list applicable to one of several wireless modems
US9198117B2 (en)2009-01-282015-11-24Headwater Partners I LlcNetwork system with common secure wireless message service serving multiple applications on multiple wireless devices
US9204282B2 (en)2009-01-282015-12-01Headwater Partners I LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US9204374B2 (en)2009-01-282015-12-01Headwater Partners I LlcMulticarrier over-the-air cellular network activation server
US11757943B2 (en)2009-01-282023-09-12Headwater Research LlcAutomated device provisioning and activation
US9215613B2 (en)2009-01-282015-12-15Headwater Partners I LlcWireless end-user device with differential traffic control policy list having limited user control
US9215159B2 (en)2009-01-282015-12-15Headwater Partners I LlcData usage monitoring for media data services used by applications
AU2010208488B2 (en)*2009-01-282015-12-17Headwater Research LlcService profile management with user preference, adaptive policy, network neutrality and user privacy for intermediate networking devices
US9220027B1 (en)2009-01-282015-12-22Headwater Partners I LlcWireless end-user device with policy-based controls for WWAN network usage and modem state changes requested by specific applications
US9225797B2 (en)2009-01-282015-12-29Headwater Partners I LlcSystem for providing an adaptive wireless ambient service to a mobile device
US9232403B2 (en)2009-01-282016-01-05Headwater Partners I LlcMobile device with common secure wireless message service serving multiple applications
US9247450B2 (en)2009-01-282016-01-26Headwater Partners I LlcQuality of service for device assisted services
WO2010088100A1 (en)*2009-01-282010-08-05Headwater Partners I LlcService profile management with user preference, adaptive policy, network neutrality and user privacy for intermediate networking devices
US9253663B2 (en)2009-01-282016-02-02Headwater Partners I LlcControlling mobile device communications on a roaming network based on device state
US9258735B2 (en)2009-01-282016-02-09Headwater Partners I LlcDevice-assisted services for protecting network capacity
US9271184B2 (en)2009-01-282016-02-23Headwater Partners I LlcWireless end-user device with per-application data limit and traffic control policy list limiting background application traffic
US9270559B2 (en)2009-01-282016-02-23Headwater Partners I LlcService policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US9565543B2 (en)2009-01-282017-02-07Headwater Partners I LlcDevice group partitions and settlement platform
US9277445B2 (en)2009-01-282016-03-01Headwater Partners I LlcWireless end-user device with differential traffic control policy list and applying foreground classification to wireless data service
US11750477B2 (en)2009-01-282023-09-05Headwater Research LlcAdaptive ambient services
US11665186B2 (en)2009-01-282023-05-30Headwater Research LlcCommunications device with secure data path processing agents
US9319913B2 (en)2009-01-282016-04-19Headwater Partners I LlcWireless end-user device with secure network-provided differential traffic control policy list
US9351193B2 (en)2009-01-282016-05-24Headwater Partners I LlcIntermediate networking devices
US11665592B2 (en)2009-01-282023-05-30Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US9386165B2 (en)2009-01-282016-07-05Headwater Partners I LlcSystem and method for providing user notifications
WO2010088096A1 (en)*2009-01-282010-08-05Headwater Partners I LlcVerifiable and accurate service usage monitoring for intermediate networking devices
US9392462B2 (en)2009-01-282016-07-12Headwater Partners I LlcMobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
KR101646810B1 (en)2009-01-282016-08-08헤드워터 파트너스 아이 엘엘씨Network tools for analysis, design, testing, and production of services
US11589216B2 (en)2009-01-282023-02-21Headwater Research LlcService selection set publishing to device agent with on-device service selection
US9491564B1 (en)2009-01-282016-11-08Headwater Partners I LlcMobile device and method with secure network messaging for authorized components
US9491199B2 (en)2009-01-282016-11-08Headwater Partners I LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US9521578B2 (en)2009-01-282016-12-13Headwater Partners I LlcWireless end-user device with application program interface to allow applications to access application-specific aspects of a wireless network access policy
WO2010088101A1 (en)*2009-01-282010-08-05Headwater Partners I LlcSimplified service network architecture
