1
Paul Michael Martini: Selectively performing man in the middle decryption. iboss, Fish & Richardson P C, April 28, 2015: US09021575 (115 worldwide citation)

An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second encrypted connection is established between the agent and the resource, to facilitate encrypted communication ...


2
Paul Michael Martini: Prioritizing content classification categories. iboss, Fish & Richardson P C, October 7, 2014: US08856865 (62 worldwide citation)

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for prioritizing content classification categories. One of the methods includes maintaining two or more content categories including a first content category and a second content category, each content ca ...


3
Paul Michael Martini: Manage encrypted network traffic using spoofed addresses. iboss, Fish & Richardson P C, July 5, 2016: US09386038 (20 worldwide citation)

Methods and systems for managing encrypted network traffic using spoofed addresses. One example method includes receiving a request to resolve a domain name; determining that the domain name is included in a predetermined set of domain names; associating a spoofed address with the domain name; sendi ...


4
Paul Michael Martini: Network notifications. iboss, Fish & Richardson P C, September 8, 2015: US09130996 (8 worldwide citation)

A request is received from a device within a network for a resource on server outside of the network. The resource is subject to a policy of the network. An informational webpage is served to the device; the webpage includes an interface element. An indication of a selection of the interface element ...


5
Paul Michael Martini: Mobile device management profile distribution. iboss, Fish & Richardson P C, December 9, 2014: US08910263 (5 worldwide citation)

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for automated mobile device management profile distribution. One of the methods includes receiving a first request for access to a first network resource from a client device, the first network resource c ...


6
Paul Michael Martini: Maintaining IP tables. iboss, Fish & Richardson P C, March 10, 2015: US08977728 (4 worldwide citation)

Data including a set of one or more resources and one or more associated IP addresses is updated based on monitored DNS responses. A request is received from a client device for a resource identified by an IP address. The IP address is matched to one of the IP addresses in the set of one or more IP ...


7
Paul Michael Martini, Peter Anthony Martini: Software program identification based on program behavior. iboss, Fish & Richardson P C, March 22, 2016: US09294492 (4 worldwide citation)

Operations performed by a software application instance executed by a computing device are monitored. A determination is made that a particular operation performed matches an application signature representing a particular software application. In response, a match score is added to a total score fo ...


8
Paul Michael Martini: Allocating a pool of shared bandwidth. iboss, Fish & Richardson P C, November 24, 2015: US09197579 (2 worldwide citation)

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for allocating a pool of shared Internet bandwidth. One of the methods includes providing a first communications channel having a first bandwidth, the first bandwidth being shared by a first group of firs ...


9
Paul Michael Martini: Recording activity-triggered computer video output. iboss, Fish & Richardson P C, March 17, 2015: US08984585 (2 worldwide citation)

An application that is capable of monitoring Internet or network traffic and performing recordings of computer video output based on one or more violations of network activity policies. The recording application can be installed on the computer to be recorded or another computer or server that is co ...


10
Paul Michael Martini: Restricting communication over an encrypted network connection to internet domains that share common IP addresses and shared SSL certificates. iboss, Fish & Richardson P C, April 12, 2016: US09313205 (2 worldwide citation)

An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the DNS mapping of the domain to a destination IP Address that is uniquely identifiable and that represents a location of an apparatus that provides a data path to the domain.



Click the thumbnails below to visualize the patent trend.