SonicWALL, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-75 de 75 pour SonicWALL, Inc. Trier par
Recheche Texte
Affiner par
Juridiction
        États-Unis 71
        International 4
Date
2025 août 2
2025 juin 3
2025 (AACJ) 8
2024 14
2023 11
Voir plus
Classe IPC
H04L 9/40 - Protocoles réseaux de sécurité 27
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 22
H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection 21
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 14
H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu 8
Voir plus
Statut
En Instance 17
Enregistré / En vigueur 58
Résultats pour  brevets

1.

METHOD FOR PROVIDING AN ELASTIC CONTENT FILTERING SECURITY SERVICE IN A MESH NETWORK

      
Numéro d'application 19063051
Statut En instance
Date de dépôt 2025-02-25
Date de la première publication 2025-08-21
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network. Apparatus and methods consistent with the present disclosure perform a function of elastic content filtering because rating information may be stored in different memories of different mesh nodes according to rules or profiles associated with a wireless mesh network as responses to requests are sent back along a route in a wireless mesh network in a manner that may not increase an amount of network traffic. When, however, network traffic dips below a threshold level, additional messages may be sent to certain mesh nodes that update rating information stored at those certain mesh nodes.

Classes IPC  ?

  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
  • H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité

2.

Providing Access to Data in a Secure Communication

      
Numéro d'application 19097706
Statut En instance
Date de dépôt 2025-04-01
Date de la première publication 2025-08-07
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to preventing computer data from being usurped and exploited by individuals or organizations with nefarious intent. Methods and systems consistent with the present disclosure may store keys and keying data for each of a plurality of connections in separate memory locations. These memory locations may store data that maps a virtual address to a physical memory address associated with storing information relating to a secure connection. These separate memory locations may have a unique instance for each individual communication connection session, for example each transport layer security (TLS) connection may be assigned memory via logical addresses that are mapped to one or more physical memory addresses on a per-core basis. Such architectures decouple actual physical addresses that are used in conventional architectures that assign a single large continuous physical memory partition that may be accessed via commands that access physical memory addresses directly.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]

3.

METHOD OF CREATING HIGH AVAILABILITY FOR SINGLE POINT NETWORK GATEWAY USING CONTAINERS

      
Numéro d'application 19000994
Statut En instance
Date de dépôt 2024-12-24
Date de la première publication 2025-06-26
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Xiang, Dong
  • Liu, Yunfeng
  • Chen, Zhong

Abrégé

Methods and apparatus consistent with the present disclosure may be used in environments where multiple different virtual sets of program instructions are executed by shared computing resources when different processes are performed in a virtual computing environment. Methods consistent with the present disclosure may be used to provide a form of redundancy that does not require two physically distinct computers. Such methods may use a set of physical hardware components and two or more sets of synchronized virtual gateway software. Architectural features of physical hardware components included in an apparatus consistent with the present disclosure may be abstracted from sets of virtual program code when one virtual software process backs up another virtual software process at the apparatus.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/445 - Chargement ou démarrage de programme
  • G06F 9/46 - Dispositions pour la multiprogrammation
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

4.

EARLY FILTERING OF CLEAN FILE USING DYNAMIC ANALYSIS

      
Numéro d'application 18984089
Statut En instance
Date de dépôt 2024-12-17
Date de la première publication 2025-06-19
Propriétaire SonicWall, Inc. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Kuchan, Sushikumar
  • Dubrovsky, Aleksnadr

Abrégé

The present disclosure is directed to analyzing received sets of computer data. Methods and apparatus consistent with the present disclosure may forecast that a received set of computer data does not include malware after allowing instructions included in that set of computer data to execute for an amount of time that does not exceed an allocated amount of time. Methods consistent with the present disclosure may instrument a set of received program code and allow instructions in that received set of program code to execute as instrumentation code collects information about the set of program code. This collected information may be compared with sets of known good data when determining whether a received set of program code is likely not to include malware. This collected information may be associated with “behaviors” performed by the received set of program code that may be identified using sets of contextual data.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

5.

METHOD FOR PROVIDING AN ELASTIC CONTENT FILTERING SECURITY SERVICE IN A MESH NETWORK

      
Numéro d'application 18984055
Statut En instance
Date de dépôt 2024-12-17
Date de la première publication 2025-06-12
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure is directed to distributing processing capabilities throughout different nodes in a wireless mesh network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless mesh network because they help minimize the need to forward communications to other nodes in the wireless mesh network such that an evaluation can be performed. Apparatus and methods consistent with the present disclosure may distribute ratings or verdicts associated with previous requests to access data to different nodes in a wireless mesh network without generating additional wireless communications through the wireless mesh network. Apparatus and methods consistent with the present disclosure distribute content ratings to different nodes in a wireless network such that different wireless nodes may block redundant requests to undesired content without increasing messaging traffic.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04W 80/06 - Protocoles de couche transport, p. ex. protocole de commande de transport [TCP Transport Control Protocol] par liaison sans fil
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

6.

DETECTION OF EXPLOITATIVE PROGRAM CODE

      
Numéro d'application 18930636
Statut En instance
Date de dépôt 2024-10-29
Date de la première publication 2025-04-17
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Ganachari, Sai
  • He, Yao
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

7.

VISUALIZATION TOOL FOR REAL-TIME NETWORK RISK ASSESSMENT

      
Numéro d'application 18795717
Statut En instance
Date de dépôt 2024-08-06
Date de la première publication 2025-01-30
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Conner, F. William
  • Nguyenle, Minhdung Joe
  • Dhablania, Atul
  • Chio, Richard
  • Jose, Justin
  • Dampanaboina, Lalith Kumar

Abrégé

The present disclosure relates to methods and apparatus that collect data regarding malware threats, that organizes this collected malware threat data, and that provides this data to computers or people such that damage associated with these software threats can be quantified and reduced. The present disclosure is also directed to preventing the spread of malware before that malware can damage computers or steal computer data. Methods consistent with the present disclosure may optimize tests performed at different levels of a multi-level threat detection and prevention system. As such, methods consistent with the present disclosure may collect data from various sources that may include endpoint computing devices, firewalls/gateways, or isolated (e.g. “sandbox”) computers. Once this information is collected, it may then be organized, displayed, and analyzed in ways that were not previously possible.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance

8.

REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSIS

      
Numéro d'application 18795848
Statut En instance
Date de dépôt 2024-08-06
Date de la première publication 2025-01-23
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Cheetancheri, Senthil
  • Dubrovsky, Alex
  • Holagi, Sachin

Abrégé

This disclosure is related to methods and apparatus used to for preventing malicious content from reaching a destination via a dynamic analysis engine may operate in real-time when packetized data is received. Data packets sent from a source computer may be received and be forwarded to an analysis computer that may monitor actions performed by executable program code included within the set of data packets when making determinations regarding whether the data packet set should be classified as malware. In certain instances all but a last data packet of the data packet set may also be sent to the destination computer while the analysis computer executes and monitors the program code included in the data packet set. In instances when the analysis computer identifies that the data packet set does include malware, the malware may be blocked from reaching the destination computer by not sending the last data packet to the destination computer.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

9.

CLOUD BASED JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION

      
Numéro d'application 18823389
Statut En instance
Date de dépôt 2024-09-03
Date de la première publication 2024-12-26
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Dubrovsky, Aleksandr
  • Das, Soumyadipta
  • Cheetancheri, Senthilkumar Gopinathan

Abrégé

Methods and apparatus consistent with the present disclosure may be performed by a Cloud computing device may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into, may perform deep packet inspection (DPI) on computer data, or identify a content rating associated with computer data. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. Furthermore, access to content associated with malware, potential malware, or with inappropriate content ratings may be blocked.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

10.

