Manufacturer usage description (MUD) extensions for secure access service edge (SASE) services

    公开(公告)号:US11929984B2

    公开(公告)日:2024-03-12

    申请号:US17308375

    申请日:2021-05-05

    Abstract: Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine that a security recommendation included in the MUD file is to be implemented by a cloud-based security service provided by the SASE service and cause the IoT device to establish a connection with a secure internet gateway associated with the cloud-based security service. Additionally, or alternatively, the MUD file may include SASE extensions indicating manufacturer recommended cloud-based security services. Further, cloud-based security services may be implemented if local services are unavailable.

    Prioritized scheduling for UWB ranging

    公开(公告)号:US11838830B2

    公开(公告)日:2023-12-05

    申请号:US18075631

    申请日:2022-12-06

    CPC classification number: H04W4/023 H04B1/7163 H04W72/56

    Abstract: Presented herein are techniques for scheduling Ultra-Wideband (UWB) anchors and mobile devices for client ranging. A control device can determine respective ranging priorities for a plurality of mobile devices, which are each assigned to at least one UWB anchor. The control device can obtain at least one collision mapping identifying, for a respective pair of the mobile devices, a collision probability that a UWB signal associated with a ranging procedure involving a first mobile device of the respective pair will collide with a UWB signal associated with a ranging procedure involving a second mobile device of the respective pair. The control device can establish a ranging schedule for the mobile devices and UWB anchors based on the respective UWB ranging priorities and the collision mapping(s). The control device can send at least one command to cause UWB ranging procedures to be performed according to the ranging schedule.

    ENFORCING DATA SOVEREIGNTY POLICIES IN A CLOUD ENVIRONMENT

    公开(公告)号:US20230344836A1

    公开(公告)日:2023-10-26

    申请号:US18344492

    申请日:2023-06-29

    CPC classification number: H04L63/107 H04L63/20 H04L63/0823 H04L67/1097

    Abstract: Systems, methods, and computer-readable media for enforcing data sovereignty policies in a cloud environment are provided. An example method can include sending, by a cloud provider, to a government entity associated with a geographic area, a request for device certificates for nodes located within the geographic area; receiving device certificates for the nodes; creating a data sovereignty policy specifying that data associated with the government entity must be stored on nodes located within the geographic area; based on the device certificates, verifying those of the nodes that comply with the data sovereignty policy; and storing the data associated with the government entity on those of the nodes verified to comply with the data sovereignty policy.

    DISTRIBUTED LEARNING MODEL FOR FOG COMPUTING
    176.
    发明公开

    公开(公告)号:US20230281515A1

    公开(公告)日:2023-09-07

    申请号:US18315281

    申请日:2023-05-10

    CPC classification number: G06N20/00 G06F9/505 G06F11/3006 G06N5/043

    Abstract: The disclosed technology relates to a process for metered training of fog nodes within the fog layer. The metered training allows the fog nodes to be continually trained within the fog layer without the need for the cloud. Furthermore, the metered training allows the fog node to operate normally as the training is performed only when spare resources are available at the fog node. The disclosed technology also relates to a process of sharing better trained machine learning models of a fog node with other similar fog nodes thereby speeding up the training process for other fog nodes within the fog layer.

    SECURE CREATION OF APPLICATION CONTAINERS FOR FIFTH GENERATION CELLULAR NETWORK SLICES

    公开(公告)号:US20230171641A1

    公开(公告)日:2023-06-01

    申请号:US18153882

    申请日:2023-01-12

    CPC classification number: H04W28/06 H04L45/50 H04W40/02

    Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.

    DYNAMIC QUEUE MANAGEMENT OF NETWORK TRAFFIC
    179.
    发明公开

    公开(公告)号:US20230155964A1

    公开(公告)日:2023-05-18

    申请号:US17530376

    申请日:2021-11-18

    CPC classification number: H04L49/9005

    Abstract: Techniques and systems described herein relate to network system queue management and dynamic real-time re-allocation of resources to prevent oversubscription and packet loss due to oversubscription. The techniques and systems enable monitoring of traffic and initial identification of queues at risk for oversubscription based on a rate of change of traffic load on the queue in advance of oversubscription occurring. After identifying a queue at risk for oversubscription, an Extended Berkeley Packet Filter or other similar component performs a likelihood determination using predictive algorithm techniques to identify a likelihood of oversubscription in the near future and re-allocates to parallel queues for efficient and loss-free use of the queues.

    Peer-to-peer networking interference remediation

    公开(公告)号:US11617158B2

    公开(公告)日:2023-03-28

    申请号:US17097813

    申请日:2020-11-13

    Abstract: Presented herein are methodologies for managing radio resources in a venue that implements a high density wireless infrastructure. The methodology includes detecting, using wireless access points, neighbor awareness networking (NAN) communications broadcast by a mobile device, determining a wireless channel on which the mobile device is sending the NAN communications, predicting a destination of the mobile device based on a path, through a predetermined venue, being taken by the mobile device, the path being detected using the wireless access points; and implementing a radio resource management remediation technique to reduce radio interference that is expected to be caused by the NAN communications broadcast by the mobile device at the destination based on the wireless channel and the destination.

Patent Agency Ranking