APPARATUS AND METHOD FOR HIGH THROUGHPUT NETWORK SECURITY SYSTEMS

Number of patents in Portfolio can not be more than 2000

United States of America Patent

APP PUB NO 20080077793A1
SERIAL NO

11859530

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

An accelerated network security system includes, in part, a network security engine and a processing module configured to perform network security functions. The network security engine includes an input module configured to receive input data and generate an intermediate data in response, a core engine configured to perform security function operations on the first intermediate data to generate a first output data, and an output module configured to receive the first output data and generate a processed output data in response. The processing module includes a multitude of processing cores configured to operate concurrently, a memory configured to store processing core instructions and processing core data associated with the multitude of processing cores, and a processing controller configured to periodically allocate to each processing core one or more discrete blocks of processing time. The number of processing core data is greater than the number of processing cores.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTEL CORPORATIONSANTA CLARA, CA29065
Sensory Networks, Inc.PALO ALTO, CA5

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Barrie, Robert Matthew Double Bay, AU 22 682
Place, Anthony Waterloo, AU 2 165
Tan, Teewoon Roseville, AU 14 371
Williams, Darren Newtown, AU 27 677

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTEL CORPORATION (1)
* 7103881 Virtual machine to provide compiled code to processing elements embodied on a processor device 46 2002
 
CAVIUM, INC. (1)
* 7606998 Store instruction ordering for multi-core processor 5 2004
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (5)
9990393 Intelligent feed switch 0 2014
10002326 Compilation of finite automata based on memory hierarchy 0 2014
9973531 Shellcode detection 0 2014
9954890 Systems and methods for analyzing PDF documents 0 2016
9934381 System and method for detecting malicious activity based on at least one environmental property 0 2017
 
QUALCOMM INCORPORATED (1)
* 9767320 Hardware enforced content protection for graphics processing units 0 2015
 
FireEye, Inc. (92)
9027135 Prospective client identification using malware attack detection 85 2007
8898788 Systems and methods for malware attack prevention 77 2007
8881282 Systems and methods for malware attack detection and identification 80 2007
8850571 Systems and methods for detecting malicious network content 79 2008
* 2010/0115,621 Systems and Methods for Detecting Malicious Network Content 165 2008
8793787 Detecting malicious network content using virtual environment components 86 2009
* 2010/0192,223 Detecting Malicious Network Content Using Virtual Environment Components 121 2009
8832829 Network-based binary file extraction and analysis for malware detection 81 2009
* 2011/0078,794 Network-Based Binary File Extraction and Analysis for Malware Detection 128 2009
9106694 Electronic message analysis for malware detection 70 2011
8935779 Network-based binary file extraction and analysis for malware detection 69 2012
9824209 Framework for efficient security coverage of mobile software applications that is usable to harden in the field code 0 2013
9367681 Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application 9 2013
9195829 User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications 28 2013
9176843 Framework for efficient security coverage of mobile software applications 31 2013
9159035 Framework for computer application analysis of sensitive information tracking 34 2013
9009822 Framework for multi-phase analysis of mobile applications 74 2013
9009823 Framework for efficient security coverage of mobile software applications installed on mobile devices 76 2013
8990944 Systems and methods for automatically detecting backdoors 74 2013
9626509 Malicious content analysis with multi-version application support within single operating environment 2 2013
* 9565202 System and method for detecting exfiltration content 6 2013
9355247 File extraction from memory dump for malicious content analysis 5 2013
9104867 Malicious content analysis using simulated user interaction without user involvement 67 2013
9430646 Distributed systems and methods for automatically detecting unknown bots and botnets 7 2013
9311479 Correlation and consolidation of analytic data for holistic view of a malware attack 31 2013
9251343 Detecting bootkits resident on compromised computers 28 2013
9495180 Optimized resource allocation for virtual machines within a malware content detection system 3 2013
9635039 Classifying sets of malicious indicators for detecting command and control communications associated with malware 2 2013
9536091 System and method for detecting time-bomb malware 3 2013
8990939 Systems and methods for scheduling analysis of network content for malware 70 2013
9888016 System and method for detecting phishing using password prediction 0 2013
9356944 System and method for detecting malicious traffic using a virtual machine configured with a select software environment 4 2013
9300686 System and method for detecting malicious links in electronic messages 28 2013
9306960 Systems and methods for unauthorized activity defense 25 2013
9027130 Systems and methods for unauthorized activity defense 0 2013
9838416 System and method of detecting malicious content 0 2013
9736179 System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection 2 2013
9628507 Advanced persistent threat (APT) detection center 6 2013
9596258 System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection 0 2013
* 9294501 Fuzzy hash of behavioral results 30 2013
9171160 Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses 36 2013
* 2015/0096,023 FUZZY HASH OF BEHAVIORAL RESULTS 34 2013
9628498 System and method for bot detection 4 2013
9189627 System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection 27 2013
9262635 Detection efficacy of virtual machine-based analysis with application specific events 29 2014
9591020 System and method for signature generation 2 2014
9241010 System and method for network behavior detection 30 2014
9756074 System and method for IPS and VM-based detection of suspicious objects 0 2014
9747446 System and method for run-time object classification 1 2014
9591015 System and method for offloading packet processing and static analysis operations 2 2014
9432389 System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object 3 2014
9223972 Dynamically remote tuning of a malware content detection system 33 2014
9594912 Return-oriented programming detection 4 2014
9438623 Computer exploit detection using heap spray pattern matching 3 2014
9398028 System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers 4 2014
9912684 System and method for virtual analysis of network data 0 2014
9282109 System and method for analyzing packets 26 2014
9690936 Multistage system and method for analyzing obfuscated content for malware 0 2014
9363280 System and method of detecting delivery of malware using cross-customer data 7 2014
9225740 Framework for iterative analysis of mobile software applications 30 2014
9773112 Exploit detection of malware and malware families 0 2014
9589135 Exploit detection of malware and malware families 0 2014
9921978 System and method for enhanced security of storage devices 0 2014
9690933 Framework for classifying an object as malicious with machine learning for deploying updated predictive models 0 2014
9838417 Intelligent context aware user interaction for malware detection 0 2014
9306974 System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits 27 2015
9690606 Selective system call monitoring 0 2015
9438613 Dynamic content activation for automated analysis of embedded objects 2 2015
9438622 Systems and methods for analyzing malicious PDF network content 3 2015
9483644 Methods for detecting file altering malware in VM based analysis 3 2015
9594904 Detecting malware based on reflection 3 2015
9832212 Electronic message analysis for malware detection 0 2015
9912698 Malicious content analysis using simulated user interaction without user involvement 0 2015
9825976 Detection and classification of exploit kits 0 2015
9825989 Cyber attack early warning system 0 2015
9594905 Framework for efficient security coverage of mobile software applications using machine learning 2 2015
9910988 Malware analysis in accordance with an analysis plan 0 2015
9792196 Framework for efficient security coverage of mobile software applications 0 2015
9560059 System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection 3 2015
9824216 Susceptible environment detection system 0 2015
9916440 Detection efficacy of virtual machine-based analysis with application specific events 0 2016
* 9912691 Fuzzy hash of behavioral results 0 2016
9888019 System and method for detecting malicious links in electronic messages 0 2016
9516057 Systems and methods for computer worm defense 2 2016
9641546 Electronic device for aggregation, correlation and consolidation of analysis attributes 2 2016
9661018 System and method for detecting anomalous behaviors using a virtual machine environment 2 2016
9609007 System and method of detecting delivery of malware based on indicators of compromise from different sources 2 2016
9661009 Network-based malware detection 1 2016
9846776 System and method for detecting file altering behaviors pertaining to a malicious attack 0 2016
9838411 Subscriber based protection system 0 2016
9787700 System and method for offloading packet processing and static analysis operations 0 2017
9838408 System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers 0 2017
 