FIREWALL ACCESS RULE AUTHENTICATED BY SECURITY ASSERTION MARKUP LANGUAGE (SAML)

      
Numéro d'application 18210569
Statut En instance
Date de dépôt 2023-06-15
Date de la première publication 2024-12-19
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Zhang, Hao
  • Zheng, Rui
  • Cai, Bruce

Abrégé

Disclosed are systems, apparatuses, methods, computer readable medium, and circuits for providing access to a network. According to at least one example, a method includes: intercepting a request at a firewall the request sent from a computing device regarding establishment of a secure communication session with a network; in response to determining that the request is unauthenticated, notifying a service provider node of the request, wherein the service provider node is configured to: generating a communication session between the computing device and a RBI server; receiving at the firewall authentication information pertaining to authorization for the computing device to establish the secure communication session with the network; identifying that the secure communication session is allowed to be established based on the authentication information; and providing access at the firewall to the computing device to establish the secure communication session with the network.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

11.

ANALYSIS OF HISTORICAL NETWORK TRAFFIC TO IDENTIFY NETWORK VULNERABILITIES

      
Numéro d'application 18795585
Statut En instance
Date de dépôt 2024-08-06
Date de la première publication 2024-12-19
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

Methods and apparatus consistent with the present disclosure may be used after a computer network has been successfully attacked by new malicious program code. Such methods may include collecting data from computers that have been affected by the new malicious program code and this data may be used to identify a type of damage performed by the new malicious code. The collected data may also include a copy of the new malicious program code. Methods consistent with the present disclosure may also include allowing the new malicious program code to execute at an isolated computer while actions and instructions that cause the damage are identified. Signatures may be generated from the identified instructions after which the signatures or data that describes the damaging actions are provided to computing resources such that those resources can detect the new malware program code.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/40 - Protocoles réseaux de sécurité

12.

DYNAMIC BYPASS

      
Numéro d'application 18816546
Statut En instance
Date de dépôt 2024-08-27
Date de la première publication 2024-12-19
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

Methods and apparatus consistent with the present disclosure may prevent a computer process from failing when a firewall located between a client device and a server identifies that a process at the firewall should be bypassed using fingerprint information associated with a connection attempt. When fingerprint information stored at a firewall matches previously received fingerprint information, the firewall may allow processes typically performed at the firewall to be bypassed, thereby, allowing communications to pass between the client device and the server without inspection. When that fingerprint information does not match previously received fingerprint information, the firewall may perform a process that causes the client device to fail the first connection attempt. Because of this, methods consistent with the present disclosure may allow communications from an application program to be passed through a firewall without relying on an ever growing list of trusted application programs.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/01 - Protocoles
  • H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
  • H04L 67/141 - Configuration des sessions d'application

13.

SECURING TRANSMISSION PATHS IN A MESH NETWORK

      
Numéro d'application 18816879
Statut En instance
Date de dépôt 2024-08-27
Date de la première publication 2024-12-19
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to securely setting up mesh networks in a secure manner that does not require a physical network cable being attached to a wireless device and that do not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus consistent with the present disclosure may use different communication interfaces and different types of channels to ensure that devices included in or being added to a wireless mesh network always communicate securely. Methods and apparatus consistent with the present disclosure may use a combination of conventional secure communication methods, such as secure hypertext transfer protocol (HTTPS) communications, low power signals that travel over short distances, and other types of communications to create a system that only uses secure communications when setting up or expanding a wireless mesh network.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
  • H04W 12/06 - Authentification
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

14.

ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORK

      
Numéro d'application 18809807
Statut En instance
Date de dépôt 2024-08-20
Date de la première publication 2024-12-12
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network by allowing different wireless nodes to receive and store content ratings regarding requested content in caches associated with respective wireless nodes. Apparatus and methods consistent with the present disclosure perform a load balancing function because they distribute content ratings to different nodes in a wireless network without increasing messaging traffic. As response messages regarding access requests are passed back to a requestor, cache memories at nodes along a communication path are updated to include information that cross-references data identifiers with received content ratings. The cross-referenced data identifiers and content ratings allow each respective wireless node along the communication path to block requests to bad content.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
  • H04W 12/10 - Intégrité
  • H04W 28/08 - Équilibrage ou répartition des charges
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

15.

JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION

      
Numéro d'application 18733034
Statut En instance
Date de dépôt 2024-06-04
Date de la première publication 2024-11-07
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Dubrovsky, Alex
  • Korsunsky, Igor

Abrégé

Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

16.

STREAMLINED CREATION AND EXPANSION OF A WIRELESS MESH NETWORK

      
Numéro d'application 18753727
Statut En instance
Date de dépôt 2024-06-25
Date de la première publication 2024-10-17
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to methods and apparatus that registers and configures mesh node devices to operate as part of a wireless mesh network as part of a process that may be referred to as an onboarding process that streamlines. Such an onboarding process may store registration information and configuration information in a database at a computer in the cloud or that is accessible via the Internet. This stored information may be used to easily create or expand a wireless mesh network. This registration information may be cross-referenced with a profile associated with a network configuration, with a customer license, and with an identifier that identifies a wireless mesh network. Profiles consistent with the present disclosure may identify configuration preferences of a wireless mesh network and may identify software components that may be installed at particular mesh nodes when mesh node devices are added to a wireless mesh network.

Classes IPC  ?

  • H04W 12/50 - Appariement sécurisé de dispositifs
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 12/55 - Appariement sécurisé de dispositifs faisant intervenir trois dispositifs ou plus, p. ex. appariement de groupes
  • H04W 60/00 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement
  • H04W 76/11 - Attribution ou utilisation d'identifiants de connexion
  • H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

17.

Detecting profile-based wireless mesh node failover in communication networks

      
Numéro d'application 18673699
Numéro de brevet 12376062
Statut Délivré - en vigueur
Date de dépôt 2024-05-24
Date de la première publication 2024-09-26
Date d'octroi 2025-07-29
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

Apparatuses, methods, and non-transitory computer-readable storage media are described for detecting profile-based wireless mesh node failover in communication networks. An apparatus can receive authentication information sent from a first wireless mesh node of a plurality of wireless mesh nodes in a wireless communication network, generate a profile for configuring wireless mesh nodes according to the authentication information, establish a communication session with the first wireless mesh node and a second wireless mesh node based on the profile, detect a failure at the first wireless mesh node that triggers to probe the profile for a communication policy that specifies one or more available wireless mesh nodes that includes the second wireless mesh node, and switch a communication connection to the second wireless mesh node in accordance with the communication policy.

Classes IPC  ?

  • H04W 60/04 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement utilisant des événements déclenchés
  • G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
  • G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/55 - Appariement sécurisé de dispositifs faisant intervenir trois dispositifs ou plus, p. ex. appariement de groupes
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

18.

Adaptive CPU usage mechanism for networking system in a virtual environment

      
Numéro d'application 18624288
Numéro de brevet 12399741
Statut Délivré - en vigueur
Date de dépôt 2024-04-02
Date de la première publication 2024-09-19
Date d'octroi 2025-08-26
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Mao, Miao
  • Zhou, Wei
  • Chen, Zhong

Abrégé

Methods and apparatus consistent with the present disclosure may be used in environments where multiple different virtual sets of program instructions are executed by shared computing resources. These methods may allow actions associated with a first set of virtual software to be paused to allow a second set of virtual software to be executed by the shared computing resources. In certain instances, methods and apparatus consistent with the present disclosure may manage the operation of one or more sets of virtual software at a point in time. Apparatus consistent with the present disclosure may include a memory and one or more processors that execute instructions out of the memory. At certain points in time, a processors of a computing system may pause a virtual process while allowing instructions associated with another virtual process to be executed.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 9/46 - Dispositions pour la multiprogrammation
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

19.

