Fortinet Patent Applications

SYSTEMS AND METHODS FOR ENHANCED KEY SECURITY IN AN SD-WAN NETWORK ENVIRONMENT

Granted: August 17, 2023
Application Number: 20230261859
Systems, devices, and methods are discussed for leveraging SD-WAN's property of redundant independent paths to enable out of band key exchange using the collection of available paths, dynamically managing link failures to keep the separation whenever possible, and/or signaling availability of quantum-safe data transfer to SD-WAN to enable quantum-safety to be used in SD-WAN policy decisions.

SYSTEMS AND METHODS FOR CONTAINER SERVER PROTECTION

Granted: August 3, 2023
Application Number: 20230247055
Systems, devices, and methods are discussed for enhancing security in a container server environment.

DYNAMIC LEAF DETERMINATION FOR TREE CREATIONS FOR HIGH-SPEED NETWORK POLICY SEARCH DURING DATA PACKET SCANNING

Granted: July 27, 2023
Application Number: 20230239213
During high-speed network policy searching for data packets, an upper limit and a lower limit for a policy count are predefined for a ratio of the policy count to the sum of the policy count and the range count. A policy tree builder generates a policy tree image from a set of recursive operations on the raw policy set including an on-the-fly determination of whether a specific node is a leaf based on a leaf policy count limit, wherein for a selected dimension, the specific node is…

MACHINE LEARNING FOR VISUAL SIMILARITY-BASED PHISHING DETECTION

Granted: July 20, 2023
Application Number: 20230231879
In one embodiment, a similarity index is calculated from characteristics of a suspected phishing web page to a database of known phishing web pages. The characteristics derive from both HTML tags of the suspected phishing web page and a screenshot of the suspected phishing web page. With machine learning using the similarity index as an input, a probability is estimated that the suspected web page comprises a known phishing web page from the database of known phishing web pages. A known…

LEVERAGING USER-BEHAVIOR ANALYTICS FOR IMPROVED SECURITY EVENT CLASSIFICATION

Granted: June 8, 2023
Application Number: 20230179617
Systems and methods for improving security event classification by leveraging user-behavior analytics are provided. According to an embodiment, a UEBA-based security event classification service of a cloud-based security platform maintains information regarding historical user behavior of various users of an enterprise network. An endpoint protection platform running on an endpoint device that is part of the enterprise network performs an initial classification of the event, based on…

SYSTEMS AND METHODS FOR BIOMETRIC AIDED NETWORK ACCESS CONTROL

Granted: June 8, 2023
Application Number: 20230179595
Various embodiments discussed generally relate to network security, and more particularly to systems and methods for using biometric data to enhance security in network access authorization.

Systems and Methods for Application Integrated Malicious Behavior Mitigation

Granted: June 8, 2023
Application Number: 20230177147
Various embodiments discussed generally relate to securing applications that work across networks, and more particularly to systems and methods for mitigating malicious behavior integrated within an application that directly calls a separate cloud based malicious behavior mitigation system.

SYSTEMS AND METHODS FOR PROACTIVELY UPGRADING LOW QUALITY ACCESS CREDENTIALS

Granted: June 8, 2023
Application Number: 20230179586
Systems, devices, and methods are discussed for proactively addressing low quality access credentials in a network environment.

ADJUSTING BEHAVIOR OF AN ENDPOINT SECURITY AGENT BASED ON NETWORK LOCATION

Granted: May 18, 2023
Application Number: 20230156014
Systems and methods for adjusting the behavior of an endpoint security agent based on a network location are provided. According to an embodiment, an agent of an endpoint device identifies whether a security service of a cloud-based security service is not reachable or is unresponsive. The security service is associated with a particular security function implemented by the agent. When the security service is not reachable or is unresponsive, the agent further determines whether the…

SYSTEMS AND METHODS FOR GRAPHICAL RUNTIME VALIDATED REPORT GENERATION

Granted: May 11, 2023
Application Number: 20230146247
Systems, devices, and methods are discussed that provide for developing custom reports.

MACHINE-LEARNING BASED APPROACH FOR DYNAMICALLY GENERATING INCIDENT-SPECIFIC PLAYBOOKS FOR A SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR) PLATFORM

Granted: May 11, 2023
Application Number: 20230146804
Systems and methods for a machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration and automated response (SOAR) platform are provided. The SOAR platform captures information regarding execution of a sequence of actions performed by analysts responsive to a first incident of a first type. The captured information is fed into a machine-learning model. When a second incident, observed by the SOAR platform, is similar in nature to…

SYSTEMS AND METHODS FOR GRAPHICAL RUNTIME VALIDATED REPORT GENERATION

Granted: May 11, 2023
Application Number: 20230146247
Systems, devices, and methods are discussed that provide for developing custom reports.

MACHINE-LEARNING BASED APPROACH FOR DYNAMICALLY GENERATING INCIDENT-SPECIFIC PLAYBOOKS FOR A SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR) PLATFORM

Granted: May 11, 2023
Application Number: 20230146804
Systems and methods for a machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration and automated response (SOAR) platform are provided. The SOAR platform captures information regarding execution of a sequence of actions performed by analysts responsive to a first incident of a first type. The captured information is fed into a machine-learning model. When a second incident, observed by the SOAR platform, is similar in nature to…

SYSTEMS AND METHODS FOR PREPARING CODE FOR MALICIOUS BEHAVIOR ANALYSIS

Granted: May 4, 2023
Application Number: 20230137942
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

SYSTEMS AND METHODS FOR UNPACKING PROTECTED DATA FROM OBFUSCATED CODE

Granted: May 4, 2023
Application Number: 20230140432
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

SYSTEMS AND METHODS FOR DEOBFUSCATION OF EXECUTABLE CODE

Granted: May 4, 2023
Application Number: 20230133651
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

SYSTEMS AND METHODS FOR UNPACKING PROTECTED DATA FROM OBFUSCATED CODE

Granted: May 4, 2023
Application Number: 20230140432
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

SYSTEMS AND METHODS FOR PREPARING CODE FOR MALICIOUS BEHAVIOR ANALYSIS

Granted: May 4, 2023
Application Number: 20230137942
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

SYSTEMS AND METHODS FOR DEOBFUSCATION OF EXECUTABLE CODE

Granted: May 4, 2023
Application Number: 20230133651
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.

PTIVE RESOURCE PROVISIONING FOR A MULTI-TENANT DISTRIBUTED EVENT DATA STORE

Granted: April 20, 2023
Application Number: 20230124404
Systems and methods for adaptively provisioning a distributed event data store of a multi-tenant architecture are provided. According to one embodiment, a managed security service provider (MSSP) maintains a distributed event data store on behalf of each tenant of the MSSP. For each tenant, the MSSP periodically determines a provisioning status for a current active partition of the distributed event data store of the tenant. Further, when the determining indicates an under-provisioning…