Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Integrated bot and captcha techniques 2021-6-01 2022-4-21
Packet watermark with static salt and token validation 2021-4-25 2022-10-27
User Defined Objects for Network Devices 2021-4-15 2021-8-19
Cluster-based precision mitigation of network attacks 2021-1-04 2022-10-18 2022-10-18
Transmission Control of Protocol State Exchange for Dynamic Stateful Service … 2020-3-02 2020-6-25
Policy-driven management of application traffic for providing services to cloud … 2019-3-06 2019-7-04
Caching network generated security certificates 2019-3-01 2020-3-31 2020-3-31
Automated Adjustment of Subscriber Policies 2019-2-05 2019-6-06
System and method for an adaptive TCP SYN cookie with time validation 2018-12-28 2022-4-26 2022-4-26
Health monitor based distributed denial of service attack mitigation 2018-12-14 2021-1-05 2021-1-05
Distributing application traffic to servers based on dynamic service response … 2018-11-29 2019-12-24 2019-12-24
Location determination for user authentication 2018-11-24 2019-7-02 2019-7-02
Mitigating TCP SYN DDOS attacks using TCP reset 2018-11-23 2020-1-14 2020-1-14
Network session traffic behavior learning system 2018-10-22 2021-11-30 2021-11-30
Slave secure sockets layer proxy system 2018-9-07 2021-12-28 2021-12-28
Cluster-based determination of signatures for detection of anomalous data … 2018-9-07 2021-3-02 2021-3-02
Enabling planned upgrade/downgrade of network devices without impacting network … 2018-9-07 2019-1-17
Systems and methods for network access control 2018-8-28 2020-3-03 2020-3-03
Generating secure name records 2018-8-01 2021-1-26 2021-1-26
Implementing and optimizing secure socket layer intercept 2018-7-25 2020-11-10 2020-11-10
Facilitating a secure 3 party network session by a network device 2018-7-03 2018-11-01
Distributing service sessions 2018-6-08 2020-12-08 2020-12-08
Processing data packets using a policy based network path 2018-6-04 2020-5-19 2020-5-19
Programming a data network device using user defined scripts with licenses 2018-4-30 2018-8-30
Eliminating data traffic redirection in scalable clusters 2018-4-30 2020-8-11 2020-8-11
Programming a data network device using user defined scripts 2018-4-30 2018-8-30
System and method to balance servers based on server load status 2018-3-27 2018-7-26
Determining an application delivery server based on geo-location information 2018-3-22 2020-8-04 2020-8-04
Active application response delay time 2018-2-27 2019-4-09 2019-4-09
Synchronization of configuration file of virtual application distribution … 2018-1-26 2019-5-21 2019-5-21
Facilitating secure network traffic by an application delivery controller 2017-12-29 2018-5-03
Combining stateless and stateful server load balancing 2017-12-29 2018-5-03
Distributed system to determine a server's health 2017-12-29 2020-6-16 2020-6-16
Adaptive, deceptive and polymorphic security platform 2017-12-28 2021-2-02 2021-2-02
Managing health status of network devices in a distributed global server load … 2017-12-22 2019-12-31 2019-12-31
Graceful scaling in software driven networks 2017-12-11 2018-4-12
Application delivery controller and global server load balancer 2017-12-06 2021-5-11 2021-5-11
System and method of updating modules for application or content identification 2017-12-01 2018-3-29
Processing packet header with hardware assistance 2017-11-16 2019-7-09 2019-7-09
Context aware threat protection 2017-11-16 2019-12-10 2019-12-10
Virtual application delivery chassis system 2017-10-27 2018-2-22
Application aware systems and methods to process user loadable network … 2017-10-20 2018-7-19
Hardware-based packet editor 2017-7-26 2017-11-09
System and method for customizing the identification of application or content … 2017-7-24 2017-11-09
Tcp fast open hardware support in proxy devices 2017-7-18 2019-1-24
Automatic capture of network data for a detected anomaly 2017-7-11 2020-1-22
Load distribution in data networks 2017-7-10 2019-11-26 2019-11-26
System and method to associate a private user identity with a public user … 2017-6-23 2018-4-24 2018-4-24
System and method for mobile network access load balancing 2017-5-30 2020-4-14 2020-4-14
