US 12,413,624 B2
Cyber secure communications system
Ofer Ben-Noon, Tel Aviv (IL); Ohad Bobrov, Tel Aviv (IL); Gilad Roth, Modi+30 in Makabim-Re+30 ut (IL); Guy Harpak, Ramat Gan (IL); and Ido Salomon, Tel Aviv (IL)
Assigned to Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed by Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed on Apr. 22, 2022, as Appl. No. 17/726,579.
Claims priority of provisional application 63/177,998, filed on Apr. 22, 2021.
Prior Publication US 2022/0366050 A1, Nov. 17, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 16/955 (2019.01); G06F 21/44 (2013.01); G06F 21/53 (2013.01); G06F 21/57 (2013.01); H04L 41/16 (2022.01); H04L 67/125 (2022.01); H04L 67/55 (2022.01); H04W 12/08 (2021.01)
CPC H04L 63/20 (2013.01) [G06F 16/955 (2019.01); G06F 21/44 (2013.01); G06F 21/53 (2013.01); G06F 21/57 (2013.01); H04L 41/16 (2013.01); H04L 63/0428 (2013.01); H04L 63/08 (2013.01); H04L 63/083 (2013.01); H04L 63/10 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 67/125 (2013.01); H04L 67/55 (2022.05); H04W 12/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
a user equipment (UE) having thereon ambient software secure isolated environment comprising a secure web browser (SWB), wherein the secure isolated environment the SWB from the ambient software in the UE;
the SWB configured to obtain a security token to access one or more digital resources of an enterprise and configured to monitor and control ingress and egress data with respect to the secure isolated environment, wherein the SWB configured to control the ingress and egress data comprises the SWB configured to enforce one or more security constraints of an enterprise associated with the UE on the ingress and egress data,
wherein the secure isolated environment is configured to run a set of one or more software integrity tests of the SWB according to a testing policy of the enterprise, and wherein the SWB being configured to obtain a security token comprises the SWB being configured to obtain the security token if a sufficient integrity value is determined from the one or more software integrity tests.