APPLICATION-AWARE ROUTING THROUGH PATHS OF SATELLITE NETWORKS

    公开(公告)号:US20240297708A1

    公开(公告)日:2024-09-05

    申请号:US18116493

    申请日:2023-03-02

    CPC classification number: H04B7/18513

    Abstract: Techniques for a low Earth orbit (LEO) satellite to route data through optimal satellite paths based on latency thresholds (and/or other QoS thresholds) for the application generating the data. The LEO satellite may identify the latency threshold from a data packet, where the latency threshold indicates an amount of time for the data packet to be relayed back down to a destination ground device. The LEO satellite determines available satellite paths through which data packets may be routed to destination ground stations. Further, the LEO satellite may determine latencies for transmitting traffic over the available satellite paths. The LEO satellite may compare the latency threshold for the data packet with the latencies of the available satellite paths, and select a satellite path that is optimal for transmitting the data packet. In this way, LEO satellites intelligently route data through satellite paths based on the type of traffic being transmitted.

    ENHANCED CLOUD ACCESS SECURITY BROKER FUNCTIONALITY UTILIZING IN-BAND APPLICATION OBSERVABILITY

    公开(公告)号:US20240291816A1

    公开(公告)日:2024-08-29

    申请号:US18174177

    申请日:2023-02-24

    CPC classification number: H04L63/0876 H04L63/0245 H04L63/20

    Abstract: Provided herein are techniques to facilitate enhanced cloud access security broker (CASB) functionality via in-band application observability in which a CASB can be implemented in-line between the client device and an embedded application security service. In one instance, a method may include, obtaining, by a CASB from a client device, a first message for an application transaction involving an application operating via the client device. The first message can be augmented to include first security metadata and can be forwarded to trigger one or more actions by an embedded application security service associated with the application. The CASB may obtain a second message from the embedded application security service that includes second security metadata, and one or more actions can be triggered at the CASB based, at least in part, on the second security metadata included in the second message.

    Dynamically Enabling a Transport Control Protocol Proxy for Satellite Networks

    公开(公告)号:US20230379258A1

    公开(公告)日:2023-11-23

    申请号:US17747359

    申请日:2022-05-18

    CPC classification number: H04L47/193 H04B7/18502 H04L69/16

    Abstract: Techniques for a TCP proxy to communicate over a LEO satellite network on behalf of a client device by selecting a TCP congestion-control algorithm that is optimal for the LEO satellite network based on the time of day and/or location of the TCP proxy. Based on the locations of satellites during the day as they traverse predefined and patterned orbital paths, different TCP congestion-control algorithms may be more optimized to communicate data through the LEO satellite network. However, client devices generally use a single TCP congestion-control algorithm to communicate over WAN networks. Accordingly, a TCP proxy may be inserted on, for example, a router to communicate with the client device using a TCP congestion-control algorithm that the client device is configured to use, but then communicate over the LEO satellite network using a different TCP congestion-control algorithm that is optimal based on the time of day and/or other factors.

    CONTINUOUS MULTIFACTOR AUTHENTICATION SYSTEM INTEGRATION WITH CORPORATE SECURITY SYSTEMS

    公开(公告)号:US20230344830A1

    公开(公告)日:2023-10-26

    申请号:US18344527

    申请日:2023-06-29

    Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.

Patent Agency Ranking