Palo Alto Networks, Inc. (20240283775). INLINE INSPECTION CYBERSECURITY ENFORCEMENT OF MULTIPART FILE TRANSMISSIONS simplified abstract

From WikiPatents
Jump to navigation Jump to search

INLINE INSPECTION CYBERSECURITY ENFORCEMENT OF MULTIPART FILE TRANSMISSIONS

Organization Name

Palo Alto Networks, Inc.

Inventor(s)

Zihang Xiao of Los Gatos CA (US)

Lexuan Sun of Sunnyvale CA (US)

Mengying Jiang of Campbell CA (US)

Li Meng of Saratoga CA (US)

INLINE INSPECTION CYBERSECURITY ENFORCEMENT OF MULTIPART FILE TRANSMISSIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240283775 titled 'INLINE INSPECTION CYBERSECURITY ENFORCEMENT OF MULTIPART FILE TRANSMISSIONS

The abstract describes a system for efficient cybersecurity enforcement on multipart file transmissions by separating awareness of different applications from traffic handling at the individual application layer session level.

  • A protocol-based regulator determines per session message handling actions to prevent completion of a multipart file transmission until cybersecurity analysis can be performed.
  • The regulator communicates these actions to the network component supporting the session and maintains information and file chunks in a data store for active sessions.
  • The regulator checks the data store to determine when cybersecurity analysis is needed for a multipart file transmission and provides the analysis verdict to ensure compliance with cybersecurity policies.

Potential Applications: - Enhancing cybersecurity measures for file transmissions across different applications. - Improving network security by delaying file transmissions for analysis when necessary.

Problems Solved: - Ensuring that multipart file transmissions comply with cybersecurity policies. - Preventing potential security threats by analyzing files before completion of transmission.

Benefits: - Increased network security and protection against cyber threats. - Efficient enforcement of cybersecurity policies on multipart file transmissions.

Commercial Applications: Title: Enhanced Cybersecurity Enforcement System for Multipart File Transmissions This technology could be utilized by cybersecurity firms, network security companies, and organizations handling sensitive data to enhance their cybersecurity measures and protect against potential threats.

Questions about the technology: 1. How does the system differentiate between different applications during multipart file transmissions? 2. What are the potential implications of delaying file transmissions for cybersecurity analysis?


Original Abstract Submitted

separating awareness of multipart file transmissions of different applications from traffic handling at a granularity of an individual application layer session facilitates efficient cybersecurity enforcement on multipart file transmissions. a protocol-based multipart file transmission regulator (“regulator”) determines a per session message handling action to prevent completion of a multipart file transmission based on a protocol of an application identified for the session until cybersecurity analysis can be performed. the regulator then communicates the message handling action to a network component supporting the session. the regulator maintains information and file chunks in a data store for active sessions and determines with the data store whether a condition for requesting cybersecurity analysis for a multipart file transmission is satisfied. upon obtaining a cybersecurity analysis verdict, the regulator provides the verdict or a verdict based instruction to the network component that ensures the multipart file transmission is compliant with a cybersecurity policy(ies).