Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Blockchain-based admission processes for protected entities 2022-7-29 2023-1-05
Method and system for detecting and mitigating https flood attacks 2022-5-31 2022-9-15
System and methods for malware detection using log analytics for channels and … 2022-4-29 2022-10-20
Techniques for generating signatures characterizing advanced application layer … 2021-11-23 2023-1-10 2023-1-10
Characterization of HTTP flood DDoS attacks 2021-11-23 2023-2-14 2023-2-14
Techniques for protecting web-access 2021-9-22 2023-3-23
Method and system for blockchain based cyber protection of network entities 2021-8-20 2021-12-09
Techniques for protecting against excessive utilization of cloud services 2021-3-15 2021-9-09
Techniques for disaggregated detection and mitigation of distributed denial-of- … 2020-12-30 2021-7-22
DETECTION AND MITIGATION OF SLOW APPLICATION LAYER DDoS ATTACKS 2020-12-23 2021-5-20
System and method for analytics based waf service configuration 2020-12-17 2021-6-24
System and method for attack sequence matching 2020-7-29 2020-11-12
Detection and mitigation ddos attacks performed over quic communication … 2020-6-29 2022-6-22
System and method for analytics based WAF service configuration 2020-5-26 2022-8-23 2022-8-23
Detection and mitigation of recursive domain name system attacks 2020-4-13 2020-7-30
System and method for automatic waf service configuration 2019-12-30 2021-7-01
Baselining techniques for detecting anomalous https traffic behavior 2019-12-19 2021-6-24
System and method for detecting bots using semi-supervised deep learning … 2019-9-18 2023-4-11 2023-4-11
Hardening of cloud security policies 2019-6-03 2020-8-13
System and method to detect and block bot traffic 2019-3-26 2022-9-20 2022-9-20
Techniques for defensing cloud platforms against cyber-attacks 2018-12-31 2020-7-02
Techniques for reducing the time to mitigate of ddos attacks 2018-12-20 2019-6-27
System and method for providing insights on distributed denial of service … 2018-12-11 2022-7-05 2022-7-05
Techniques for predicting subsequent attacks in attack campaigns 2018-12-11 2021-8-10 2021-8-10
System and method for out of path ddos attack detection 2018-12-06 2019-6-13
System and method for out of path DDoS attack detection 2018-12-06 2023-4-18 2023-4-18
Multi-tiered network architecture for mitigation of cyber-attacks 2018-10-18 2020-8-11 2020-8-11
System and method for botnet identification 2018-10-15 2019-4-18
Techniques for defense against domain name system (DNS) cyber-attacks 2018-3-29 2021-3-02 2021-3-02
Extensible, asynchronous, centralized analysis and optimization of server … 2017-12-28 2018-5-03
Method and system for load balancing over a cluster of authentication, … 2017-8-25 2017-12-07
System and method for real-time tuning of inference systems 2017-4-10 2019-12-31 2019-12-31
System and method for operating protection services 2017-4-10 2017-7-27
Accelerating HTTP responses in a client/server environment 2016-12-29 2020-8-04 2020-8-04
Network-based perimeter defense system and method 2016-10-27 2021-1-05 2021-1-05
Techniques for adaptive traffic direction via scalable application delivery … 2016-7-01 2017-1-05
Method and system for detection of headless browser bots 2016-6-01 2016-12-08
Method and system for fulfilling server push directives on an edge proxy 2016-5-05 2020-4-21 2020-4-21
Optimized stream management 2016-5-04 2017-11-09
Method and system for detecting and mitigating attacks performed using … 2016-5-04 2017-6-06 2017-6-06
Optimization of asynchronous pushing of web resources 2016-2-24 2020-4-07 2020-4-07
Techniques for distribution of application delivery 2016-1-19 2018-11-27 2018-11-27
Network protection system and method 2016-1-10 2017-5-02 2017-5-02
Techniques for separating the processing of clients' traffic to different zones … 2015-12-03 2017-3-07 2017-3-07
System and method for detecting abnormal traffic behavior using infinite … 2015-11-05 2017-5-11