US9532261B2 (en)2009-01-282016-12-27Headwater Partners I LlcSystem and method for wireless network offloading
US9532161B2 (en)2009-01-282016-12-27Headwater Partners I LlcWireless device with application data flow tagging and network stack-implemented network access policy
US9544397B2 (en)2009-01-282017-01-10Headwater Partners I LlcProxy server for providing an adaptive wireless ambient service to a mobile device
US9557889B2 (en)2009-01-282017-01-31Headwater Partners I LlcService plan design, user interfaces, application programming interfaces, and device management
US9565707B2 (en)2009-01-282017-02-07Headwater Partners I LlcWireless end-user device with wireless data attribution to multiple personas
US9277433B2 (en)2009-01-282016-03-01Headwater Partners I LlcWireless end-user device with policy-based aggregation of network activity requested by applications
CN102365554A (en)*2009-01-282012-02-29海德沃特合作I有限公司 Network-based service policy implementation with net neutrality and user privacy
US9179315B2 (en)2009-01-282015-11-03Headwater Partners I LlcMobile device with data service monitoring, categorization, and display for different applications and networks
US9591474B2 (en)2009-01-282017-03-07Headwater Partners I LlcAdapting network policies based on device service processor configuration
US9609544B2 (en)2009-01-282017-03-28Headwater Research LlcDevice-assisted services for protecting network capacity
US9609459B2 (en)2009-01-282017-03-28Headwater Research LlcNetwork tools for analysis, design, testing, and production of services
US11582593B2 (en)2009-01-282023-02-14Head Water Research LlcAdapting network policies based on device service processor configuration
US9615192B2 (en)2009-01-282017-04-04Headwater Research LlcMessage link server with plural message delivery triggers
US11570309B2 (en)2009-01-282023-01-31Headwater Research LlcService design center for device assisted services
US9641957B2 (en)2009-01-282017-05-02Headwater Research LlcAutomated device provisioning and activation
US9647918B2 (en)2009-01-282017-05-09Headwater Research LlcMobile device and method attributing media services network usage to requesting application
US9674731B2 (en)2009-01-282017-06-06Headwater Research LlcWireless device applying different background data traffic policies to different device applications
US9705771B2 (en)2009-01-282017-07-11Headwater Partners I LlcAttribution of mobile device data traffic to end-user application based on socket flows
US9706061B2 (en)2009-01-282017-07-11Headwater Partners I LlcService design center for device assisted services
US11563592B2 (en)2009-01-282023-01-24Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9749899B2 (en)2009-01-282017-08-29Headwater Research LlcWireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications
US9749898B2 (en)2009-01-282017-08-29Headwater Research LlcWireless end-user device with differential traffic control policy list applicable to one of several wireless modems
US9755842B2 (en)2009-01-282017-09-05Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9769207B2 (en)2009-01-282017-09-19Headwater Research LlcWireless network service interfaces
US20100188994A1 (en)*2009-01-282010-07-29Gregory G. RaleighVerifiable service billing for intermediate networking devices
US9819808B2 (en)2009-01-282017-11-14Headwater Research LlcHierarchical service policies for creating service usage data records for a wireless end-user device
US11538106B2 (en)2009-01-282022-12-27Headwater Research LlcWireless end-user device providing ambient or sponsored services
US9858559B2 (en)2009-01-282018-01-02Headwater Research LlcNetwork service plan design
US9866642B2 (en)2009-01-282018-01-09Headwater Research LlcWireless end-user device with wireless modem power state control policy for background applications
US9942796B2 (en)2009-01-282018-04-10Headwater Research LlcQuality of service for device assisted services
US9955332B2 (en)2009-01-282018-04-24Headwater Research LlcMethod for child wireless device activation to subscriber account of a master wireless device
US9954975B2 (en)2009-01-282018-04-24Headwater Research LlcEnhanced curfew and protection associated with a device group
US9973930B2 (en)2009-01-282018-05-15Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US9980146B2 (en)2009-01-282018-05-22Headwater Research LlcCommunications device with secure data path processing agents
