CONFIGURATION VALIDATION IN A DISAGGREGATED NETWORK OS ENVIRONMENT

    公开(公告)号:US20240281265A1

    公开(公告)日:2024-08-22

    申请号:US18650798

    申请日:2024-04-30

    CPC classification number: G06F9/44505 G06F8/65 H04L45/02

    Abstract: A network controller deploys a first component and a second component to run concurrently on a network device. The second component is an upgraded version of the first component. The first component receives a first instance of a packet routed to the network device and has a timestamp and a first ID, and the second component receives a second instance of the packet routed to the network device and has the timestamp and a second ID. The network controller receives first functionality data for the first component and second functionality data for the second component from the network device. Based on the first functionality data and the second functionality data, the network controller determines whether to continue operating the first component or the second component on the network device.

    CONFIGURATION VALIDATION IN A DISAGGREGATED NETWORK OS ENVIRONMENT

    公开(公告)号:US20230401072A1

    公开(公告)日:2023-12-14

    申请号:US17898924

    申请日:2022-08-30

    CPC classification number: G06F9/44505 G06F8/65 H04L45/02

    Abstract: A network device has a first OS component, a second OS component is added to run concurrently with the first. The first OS component transmits routing information to the second OS component where it is stored in memory. The second OS component registers with a routing infrastructure to receive packets that are routed to the first OS component. A timestamp and a first ID are added to a first instance of a packet and transmitted to the first OS component. The timestamp and a second ID are added to a second instance of the packet and transmitted to the second OS component. First functionality data for the first OS component is transmitted to a controller. Second functionality data for the second OS component is transmitted to the controller. The first and second functionality data are compared to determine whether to replace the first OS component with the second OS component.

    Dynamically Enabling a Transport Control Protocol Proxy for Satellite Networks

    公开(公告)号:US20230379258A1

    公开(公告)日:2023-11-23

    申请号:US17747359

    申请日:2022-05-18

    CPC classification number: H04L47/193 H04B7/18502 H04L69/16

    Abstract: Techniques for a TCP proxy to communicate over a LEO satellite network on behalf of a client device by selecting a TCP congestion-control algorithm that is optimal for the LEO satellite network based on the time of day and/or location of the TCP proxy. Based on the locations of satellites during the day as they traverse predefined and patterned orbital paths, different TCP congestion-control algorithms may be more optimized to communicate data through the LEO satellite network. However, client devices generally use a single TCP congestion-control algorithm to communicate over WAN networks. Accordingly, a TCP proxy may be inserted on, for example, a router to communicate with the client device using a TCP congestion-control algorithm that the client device is configured to use, but then communicate over the LEO satellite network using a different TCP congestion-control algorithm that is optimal based on the time of day and/or other factors.

    CONTINUOUS MULTIFACTOR AUTHENTICATION SYSTEM INTEGRATION WITH CORPORATE SECURITY SYSTEMS

    公开(公告)号:US20230344830A1

    公开(公告)日:2023-10-26

    申请号:US18344527

    申请日:2023-06-29

    Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.

    EVENT TRIGGERED GUARANTEED SERVICE CONNECTIVITY

    公开(公告)号:US20230300037A1

    公开(公告)日:2023-09-21

    申请号:US17695085

    申请日:2022-03-15

    CPC classification number: H04L41/5009 H04L41/5045

    Abstract: A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.

    PEER RISK BENCHMARKING USING GENERATIVE ADVERSARIAL NETWORKS

    公开(公告)号:US20230118857A1

    公开(公告)日:2023-04-20

    申请号:US18067068

    申请日:2022-12-16

    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.

Patent Agency Ranking