| Inter-process serving of machine learning features from mapped memory for … |
2023-7-26 |
2024-1-16 |
2024-1-16 |
| Web browser remoting across a network using draw commands |
2023-7-20 |
2023-11-16 |
|
| Establishing a cryptographic tunnel between a first tunnel endpoint and a … |
2023-6-12 |
2023-10-12 |
|
| Remoting application across a network using draw commands with an isolator … |
2023-6-12 |
2023-10-26 |
|
| Method and system for determining a path maximum transmission unit (mtu) … |
2023-6-12 |
2023-10-12 |
|
| Methods and apparatuses for providing internet-based proxy services |
2023-6-12 |
2023-10-12 |
|
| Unified network service that connects multiple disparate private networks and … |
2023-5-31 |
2023-9-28 |
|
| Distributed key management system with a key lookup service |
2023-5-23 |
2024-2-06 |
2024-2-06 |
| Isolating internet-of-things (iot) devices using a secure overlay network |
2023-3-17 |
2023-9-21 |
|
| Enforcing security policies in a zero trust security framework using a … |
2023-2-28 |
2024-1-09 |
2024-1-09 |
| Dynamic selection of where to execute application code in a distributed cloud … |
2023-2-08 |
2023-9-12 |
2023-9-12 |
| Machine learning based web application firewall |
2023-1-30 |
2023-10-17 |
2023-10-17 |
| Method and apparatus for traffic optimization in virtual private networks (VPNs … |
2023-1-24 |
2024-1-02 |
2024-1-02 |
| Machine learning-based malicious attachment detector |
2023-1-17 |
2023-5-18 |
|
| Verification of selected inbound electronic mail messages |
2023-1-11 |
2023-7-13 |
|
| Secure session capability using public-key cryptography without access to the … |
2023-1-03 |
2023-7-13 |
|
| Cloud Computing Platform That Executes Third-Party Code in A Distributed Cloud … |
2022-12-30 |
2023-5-04 |
|
| Intelligently routing internet traffic |
2022-12-28 |
2024-2-06 |
2024-2-06 |
| Loading and managing third-party tools on a website |
2022-12-27 |
2023-6-08 |
|
| Network layer performance and security provided by a distributed cloud … |
2022-12-18 |
2024-2-06 |
2024-2-06 |
| Selective traffic processing in a distributed cloud computing network |
2022-11-29 |
2023-3-23 |
|
| Modifying the congestion control algorithm applied to a connection based on … |
2022-11-07 |
2023-2-23 |
|
| Method and system for reliable application layer data transmission through … |
2022-11-01 |
2023-2-16 |
|
| Mobile application accelerator |
2022-10-25 |
2023-2-09 |
|
| State management and object storage in a distributed cloud computing network |
2022-9-30 |
2023-11-14 |
2023-11-14 |
| Method and apparatus for distributed emulation of behavior of a malicious … |
2022-9-30 |
2023-6-01 |
|
| Distributed key management system |
2022-9-29 |
2023-5-23 |
2023-5-23 |
| Non-http layer 7 protocol applications running in the browser |
2022-9-29 |
2023-6-22 |
|
| Cloud-based security service that includes external evaluation for accessing a … |
2022-9-29 |
2023-12-05 |
2023-12-05 |
| Implementing a queuing system in a distributed network |
2022-9-29 |
2023-8-29 |
2023-8-29 |
| Intelligently routing a response packet along a same connection as a request … |
2022-9-29 |
2023-10-24 |
2023-10-24 |
| Selection of an egress IP address for egress traffic of a distributed cloud … |
2022-9-06 |
2023-12-26 |
2023-12-26 |
| Virtual Private Network (VPN) Whose Traffic Is Intelligently Routed |
2022-8-22 |
2022-12-15 |
|
| Mobile Accelerator |
2022-8-16 |
2023-3-16 |
|
| Responding to search requests based on referrer information |
2022-8-08 |
2023-3-09 |
|
| Implementing a tiered cache topology with anycast networks |
2022-8-08 |
2023-4-20 |
|
| Protecting Internet of Things (IoT) Devices at the Network Level |
2022-8-01 |
2023-3-16 |
|
| Identity proxy and access gateway |
2022-7-18 |
2024-1-30 |
2024-1-30 |
| Concurrency control in an asynchronous event-loop based program environment |
2022-5-02 |
2024-1-02 |
2024-1-02 |
| Generating early hints informational responses at an intermediary server |
2022-5-02 |
2023-3-23 |
|
| Establishing and using a tunnel from an origin server in a distributed edge … |
2022-4-25 |
2023-2-09 |
|
| Identifying malicious client network applications based on network request … |
2022-2-15 |
2022-6-02 |
|
| Method and apparatus of automatic generation of a content security policy for a … |
2022-2-15 |
2022-10-20 |
|
| Determining an origin server is potentially compromised |
2022-2-08 |
2023-5-09 |
2023-5-09 |
| Phishing email campaign identification |
2022-1-12 |
2024-2-06 |
2024-2-06 |
| State Management and Storage With Policy Enforcement in a Distributed Cloud … |
2021-12-30 |
2022-6-09 |
|
| Transparent Proxy Conversion of Transmission Control Protocol (TCP) Fast Open … |
2021-10-25 |
2022-2-10 |
|
| Authoritative domain name system (DNS) server responding to DNS requests with … |
2021-10-25 |
2023-11-14 |
2023-11-14 |
| Method and apparatus of automatic route optimization in a private virtual … |
2021-10-25 |
2022-2-10 |
|
| Method and apparatus for automatically optimizing the loading of images in a … |
2021-10-19 |
2023-5-09 |