US10028144B2 (en)2009-01-282018-07-17Headwater Research LlcSecurity techniques for device assisted services
US10057141B2 (en)2009-01-282018-08-21Headwater Research LlcProxy system and method for adaptive ambient services
US10057775B2 (en)2009-01-282018-08-21Headwater Research LlcVirtualized policy and charging system
US10064033B2 (en)2009-01-282018-08-28Headwater Research LlcDevice group partitions and settlement platform
US10064055B2 (en)2009-01-282018-08-28Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US10070305B2 (en)2009-01-282018-09-04Headwater Research LlcDevice assisted services install
US11533642B2 (en)2009-01-282022-12-20Headwater Research LlcDevice group partitions and settlement platform
US10080250B2 (en)2009-01-282018-09-18Headwater Research LlcEnterprise access control and accounting allocation for access networks
US11516301B2 (en)2009-01-282022-11-29Headwater Research LlcEnhanced curfew and protection associated with a device group
US10165447B2 (en)2009-01-282018-12-25Headwater Research LlcNetwork service plan design
US10171681B2 (en)2009-01-282019-01-01Headwater Research LlcService design center for device assisted services
US10171988B2 (en)2009-01-282019-01-01Headwater Research LlcAdapting network policies based on device service processor configuration
US11494837B2 (en)2009-01-282022-11-08Headwater Research LlcVirtualized policy and charging system
US10171990B2 (en)2009-01-282019-01-01Headwater Research LlcService selection set publishing to device agent with on-device service selection
US10200541B2 (en)2009-01-282019-02-05Headwater Research LlcWireless end-user device with divided user space/kernel space traffic policy system
US10237146B2 (en)2009-01-282019-03-19Headwater Research LlcAdaptive ambient services
US10237757B2 (en)2009-01-282019-03-19Headwater Research LlcSystem and method for wireless network offloading
US10237773B2 (en)2009-01-282019-03-19Headwater Research LlcDevice-assisted services for protecting network capacity
US10248996B2 (en)2009-01-282019-04-02Headwater Research LlcMethod for operating a wireless end-user device mobile payment agent
US10264138B2 (en)2009-01-282019-04-16Headwater Research LlcMobile device and service management
US10320990B2 (en)2009-01-282019-06-11Headwater Research LlcDevice assisted CDR creation, aggregation, mediation and billing
US10321320B2 (en)2009-01-282019-06-11Headwater Research LlcWireless network buffered message system
US10326675B2 (en)2009-01-282019-06-18Headwater Research LlcFlow tagging for service policy implementation
US10326800B2 (en)2009-01-282019-06-18Headwater Research LlcWireless network service interfaces
US11477246B2 (en)2009-01-282022-10-18Headwater Research LlcNetwork service plan design
US11425580B2 (en)2009-01-282022-08-23Headwater Research LlcSystem and method for wireless network offloading
US10462627B2 (en)2009-01-282019-10-29Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US10492102B2 (en)2009-01-282019-11-26Headwater Research LlcIntermediate networking devices
US10536983B2 (en)2009-01-282020-01-14Headwater Research LlcEnterprise access control and accounting allocation for access networks
US10582375B2 (en)2009-01-282020-03-03Headwater Research LlcDevice assisted services install
US11412366B2 (en)2009-01-282022-08-09Headwater Research LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US11405429B2 (en)2009-01-282022-08-02Headwater Research LlcSecurity techniques for device assisted services
US10681179B2 (en)2009-01-282020-06-09Headwater Research LlcEnhanced curfew and protection associated with a device group
US10694385B2 (en)2009-01-282020-06-23Headwater Research LlcSecurity techniques for device assisted services
US10715342B2 (en)2009-01-282020-07-14Headwater Research LlcManaging service user discovery and service launch object placement on a device
US10716006B2 (en)2009-01-282020-07-14Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US10749700B2 (en)2009-01-282020-08-18Headwater Research LlcDevice-assisted services for protecting network capacity
US11405224B2 (en)2009-01-282022-08-02Headwater Research LlcDevice-assisted services for protecting network capacity
US10771980B2 (en)2009-01-282020-09-08Headwater Research LlcCommunications device with secure data path processing agents
US10779177B2 (en)2009-01-282020-09-15Headwater Research LlcDevice group partitions and settlement platform
US10783581B2 (en)2009-01-282020-09-22Headwater Research LlcWireless end-user device providing ambient or sponsored services
