APPARATUS AND METHOD FOR HIGH THROUGHPUT NETWORK SECURITY SYSTEMS

Number of patents in Portfolio can not be more than 2000

United States of America Patent

APP PUB NO 20080077793A1
SERIAL NO

11859530

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

An accelerated network security system includes, in part, a network security engine and a processing module configured to perform network security functions. The network security engine includes an input module configured to receive input data and generate an intermediate data in response, a core engine configured to perform security function operations on the first intermediate data to generate a first output data, and an output module configured to receive the first output data and generate a processed output data in response. The processing module includes a multitude of processing cores configured to operate concurrently, a memory configured to store processing core instructions and processing core data associated with the multitude of processing cores, and a processing controller configured to periodically allocate to each processing core one or more discrete blocks of processing time. The number of processing core data is greater than the number of processing cores.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTEL CORPORATIONSANTA CLARA, CA29226
Sensory Networks, Inc.PALO ALTO, CA5

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Barrie, Robert Matthew Double Bay, AU 22 625
Place, Anthony Waterloo, AU 2 142
Tan, Teewoon Roseville, AU 14 332
Williams, Darren Newtown, AU 27 622

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTEL CORPORATION (1)
* 7103881 Virtual machine to provide compiled code to processing elements embodied on a processor device 45 2002
 
CAVIUM, INC. (1)
* 7606998 Store instruction ordering for multi-core processor 1 2004
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (5)
9824209 Framework for efficient security coverage of mobile software applications that is usable to harden in the field code 0 2013
9823895 Memory management for finite automata processing 0 2014
9825976 Detection and classification of exploit kits 0 2015
9825989 Cyber attack early warning system 0 2015
9824216 Susceptible environment detection system 0 2015
 
QUALCOMM INCORPORATED (1)
* 9767320 Hardware enforced content protection for graphics processing units 0 2015
 
FireEye, Inc. (74)
9027135 Prospective client identification using malware attack detection 64 2007
8898788 Systems and methods for malware attack prevention 60 2007
8881282 Systems and methods for malware attack detection and identification 61 2007
8850571 Systems and methods for detecting malicious network content 61 2008
* 2010/0115,621 Systems and Methods for Detecting Malicious Network Content 143 2008
8793787 Detecting malicious network content using virtual environment components 66 2009
* 2010/0192,223 Detecting Malicious Network Content Using Virtual Environment Components 100 2009
8832829 Network-based binary file extraction and analysis for malware detection 56 2009
* 2011/0078,794 Network-Based Binary File Extraction and Analysis for Malware Detection 107 2009
9106694 Electronic message analysis for malware detection 52 2011
8935779 Network-based binary file extraction and analysis for malware detection 52 2012
9367681 Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application 6 2013
9195829 User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications 16 2013
9176843 Framework for efficient security coverage of mobile software applications 18 2013
9159035 Framework for computer application analysis of sensitive information tracking 20 2013
9009822 Framework for multi-phase analysis of mobile applications 57 2013
9009823 Framework for efficient security coverage of mobile software applications installed on mobile devices 57 2013
8990944 Systems and methods for automatically detecting backdoors 54 2013
9626509 Malicious content analysis with multi-version application support within single operating environment 1 2013
* 9565202 System and method for detecting exfiltration content 2 2013
9355247 File extraction from memory dump for malicious content analysis 3 2013
9104867 Malicious content analysis using simulated user interaction without user involvement 49 2013
9430646 Distributed systems and methods for automatically detecting unknown bots and botnets 4 2013
9311479 Correlation and consolidation of analytic data for holistic view of a malware attack 17 2013
9251343 Detecting bootkits resident on compromised computers 15 2013
9495180 Optimized resource allocation for virtual machines within a malware content detection system 2 2013
9635039 Classifying sets of malicious indicators for detecting command and control communications associated with malware 1 2013
9536091 System and method for detecting time-bomb malware 2 2013
8990939 Systems and methods for scheduling analysis of network content for malware 52 2013
9356944 System and method for detecting malicious traffic using a virtual machine configured with a select software environment 3 2013
9300686 System and method for detecting malicious links in electronic messages 16 2013
9306960 Systems and methods for unauthorized activity defense 14 2013
9027130 Systems and methods for unauthorized activity defense 0 2013
9736179 System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection 0 2013
9628507 Advanced persistent threat (APT) detection center 1 2013
9596258 System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection 0 2013
* 9294501 Fuzzy hash of behavioral results 17 2013
9171160 Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses 20 2013
* 2015/0096,023 FUZZY HASH OF BEHAVIORAL RESULTS 23 2013
9628498 System and method for bot detection 3 2013
9189627 System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection 16 2013
9262635 Detection efficacy of virtual machine-based analysis with application specific events 16 2014
9591020 System and method for signature generation 1 2014
9241010 System and method for network behavior detection 17 2014
9756074 System and method for IPS and VM-based detection of suspicious objects 0 2014
9747446 System and method for run-time object classification 0 2014
9591015 System and method for offloading packet processing and static analysis operations 1 2014
9432389 System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object 1 2014
9223972 Dynamically remote tuning of a malware content detection system 20 2014
9594912 Return-oriented programming detection 1 2014
9438623 Computer exploit detection using heap spray pattern matching 1 2014
9398028 System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers 3 2014
9282109 System and method for analyzing packets 14 2014
9690936 Multistage system and method for analyzing obfuscated content for malware 0 2014
9363280 System and method of detecting delivery of malware using cross-customer data 5 2014
9225740 Framework for iterative analysis of mobile software applications 19 2014
9773112 Exploit detection of malware and malware families 0 2014
9589135 Exploit detection of malware and malware families 0 2014
9690933 Framework for classifying an object as malicious with machine learning for deploying updated predictive models 0 2014
9306974 System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits 16 2015
9690606 Selective system call monitoring 0 2015
9438613 Dynamic content activation for automated analysis of embedded objects 1 2015
9438622 Systems and methods for analyzing malicious PDF network content 1 2015
9483644 Methods for detecting file altering malware in VM based analysis 1 2015
9594904 Detecting malware based on reflection 2 2015
9594905 Framework for efficient security coverage of mobile software applications using machine learning 1 2015
9792196 Framework for efficient security coverage of mobile software applications 0 2015
9560059 System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection 2 2015
9516057 Systems and methods for computer worm defense 1 2016
9641546 Electronic device for aggregation, correlation and consolidation of analysis attributes 1 2016
9661018 System and method for detecting anomalous behaviors using a virtual machine environment 2 2016
9609007 System and method of detecting delivery of malware based on indicators of compromise from different sources 1 2016
9661009 Network-based malware detection 1 2016
9787700 System and method for offloading packet processing and static analysis operations 0 2017
 
