Context-based security policy for data access and visibility

    公开(公告)号:US11818137B2

    公开(公告)日:2023-11-14

    申请号:US17490004

    申请日:2021-09-30

    CPC classification number: H04L63/104 G06V40/173 H04L63/20

    Abstract: A method, computer system, and computer program product are provided for controlling data access and visibility using a context-based security policy. A request from an endpoint device to receive data is received at a server, wherein the request includes one or more contextual attributes of the endpoint device including an identity of a user of the endpoint device. The one or more contextual attributes are processed to determine that the endpoint device is authorized to receive the data. A security policy is determined for the data based on the one or more contextual attributes. The data is transmitted, including the security policy, to the endpoint device, wherein the endpoint devices enforces the security policy to selectively permit access to the data by preventing the endpoint device from displaying the data to an unauthorized individual.

    Integrity verified paths between entities in a container-orchestration system

    公开(公告)号:US11811784B2

    公开(公告)日:2023-11-07

    申请号:US17832159

    申请日:2022-06-03

    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.

    SELECTIVE DISAGGREGATION ADVERTISEMENT FOR ROUTING IN MULTI-PLANE TOPOLOGIES

    公开(公告)号:US20230179471A1

    公开(公告)日:2023-06-08

    申请号:US18103918

    申请日:2023-01-31

    CPC classification number: H04L41/0668 H04L45/28 H04L41/12 H04L47/24

    Abstract: Techniques for identifying nodes in a data center fabric that are affected by a failure in the fabric, and selectively sending disaggregation advertisements to the nodes affected by the failure. The techniques include a process where a component monitors the network fabric to identify communication paths between leaf nodes, and determines what leaf nodes would be affected by a failure in those communication paths. The component may detect a failure in the network and determine which communication paths, and thus which leaf nodes, are affected by the failure and send disaggregation advertisements to the affected leaf nodes. In some examples, ingress leaf nodes send data through the fabric that indicate egress nodes for the communication paths. Intermediate nodes along may receive the data from the leaf nodes to identify communication paths, and the notify only affected nodes upon detecting a failure in the network.

    Bit indexed explicit replication for layer 2 networking

    公开(公告)号:US11601296B2

    公开(公告)日:2023-03-07

    申请号:US16987017

    申请日:2020-08-06

    Abstract: Functionality for creating a bit routing table for use in a bit-indexed explicit replication (“BIER”) environment in disclosed herein. In one embodiment, this functionality includes receiving information from a host, and determining whether the information comprises a MAC address that is a bit-indexed explicit replication (“BIER”) MAC address. In response to determining that the information comprises a BIER MAC address, this functionality creates an entry corresponding to the MAC address in a bit routing table. This functionality also analyzes the information to determine a bit position that is associated with the host, and also determines a port via which the host is reachable. The functionality updates the bit routing table by storing information identifying the bit position and the port in the entry, such that the bit position and the port both correspond to the MAC address. This functionality can be used to route packets in a BIER environment.

    Event-triggered adaptiveness to toggle timers/modes in fast-detection OAM protocols

    公开(公告)号:US11563622B2

    公开(公告)日:2023-01-24

    申请号:US17070648

    申请日:2020-10-14

    Abstract: A method is performed by a node configured to implement an Operation, Administration, and Maintenance (OAM) protocol for rapid link failure detection. The node receives peer OAM packets sent by a peer node over a link at a peer periodic interval. While in a first mode of the OAM protocol, the node determines whether the peer node is reachable based on the peer OAM packets, sends OAM packets to the peer node at a periodic interval to indicate to the peer node that the node is reachable, and responsive to detecting a critical condition of the node that impairs the sending the OAM packets, transitions to a second mode of the OAM protocol. While in the second mode, the node adds, to the peer OAM packets, a code to indicate the critical condition, and reflects the peer OAM packets with the code back to the peer node.

Patent Agency Ranking