Method for providing an elastic content filtering security service in a mesh network

      
Numéro d'application 18384103
Numéro de brevet 12170900
Statut Délivré - en vigueur
Date de dépôt 2023-10-26
Date de la première publication 2024-02-15
Date d'octroi 2024-12-17
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure is directed to distributing processing capabilities throughout different nodes in a wireless mesh network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless mesh network because they help minimize the need to forward communications to other nodes in the wireless mesh network such that an evaluation can be performed. Apparatus and methods consistent with the present disclosure may distribute ratings or verdicts associated with previous requests to access data to different nodes in a wireless mesh network without generating additional wireless communications through the wireless mesh network. Apparatus and methods consistent with the present disclosure distribute content ratings to different nodes in a wireless network such that different wireless nodes may block redundant requests to undesired content without increasing messaging traffic.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04W 80/06 - Protocoles de couche transport, p. ex. protocole de commande de transport [TCP Transport Control Protocol] par liaison sans fil
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

20.

Analysis of historical network traffic to identify network vulnerabilities

      
Numéro d'application 18215943
Numéro de brevet 12056237
Statut Délivré - en vigueur
Date de dépôt 2023-10-30
Date de la première publication 2024-02-08
Date d'octroi 2024-08-06
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

Methods and apparatus consistent with the present disclosure may be used after a computer network has been successfully attacked by new malicious program code. Such methods may include collecting data from computers that have been affected by the new malicious program code and this data may be used to identify a type of damage performed by the new malicious code. The collected data may also include a copy of the new malicious program code. Methods consistent with the present disclosure may also include allowing the new malicious program code to execute at an isolated computer while actions and instructions that cause the damage are identified. Signatures may be generated from the identified instructions after which the signatures or data that describes the damaging actions are provided to computing resources such that those resources can detect the new malware program code.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/40 - Protocoles réseaux de sécurité

21.

Method for providing an elastic content filtering security service in a mesh network

      
Numéro d'application 18378583
Numéro de brevet 12238825
Statut Délivré - en vigueur
Date de dépôt 2023-10-10
Date de la première publication 2024-02-08
Date d'octroi 2025-02-25
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network. Apparatus and methods consistent with the present disclosure perform a function of elastic content filtering because rating information may be stored in different memories of different mesh nodes according to rules or profiles associated with a wireless mesh network as responses to requests are sent back along a route in a wireless mesh network in a manner that may not increase an amount of network traffic. When, however, network traffic dips below a threshold level, additional messages may be sent to certain mesh nodes that update rating information stored at those certain mesh nodes.

Classes IPC  ?

  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
  • H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité

22.

Cloud based just in time memory analysis for malware detection

      
Numéro d'application 18369926
Numéro de brevet 12079340
Statut Délivré - en vigueur
Date de dépôt 2023-09-19
Date de la première publication 2024-01-11
Date d'octroi 2024-09-03
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Dubrovsky, Aleksandr
  • Das, Soumyadipta
  • Cheetancheri, Senthilkumar Gopinathan

Abrégé

Methods and apparatus consistent with the present disclosure may be performed by a Cloud computing device may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into, may perform deep packet inspection (DPI) on computer data, or identify a content rating associated with computer data. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. Furthermore, access to content associated with malware, potential malware, or with inappropriate content ratings may be blocked.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

23.

Elastic security services load balancing in a wireless mesh network

      
Numéro d'application 18234152
Numéro de brevet 12069480
Statut Délivré - en vigueur
Date de dépôt 2023-08-15
Date de la première publication 2023-12-14
Date d'octroi 2024-08-20
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network by allowing different wireless nodes to receive and store content ratings regarding requested content in caches associated with respective wireless nodes. Apparatus and methods consistent with the present disclosure perform a load balancing function because they distribute content ratings to different nodes in a wireless network without increasing messaging traffic. As response messages regarding access requests are passed back to a requestor, cache memories at nodes along a communication path are updated to include information that cross-references data identifiers with received content ratings. The cross-referenced data identifiers and content ratings allow each respective wireless node along the communication path to block requests to bad content.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
  • H04W 12/10 - Intégrité
  • H04W 28/08 - Équilibrage ou répartition des charges
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

24.

Providing access to data in a secure communication

      
Numéro d'application 18220436
Numéro de brevet 12267362
Statut Délivré - en vigueur
Date de dépôt 2023-07-11
Date de la première publication 2023-12-14
Date d'octroi 2025-04-01
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to preventing computer data from being usurped and exploited by individuals or organizations with nefarious intent. Methods and systems consistent with the present disclosure may store keys and keying data for each of a plurality of connections in separate memory locations. These memory locations may store data that maps a virtual address to a physical memory address associated with storing information relating to a secure connection. These separate memory locations may have a unique instance for each individual communication connection session, for example each transport layer security (TLS) connection may be assigned memory via logical addresses that are mapped to one or more physical memory addresses on a per-core basis. Such architectures decouple actual physical addresses that are used in conventional architectures that assign a single large continuous physical memory partition that may be accessed via commands that access physical memory addresses directly.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]

25.

Instant secure wireless network setup

      
Numéro d'application 18138840
Numéro de brevet 12279115
Statut Délivré - en vigueur
Date de dépôt 2023-04-25
Date de la première publication 2023-11-09
Date d'octroi 2025-04-15
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to securely setting up mesh networks in a manner that does not require a physical network cable being attached to a wireless mesh device and that does not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus consistent with the present disclosure may allow a user to choose which mesh nodes can join a network and that user may specificity a custom profile that may include rules that may identify how mesh network identifiers are used, that identify passcodes/passphrases assigned to a particular network, may identify types of traffic that may be passed through particular 802.11 radio channels, or other parameters that may control how traffic is switched between devices in a particular wireless mesh network. This combined with dual factor verification and the use of different types of communication channels make wireless mesh networks easy to deploy and expand.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/06 - Authentification
  • H04W 60/00 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement
  • H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

26.

Reassembly free deep packet inspection for peer to peer networks

      
Numéro d'application 18215669
Numéro de brevet 12095779
Statut Délivré - en vigueur
Date de dépôt 2023-06-28
Date de la première publication 2023-10-19
Date d'octroi 2024-09-17
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Ling, Hui
  • Yu, Cuiping
  • Chen, Zhong

Abrégé

The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.

Classes IPC  ?

27.

Call location based access control of query to database

      
Numéro d'application 18206135
Numéro de brevet 12406078
Statut Délivré - en vigueur
Date de dépôt 2023-06-06
Date de la première publication 2023-10-05
Date d'octroi 2025-09-02
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Joshipura, Bhushit
  • Das, Soumyadipta
  • Yogeesh, Arun
  • Ashok, Navaneeth

Abrégé

The present disclosure is directed to protecting data stored at a database in a manner that increases data protection minimizing performance reductions. Apparatus and methods consistent with the present disclosure may collect information from user devices from which user inputs are received when collecting data that may be used to protect database data. Methods consistent with the present disclosure may identify code paths traversed, pages of program code where actions were initiated, and functions associated with those actions. This information may be cross-referenced with a set of data, constraints, rules, or command parameters when data associated with a database query is initially associated with an “allow” action or a “deny” action. This information may also be used to evaluate whether newly generated database queries should be allowed to be sent to a database server or to identify whether a database request should be blocked.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/44 - Authentification de programme ou de dispositif

28.

VPN deep packet inspection

      
Numéro d'application 18103898
Numéro de brevet 12058109
Statut Délivré - en vigueur
Date de dépôt 2023-01-31
Date de la première publication 2023-08-10
Date d'octroi 2024-08-06
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Work, Steven C.
  • Masanagi, Prakash N.
  • Peterson, Christopher D.

Abrégé

Policy enforcement previously available for web proxy access methods is extended and applied to layer 3 packets flowing through VPN channels. With these extensions, a common security policy is possible that is enforceable between VPN proxied access and VPN tunneled access. Equivalent security policy to tunnel based VPN access without comprising the inherent performance, scalability and application compatibility advantages tunne based VPNs have over their proxy based VPN counterparts.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

29.