US10791471B2 (en)2009-01-282020-09-29Headwater Research LlcSystem and method for wireless network offloading
US10798558B2 (en)2009-01-282020-10-06Headwater Research LlcAdapting network policies based on device service processor configuration
US10798252B2 (en)2009-01-282020-10-06Headwater Research LlcSystem and method for providing user notifications
US10798254B2 (en)2009-01-282020-10-06Headwater Research LlcService design center for device assisted services
US10803518B2 (en)2009-01-282020-10-13Headwater Research LlcVirtualized policy and charging system
US10834577B2 (en)2009-01-282020-11-10Headwater Research LlcService offer set publishing to device agent with on-device service selection
US11363496B2 (en)2009-01-282022-06-14Headwater Research LlcIntermediate networking devices
US10841839B2 (en)2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US10848330B2 (en)2009-01-282020-11-24Headwater Research LlcDevice-assisted services for protecting network capacity
US10855559B2 (en)2009-01-282020-12-01Headwater Research LlcAdaptive ambient services
US10869199B2 (en)2009-01-282020-12-15Headwater Research LlcNetwork service plan design
US11337059B2 (en)2009-01-282022-05-17Headwater Research LlcDevice assisted services install
US10985977B2 (en)2009-01-282021-04-20Headwater Research LlcQuality of service for device assisted services
US11039020B2 (en)2009-01-282021-06-15Headwater Research LlcMobile device and service management
US11096055B2 (en)2009-01-282021-08-17Headwater Research LlcAutomated device provisioning and activation
US11134102B2 (en)2009-01-282021-09-28Headwater Research LlcVerifiable device assisted service usage monitoring with reporting, synchronization, and notification
US11190545B2 (en)2009-01-282021-11-30Headwater Research LlcWireless network service interfaces
US11190427B2 (en)2009-01-282021-11-30Headwater Research LlcFlow tagging for service policy implementation
US11190645B2 (en)2009-01-282021-11-30Headwater Research LlcDevice assisted CDR creation, aggregation, mediation and billing
US11218854B2 (en)2009-01-282022-01-04Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US11219074B2 (en)2009-01-282022-01-04Headwater Research LlcEnterprise access control and accounting allocation for access networks
US11228617B2 (en)2009-01-282022-01-18Headwater Research LlcAutomated device provisioning and activation
US8099784B1 (en)*2009-02-132012-01-17Symantec CorporationBehavioral detection based on uninstaller modification or removal
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US8606911B2 (en)2009-03-022013-12-10Headwater Partners I LlcFlow tagging for service policy implementation
US8954725B2 (en)*2009-05-082015-02-10Microsoft Technology Licensing, LlcSanitization of packets
US20100287613A1 (en)*2009-05-082010-11-11Microsoft CorporationSanitization of packets
US9436521B2 (en)2009-11-032016-09-06Iota Computing, Inc.TCP/IP stack-based operating system
US20110145887A1 (en)*2009-12-142011-06-16At&T Intellectual Property I, L.P.System and Method of Selectively Applying Security Measures to Data Services
US8925039B2 (en)*2009-12-142014-12-30At&T Intellectual Property I, L.P.System and method of selectively applying security measures to data services
US8424072B2 (en)*2010-03-092013-04-16Microsoft CorporationBehavior-based security system
US20110225644A1 (en)*2010-03-092011-09-15Microsoft CorporationBehavior-based security system
US9294505B2 (en)2010-08-132016-03-22Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US8869272B2 (en)*2010-08-132014-10-21Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US20130247183A1 (en)*2010-08-132013-09-19Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US20120255006A1 (en)*2010-08-252012-10-04International Business Machines CorporationTwo-tier deep analysis of html traffic
US20120054867A1 (en)*2010-08-252012-03-01International Business Machines CorporationTwo-tier deep analysis of html traffic
US10673898B2 (en)*2010-08-252020-06-02International Business Machines CorporationTwo-tier deep analysis of HTML traffic
US10673897B2 (en)*2010-08-252020-06-02International Business Machines CorporationTwo-tier deep analysis of HTML traffic
WO2012030419A1 (en)*2010-08-302012-03-08Bank Of AmericaOrganization resource allocation based on forecasted change outcomes
US20130061283A1 (en)*2010-11-022013-03-07Ian Henry Stuart CullimoreUltra-Low Power Single-Chip Firewall Security Device, System and Method
