Applying network policies to devices based on their current access network

    公开(公告)号:US11595262B2

    公开(公告)日:2023-02-28

    申请号:US17848258

    申请日:2022-06-23

    Applicant: iboss, Inc.

    Abstract: A server of a distributed computing system that is at least partially hosted on a particular access network receives a plurality of messages from a plurality of devices over a network, each of the messages associated with a corresponding source address. For each of the plurality of devices, a current access network is determined for the device. For each of the devices with a current access network being the particular access network, a first network policy is applied to the device. For each of the devices with a current access network being other than the particular access network, a second network policy is applied to the device, the second network policy defining a second encryption requirement.

    Applying network policies to devices based on their current access network

    公开(公告)号:US11374818B2

    公开(公告)日:2022-06-28

    申请号:US17021649

    申请日:2020-09-15

    Applicant: iboss, Inc.

    Abstract: A server of a distributed computing system that is at least partially hosted on a particular access network receives a plurality of messages from a plurality of devices over a network, each of the messages associated with a corresponding source address. For each of the plurality of devices, a current access network is determined for the device. For each of the devices with a current access network being the particular access network, a first network policy is applied to the device. For each of the devices with a current access network being other than the particular access network, a second network policy is applied to the device, the second network policy defining a second encryption requirement.

    Malicious program identification based on program behavior

    公开(公告)号:US11055410B2

    公开(公告)日:2021-07-06

    申请号:US16666324

    申请日:2019-10-28

    Applicant: iboss, Inc.

    Abstract: An execution of a data object is identified by a computing device. In response to identifying the execution of the data object, it is determined that the data object has requested a sensitive action of the computing device before interacting with a user of the computing device. In response to determining that the data object has requested the sensitive action, the data object is classified as a high-risk data object.

    Distributed network security system providing isolation of customer data

    公开(公告)号:US10462219B2

    公开(公告)日:2019-10-29

    申请号:US15233894

    申请日:2016-08-10

    Applicant: iBoss, Inc.

    Abstract: Techniques for delivering a distributed network security service providing isolation of customer data are described. One example method includes assigning a first node in a distributed network to a first customer; assigning a second node in the distributed network to a second customer; configuring the assigned first node to process network traffic only from the first customer; configuring the assigned second node to process network traffic only from the second customer; processing, by the assigned first node, network traffic associated with the first customer; and processing, by the assigned second node, network traffic associated with the second customer, wherein the network traffic of the first customer is isolated from the network traffic of the second customer, wherein the network traffic of the customers is kept isolated from one another.

    Selectively performing man in the middle decryption

    公开(公告)号:US10341357B2

    公开(公告)日:2019-07-02

    申请号:US14265540

    申请日:2014-04-30

    Applicant: iboss, Inc.

    Abstract: A device within the network receives a domain name service (DNS) request for an address of a first resource outside the network, the first resource associated with a security policy of the network. An address of a second resource within the network is returned to the device within the network in response the DNS request, the second resource address having previously been associated with the first resource address. A first encrypted connection is established between the device and the second resource, and a second encrypted connection is established between the second resource and the first resource, to facilitate encrypted communication traffic between the device and the first resource. The encrypted communication traffic passing between the device and the first resource is selectively decrypted and inspected depending on the address of the first resource.

    Web redirection for caching
    10.
    发明授权

    公开(公告)号:US09900341B2

    公开(公告)日:2018-02-20

    申请号:US14843922

    申请日:2015-09-02

    Applicant: iboss, Inc.

    Abstract: This specification generally relates to using redirect messages to implement caching. One example method includes receiving from a client a first request for a network resource, the first request including an original location of the network resource; determining that a response to the first request is to be cached; sending a redirect response to the client including a cache location for the network resource; receiving a second request for the network resource from the client, the second request including the cache location; in response to receiving the second request for the network resource from the client: determining that the network resource has not been previously cached; retrieving the network resource from the original location; caching the retrieved network resource in a location associated with the cache location for the network resource; and sending the retrieved network resource to the client.

Patent Agency Ranking