Abstract: Methods, systems, and computer readable media for network security are described. In some implementations, security tasks and roles can be allocated between an endpoint device and a firewall device based on tag information sent from the endpoint and also based on resource availability and process reputation of a process associated with a traffic flow.
Description:-As Attached- , Claims:-As Attached-
| # | Name | Date |
|---|---|---|
| 1 | 202312040579-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [14-06-2023(online)].pdf | 2023-06-14 |
| 2 | 202312040579-STATEMENT OF UNDERTAKING (FORM 3) [14-06-2023(online)].pdf | 2023-06-14 |
| 3 | 202312040579-REQUEST FOR EXAMINATION (FORM-18) [14-06-2023(online)].pdf | 2023-06-14 |
| 4 | 202312040579-PROOF OF RIGHT [14-06-2023(online)].pdf | 2023-06-14 |
| 5 | 202312040579-POWER OF AUTHORITY [14-06-2023(online)].pdf | 2023-06-14 |
| 6 | 202312040579-FORM 18 [14-06-2023(online)].pdf | 2023-06-14 |
| 7 | 202312040579-FORM 1 [14-06-2023(online)].pdf | 2023-06-14 |
| 8 | 202312040579-DRAWINGS [14-06-2023(online)].pdf | 2023-06-14 |
| 9 | 202312040579-DECLARATION OF INVENTORSHIP (FORM 5) [14-06-2023(online)].pdf | 2023-06-14 |
| 10 | 202312040579-COMPLETE SPECIFICATION [14-06-2023(online)].pdf | 2023-06-14 |
| 11 | 202312040579-FORM 3 [04-12-2023(online)].pdf | 2023-12-04 |
| 12 | 202312040579-FER.pdf | 2025-07-16 |
| 13 | 202312040579-FORM 3 [24-07-2025(online)].pdf | 2025-07-24 |
| 15 | 202312040579-FER_SER_REPLY [15-10-2025(online)].pdf | 2025-10-15 |
| 16 | 202312040579-DRAWING [15-10-2025(online)].pdf | 2025-10-15 |
| 17 | 202312040579-CLAIMS [15-10-2025(online)].pdf | 2025-10-15 |
| 18 | 202312040579-ABSTRACT [15-10-2025(online)].pdf | 2025-10-15 |
| 1 | 202312040579_SearchStrategyNew_E_searchstrategyE_23-05-2025.pdf |