Encassa Pty Ltd (1)
* 2009/0198,994 UPDATED SECURITY SYSTEM 16 2009
 
JUNIPER NETWORKS, INC. (6)
* 9106693 Attack detection and prevention using global device fingerprinting 3 2013
* 2014/0283,061 ATTACK DETECTION AND PREVENTION USING GLOBAL DEVICE FINGERPRINTING 4 2013
9015839 Identifying malicious devices within a computer network 4 2013
9258328 Identifying malicious devices within a computer network 5 2015
9497163 Identifying malicious devices within a computer network 1 2015
9848016 Identifying malicious devices within a computer network 0 2016
 
AGERE SYSTEMS INC. (1)
* 2008/0080,505 Methods and Apparatus for Performing Packet Processing Operations in a Network 3 2006
 
RICOH COMPANY, LTD. (1)
* 9473659 Blank skip action in an image forming apparatus 0 2013
 
IP RESERVOIR, LLC (5)
* 2012/0095,893 METHOD AND APPARATUS FOR HIGH-SPEED PROCESSING OF FINANCIAL MARKET DEPTH DATA 33 2009
9582831 High speed processing of financial information using FPGA devices 1 2011
9672565 High speed processing of financial information using FPGA devices 0 2013
9916622 High speed processing of financial information using FPGA devices 0 2014
9396222 Method and system for high performance integration, processing and searching of structured and unstructured data using coprocessors 0 2014
 
NEC CORPORATION (1)
* 2012/0044,935 Relay control unit, relay control system, relay control method, and relay control program 13 2011
 
Fire Eye, Inc. (1)
9197664 System and method for malware containment 25 2015
 
INTEL CORPORATION (1)
* 9183171 Fast deskew when exiting low-power partial-width high speed link state 0 2012
 
The United States of America as represented by the United States Department of Energy (1)
* 8850583 Intrusion detection using secure signatures 7 2013
 
NVIDIA CORPORATION (1)
* 9024957 Address independent shader program loading 1 2007
 
CAVIUM, INC. (6)
9904630 Finite automata processing based on a top of stack (TOS) memory 0 2014
* 9264357 Apparatus and method for table search with centralized memory pool in a network switch 1 2014
9823895 Memory management for finite automata processing 1 2014
* 9785403 Engine architecture for processing finite automata 2 2014
* 2015/0067,123 Engine Architecture for Processing Finite Automata 19 2014
9762544 Reverse NFA generation and processing 3 2015
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (2)
* 8687505 Apparatus and method for controlling traffic 0 2010
* 2011/0149,727 APPARATUS AND METHOD FOR CONTROLLING TRAFFIC 4 2010
* Cited By Examiner