Dynamic circuit breaker applications using a proxying agent

    公开(公告)号:US11012523B2

    公开(公告)日:2021-05-18

    申请号:US16520919

    申请日:2019-07-24

    Abstract: In one embodiment, a proxying agent loaded at application startup loads a circuit breaker framework into a class loader, and also loads a circuit breaker proxy into an extension class loader seen by the proxying agent and by the application. The proxying agent may also instrument selected methods of the application, such that, when calling to run an instrumented method: an ID of the circuit breaker proxy is set to a trackable context, and the proxy execution may be held until exit of the run method (and if exit of the run method is due to a particular exception, an exception of the proxy may also be set to reflect the particular exception). The circuit breaker may then monitor the proxy for latency, exceptions, and circuit breaker trip criteria, and stops the run method in response to the latency, exceptions, or circuit breaker trip criteria surpassing a particular respective threshold.

    Application component auditor
    3.
    发明授权

    公开(公告)号:US10984109B2

    公开(公告)日:2021-04-20

    申请号:US15883492

    申请日:2018-01-30

    Abstract: In one embodiment, a process on a computer for dynamic application component auditing is disclosed, the process includes automatically identifying, by an agent, all application components in an application. The process includes determining, by the agent, manifest information for the identified application components. The process includes accessing, by the agent, an alias file to convert the determined manifest information to align with corresponding information in a vulnerability database. The process includes using a Web service to query the vulnerability database to search for a match with the converted manifest information. The process includes responsive to the query, creating an audit report of the application components.

    End user security manager
    5.
    发明授权

    公开(公告)号:US11553001B2

    公开(公告)日:2023-01-10

    申请号:US16787552

    申请日:2020-02-11

    Abstract: In one embodiment, a client device accesses an online application via a browser executed by the client device. The client device makes an assessment as to whether the online application uses Hypertext Transfer Protocol (HTTP) security headers that satisfy a security header policy. The client device generates scoring for the webpage based on the assessment. The client device presents the generated scoring to a user of the client device.

    Microservice manager and optimizer

    公开(公告)号:US11349909B2

    公开(公告)日:2022-05-31

    申请号:US16921431

    申请日:2020-07-06

    Abstract: In one embodiment, an agent executed by a device detects an invocation that is made using Java reflection of a method associated with a microservice. The agent instruments the invocation of the method associated with the microservice, to capture one or more metrics regarding the microservice. The agent optimizes the invocation of the method associated with the microservice. The agent provides the one or more metrics regarding the microservice to a user interface.

    Dynamic transaction-aware web application authentication using call intercepts

    公开(公告)号:US12299097B2

    公开(公告)日:2025-05-13

    申请号:US17390610

    申请日:2021-07-30

    Abstract: According to one or more embodiments of the disclosure, the techniques herein are directed toward a dynamic transaction-aware web application authentication using call intercepts. In one embodiment, a method comprises: intercepting, by a monitoring process, calls made for transactions within an executing application; determining, by the monitoring process, whether a particular intercepted call triggers an enhanced user authentication requirement for a particular transaction; initiating, by the monitoring process in response to the particular intercepted call triggering the enhanced user authentication requirement, a corresponding challenge to adequately authenticate a user for the particular transaction; and allowing, by the monitoring process, the particular intercepted call to proceed for the particular transaction in response to an adequately authenticated user for the particular transaction.

    Reflection runtime protection and auditing system

    公开(公告)号:US12174941B2

    公开(公告)日:2024-12-24

    申请号:US17494952

    申请日:2021-10-06

    Abstract: In one embodiment, a method may comprise: instrumenting, by a process, runtime of a software application; detecting, by the process, a reflection call made within the runtime of the software application; determining, by the process and from the reflection call, a reflection target and a reflection caller; comparing, by the process, the reflection target, the reflection caller, and the reflection call against a security policy; and performing, by the process, one or more mitigation actions on the reflection call in response to a violation of the security policy. In another embodiment, a secure audit process first generates the security policy based on approving reflection calls, reflection targets, and reflection callers seen during a runtime of the software application in a secure environment, and then shares the security policy with local instrumentors of the software application to cause enforcement of the security policy against a local runtime of the software application.

    OpenTelemetry security extensions

    公开(公告)号:US12061703B2

    公开(公告)日:2024-08-13

    申请号:US17088987

    申请日:2020-11-04

    CPC classification number: G06F21/577 H04L63/1416

    Abstract: In one embodiment, a device instruments an application to generate OpenTelemetry trace data during execution of the application. The device detects an occurrence of a security event during execution of the application. The device identifies a correlation between the security event and the OpenTelemetry trace data. The device provides an indication of the security event in conjunction with the OpenTelemetry trace data, based on the security event being correlated with the OpenTelemetry trace data.

    Automated open telemetry instrumentation leveraging behavior learning

    公开(公告)号:US11971800B2

    公开(公告)日:2024-04-30

    申请号:US17743734

    申请日:2022-05-13

    CPC classification number: G06F11/34

    Abstract: In one embodiment, an illustrative method herein may comprise: listening, by an agent process, to a discovery-based execution of an application; determining, by the agent process, a plurality of transition locations during the discovery-based execution of the application; recording, by the agent process, the plurality of transition locations into a recorded file; and providing, by the agent process, the recorded file to cause injection of instrumentation into the plurality of transition locations during runtime of the application based on the recorded file.

Patent Agency Ranking