Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Imperva Inc patents


Recent patent applications related to Imperva Inc. Imperva Inc is listed as an Agent/Assignee. Note: Imperva Inc may have other listings under different names/spellings. We're not affiliated with Imperva Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Imperva Inc-related inventors


Techniques for detecting enterprise intrusions utilizing active tokens

A token transmission server transmits active tokens within an enterprise network. The active tokens include either active data tokens or active request tokens, and are fraudulent from the perspective of the enterprise. ... Imperva Inc

Infrastructure distributed denial of service (ddos) protection

A method of providing infrastructure protection for a network that includes ip addresses as low as a single ip address. An end user sends traffic to an ip address of a projected server publicly available as an anycast address, and sends traffic to the protected network. ... Imperva Inc

Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications

A system for automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications is disclosed. The system, in response to a sensor collecting from http requests sent by the clients to the web application installed on the protected device, automatically creates for a web application a profile with discrete parts that will represent normal behavior so that deviations from the profile can be considered anomalous. ... Imperva Inc

Automatic generation of attribute values for rules of a web application layer attack detector

According to one embodiment, a web application layer attack detector (ad) is coupled between an http client and a web application server. Responsive to receipt of a set of packets from the http client carrying a web application layer message that violates a condition of a security rule, the ad transmits an alert package to an automatic attribute value generation and rule feedback module (avgrfm). ... Imperva Inc

Techniques for targeted botnet protection using collective botnet analysis

A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module. Each set of botnet sources includes a plurality of source identifiers of end stations acting as part of a corresponding botnet. ... Imperva Inc

Techniques for targeted botnet protection

A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module. Each set of botnet sources includes a plurality of source identifiers of end stations acting as part of a corresponding botnet. ... Imperva Inc

Techniques for botnet detection and member identification

A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module. Each set of botnet sources includes a plurality of source identifiers of end stations acting as part of a corresponding botnet. ... Imperva Inc

Techniques for detecting compromises of enterprise end stations utilizing noisy tokens

Noisy tokens can be placed in locations of client end stations such that local operations performed upon the noisy tokens generate network traffic. A traffic monitoring module (tmm) can determine normal activity patterns of network traffic resulting from one or more of the placed noisy tokens being activated by one or more non-malicious operations, and identify that other network traffic resulting from one or more of the noisy tokens being activated does not meet the one or more normal activity patterns. ... Imperva Inc

Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens

A token tunnel server (tts) within an enterprise network receives packets from a source address directed to a destination address (both of the enterprise network) that were caused to be originated by an attacker. The packets carry data including a token that was placed upon an end station of the enterprise and that appears to be useful for accessing an enterprise server, despite the apparent enterprise server not actually being deployed within the enterprise network. ... Imperva Inc

Techniques for preventing large-scale data breaches utilizing differentiated protection layers

Techniques related to preventing large-scale data breaches utilizing differentiated data object (do) protection layers are described. A security gateway placed within a communication path between client end stations and servers receives do access requests from the client end stations. ... Imperva Inc

Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets

Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers receives data object (do) access requests from the clients on behalf of users of an enterprise. ... Imperva Inc

Techniques for preventing large-scale data breaches utilizing differentiated protection layers

Techniques related to preventing large-scale data breaches utilizing differentiated data object (do) protection layers are described. A security gateway placed within a communication path between client end stations and servers receives do access requests from the client end stations. ... Imperva Inc

Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets

Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers receives data object (do) access requests from the clients on behalf of users of an enterprise. ... Imperva Inc

Data access verification for enterprise resources

According to one embodiment, a method in a computing device for responding to a determination that a verification with a user is desired responsive to detection of activity indicative of a possible insider threat is described. The method includes selecting a target role and a target user for the verification based on an activity context and an enterprise context repository, the selecting including selecting the target role from a plurality of target roles based on the activity context and optionally the enterprise context repository and selecting a target user in the selected target role based on the enterprise context repository. ... Imperva Inc

03/30/17 / #20170093824

Virtual encryption patching using multiple transport layer security implementations

Techniques related to virtual encryption patching are described. A security gateway includes multiple transport layer security implementations (tlsi) that can be used for creating secure communications channels to carry application-layer traffic between one or more clients and one or more server applications. ... Imperva Inc

01/26/17 / #20170026407

Coordinated detection and differentiation of denial of service attacks

According to one embodiment, an analyzer module (am) within a same protected network and on-premise with a web application server (was) detects and distinguishes between types of denial-of-service (dos) attacks. The am tracks whether test http messages, which include test http request messages that a signal generation module (sgm) is configured to transmit to the was and test http response messages that the was is expected to transmit in response to the test http request messages, are timely received. ... Imperva Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Imperva Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Imperva Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###