MPLS LSP connectivity test when the initiator address is unknown

    公开(公告)号:US10708182B2

    公开(公告)日:2020-07-07

    申请号:US13951758

    申请日:2013-07-26

    Abstract: The present disclosure provides for carrying reachability information in an echo request message and/or an echo reply message, which can be used to reach an initiator when the initiator's address is unknown. An echo request message includes an FEC (forwarding equivalence class) stack that identifies a label switched path (LSP). The echo request message is received by a label switching routing element (LSR) on the LSP, and the echo request is originated by an initiator. In response to a detection that the FEC stack changes at the LSR, a segment reachability (SR) sub-TLV (type-length-value) element can be generated, where the SR sub-TLV includes reachability information that can be used to reach the initiator, and the reachability information includes an incoming label allocated by the LSR to reach the initiator.

    SYSTEM AND METHOD FOR OBTAINING MICRO-SERVICE TELEMETRY DATA

    公开(公告)号:US20200153716A1

    公开(公告)日:2020-05-14

    申请号:US16745035

    申请日:2020-01-16

    Abstract: Systems, methods, and computer-readable media are disclosed for use of an overlay network termination endpoint as a proxy to collect telemetry data for micro-services or specific applications provided by containers in overlay data centers. In one aspect of the present disclosure, a method includes receiving, at a controller, a probe for flow statistics associated with a service path, the probe including corresponding flow identification information, extracting the corresponding flow identification information from the probe, obtaining the flow statistics from an agent based on the flow identification information, the agent being configured to manage a plurality of containers, generating a response packet including the flow statistics obtained from the agent and sending the response packet to an initiator from which the query is received.

    Blockchain based software licensing enforcement

    公开(公告)号:US10572688B2

    公开(公告)日:2020-02-25

    申请号:US15482036

    申请日:2017-04-07

    Abstract: A server compiles a software program with a randomly generated string to produce compiled code. The server also computes a hash of the compiled code to produce a unique identifier for the software program. Upon receiving a request from a user to download the software program, the server generates a transaction for a blockchain that has a transaction identifier and the transaction including a user identifier for the user and the unique identifier. The server embeds the transaction identifier and the unique identifier with the software program, and downloads the software program to a computing device associated with the user.

    Distributed security system
    96.
    发明授权

    公开(公告)号:US10567441B2

    公开(公告)日:2020-02-18

    申请号:US15870957

    申请日:2018-01-14

    Abstract: In one embodiment, a system includes a first host computer including a host interface configured to receive traffic from a domain ingress node of a first domain, and processing machinery configured to instantiate worker nodes, instantiate a master node and a security gateway agent on the master node, instantiate a plurality of security clients on the worker nodes, wherein each worker node includes at least one security client, wherein each security client is configured to monitor at least part of the traffic being forwarded in the one worker node for malicious traffic, and report a first data item about the malicious traffic to the security gateway agent, and wherein the security gateway agent is configured to forward a second data item about the malicious traffic to a security server to determine at least one security policy to mitigate the malicious traffic, and to be enforced by a node.

    IN-SITU OPERATIONS, ADMINISTRATION AND MANAGEMENT PROXY

    公开(公告)号:US20190037391A1

    公开(公告)日:2019-01-31

    申请号:US15662555

    申请日:2017-07-28

    Abstract: A process executing on a network connected device provides distinct Internet Protocol addresses to a plurality of workload applications. The process determines that a first of the plurality of workload applications will not be providing in-situ Operations, Administration and Management (iOAM) data in packets processed by the first of the plurality of workload applications. The process receives a packet processed by the first of the plurality of workload applications. The process inserts iOAM data for the first of the plurality of workload applications into the packet.

Patent Agency Ranking