Detection of exploitative program code

      
Numéro d'application 18095340
Numéro de brevet 12130919
Statut Délivré - en vigueur
Date de dépôt 2023-01-10
Date de la première publication 2023-07-13
Date d'octroi 2024-10-29
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Ganachari, Sai Sravan Kumar
  • He, Yao
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

30.

Method for providing an elastic content filtering security service in a mesh network

      
Numéro d'application 18088273
Numéro de brevet 11863987
Statut Délivré - en vigueur
Date de dépôt 2022-12-23
Date de la première publication 2023-06-29
Date d'octroi 2024-01-02
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure is directed to distributing processing capabilities throughout different nodes in a wireless mesh network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless mesh network because they help minimize the need to forward communications to other nodes in the wireless mesh network such that an evaluation can be performed. Apparatus and methods consistent with the present disclosure may distribute ratings or verdicts associated with previous requests to access data to different nodes in a wireless mesh network without generating additional wireless communications through the wireless mesh network. Apparatus and methods consistent with the present disclosure distribute content ratings to different nodes in a wireless network such that different wireless nodes may block redundant requests to undesired content without increasing messaging traffic.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04W 80/06 - Protocoles de couche transport, p. ex. protocole de commande de transport [TCP Transport Control Protocol] par liaison sans fil
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

31.

Early filtering of clean file using dynamic analysis

      
Numéro d'application 17991749
Numéro de brevet 12169564
Statut Délivré - en vigueur
Date de dépôt 2022-11-21
Date de la première publication 2023-05-18
Date d'octroi 2024-12-17
Propriétaire SonicWall, Inc. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Kuchan, Sushilkumar
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to analyzing received sets of computer data. Methods and apparatus consistent with the present disclosure may forecast that a received set of computer data does not include malware after allowing instructions included in that set of computer data to execute for an amount of time that does not exceed an allocated amount of time. Methods consistent with the present disclosure may instrument a set of received program code and allow instructions in that received set of program code to execute as instrumentation code collects information about the set of program code. This collected information may be compared with sets of known good data when determining whether a received set of program code is likely not to include malware. This collected information may be associated with “behaviors” performed by the received set of program code that may be identified using sets of contextual data.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

32.

Real-time prevention of malicious content via dynamic analysis

      
Numéro d'application 17949796
Numéro de brevet 12058154
Statut Délivré - en vigueur
Date de dépôt 2022-09-21
Date de la première publication 2023-01-19
Date d'octroi 2024-08-06
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Cheetancheri, Senthil
  • Dubrovsky, Alex
  • Holagi, Sachin

Abrégé

This disclosure is related to methods and apparatus used to for preventing malicious content from reaching a destination via a dynamic analysis engine may operate in real-time when packetized data is received. Data packets sent from a source computer may be received and be forwarded to an analysis computer that may monitor actions performed by executable program code included within the set of data packets when making determinations regarding whether the data packet set should be classified as malware. In certain instances all but a last data packet of the data packet set may also be sent to the destination computer while the analysis computer executes and monitors the program code included in the data packet set. In instances when the analysis computer identifies that the data packet set does include malware, the malware may be blocked from reaching the destination computer by not sending the last data packet to the destination computer.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

33.

Visualization tool for real-time network risk assessment

      
Numéro d'application 17862948
Numéro de brevet 12058147
Statut Délivré - en vigueur
Date de dépôt 2022-07-12
Date de la première publication 2023-01-05
Date d'octroi 2024-08-06
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Conner, F. William
  • Nguyenle, Minhdung Joe
  • Dhablania, Atul
  • Chio, Richard
  • Jose, Justin
  • Dampanaboina, Lalith Kumar

Abrégé

The present disclosure relates to methods and apparatus that collect data regarding malware threats, that organizes this collected malware threat data, and that provides this data to computers or people such that damage associated with these software threats can be quantified and reduced. The present disclosure is also directed to preventing the spread of malware before that malware can damage computers or steal computer data. Methods consistent with the present disclosure may optimize tests performed at different levels of a multi-level threat detection and prevention system. As such, methods consistent with the present disclosure may collect data from various sources that may include endpoint computing devices, firewalls/gateways, or isolated (e.g. “sandbox”) computers. Once this information is collected, it may then be organized, displayed, and analyzed in ways that were not previously possible.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance

34.

Method for providing an elastic content filtering security service in a mesh network

      
Numéro d'application 17899959
Numéro de brevet 11800598
Statut Délivré - en vigueur
Date de dépôt 2022-08-31
Date de la première publication 2022-12-29
Date d'octroi 2023-10-24
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network. Apparatus and methods consistent with the present disclosure perform a function of elastic content filtering because rating information may be stored in different memories of different mesh nodes according to rules or profiles associated with a wireless mesh network as responses to requests are sent back along a route in a wireless mesh network in a manner that may not increase an amount of network traffic. When, however, network traffic dips below a threshold level, additional messages may be sent to certain mesh nodes that update rating information stored at those certain mesh nodes.

Classes IPC  ?

  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité
  • H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux

35.

Elastic security services and load balancing in a wireless mesh network

      
Numéro d'application 17716860
Numéro de brevet 11729621
Statut Délivré - en vigueur
Date de dépôt 2022-04-08
Date de la première publication 2022-07-28
Date d'octroi 2023-08-15
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network by allowing different wireless nodes to receive and store content ratings regarding requested content in caches associated with respective wireless nodes. Apparatus and methods consistent with the present disclosure perform a load balancing function because they distribute content ratings to different nodes in a wireless network without increasing messaging traffic. As response messages regarding access requests are passed back to a requestor, cache memories at nodes along a communication path are updated to include information that cross-references data identifiers with received content ratings. The cross-referenced data identifiers and content ratings allow each respective wireless node along the communication path to block requests to bad content.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04W 12/10 - Intégrité
  • H04W 28/08 - Équilibrage ou répartition des charges
  • H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

36.

Cloud based just in time memory analysis for malware detection

      
Numéro d'application 17584152
Numéro de brevet 11797677
Statut Délivré - en vigueur
Date de dépôt 2022-01-25
Date de la première publication 2022-07-14
Date d'octroi 2023-10-24
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Dubrovsky, Aleksandr
  • Das, Soumyadipta
  • Cheetancheri, Senthilkumar Gopinathan

Abrégé

Methods and apparatus consistent with the present disclosure may be performed by a Cloud computing device may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into, may perform deep packet inspection (DPI) on computer data, or identify a content rating associated with computer data. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. Furthermore, access to content associated with malware, potential malware, or with inappropriate content ratings may be blocked.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

37.

Just in time memory analysis for malware detection

      
Numéro d'application 17505327
Numéro de brevet 12001554
Statut Délivré - en vigueur
Date de dépôt 2021-10-19
Date de la première publication 2022-02-03
Date d'octroi 2024-06-04
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Dubrovsky, Alex
  • Korsunsky, Igor

Abrégé

Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

38.

Adaptive CPU usage mechanism for networking system in a virtual environment

      
Numéro d'application 17350239
Numéro de brevet 11948001
Statut Délivré - en vigueur
Date de dépôt 2021-06-17
Date de la première publication 2021-12-23
Date d'octroi 2024-04-02
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Mao, Miao
  • Zhou, Wei
  • Chen, Zhong

Abrégé

Methods and apparatus consistent with the present disclosure may be used in environments where multiple different virtual sets of program instructions are executed by shared computing resources. These methods may allow actions associated with a first set of virtual software to be paused to allow a second set of virtual software to be executed by the shared computing resources. In certain instances, methods and apparatus consistent with the present disclosure may manage the operation of one or more sets of virtual software at a point in time. Apparatus consistent with the present disclosure may include a memory and one or more processors that execute instructions out of the memory. At certain points in time, a processors of a computing system may pause a virtual process while allowing instructions associated with another virtual process to be executed.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 9/46 - Dispositions pour la multiprogrammation
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

39.