Encassa Pty Ltd (1)
* 2009/0198,994 UPDATED SECURITY SYSTEM 16 2009
 
JUNIPER NETWORKS, INC. (5)
* 9106693 Attack detection and prevention using global device fingerprinting 2 2013
* 2014/0283,061 ATTACK DETECTION AND PREVENTION USING GLOBAL DEVICE FINGERPRINTING 2 2013
9015839 Identifying malicious devices within a computer network 2 2013
9258328 Identifying malicious devices within a computer network 0 2015
9497163 Identifying malicious devices within a computer network 0 2015
 
AGERE SYSTEMS INC. (1)
* 2008/0080,505 Methods and Apparatus for Performing Packet Processing Operations in a Network 2 2006
 
RICOH COMPANY, LTD. (1)
* 9473659 Blank skip action in an image forming apparatus 0 2013
 
IP RESERVOIR, LLC (4)
* 2012/0095,893 METHOD AND APPARATUS FOR HIGH-SPEED PROCESSING OF FINANCIAL MARKET DEPTH DATA 27 2009
9582831 High speed processing of financial information using FPGA devices 0 2011
9672565 High speed processing of financial information using FPGA devices 0 2013
9396222 Method and system for high performance integration, processing and searching of structured and unstructured data using coprocessors 0 2014
 
NEC CORPORATION (1)
* 2012/0044,935 Relay control unit, relay control system, relay control method, and relay control program 10 2011
 
Fire Eye, Inc. (1)
9197664 System and method for malware containment 14 2015
 
INTEL CORPORATION (1)
* 9183171 Fast deskew when exiting low-power partial-width high speed link state 0 2012
 
The United States of America as represented by the United States Department of Energy (1)
* 8850583 Intrusion detection using secure signatures 6 2013
 
NVIDIA CORPORATION (1)
* 9024957 Address independent shader program loading 0 2007
 
CAVIUM, INC. (4)
* 9264357 Apparatus and method for table search with centralized memory pool in a network switch 0 2014
* 9785403 Engine architecture for processing finite automata 0 2014
* 2015/0067,123 Engine Architecture for Processing Finite Automata 16 2014
9762544 Reverse NFA generation and processing 1 2015
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (2)
* 8687505 Apparatus and method for controlling traffic 0 2010
* 2011/0149,727 APPARATUS AND METHOD FOR CONTROLLING TRAFFIC 4 2010
* Cited By Examiner