ACTIVE TARGETED DATA PLANE TRAFFIC MONITORING FOR WIRED NETWORKS

    公开(公告)号:US20200162357A1

    公开(公告)日:2020-05-21

    申请号:US16390695

    申请日:2019-04-22

    Abstract: Systems, methods, and computer-readable media for monitoring traffic in a network include receiving, at an analytics platform connected to the network, one or more encapsulated packet headers from one or more network nodes of the network. From the one or more encapsulated packet headers, at least one or more source addresses of the one or more network nodes which transmitted the encapsulated packet headers, and one or more timestamps at which the one or more encapsulated packet headers were transmitted from the one or more network nodes may be determined. From at least the one or more source addresses and timestamps, network traffic information such as one or more of latency or jitter of data packets transiting through the one or more network nodes may be determined, wherein the one or more encapsulated packet headers may correspond to the data packets transiting through the one or more network nodes.

    RADIO RESOURCE MANAGEMENT DRIVEN ENERGY MANAGEMENT IN WIRELESS NETWORKS

    公开(公告)号:US20250063493A1

    公开(公告)日:2025-02-20

    申请号:US18450688

    申请日:2023-08-16

    Abstract: A method to manage access points in a wireless network to save power during off-peak hours. The method includes operating a wireless local area network including access points with the access points powered on, receiving information indicative of channel utilization levels for each of the access points over a predetermined period of time, receiving respective indications of occupancy levels of a space that is covered by the access points during the predetermined period of time, predicting a low occupancy period of the space based on the channel utilization levels and the respective indications of occupancy levels, and during the low occupancy period, causing a first group of the access points to be powered off, and causing a second group of the access points to remain powered on.

    Resolving access policies between intent-based network architectures and cloud native architectures

    公开(公告)号:US12225057B2

    公开(公告)日:2025-02-11

    申请号:US18244048

    申请日:2023-09-08

    Abstract: Techniques for expressing, communicating, de-conflicting, and enforcing consistent access policies between an IBN architecture and a Cloud-Native architecture. Generally, network administrators and/or users of a Cloud-Native architecture and an IBN architecture express access policies independently for the two different domains or architectures. According to the techniques described herein, a Network Service Endpoint (NSE) of the Cloud-Native architecture may exchange access policies with a network device of the IBN architecture. After exchanging access policies, conflicts between the sets of access policies may be identified, such as differences between allowing or denying communications between microservices and/or applications. The conflicts may be de-conflicted using various types of heuristics or rules, such as always selecting an access policy of the IBN architecture when conflicts arise. After the access policies have been de-conflicted, the IBN architecture and Cloud-Native architecture may then apply consistent access policies for traffic and communications in their respective network architectures.

    Secure access service edge function with configured metric collection intelligence

    公开(公告)号:US12192192B2

    公开(公告)日:2025-01-07

    申请号:US17749274

    申请日:2022-05-20

    Abstract: In one embodiment, a method herein comprises: receiving, at a device, a registration request from a telemetry exporter that transmits telemetry data; generating, by the device, a telemetry configuration file for the telemetry exporter, the telemetry configuration file defining a policy for transmission of telemetry data from the telemetry exporter and an authentication token for the telemetry exporter; sharing, by the device, the policy with a security enforcer; and sending, by the device, the telemetry configuration file to the telemetry exporter, wherein the telemetry exporter is caused to connect with the security enforcer using the authentication token, send the telemetry configuration file to the security enforcer, and transmit collected telemetry data to the security enforcer, and wherein the security enforcer is caused to create a dynamic publish-subscribe stream for publishing the collected telemetry data received from the telemetry exporter based on the telemetry configuration file and the policy.

    CONTINUOUS MULTIFACTOR AUTHENTICATION SYSTEM INTEGRATION WITH CORPORATE SECURITY SYSTEMS

    公开(公告)号:US20240430257A1

    公开(公告)日:2024-12-26

    申请号:US18826359

    申请日:2024-09-06

    Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.

    PHYSICAL LAYER METADATA CARRIER FOR ETHERNET SYSTEMS

    公开(公告)号:US20240414083A1

    公开(公告)日:2024-12-12

    申请号:US18206775

    申请日:2023-06-07

    Abstract: Techniques for, among other things, embedding metadata in network traffic without having to implement an overlay network. By way of example, and not limitation, the techniques described herein may include receiving an Ethernet packet at a network node and determining that a preamble of the Ethernet packet includes metadata. The metadata may, in some examples, be associated with the Ethernet packet itself, a flow that the Ethernet packet belongs to, etc. Based at least in part on the metadata, a policy decision may be made for handling the Ethernet packet, and the Ethernet packet may be handled in accordance with the policy decision.

    ACCESS CONTROL TECHNIQUES BASED ON SOFTWARE BILL OF MATERIALS

    公开(公告)号:US20240386349A1

    公开(公告)日:2024-11-21

    申请号:US18318182

    申请日:2023-05-16

    Abstract: Techniques are described herein for managing access to remotely accessed software applications. In embodiments, such techniques may be performed by a service provider platform for software applications capable of being accessed by computing devices. The techniques may involve determining (e.g., based on a software bill of materials) components associated with the software applications, identifying a number of current security threats, and determining, based on the components and current security threats, a risk score associated with each of the software applications. The service provider platform may receive an indication of a level of risk for each of the computing devices in the organization, generate, based on the risk score associated with the software applications and the level of risk for each of the computing devices, policy data for each of the computing devices, and provide the policy data to at least one second computing device.

    Classification-based data privacy and security management

    公开(公告)号:US12137125B2

    公开(公告)日:2024-11-05

    申请号:US17886030

    申请日:2022-08-11

    Abstract: Techniques are described for classification-based data security management. The classification-based data security management can include utilizing device and/or data attributes to identify security modes for communication of data stored in a source device. The security modes can be identified based on a hybrid-encryption negotiation. The attributes can include a device resource availability value, an access trust score, a data confidentiality score, a geo-coordinates value, and/or a date/time value. The security modes can include a hybrid-encryption mode. The source device can utilize the hybrid-encryption mode to transmit the data, via one or more network nodes, such as an edge node, to one or more service nodes.

Patent Agency Ranking