Method of creating high availability for single point network gateway using containers

      
Numéro d'application 17350243
Numéro de brevet 12175284
Statut Délivré - en vigueur
Date de dépôt 2021-06-17
Date de la première publication 2021-12-23
Date d'octroi 2024-12-24
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Xiang, Dong
  • Liu, Yunfeng
  • Chen, Zhong

Abrégé

Methods and apparatus consistent with the present disclosure may be used in environments where multiple different virtual sets of program instructions are executed by shared computing resources when different processes are performed in a virtual computing environment. Methods consistent with the present disclosure may be used to provide a form of redundancy that does not require two physically distinct computers. Such methods may use a set of physical hardware components and two or more sets of synchronized virtual gateway software. Architectural features of physical hardware components included in an apparatus consistent with the present disclosure may be abstracted from sets of virtual program code when one virtual software process backs up another virtual software process at the apparatus.

Classes IPC  ?

  • G06F 9/46 - Dispositions pour la multiprogrammation
  • G06F 9/445 - Chargement ou démarrage de programme
  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

40.

Providing access to data in a secure communication

      
Numéro d'application 17166773
Numéro de brevet 11700277
Statut Délivré - en vigueur
Date de dépôt 2021-02-03
Date de la première publication 2021-07-29
Date d'octroi 2023-07-11
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to preventing computer data from being usurped and exploited by individuals or organizations with nefarious intent. Methods and systems consistent with the present disclosure may store keys and keying data for each of a plurality of connections in separate memory locations. These memory locations may store data that maps a virtual address to a physical memory address associated with storing information relating to a secure connection. These separate memory locations may have a unique instance for each individual communication connection session, for example each transport layer security (TLS) connection may be assigned memory via logical addresses that are mapped to one or more physical memory addresses on a per-core basis. Such architectures decouple actual physical addresses that are used in conventional architectures that assign a single large continuous physical memory partition that may be accessed via commands that access physical memory addresses directly.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]

41.

Reassembly free deep packet inspection for peer to peer networks

      
Numéro d'application 17174182
Numéro de brevet 11695784
Statut Délivré - en vigueur
Date de dépôt 2021-02-11
Date de la première publication 2021-07-29
Date d'octroi 2023-07-04
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Ling, Hui
  • Yu, Cuiping
  • Chen, Zhong

Abrégé

The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.

Classes IPC  ?

42.

Instant secure wireless network setup

      
Numéro d'application 17223526
Numéro de brevet 11638149
Statut Délivré - en vigueur
Date de dépôt 2021-04-06
Date de la première publication 2021-07-22
Date d'octroi 2023-04-25
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to securely setting up mesh networks in a manner that does not require a physical network cable being attached to a wireless mesh device and that does not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus consistent with the present disclosure may allow a user to choose which mesh nodes can join a network and that user may specificity a custom profile that may include rules that may identify how mesh network identifiers are used, that identify passcodes/passphrases assigned to a particular network, may identify types of traffic that may be passed through particular 802.11 radio channels, or other parameters that may control how traffic is switched between devices in a particular wireless mesh network. This combined with dual factor verification and the use of different types of communication channels make wireless mesh networks easy to deploy and expand.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
  • H04W 60/00 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement
  • H04W 12/06 - Authentification
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

43.

IDENTIFICATION OF POTENTIAL NETWORK VULNERABILITY AND SECURITY RESPONSES IN LIGHT OF REAL-TIME NETWORK RISK ASSESSMENT

      
Numéro d'application 17111398
Statut En instance
Date de dépôt 2020-12-03
Date de la première publication 2021-06-24
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to methods and apparatus that collect data regarding malware threats, that organizes this collected malware threat data, and that provides this data to computers or people such that damage associated with these software threats can be quantified and reduced. The present disclosure is also directed to preventing the spread of malware before that malware can damage computers or steal computer data. Methods consistent with the present disclosure may optimize tests performed at different levels of a multi-level threat detection and prevention system. As such, methods consistent with the present disclosure may collect data from various sources that may include endpoint computing devices, firewalls/gateways, or isolated (e.g. “sandbox”) computers. Once this information is collected, it may then be organized, displayed, and analyzed in ways that were not previously possible.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

44.

Real-time prevention of malicious content via dynamic analysis

      
Numéro d'application 17128639
Numéro de brevet 11558405
Statut Délivré - en vigueur
Date de dépôt 2020-12-21
Date de la première publication 2021-06-17
Date d'octroi 2023-01-17
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Cheetancheri, Senthil
  • Dubrovsky, Alex
  • Holagi, Sachin

Abrégé

This disclosure is related to methods and apparatus used to for preventing malicious content from reaching a destination via a dynamic analysis engine may operate in real-time when packetized data is received. Data packets sent from a source computer may be received and be forwarded to an analysis computer that may monitor actions performed by executable program code included within the set of data packets when making determinations regarding whether the data packet set should be classified as malware. In certain instances all but a last data packet of the data packet set may also be sent to the destination computer while the analysis computer executes and monitors the program code included in the data packet set. In instances when the analysis computer identifies that the data packet set does include malware, the malware may be blocked from reaching the destination computer by not sending the last data packet to the destination computer.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

45.

Method for providing an elastic content filtering security service in a mesh network

      
Numéro d'application 17111391
Numéro de brevet 11540132
Statut Délivré - en vigueur
Date de dépôt 2020-12-03
Date de la première publication 2021-06-10
Date d'octroi 2022-12-27
Propriétaire SonicWALL Inc. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure is directed to distributing processing capabilities throughout different nodes in a wireless mesh network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless mesh network because they help minimize the need to forward communications to other nodes in the wireless mesh network such that an evaluation can be performed. Apparatus and methods consistent with the present disclosure may distribute ratings or verdicts associated with previous requests to access data to different nodes in a wireless mesh network without generating additional wireless communications through the wireless mesh network. Apparatus and methods consistent with the present disclosure distribute content ratings to different nodes in a wireless network such that different wireless nodes may block redundant requests to undesired content without increasing messaging traffic.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • H04W 80/06 - Protocoles de couche transport, p. ex. protocole de commande de transport [TCP Transport Control Protocol] par liaison sans fil
  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

46.

Analysis of historical network traffic to identify network vulnerabilities

      
Numéro d'application 17111414
Numéro de brevet 11693961
Statut Délivré - en vigueur
Date de dépôt 2020-12-03
Date de la première publication 2021-06-03
Date d'octroi 2023-07-04
Propriétaire SonicWall Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

Methods and apparatus consistent with the present disclosure may be used after a computer network has been successfully attacked by new malicious program code. Such methods may include collecting data from computers that have been affected by the new malicious program code and this data may be used to identify a type of damage performed by the new malicious code. The collected data may also include a copy of the new malicious program code. Methods consistent with the present disclosure may also include allowing the new malicious program code to execute at an isolated computer while actions and instructions that cause the damage are identified. Signatures may be generated from the identified instructions after which the signatures or data that describes the damaging actions are provided to computing resources such that those resources can detect the new malware program code.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 9/40 - Protocoles réseaux de sécurité

47.

