Event triggered guaranteed service connectivity

    公开(公告)号:US11765050B1

    公开(公告)日:2023-09-19

    申请号:US17695085

    申请日:2022-03-15

    CPC classification number: H04L41/5009 H04L41/5045

    Abstract: A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.

    Continuous multifactor authentication system integration with corporate security systems

    公开(公告)号:US11706214B2

    公开(公告)日:2023-07-18

    申请号:US17225824

    申请日:2021-04-08

    Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.

    PREDICTIVE POLICY ENFORCEMENT USING ENCAPSULATED METADATA

    公开(公告)号:US20230198946A1

    公开(公告)日:2023-06-22

    申请号:US17557865

    申请日:2021-12-21

    Abstract: Methods are provided for predictive policy enforcement using encapsulated metadata. The methods involve obtaining a packet of an encapsulated traffic flow that is transported in a software-defined wide area network (SD-WAN) or in a cloud network. The packet includes a network virtualization tunneling header with an appended service plane protocol header and a payload. The methods further involve extracting, from the appended service plane protocol header, without performing deep packet inspection, enriched metadata that includes fields for one or more attributes related to a source of the packet or a destination of the packet, determining at least one network policy based on the enriched metadata, and applying, to the packet, the at least one network policy that relates to gathering analytics and/or transporting the encapsulated traffic flow to the destination.

    MICROSERVICE VISIBILITY AND CONTROL
    125.
    发明公开

    公开(公告)号:US20230188496A1

    公开(公告)日:2023-06-15

    申请号:US18163979

    申请日:2023-02-03

    CPC classification number: H04L61/4511

    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.

    MICROSERVICE-BASED MULTIFACTOR AUTHENTICATION
    126.
    发明公开

    公开(公告)号:US20230169500A1

    公开(公告)日:2023-06-01

    申请号:US17535957

    申请日:2021-11-26

    CPC classification number: G06Q20/401

    Abstract: In one embodiment, a microservice, that provides one or more services for one or more distributed business transactions offered by an application, obtains a service request for a particular business transaction involving a particular user device executing the application. The microservice determines whether the service request includes an indication of authentication results for the particular business transaction that satisfy one or more authentication requirements of the microservice. The microservice sends, based on the indication of authentication results for the particular business transaction not satisfying the one or more authentication requirements of the microservice, a request for the particular user device to perform authentication for the particular business transaction to satisfy the one or more authentication requirements. The microservice completes, based on the indication of authentication results for the particular business transaction satisfying the one or more authentication requirements of the microservice, a particular service as per the service request.

    END-TO-END NETWORK AND APPLICATION VISIBILITY CORRELATION LEVERAGING INTEGRATED INTER-SYSTEM MESSAGING

    公开(公告)号:US20230100471A1

    公开(公告)日:2023-03-30

    申请号:US17488403

    申请日:2021-09-29

    Abstract: In one embodiment, an agent process performs performance monitoring according to either a network performance monitoring platform or an application performance monitoring platform. The agent process exchanges a request message with a remote agent process (performing performance monitoring according to the opposing platform), where the request message comprises a transaction identifier and a requested action. The agent process also exchanges, in response to the request message, a response message with the remote agent process, wherein the response message comprises an acknowledgment of the transaction identifier and the requested action. The agent process shares first performance monitoring platform information along with the transaction identifier, where the remote agent process shares second performance monitoring platform information along with the transaction identifier, such that the sharing causes explicit correlation of the first information and the second information based on the transaction identifier.

    CONTEXT-BASED SECURITY POLICY FOR DATA ACCESS AND VISIBILITY

    公开(公告)号:US20230098281A1

    公开(公告)日:2023-03-30

    申请号:US17490004

    申请日:2021-09-30

    Abstract: A method, computer system, and computer program product are provided for controlling data access and visibility using a context-based security policy. A request from an endpoint device to receive data is received at a server, wherein the request includes one or more contextual attributes of the endpoint device including an identity of a user of the endpoint device. The one or more contextual attributes are processed to determine that the endpoint device is authorized to receive the data. A security policy is determined for the data based on the one or more contextual attributes. The data is transmitted, including the security policy, to the endpoint device, wherein the endpoint devices enforces the security policy to selectively permit access to the data by preventing the endpoint device from displaying the data to an unauthorized individual.

    CONTINUOUS MULTIFACTOR AUTHENTICATION SYSTEM INTEGRATION WITH CORPORATE SECURITY SYSTEMS

    公开(公告)号:US20220329588A1

    公开(公告)日:2022-10-13

    申请号:US17225824

    申请日:2021-04-08

    Abstract: The present technology pertains to increasing security of devices that leverages an integration of an authentication system with at least one corporate service. The present technology includes receiving a request from a user device to authenticate a person as a particular user by the authentication system. The present technology also includes capturing a photo of the person attempting to be authenticated as the particular user. The present technology also includes mapping nodal points to the captured photo of the person attempting to be authenticated as the particular user to a device or service. The present technology also includes comparing the nodal points from the photo against a reference model for facial recognition of the particular user. The present technology also includes determining that the nodal points do not sufficiently match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.

Patent Agency Ranking