-
公开(公告)号:US20240095383A1
公开(公告)日:2024-03-21
申请号:US17946159
申请日:2022-09-16
发明人: Gilbert Gatchalian , Kamal D. Sharma , Karthik Rajagopalan , Kevin A. Delson , Robert R. Rosseland , Yassine Touahri , Amer Ali , Jyothishwar Reddy Sama , Srinivasulu Bodapati , Brian Christman
CPC分类号: G06F21/6218 , G06F21/554 , G06F21/602
摘要: Methods are provided to secure a mutual Transport Layer Security (TLS) verification between a client computer and a server computer, using an authorized viewer. Methods may include intercepting a file at the authorized viewer. Methods may include using a content inspection Artificial Intelligence (AI) module to inspect the data. Methods may include preventing the transmission of malicious data to a server computer.
-
公开(公告)号:US20240113977A1
公开(公告)日:2024-04-04
申请号:US17957848
申请日:2022-09-30
发明人: Amer Ali , Brian Daniel Christman , Kamal D. Sharma , Gilbert Gatchalian , Karthik Rajagopalan , Kevin A. Delson , Robert Ronald Rosseland, JR. , Yassine Touahri , Jyothishwar Reddy Sama , Zaheeruddin Mohammed
IPC分类号: H04L47/2425 , H04L41/16
CPC分类号: H04L47/2425 , H04L41/16
摘要: Systems, computer program products, and methods are described herein for network traffic discovery and analysis. The present invention is configured to capture data traffic across network ports in a computing environment; retrieve source code from code repositories; determine that the data traffic and the source code are associated with application programming interface (API) traffic; determine a first API associated with the API traffic; determine, using a machine learning (ML) subsystem, whether the first API meets supervisory requirements; and invoke a remediation protocol in an instance when the first API does not meet supervisory requirements.
-
3.
公开(公告)号:US10021117B2
公开(公告)日:2018-07-10
申请号:US14986876
申请日:2016-01-04
发明人: Alan White , Michael B. Stark , Scott Morton , Jyothishwar Reddy Sama , Amer Ali , Lois Ann Helmerson , Mark Atchley , Jeffrey Myers
CPC分类号: H04L63/1408 , H04L61/2007 , H04L63/0227 , H04L63/0236
摘要: The present invention provides for analyzing secured network traffic to determine which devices and/or applications are accessed by authorized, and in some instances, unauthorized third-party entities. A fully automated methodology is disclosed for verification and validation of secured network accesses performed by an authorized third-party entity and the monitoring and investigation of unauthorized third-party threats/attacks on the secured network.
-
4.
公开(公告)号:US20170195343A1
公开(公告)日:2017-07-06
申请号:US14986876
申请日:2016-01-04
发明人: Alan White , Michael B. Stark , Scott Morton , Jyothishwar Reddy Sama , Amer Ali , Lois Ann Helmerson , Mark Atchley , Jeffrey Myers
CPC分类号: H04L63/1408 , H04L61/2007 , H04L63/0227 , H04L63/0236
摘要: The present invention provides for analyzing secured network traffic to determine which devices and/or applications are accessed by authorized, and in some instances, unauthorized third-party entities. A fully automated methodology is disclosed for verification and validation of secured network accesses performed by an authorized third-party entity and the monitoring and investigation of unauthorized third-party threats/attacks on the secured network.
-
-
-