US9705848B2 (en)*2010-11-022017-07-11Iota Computing, Inc.Ultra-small, ultra-low power single-chip firewall security device with tightly-coupled software and hardware
US9154826B2 (en)2011-04-062015-10-06Headwater Partners Ii LlcDistributing content and service launch objects to mobile devices
CN102427415A (en)*2011-12-072012-04-25广东石油化工学院 Network Intrusion Immune Detection Method Based on Self-set Scale Constraint
US9613163B2 (en)*2012-04-252017-04-04Significs And Elements, LlcEfficient packet forwarding using cyber-security aware policies
US20160077873A1 (en)*2012-04-252016-03-17Reservoir Labs, Inc.Efficient packet forwarding using cyber-security aware policies
US10171995B2 (en)2013-03-142019-01-01Headwater Research LlcAutomated credential porting for mobile devices
US10834583B2 (en)2013-03-142020-11-10Headwater Research LlcAutomated credential porting for mobile devices
US11743717B2 (en)2013-03-142023-08-29Headwater Research LlcAutomated credential porting for mobile devices
US10069862B2 (en)2013-03-152018-09-04Symantec CorporationTechniques for predicting and protecting spearphishing targets
US20160191568A1 (en)*2013-03-152016-06-30Extreme Networks, Inc.System and related method for network monitoring and control based on applications
CN105144653A (en)*2013-03-152015-12-09赛门铁克公司Techniques for predicting and protecting spearphishing targets
US9049169B1 (en)*2013-05-302015-06-02Trend Micro IncorporatedMobile email protection for private computer networks
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US10922406B2 (en)*2016-05-232021-02-16Wistron CorporationProtecting method and system for malicious code, and monitor apparatus
US20170337374A1 (en)*2016-05-232017-11-23Wistron CorporationProtecting method and system for malicious code, and monitor apparatus
CN106599997A (en)*2016-12-202017-04-26中兴软创科技股份有限公司Zero dynamic-based industrial control attack detection and identification method and system
US11546153B2 (en)2017-03-222023-01-03Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US11665207B2 (en)2017-10-252023-05-30Extrahop Networks, Inc.Inline secret sharing
US11568236B2 (en)2018-01-252023-01-31The Research Foundation For The State University Of New YorkFramework and methods of diverse exploration for fast and safe policy improvement
US11463299B2 (en)2018-02-072022-10-04Extrahop Networks, Inc.Ranking alerts based on network monitoring
US11431744B2 (en)2018-02-092022-08-30Extrahop Networks, Inc.Detection of denial of service attacks
US20190303208A1 (en)*2018-03-292019-10-03Servicenow, Inc.Management instrumentation and discovery (mid) server support for executing automated flows within a cloud based system
US11720415B2 (en)2018-03-292023-08-08Servicenow, Inc.Management instrumentation and discovery (MID) server support for executing automated flows within a cloud based system
US10761903B2 (en)*2018-03-292020-09-01Servicenow, Inc.Management instrumentation and discovery (MID) server support for executing automated flows within a cloud based system
CN108737406A (en)*2018-05-102018-11-02北京邮电大学A kind of detection method and system of abnormal flow data
US11496378B2 (en)2018-08-092022-11-08Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US11706233B2 (en)2019-05-282023-07-18Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
US12309192B2 (en)2019-07-292025-05-20Extrahop Networks, Inc.Modifying triage information based on network monitoring
US11652714B2 (en)2019-08-052023-05-16Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11438247B2 (en)2019-08-052022-09-06Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11388072B2 (en)*2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11463465B2 (en)2019-09-042022-10-04Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US12107888B2 (en)2019-12-172024-10-01Extrahop Networks, Inc.Automated preemptive polymorphic deception
US12355816B2 (en)2019-12-172025-07-08Extrahop Networks, Inc.Automated preemptive polymorphic deception
US11558413B2 (en)2020-09-232023-01-17Extrahop Networks, Inc.Monitoring encrypted network traffic
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
US12225030B2 (en)2021-06-182025-02-11Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US11916771B2 (en)2021-09-232024-02-27Extrahop Networks, Inc.Combining passive network analysis and active probing
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
CN116756225A (en)*2023-08-142023-09-15南京展研信息技术有限公司Situation data information processing method based on computer network security