2023-5-09 |
| Decoupling of ip address bindings and use in a distributed cloud computing … |
2021-10-18 |
2022-6-09 |
|
| Incorporating web applications into web pages at the network level |
2021-9-30 |
2022-1-20 |
|
| Method and apparatus for reducing loading time of web pages |
2021-9-21 |
2022-1-06 |
|
| Traffic load balancing between a plurality of points of presence of a cloud … |
2021-9-21 |
2023-11-21 |
2023-11-21 |
| Scaling stateful services hosted in a cluster of server nodes |
2021-4-09 |
2021-11-02 |
2021-11-02 |
| Using a zero-knowledge proof to prove knowledge that a website visitor is a … |
2021-3-30 |
2022-10-06 |
|
| Persisting Encrypted Remote Browser Data At a Local Browser for Use in a Remote … |
2021-3-19 |
2022-9-22 |
|
| Supporting secure sessions in a cloud-based proxy service |
2021-2-22 |
2021-6-10 |
|
| Business email compromise detection system |
2021-1-15 |
2022-7-21 |
|
| Opportunistic Transmission Control Protocol (TCP) Connection Establishment |
2020-12-30 |
2021-7-01 |
|
| Methods and apparatuses for responding to requests for network resources … |
2020-12-18 |
2022-2-01 |
2022-2-01 |
| Distributed anticipatory bidirectional packet steering for software network … |
2020-12-14 |
2022-11-29 |
2022-11-29 |
| Caching assets in a multiple cache system |
2020-10-13 |
2021-9-23 |
|
| Cloud computing platform that executes third-party code in a distributed cloud … |
2020-9-28 |
2023-12-26 |
2023-12-26 |
| Message processing system with business email compromise detection |
2020-9-18 |
2021-6-29 |
2021-6-29 |
| Delivering video in a content delivery network |
2020-9-14 |
2023-8-22 |
2023-8-22 |
| Preloading on-demand code pieces in a distributed cloud computing network |
2020-7-27 |
2023-4-04 |
2023-4-04 |
| Serving an Online Advertisement Asynchronously |
2020-6-24 |
2020-12-24 |
|
| Third party validation of web content |
2020-6-23 |
2021-10-26 |
2021-10-26 |
| Inline data plane monitor placement and operation for network function … |
2020-4-15 |
2021-5-18 |
2021-5-18 |
| Registering for internet-based proxy services |
2020-3-30 |
2022-2-08 |
2022-2-08 |
| Self-monitoring universal scaling controller for software network functions |
2020-3-25 |
2022-2-08 |
2022-2-08 |
| Secure session capability using public-key cryptography without access to the … |
2020-3-16 |
2022-9-06 |
2022-9-06 |
| Cloud computing platform that isolates suspicious third-party code in a … |
2020-3-02 |
2020-10-13 |
2020-10-13 |
| Using post-cache edge computing to re-populate dynamic content in cached … |
2019-12-20 |
2020-10-27 |
2020-10-27 |
| Multiply-Encrypting Data Requiring Multiple Keys for Decryption |
2019-11-18 |
2020-6-11 |
|
| Incompatible network gateway provisioned through dns |
2019-9-13 |
2020-1-02 |
|
| Method and apparatus for transparently enabling compatibility between multiple … |
2019-8-27 |
2020-9-08 |
2020-9-08 |
| Managing domain name system (DNS) record cache across multiple DNS servers … |
2019-8-06 |
2022-5-03 |
2022-5-03 |
| Site and page specific resource prioritization |
2019-7-19 |
2021-10-26 |
2021-10-26 |
| Local isolator application with cohesive application-isolation interface |
2019-7-11 |
2020-2-04 |
2020-2-04 |
| Domain name system cname record management |
2019-7-08 |
2019-10-31 |
|
| Application remoting using network vector rendering |
2019-7-03 |
2020-2-11 |
2020-2-11 |
| Method and apparatus for reducing network resource transmission size using … |
2019-6-17 |
2020-10-06 |
2020-10-06 |
| Deep learning-based detection of phishing links |
2019-6-04 |
2022-7-26 |
2022-7-26 |
| Internet-based proxy service for responding to server offline errors |
2019-6-03 |
2020-12-01 |
2020-12-01 |
| Dynamically Serving Digital Certificates Based on Secure Session Properties |
2019-5-24 |
2019-9-12 |
|
| Automatically Redirecting Mobile Client Devices to Optimized Mobile Content |
2019-4-22 |
2019-12-12 |
|
| Using post-cache edge computing to re-populate nonce values in cached content |
2019-4-04 |
2020-3-03 |
2020-3-03 |
| Validating firewall rules using data at rest |
2019-3-29 |
2020-10-01 |
|
| Server-side resource prioritization |
2019-3-27 |
2020-10-01 |
|
| Transparent inspection of responses from origin servers to identify protected … |
2019-3-27 |
2020-8-04 |
2020-8-04 |
| Modular System Framework for Software Network Function Automation |
2019-3-22 |
2020-2-13 |
|
| Universal Scaling Controller for Software Network Functions |
2019-3-14 |
2020-1-23 |
|
| Packet filters in security appliances with modes and intervals |
2019-1-18 |
2020-2-25 |
2020-2-25 |
| Managing private key access in multiple nodes |
2019-1-07 |
2021-3-02 |
2021-3-02 |
| Origin Server Protection Notification |
2019-1-07 |
2019-5-30 |
|
| Proxy server streaming a resource to multiple requesting client devices while … |
2018-11-30 |
2019-7-09 |
2019-7-09 |
| Method and apparatus for optimization of advertisement elements in network … |
2018-11-28 |
2020-3-24 |
2020-3-24 |
| Applying filter expressions to requests at an edge server |
2018-11-15 |
2020-5-21 |
|