System and method for stateless distribution of bidirectional flows with … 2015-9-30 2022-7-19 2022-7-19
Multi-layer traffic steering for service chaining over software defined … 2015-6-18 2015-12-24
System and methods for malware detection using log based crowdsourcing analysis 2015-6-15 2019-8-27 2019-8-27
Techniques for traffic diversion in software defined networks for mitigating … 2015-6-02 2016-12-29
Method for live migration of virtual machines 2015-1-28 2015-5-21
Method and system for configuring behavioral network intelligence system using … 2014-12-04 2019-8-06 2019-8-06
Techniques for optimizing authentication challenges for detection of malicious … 2014-10-22 2016-4-28
Method and system for detection of malicious bots 2014-2-18 2016-3-22 2016-3-22
Method and system for efficient deployment of web applications in a multi- … 2013-11-13 2014-3-06
Escalation security method for use in software defined networks 2013-9-24 2015-3-26
System and method for creation, distribution, application, and management of … 2013-6-25 2016-9-27 2016-9-27
Techniques for providing scalable application delivery controller services 2013-4-04 2013-10-10
System and method thereof for mitigating denial of service attacks in virtual … 2013-3-14 2014-9-18
Edge side landing pages 2013-3-06 2016-4-05 2016-4-05
Method and system for spooling diameter transactions 2012-12-31 2017-5-02 2017-5-02
Mobile resource accelerator 2012-9-07 2013-3-21
Optimized rendering of dynamic content 2012-5-18 2018-12-18 2018-12-18
Method for executing virtual application delivery controllers having different … 2012-2-27 2012-9-06
Asynchronous context data messaging 2012-1-30 2013-8-13 2013-8-13
Image Optimization 2012-1-25 2012-8-02
Multi dimensional attack decision system and method thereof 2011-11-29 2013-10-22 2013-10-22
Method and system for profiling data communication activity of users of mobile … 2011-9-20 2012-3-22
In-line network device for storing application-layer data, processing … 2011-9-06 2013-12-17 2013-12-17
Automated Optimization Based On Determination Of Website Usage Scenario 2011-3-18 2011-9-22
Method and System for Generating an Enforceable Security Policy Based on … 2010-10-25 2012-4-26
Partial Content Caching 2008-8-06 2009-10-08
Multi-virtual service module pinhole or connection class offload 2008-6-04 2010-6-15 2010-6-15
Method and System for Providing Connection Resiliency 2007-11-20 2009-5-21
Dynamic network protection 2007-10-24 2008-2-28
Adaptive Behavioral HTTP Flood Protection 2007-10-09 2008-4-10
Automatic Signature Propagation Network 2007-10-09 2008-4-10
Method of generating anomaly pattern for HTTP flood protection 2007-10-09 2009-11-24 2009-11-24
Cache expiry in multiple-server environment 2007-8-10 2009-2-12
Method, System and Computer Program Product for Preventing SIP Attacks 2007-8-08 2009-2-12
Systems and Methods for Providing Network-Wide, Traffic-Aware Dynamic … 2007-5-15 2008-11-20
Geographic resiliency and load balancing for SIP application services 2007-5-09 2015-9-22 2015-9-22
Systems, methods, and computer program products for passively routing secure … 2007-1-19 2011-5-31 2011-5-31
Systems, methods, and computer program products for passively transforming … 2007-1-19 2008-6-19
Storing and retrieving user context data 2006-2-21 2007-8-30
Debugging application performance over a network 2005-6-22 2006-2-09
Stateful attack protection 2004-12-22 2006-6-22
Content inspection in secure networks 2004-8-03 2005-3-03
Content security by network switch 2003-11-14 2004-6-10
Policy enforcement in dynamic networks 2003-11-14 2004-9-09
Passive SSL decryption 2003-8-25 2005-3-03
Persistent redirection engine 2003-1-02 2003-7-03
Multiple component connector plane for a network device 2002-4-24 2006-10-17 2006-10-17
Method and apparatus for discovering client proximity using race type … 2001-12-27 2003-7-03
Controlling traffic on links between autonomous systems 2001-5-03 2002-11-07
Method and apparatus for discovering client proximity network sites 2000-11-30 2006-9-05 2006-9-05