Binding flows to unique addresses or ports

KAD Mestery, VE Parla - US Patent App. 17/678,472, 2023 - Google Patents
computing devices In order to prevent malicious third parties from monitoring communication
data, computing devices often encrypt the communication data as it travels between devices …

Implementing policy based on unique addresses or ports

KAD Mestery, VE Parla - US Patent 12,069,103, 2024 - Google Patents
Techniques for binding communication flows to unique addresses and/or ports, and
configuring networking devices internal to a network to apply policy without the need to …

Industrial security model as a SASE service

J Henry, RE Barton, E Ganesan… - US Patent …, 2024 - Google Patents
A method includes determining a corresponding level of a security model associated with
each device of a plurality of devices connected to a network, each level of the security model …

Glue layer that abstracts dynamic endpoints to static endpoints

P Chung - US Patent 11,863,528, 2024 - Google Patents
A system and method for generating a set of destination IP address to be added into a
firewall whitelist. The system receives a network packet transmitted through a firewall and …

Detecting random and/or algorithmically-generated character sequences in domain names

HJ Chang, GM Dalal, A Mesdaq - US Patent 12,026,469, 2024 - Google Patents
Aspects of the disclosure relate to detecting random and/or algorithmically-generated
character sequences in domain names. A computing platform may train a machine learning …

Elastic policy scaling in multi-cloud fabrics

R Janakiraman, S Ganapathy, P Matety… - US Patent …, 2023 - Google Patents
Abstract Systems, methods, and computer-readable media for elastic policy scaling in multi-
cloud fabrics. A method can involve deploying a cluster of policy agents on a hub virtual …

Systems and methods for hierarchical access control across devices in a network environment

SD Gopalarathnam, A Natarajan - US Patent 11,606,335, 2023 - Google Patents
Access control systems and methods herein successfully overcome ACL group width
limitations of existing designs by splitting an ACL group across different units, eg, to create …