Visualization tool for real-time network risk assessment

      
Numéro d'application 16863933
Numéro de brevet 11388176
Statut Délivré - en vigueur
Date de dépôt 2020-04-30
Date de la première publication 2021-06-03
Date d'octroi 2022-07-12
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Conner, F. William
  • Nguyenle, Minhdung Joe
  • Dhablania, Atul
  • Chio, Richard
  • Jose, Justin
  • Dampanaboina, Lalith Kumar

Abrégé

The present disclosure relates to methods and apparatus that collect data regarding malware threats, that organizes this collected malware threat data, and that provides this data to computers or people such that damage associated with these software threats can be quantified and reduced. The present disclosure is also directed to preventing the spread of malware before that malware can damage computers or steal computer data. Methods consistent with the present disclosure may optimize tests performed at different levels of a multi-level threat detection and prevention system. As such, methods consistent with the present disclosure may collect data from various sources that may include endpoint computing devices, firewalls/gateways, or isolated (e.g. “sandbox”) computers. Once this information is collected, it may then be organized, displayed, and analyzed in ways that were not previously possible.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
  • H04L 43/028 - Capture des données de surveillance en filtrant

48.

Call location based access control of query to database

      
Numéro d'application 16779262
Numéro de brevet 11675920
Statut Délivré - en vigueur
Date de dépôt 2020-01-31
Date de la première publication 2021-06-03
Date d'octroi 2023-06-13
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Joshipura, Bhushit
  • Das, Soumyadipta
  • Yogeesh, Arun
  • Ashok, Navaneeth

Abrégé

The present disclosure is directed to protecting data stored at a database in a manner that increases data protection minimizing performance reductions. Apparatus and methods consistent with the present disclosure may collect information from user devices from which user inputs are received when collecting data that may be used to protect database data. Methods consistent with the present disclosure may identify code paths traversed, pages of program code where actions were initiated, and functions associated with those actions. This information may be cross-referenced with a set of data, constraints, rules, or command parameters when data associated with a database query is initially associated with an “allow” action or a “deny” action. This information may also be used to evaluate whether newly generated database queries should be allowed to be sent to a database server or to identify whether a database request should be blocked.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
  • G06F 21/44 - Authentification de programme ou de dispositif

49.

Early filtering of clean file using dynamic analysis

      
Numéro d'application 16783065
Numéro de brevet 11507664
Statut Délivré - en vigueur
Date de dépôt 2020-02-05
Date de la première publication 2021-06-03
Date d'octroi 2022-11-22
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Kuchan, Sushilkumar
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to analyzing received sets of computer data. Methods and apparatus consistent with the present disclosure may forecast that a received set of computer data does not include malware after allowing instructions included in that set of computer data to execute for an amount of time that does not exceed an allocated amount of time. Methods consistent with the present disclosure may instrument a set of received program code and allow instructions in that received set of program code to execute as instrumentation code collects information about the set of program code. This collected information may be compared with sets of known good data when determining whether a received set of program code is likely not to include malware. This collected information may be associated with “behaviors” performed by the received set of program code that may be identified using sets of contextual data.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 12/16 - Protection contre la perte de contenus de mémoire

50.

Method for providing an elastic content filtering security service in a mesh network

      
Numéro d'application 17111388
Numéro de brevet 11438963
Statut Délivré - en vigueur
Date de dépôt 2020-12-03
Date de la première publication 2021-05-27
Date d'octroi 2022-09-06
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Duo, Zhuangzhi

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network. Apparatus and methods consistent with the present disclosure perform a function of elastic content filtering because rating information may be stored in different memories of different mesh nodes according to rules or profiles associated with a wireless mesh network as responses to requests are sent back along a route in a wireless mesh network in a manner that may not increase an amount of network traffic. When, however, network traffic dips below a threshold level, additional messages may be sent to certain mesh nodes that update rating information stored at those certain mesh nodes.

Classes IPC  ?

  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité
  • H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux

51.

Dynamic bypass

      
Numéro d'application 17075492
Numéro de brevet 12074863
Statut Délivré - en vigueur
Date de dépôt 2020-10-20
Date de la première publication 2021-05-06
Date d'octroi 2024-08-27
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

Methods and apparatus consistent with the present disclosure may prevent a computer process from failing when a firewall located between a client device and a server identifies that a process at the firewall should be bypassed using fingerprint information associated with a connection attempt. When fingerprint information stored at a firewall matches previously received fingerprint information, the firewall may allow processes typically performed at the firewall to be bypassed, thereby, allowing communications to pass between the client device and the server without inspection. When that fingerprint information does not match previously received fingerprint information, the firewall may perform a process that causes the client device to fail the first connection attempt. Because of this, methods consistent with the present disclosure may allow communications from an application program to be passed through a firewall without relying on an ever growing list of trusted application programs.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/01 - Protocoles
  • H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
  • H04L 67/141 - Configuration des sessions d'application

52.

Securing transmission paths in a mesh network

      
Numéro d'application 16911111
Numéro de brevet 12075246
Statut Délivré - en vigueur
Date de dépôt 2020-06-24
Date de la première publication 2020-12-17
Date d'octroi 2024-08-27
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

Securely setting up mesh networks in a secure manner that does not require a physical network cable being attached to a wireless device and that do not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus may use different communication interfaces and different types of channels to ensure that devices included in or being added to a wireless mesh network always communicate securely. Methods and apparatus may use a combination of conventional secure communication methods, such as secure hypertext transfer protocol (HTTPS) communications, low power signals that travel over short distances, and other types of communications to create a system that only uses secure communications when setting up or expanding a wireless mesh network.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/06 - Authentification
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

53.

Detection of exploitative program code

      
Numéro d'application 16903060
Numéro de brevet 11550912
Statut Délivré - en vigueur
Date de dépôt 2020-06-16
Date de la première publication 2020-12-03
Date d'octroi 2023-01-10
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Ganachari, Sai Sravan Kumar
  • He, Yao
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

54.

Establishing simultaneous mesh node connections

      
Numéro d'application 16883275
Numéro de brevet 11997635
Statut Délivré - en vigueur
Date de dépôt 2020-05-26
Date de la première publication 2020-11-12
Date d'octroi 2024-05-28
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

Methods and apparatus that registers a plurality of mesh node devices to operate as part of a wireless mesh network after a user device scans encoded information that is unique to each mesh node of a plurality of different mesh nodes. After codes associated with different respective mesh nodes are scanned by a user device, that user device may communicate with these different mesh nodes via a low power communication interface and the user device may send registration information to a registration computer via a secure communication channel. Apparatus may also receive a validation code from the registration computer via a communication channel that is different from the secure communication channel and these apparatus may then send the validation code to the registration computer via the secure communication channel when the user device is validated by the registration computer.

Classes IPC  ?

  • H04W 60/04 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement utilisant des événements déclenchés
  • G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
  • G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/55 - Appariement sécurisé de dispositifs faisant intervenir trois dispositifs ou plus, p. ex. appariement de groupes
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

55.

Instant secure wireless network setup

      
Numéro d'application 16397935
Numéro de brevet 10972916
Statut Délivré - en vigueur
Date de dépôt 2019-04-29
Date de la première publication 2020-10-29
Date d'octroi 2021-04-06
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to securely setting up mesh networks in a manner that does not require a physical network cable being attached to a wireless mesh device and that does not require transmitting unencrypted information wirelessly when a mesh network is setup. Methods and apparatus consistent with the present disclosure may allow a user to choose which mesh nodes can join a network and that user may specificity a custom profile that may include rules that may identify how mesh network identifiers are used, that identify passcodes/passphrases assigned to a particular network, may identify types of traffic that may be passed through particular 802.11 radio channels, or other parameters that may control how traffic is switched between devices in a particular wireless mesh network. This combined with dual factor verification and the use of different types of communication channels make wireless mesh networks easy to deploy and expand.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/06 - Authentification
  • H04W 60/00 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement
  • H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

56.