Applying security policy to an application session 2017-5-22 2019-5-28 2019-5-28
Load balancing between computing clouds 2017-3-31 2019-6-25 2019-6-25
Interception of Secure Shell Communication Sessions 2017-3-29 2018-10-04
Reduction of Volume of Reporting Data Using Multiple Datasets 2017-3-28 2018-10-04
Reduction of Volume of Reporting Data Using Content Deduplication 2017-3-28 2018-10-04
Fault resilient virtual broadband gateway 2017-3-27 2020-4-28 2020-4-28
Distributed global server load balancing controllers sharing service delay time 2017-3-16 2020-1-14 2020-1-14
Processing a security policy for certificate validation error 2017-3-08 2019-8-20 2019-8-20
Dynamic capacity planning for application delivery platform across multiple … 2017-3-08 2019-10-22 2019-10-22
Perfect forward secrecy distributed denial of service attack defense 2017-1-27 2017-12-05 2017-12-05
Exchange of Control Information between Secure Socket Layer Gateways 2017-1-24 2017-6-08
Dynamic Session Rate Limiter 2017-1-04 2018-7-05
Forwarding policies on a virtual service network 2016-12-29 2019-7-02 2019-7-02
Reducing buffer usage for TCP proxy session based on delayed acknowledgement 2016-12-09 2018-5-22 2018-5-22
Measurement of application response delay time 2016-12-08 2019-4-02 2019-4-02
Verification of Server Certificates Using Hash Codes 2016-11-04 2018-5-10
SSL gateway with integrated hardware security module 2016-8-01 2019-7-02 2019-7-02
Intercepting Secure Session upon Receipt of Untrusted Certificate 2016-6-28 2017-12-28
Applying a Network Traffic Policy to an Application Session 2016-5-17 2016-9-08
System and method to process a chain of network applications 2016-1-13 2019-6-11 2019-6-11
Method and apparatus for optimizing hypertext transfer protocol (“HTTP”) … 2015-12-09 2017-3-21 2017-3-21
Implementation of secure socket layer intercept 2015-12-08 2019-11-05 2019-11-05
Allocating buffer for TCP proxy session based on dynamic network conditions 2015-9-23 2017-3-21 2017-3-21
Secure data flow open information analytics 2015-9-21 2017-10-10 2017-10-10
Methods to Manage Services over a Service Gateway 2015-6-24 2015-10-15
User Defined Objects for Network Devices 2015-6-24 2015-12-03
Techniques for passively gleaning properties of computing entities 2015-6-23 2020-11-03 2020-11-03
Captcha risk or score techniques 2015-5-08 2017-3-16
Client profile and service policy based captcha techniques 2015-5-08 2016-11-10
Distributed high availability processing methods for service sessions 2015-3-26 2015-10-29
Distributed multi-processing security gateway 2015-3-17 2015-9-01 2015-9-01
Perfect forward secrecy distributed denial of service attack detection 2015-2-05 2017-12-19 2017-12-19
Distributed denial of service cellular signaling 2015-1-05 2018-2-20 2018-2-20
Distributed multi-processing security gateway 2014-12-15 2016-5-17 2016-5-17
Network proxy layer for policy-based application proxies 2014-12-01 2015-7-22
Flagging security threats in web service requests 2014-10-23 2017-1-03 2017-1-03
Use of packet header extension for geolocation/geotargeting 2014-9-30 2016-3-31
Applications of processing packets which contain geographic location … 2014-9-30 2019-4-09 2019-4-09
Use of packet header extension for layer-3 direct server return 2014-9-30 2016-3-31
DNS denial of service attack protection 2014-9-16 2017-9-05 2017-9-05
Distributed database in software driven networks 2014-6-30 2016-2-11
Customizable high availability switchover control of application delivery … 2014-6-25 2015-12-31
User access authentication based on network access point 2014-5-29 2016-5-17 2016-5-17
Forwarding data packets using a service-based forwarding policy 2014-3-25 2015-10-01
Allocating resources in multi-core computing environments 2014-3-25 2018-7-10 2018-7-10
Configuration of a virtual service network 2013-12-13 2014-6-19
Biometric verification of a human internet user 2013-12-06 2021-11-02 2021-11-02
Accelerating service processing using fast path TCP 2012-11-26 2014-9-10
URL-based sticky routing tokens using a server-side cookie jar 2012-6-28 2013-9-24 2013-9-24
Dynamic Network Tunnel Endpoint Selection 2010-12-14 2011-4-07
Application protection from malicious network traffic 2007-12-11 2011-10-11 2011-10-11