DETECTING FAILURES OF BACKUP LABEL SWITCHED PATHS IN A NETWORK ENVIRONMENT
    102.
    发明申请
    DETECTING FAILURES OF BACKUP LABEL SWITCHED PATHS IN A NETWORK ENVIRONMENT 审中-公开
    检测网络环境中备份标签交换机的故障

    公开(公告)号:US20150138947A1

    公开(公告)日:2015-05-21

    申请号:US14600068

    申请日:2015-01-20

    CPC classification number: H04L41/0668 H04L45/00 H04L45/22 H04L45/28 H04L45/50

    Abstract: A method is provided in one example and includes communicating a first request message to a first network element functioning as a point of local repair for a backup label switched path. The first request message includes a first network address having a predetermined value and an indication of a forwarding equivalence class associated with the backup label switched path. The method further includes receiving a first reply message from the first network element. The first reply message includes at least one backup path parameter associated with the backup label switched path.

    Abstract translation: 在一个示例中提供了一种方法,并且包括将第一请求消息传达到用作备份标签交换路径的本地修复点的第一网络元件。 第一请求消息包括具有预定值的第一网络地址和与备份标签交换路径相关联的转发等价类的指示。 该方法还包括从第一网络元件接收第一应答消息。 第一应答消息包括与备份标签交换路径相关联的至少一个备份路径参数。

    TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS

    公开(公告)号:US20240346180A1

    公开(公告)日:2024-10-17

    申请号:US18301058

    申请日:2023-04-14

    CPC classification number: G06F21/6263 H04L51/063 G06F2221/2141

    Abstract: Techniques are described herein for managing access to sensitive data detected within an electronic communication. In some embodiments, such techniques may comprise receiving, from a sender, an electronic communication directed toward a first recipient. The techniques may then comprise identifying one or more pieces of sensitive data within the electronic communication, providing a content of the one or more pieces of sensitive data to a data hosting device to be stored in a memory location and first information associated with the first recipient used to access the memory location, updating the electronic communication to replace the one or more pieces of sensitive data with a reference to the memory location, and transmitting the electronic communication to the first recipient.

    Policy validation
    105.
    发明授权

    公开(公告)号:US12003408B2

    公开(公告)日:2024-06-04

    申请号:US17522515

    申请日:2021-11-09

    CPC classification number: H04L45/24 G06N20/00 H04L45/02 H04L45/42

    Abstract: This disclosure describes techniques for policy validation techniques relating to data traffic routing among network devices. The techniques may include processing a validation request from a controller. A validation request may include information related to a computed path for routing data traffic in a computing network. The processing may include sending one or more path requests to one or more redundant controllers, and comparing computed paths from the redundant controller(s) to the originally computed path. The techniques may include generating a validation response based on comparing the computed paths. In some examples, the techniques may further include determining a health score for the controller. Policy validation techniques may improve data traffic routing among network devices by helping to ensure valid policies are produced.

    METHOD FOR OBSERVING AND COMPUTING DATA ACCESS COST IN MULTI-CLOUD ENVIRONMENT

    公开(公告)号:US20240144329A1

    公开(公告)日:2024-05-02

    申请号:US17975795

    申请日:2022-10-28

    CPC classification number: G06Q30/0283 G06F11/3495

    Abstract: A method performed by a controller configured to communicate with one or more cloud platforms that are configured to host application components, which are configured to implement user services over a network, the method comprising: generating an application dependency mapping of the application components; collecting traffic flow data to identify data transfers between the application components; defining an application boundary around particular application components of the application components in the application dependency mapping; overlaying the application dependency mapping, the traffic flow data, and the application boundary, to identify particular data transfers between the particular application components; computing a network cost based on individual costs of the particular data transfers; and adding, to the network cost, compute and storage costs for the particular application components, to produce a total cost of using the particular application components.

    Multi-domain service assurance using real-time adaptive thresholds

    公开(公告)号:US11604991B2

    公开(公告)日:2023-03-14

    申请号:US17810485

    申请日:2022-07-01

    Abstract: Techniques for adaptive thresholding are provided. A first data point in a data stream is received, and a first plurality of data points from the data stream is identified, where the first plurality of data points corresponds to a timestamp associated with the first data point. At least a first cluster is generated for the first plurality of data points, and a predicted value for the first data point is generated based at least in part on data points in the first cluster. A deviation is computed between the predicted value for the first data point and an actual value for the first data point. Upon determining that the deviation exceeds a first predefined threshold, the first data point is labeled as anomalous, and reallocation of computing resources is facilitated based on labeling the first data point as anomalous.

    DYNAMIC PROXY RESPONSE FROM APPLICATION CONTAINER

    公开(公告)号:US20220417219A1

    公开(公告)日:2022-12-29

    申请号:US17304891

    申请日:2021-06-28

    Abstract: This disclosure describes using a dynamic proxy for securing communications between a source within a cloud environment and an application container. The techniques include intercepting traffic directed to an application container, analyzing the traffic and traffic patterns, and allowing or preventing the traffic from being delivered to the application container based on the analysis. A traffic analysis engine may determine whether the traffic is considered safe and is to be allowed to be delivered to the application container, or whether the traffic is considered unsafe and is to be prevented from being delivered to the application container, According to some configurations, the address(es) to the network interfaces (e.g., WIFI or Eth0) are abstracted to help ensure security of the application containers.

Patent Agency Ranking