Elastic security services and load balancing in a wireless mesh network

      
Numéro d'application 16397951
Numéro de brevet 11310665
Statut Délivré - en vigueur
Date de dépôt 2019-04-29
Date de la première publication 2020-10-29
Date d'octroi 2022-04-19
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure distributes processing capabilities throughout different nodes in a wireless network. Methods and apparatus consistent with the present disclosure increase the efficiency of communications in a wireless network because they help minimize the need to forward communications to other nodes in the network by allowing different wireless nodes to receive and store content ratings regarding requested content in caches associated with respective wireless nodes. Apparatus and methods consistent with the present disclosure perform a load balancing function because they distribute content ratings to different nodes in a wireless network without increasing messaging traffic. As response messages regarding access requests are passed back to a requestor, cache memories at nodes along a communication path are updated to include information that cross-references data identifiers with received content ratings. The cross-referenced data identifiers and content ratings allow each respective wireless node along the communication path to block requests to bad content.

Classes IPC  ?

  • H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
  • H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04W 12/10 - Intégrité
  • H04W 28/08 - Équilibrage ou répartition des charges
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

57.

Streamlined creation and expansion of a wireless mesh network

      
Numéro d'application 16404655
Numéro de brevet 12022295
Statut Délivré - en vigueur
Date de dépôt 2019-05-06
Date de la première publication 2020-10-29
Date d'octroi 2024-06-25
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Duo, Zhuangzhi
  • Dhablania, Atul

Abrégé

The present disclosure relates to methods and apparatus that registers and configures mesh node devices to operate as part of a wireless mesh network as part of a process that may be referred to as an onboarding process that streamlines. Such an onboarding process may store registration information and configuration information in a database at a computer in the cloud or that is accessible via the Internet. This stored information may be used to easily create or expand a wireless mesh network. This registration information may be cross-referenced with a profile associated with a network configuration, with a customer license, and with an identifier that identifies a wireless mesh network. Profiles consistent with the present disclosure may identify configuration preferences of a wireless mesh network and may identify software components that may be installed at particular mesh nodes when mesh node devices are added to a wireless mesh network.

Classes IPC  ?

  • H04W 12/50 - Appariement sécurisé de dispositifs
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 60/00 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement
  • H04W 76/11 - Attribution ou utilisation d'identifiants de connexion
  • H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
  • H04W 12/55 - Appariement sécurisé de dispositifs faisant intervenir trois dispositifs ou plus, p. ex. appariement de groupes
  • H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection

58.

VPN deep packet inspection

      
Numéro d'application 16590253
Numéro de brevet 11570150
Statut Délivré - en vigueur
Date de dépôt 2019-10-01
Date de la première publication 2020-04-02
Date d'octroi 2023-01-31
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Work, Steven C.
  • Masanagi, Prakash N.
  • Peterson, Christopher D.

Abrégé

Policy enforcement previously available for web proxy access methods is extended and applied to layer 3 packets flowing through VPN channels. With these extensions, a common security policy is possible that is enforceable between VPN proxied access and VPN tunneled access. Equivalent security policy to tunnel based VPN access without comprising the inherent performance, scalability and application compatibility advantages tunnel based VPNs have over their proxy based VPN counterparts.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

59.

Application signature authorization

      
Numéro d'application 16533665
Numéro de brevet 11140131
Statut Délivré - en vigueur
Date de dépôt 2019-08-06
Date de la première publication 2020-02-13
Date d'octroi 2021-10-05
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Medappa, Chemira
  • Peterson, Christopher D.
  • Telehowski, David

Abrégé

An appliance works in conjunction with an agent on a remote device to control application access to a corporate network. In conjunction with an SSL tunnel and policy operating at the appliance, granular application control may be implemented. In particular, a device user may determine what applications from a set of applications may access the corporate network and which applications do not access the network. The applications may be analyzed to determine whether the application is good or bad, as what security configurations, approvals and denials are associated with the application.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/08 - Sécurité d'accès
  • H04W 12/37 - Gestion des politiques de sécurité pour des dispositifs mobiles ou pour le contrôle d’applications mobiles
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

60.

CLOUD BASED JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION

      
Numéro d'application US2019032283
Numéro de publication 2019/222261
Statut Délivré - en vigueur
Date de dépôt 2019-05-14
Date de publication 2019-11-21
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Dubrovsky, Aleksandr
  • Das, Soumyadipta
  • Cheetancherl, Senthilkumar Gopinathan

Abrégé

Methods and apparatus consistent with the present disclosure may be performed by a Cloud computing device may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into, may perform deep packet inspection (DPI) on computer data, or identify a content rating associated with computer data. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. Furthermore, access to content associated with malware, potential malware, or with inappropriate content ratings may be blocked.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • G08B 23/00 - Alarmes réagissant à des conditions indésirables ou anormales, non spécifiées

61.

Cloud based just in time memory analysis for malware detection

      
Numéro d'application 16055958
Numéro de brevet 11232201
Statut Délivré - en vigueur
Date de dépôt 2018-08-06
Date de la première publication 2019-11-14
Date d'octroi 2022-01-25
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Dubrovsky, Aleksandr
  • Das, Soumyadipta
  • Cheetancheri, Senthilkumar Gopinathan

Abrégé

Methods and apparatus consistent with the present disclosure may be performed by a Cloud computing device may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into, may perform deep packet inspection (DPI) on computer data, or identify a content rating associated with computer data. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. Furthermore, access to content associated with malware, potential malware, or with inappropriate content ratings may be blocked.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

62.

Just in time memory analysis for malware detection

      
Numéro d'application 15890192
Numéro de brevet 10902122
Statut Délivré - en vigueur
Date de dépôt 2018-02-06
Date de la première publication 2019-08-01
Date d'octroi 2021-01-26
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Dubrovsky, Aleksandr
  • Korsunsky, Igor
  • Dhablania, Atul
  • Gmuender, John E.

Abrégé

Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

63.

Detection of exploitative program code

      
Numéro d'application 15858785
Numéro de brevet 10685110
Statut Délivré - en vigueur
Date de dépôt 2017-12-29
Date de la première publication 2019-07-04
Date d'octroi 2020-06-16
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Ganachari, Sai Sravan Kumar
  • He, Yao
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

64.

DETECTION OF EXPLOITATIVE PROGRAM CODE

      
Numéro d'application US2018067541
Numéro de publication 2019/133637
Statut Délivré - en vigueur
Date de dépôt 2018-12-26
Date de publication 2019-07-04
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Ganachari, Sai Sravan Kumar
  • He, Yao
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement

65.

Providing access to data in a secure communication

      
Numéro d'application 15851108
Numéro de brevet 10924508
Statut Délivré - en vigueur
Date de dépôt 2017-12-21
Date de la première publication 2019-06-27
Date d'octroi 2021-02-16
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

The present disclosure is directed to preventing computer data from being usurped and exploited by individuals or organizations with nefarious intent. Methods and systems consistent with the present disclosure may store keys and keying data for each of a plurality of connections in separate memory locations. These memory locations may store data that maps a virtual address to a physical memory address associated with storing information relating to a secure connection. These separate memory locations may have a unique instance for each individual communication connection session, for example each transport layer security (TLS) connection may be assigned memory via logical addresses that are mapped to one or more physical memory addresses on a per-core basis. Such architectures decouple actual physical addresses that are used in conventional architectures that assign a single large continuous physical memory partition that may be accessed via commands that access physical memory addresses directly.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]

66.

Dynamic bypass

      
Numéro d'application 15834914
Numéro de brevet 10812468
Statut Délivré - en vigueur
Date de dépôt 2017-12-07
Date de la première publication 2019-06-13
Date d'octroi 2020-10-20
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Raman, Raj
  • Dubrovsky, Aleksandr

Abrégé

Methods and apparatus consistent with the present disclosure may prevent a computer process from failing when a firewall located between a client device and a server identifies that a process at the firewall should be bypassed using fingerprint information associated with a connection attempt. When fingerprint information stored at a firewall matches previously received fingerprint information, the firewall may allow processes typically performed at the firewall to be bypassed, thereby, allowing communications to pass between the client device and the server without inspection. When that fingerprint information does not match previously received fingerprint information, the firewall may perform a process that causes the client device to fail the first connection attempt. Because of this, methods consistent with the present disclosure may allow communications from an application program to be passed through a firewall without relying on an ever growing list of trusted application programs.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

67.

