Identification of conflict rules in a network intent formal equivalence failure
K Mohanram - US Patent 10,951,477, 2021 - Google Patents
Systems, methods, and computer-readable media for iden tifying conflict rules between
models of network intents. A first and second model of network intents are obtained, the …
models of network intents. A first and second model of network intents are obtained, the …
Score-based dynamic firewall rule enforcement
RB Patil, V Kumar, S Gopalakrishnan… - US Patent 11,240,204, 2022 - Google Patents
Example methods and systems for score-based dynamic firewall rule enforcement in a
software-defined networking (SDN) environment. One example method may comprise in …
software-defined networking (SDN) environment. One example method may comprise in …
Systems and methods for isolating applications associated with multiple tenants within a computing platform
G DeArment, D Arora, J Hoch, M Elliot… - US Patent …, 2022 - Google Patents
Abstract Systems and methods for isolating applications associated with multiple tenants
within a computing platform receive a request from a client associated with a tenant for …
within a computing platform receive a request from a client associated with a tenant for …
Systems and methods for isolating applications associated with multiple tenants within a computing platform
G DeArment, D Arora, J Hoch, M Elliot… - US Patent …, 2023 - Google Patents
2022-04-15 Assigned to Palantir Technologies Inc. reassignment Palantir Technologies Inc.
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Systems and methods for validating, maintaining, and visualizing security policies
S Shah, R Ling - US Patent App. 17/712,528, 2023 - Google Patents
H04L63/205—Network architectures or network communication protocols for network
security for managing network security; network security policies in general involving …
security for managing network security; network security policies in general involving …
SSL proxy whitelisting
SK Batta, TS Pasupathy, M Thangavel - US Patent 11,496,504, 2022 - Google Patents
A network device may receive a first data packet. The network device may determine that a
level of available computing resources satisfies a threshold level. The network device may …
level of available computing resources satisfies a threshold level. The network device may …
Graphically managing a networking device configuration
HB Kamath, K Sharma, B Bajpai - US Patent 11,528,188, 2022 - Google Patents
(57) ABSTRACT A computing device may perform a method that includes graphically
presenting a plurality of virtual routing and forwarding (VRF) elements which represent a …
presenting a plurality of virtual routing and forwarding (VRF) elements which represent a …
Logging access types based on inserting tenant control headers into requests
AM Maceiras, AKG Martin - US Patent 12,034,726, 2024 - Google Patents
A proxy server receives a first request from a first user to access a resource hosted by a
cloud-based server. The proxy server inserts a first tenant control header into the first …
cloud-based server. The proxy server inserts a first tenant control header into the first …
Modularized governance of continuous compliance
A Sailer, CJ Butler, A Kumar… - US Patent App. 17 …, 2023 - Google Patents
(57) ABSTRACT A method, apparatus and computer program product for automated security
and regulatory compliance in association with an enterprise. A set of security and …
and regulatory compliance in association with an enterprise. A set of security and …
Method and system for dynamic load balancing
D Lobo, C Lin, K Koneru, R Erikson - US Patent App. 17/582,654, 2023 - Google Patents
Flow-based load-balancing involves classifying data communication traffic into flows based
on characteristics of data packets. As data packets (for example, Internet Protocol (IP) data …
on characteristics of data packets. As data packets (for example, Internet Protocol (IP) data …