Also Published As

Publication numberPublication date
US20080133518A1 (en)2008-06-05
US20080133517A1 (en)2008-06-05
US20080162390A1 (en)2008-07-03
US20070192863A1 (en)2007-08-16
US8402540B2 (en)2013-03-19

Similar Documents

PublicationPublication DateTitle
US8402540B2 (en)Systems and methods for processing data flows
US7979368B2 (en)Systems and methods for processing data flows
US8135657B2 (en)Systems and methods for processing data flows
US9525696B2 (en)Systems and methods for processing data flows
EP2432188B1 (en)Systems and methods for processing data flows
US9800608B2 (en)Processing data flows with a data flow processor
US20080229415A1 (en)Systems and methods for processing data flows
US20110219035A1 (en)Database security via data flow processing
US20110214157A1 (en)Securing a network with data flow processing
US20110231564A1 (en)Processing data flows with a data flow processor
US20110213869A1 (en)Processing data flows with a data flow processor
US20110238855A1 (en)Processing data flows with a data flow processor
Agarwal et al.A closer look at intrusion detection system for web applications
US11457025B2 (en)Method and system for detecting and preventing data exfiltration attacks
US20030084319A1 (en)Node, method and computer readable medium for inserting an intrusion prevention system into a network stack
SinghIntrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) For Network Security: A Critical Analysis
JP2022541250A (en) Inline malware detection
Alencar et al.AI techniques for automated penetration testing in MQTT networks: a literature investigation
AlshamraniCyber attacks detection and mitigation in sdn environments
UusiheimalaAdvanced threat detection through Snort integration: a study of IDS/IPS implementation at an institute of higher education
WaraichAutomated attack signature generation: A survey
ErlacherEfficient intrusion detection in high-speed networks.
AngelakisFirewall & WAF–Analysis & implementation of a machine learning integrated solution
ÖztürkA method for security breach detection through file access monitoring and pattern recognition
RanganPolymorphic attacks and network topology: Application of concepts from natural systems

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CROSSBEAM SYSTEMS, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAPOOR, HARSH;AKERMAN, MOISEY;JUSTUS, STEPHEN D.;AND OTHERS;SIGNING DATES FROM 20070214 TO 20070407;REEL/FRAME:027395/0446

ASAssignment

Owner name:SILICON VALLEY BANK, MASSACHUSETTS

Free format text:SECURITY AGREEMENT;ASSIGNORS:CROSSBEAM SYSTEMS, INC.;CB SYSTEMS HOLDINGS II, INC.;CB SYSTEMS ACQUISITION CO.;REEL/FRAME:029275/0605

Effective date:20121108

ASAssignment

Owner name:CB SYSTEMS ACQUISITION CO., MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:029599/0731

Effective date:20121231

Owner name:CROSSBEAM SYSTEMS, INC., MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:029599/0731

Effective date:20121231

Owner name:CB SYSTEMS HOLDINGS II, INC., MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:029599/0731

Effective date:20121231

ASAssignment

Owner name:JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO

Free format text:SECURITY AGREEMENT;ASSIGNOR:CROSSBEAM SYSTEMS, INC.;REEL/FRAME:029877/0668

Effective date:20130215

ASAssignment

Owner name:BLUE COAT SYSTEMS, INC., CALIFORNIA

Free format text:MERGER;ASSIGNOR:CROSSBEAM SYSTEMS, INC.;REEL/FRAME:030492/0146

Effective date:20130308

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO

Free format text:SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:BLUE COAT SYSTEMS, INC.;REEL/FRAME:030740/0181

Effective date:20130628

ASAssignment

Owner name:BLUE COAT SYSTEMS, INC. AS SUCCESSOR BY MERGER TO

Free format text:RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 29877/0668;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:035797/0004

Effective date:20150522

Owner name:BLUE COAT SYSTEMS, INC., CALIFORNIA

Free format text:RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 30740/0181;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:035797/0280

Effective date:20150522


[8]ページ先頭

©2009-2025 Movatter.jp