Just in time memory analysis for malware detection

      
Numéro d'application 15783793
Numéro de brevet 11151252
Statut Délivré - en vigueur
Date de dépôt 2017-10-13
Date de la première publication 2019-04-18
Date d'octroi 2021-10-19
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Dubrovsky, Alex
  • Korsunsky, Igor

Abrégé

Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

68.

JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION

      
Numéro d'application US2018055694
Numéro de publication 2019/075388
Statut Délivré - en vigueur
Date de dépôt 2018-10-12
Date de publication 2019-04-18
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Das, Soumyadipta
  • Dubrovsky, Alex
  • Korsunsky, Igor

Abrégé

Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.

Classes IPC  ?

69.

Real-time prevention of malicious content via dynamic analysis

      
Numéro d'application 15671445
Numéro de brevet 10873589
Statut Délivré - en vigueur
Date de dépôt 2017-08-08
Date de la première publication 2019-02-14
Date d'octroi 2020-12-22
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Cheetancheri, Senthil
  • Dubrovsky, Alex
  • Holagi, Sachin

Abrégé

This disclosure is related to methods and apparatus used to for preventing malicious content from reaching a destination via a dynamic analysis engine may operate in real-time when packetized data is received. Data packets sent from a source computer may be received and be forwarded to an analysis computer that may monitor actions performed by executable program code included within the set of data packets when making determinations regarding whether the data packet set should be classified as malware. In certain instances all but a last data packet of the data packet set may also be sent to the destination computer while the analysis computer executes and monitors the program code included in the data packet set. In instances when the analysis computer identifies that the data packet set does include malware, the malware may be blocked from reaching the destination computer by not sending the last data packet to the destination computer.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

70.

REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSIS

      
Numéro d'application US2018045814
Numéro de publication 2019/032702
Statut Délivré - en vigueur
Date de dépôt 2018-08-08
Date de publication 2019-02-14
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Cheetancheri, Senthil
  • Dubrovsky, Alex
  • Holagi, Sachin

Abrégé

This disclosure is related to methods and apparatus used to for preventing malicious content from reaching a destination via a dynamic analysis engine may operate in real-time when packetized data is received. Data packets sent from a source computer may be received and be forwarded to an analysis computer that may monitor actions performed by executable program code included within the set of data packets when making determinations regarding whether the data packet set should be classified as malware. In certain instances all but a last data packet of the data packet set may also be sent to the destination computer while the analysis computer executes and monitors the program code included in the data packet set. In instances when the analysis computer identifies that the data packet set does include malware, the malware may be blocked from reaching the destination computer by not sending the last data packet to the destination computer.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement

71.

Two stage memory allocation using a cache

      
Numéro d'application 15596987
Numéro de brevet 09898217
Statut Délivré - en vigueur
Date de dépôt 2017-05-16
Date de la première publication 2017-08-31
Date d'octroi 2018-02-20
Propriétaire SONICWALL INC. (USA)
Inventeur(s) Zhang, Xiangyang

Abrégé

The presently claimed invention manages memory in a multi-processor system. The presently claimed invention may use a combination of global and local locks when allocating memory and de-allocating memory in a multi-processor system. A method consistent with the presently claimed invention may first receive an allocation of a first memory space in the system memory of a multi-core processing system. The allocation of the first memory space may globally locks the first memory space where the memory space may administered by a software module using one or more local locks.

Classes IPC  ?

  • G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
  • G06F 13/00 - Interconnexion ou transfert d'information ou d'autres signaux entre mémoires, dispositifs d'entrée/sortie ou unités de traitement
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • G06F 9/52 - Synchronisation de programmesExclusion mutuelle, p. ex. au moyen de sémaphores
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

72.

Managing persistent cookies on a corporate web portal

      
Numéro d'application 14991567
Numéro de brevet 10021036
Statut Délivré - en vigueur
Date de dépôt 2016-01-08
Date de la première publication 2017-04-13
Date d'octroi 2018-07-10
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Peterson, Christopher D.
  • Kulkarni, Jeetendra

Abrégé

Systems and methods for management of persistent cookies in a corporate web portal are described. A plurality of zones may be defined and stored in memory. Each zone may be associated with a zone property indicative of whether cookies are allowed. A resource request may be received from a user device over a network where access to the requested resource may require a cookie. The user device may be classified into a zone from the plurality of zones based on the attributes of the user device. The cookie may be automatically installed on the user device based on a zone property for the zone and for those resources that have been configured to require installation of a cookie installed without requiring further user interaction following the request.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/911 - Contrôle d’admission au réseau et allocation de ressources, p.ex. allocation de bande passante ou renégociation en cours de communication
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 12/58 - Systèmes de commutation de messages
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04W 12/08 - Sécurité d'accès

73.

Unified source user checking of TCP data packets for network data leakage prevention

      
Numéro d'application 14819104
Numéro de brevet 10015145
Statut Délivré - en vigueur
Date de dépôt 2015-08-05
Date de la première publication 2017-02-09
Date d'octroi 2018-07-03
Propriétaire SonicWALL Inc. (USA)
Inventeur(s)
  • Ling, Hui
  • Chen, Zhong
  • Yu, Cuiping
  • Cheng, Zunping

Abrégé

Systems and methods are directed towards network data leakage prevention (DLP). More specifically, the systems and methods are directed towards using TCP (Transmission Control Protocol) data packets in conjunction with the DLP monitor. The network DLP utilizes TCP data packets to carry source user identity. With the source user identity, the DLP monitor can determine if sensitive data can be transmitted based on the provided user information and corresponding DLP policies for each user. Furthermore, the DLP monitor can determine if sensitive data can also be transmitted for particular users in situations where multiple users share the same IP address.

Classes IPC  ?

  • G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

74.

Adaptive core grouping

      
Numéro d'application 14819403
Numéro de brevet 10198262
Statut Délivré - en vigueur
Date de dépôt 2015-08-05
Date de la première publication 2017-02-09
Date d'octroi 2019-02-05
Propriétaire SONICWALL INC. (USA)
Inventeur(s)
  • Mao, Miao
  • Chen, Zhong
  • Gmuender, John

Abrégé

The present invention relates to a system, method, and non-transitory storage medium executable by one or more processors at a multi-processor system that improves load monitoring and processor-core assignments as compared to conventional approaches. A method consistent with the present invention includes a first data packet being received at a multi-processor system. After the first packet is received it may be sent to a first processor where the first processor identifies a first processing task associated with the first data packet. The first data packet may then be forwarded to a second processor that is optimized for processing the first processing task of the first data packet. The second processor may then process the first processing task of the first data packet. Program code associated with the first processing task may be stored in a level one (L1) cache at the first processor.

Classes IPC  ?

  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p. ex. décodage d'instructions
  • G06F 12/0875 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache avec mémoire cache dédiée, p. ex. instruction ou pile

75.

Mobile device identify factor for access control policies

      
Numéro d'application 14167985
Numéro de brevet 10091201
Statut Délivré - en vigueur
Date de dépôt 2014-01-29
Date de la première publication 2014-05-29
Date d'octroi 2018-10-02
Propriétaire SonicWALL Inc. (USA)
Inventeur(s) Peterson, Christopher D.

Abrégé

A secure VPN connection is provided based on user identify and a hardware identifier. A client application may initiate the VPN connection. A client device user may provide identification information to the application, which then sends a VPN connection request to a remote VPN gateway. The VPN gateway may require an equipment identifier to establish the secure VPN gateway. If the hardware ID is registered, the secure VPN connection is established. If the hardware ID is not registered with the VPN gateway, the connection may be denied. In some instances, a connection may be established with an unregistered equipment ID based on settings at the VPN gateway.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole