Canary release validation mechanisms for a containerized application or service mesh

    公开(公告)号:US10785122B2

    公开(公告)日:2020-09-22

    申请号:US16153417

    申请日:2018-10-05

    Abstract: Systems and methods provide for validating a canary release of containers in a containerized production environment. A first container of the containerized production environment can receive network traffic. The first container can transmit the network traffic to a first version of a second container of the containerized production environment and to a traffic analysis engine. First metrics relating to processing by the first version of the second container can be captured. The traffic analysis engine can determine one or more traffic patterns included in the network traffic. The traffic analysis engine can cause simulated network traffic corresponding to the one or more traffic patterns to be transmitted to a second version (e.g., a canary release) of the containerized production environment. Second metrics relating to processing by the second version of the second container can be captured. A comparison between the first metrics and the second metrics can be presented.

    FEDERATED INSERTION OF 3RD PARTY SOFTWARE AS A SERVICE FOR NETWORK SLICES

    公开(公告)号:US20200267520A1

    公开(公告)日:2020-08-20

    申请号:US16277309

    申请日:2019-02-15

    Abstract: Systems, methods, and computer-readable mediums for federating an enterprise and a SaaS provider across one or more network slices of a network service provider. A SaaS provided by a SaaS provider for provisioning to an enterprise can be recognized. One or more network slices within a network of a network service provider between the enterprise and the SaaS provider can be identified. The one or more network slices can be used to provision the SaaS to the enterprise. As follows, the SaaS provider can be federated with the enterprise across one or more network service providers, including the network service provider. Specifically, the SaaS provider can be federated with the enterprise by uniquely associating the one or more network slices provided by the network service provider with the SaaS provisioned by the SaaS provider to the enterprise.

    Adaptive bit rate streaming with multi-interface reception

    公开(公告)号:US10425458B2

    公开(公告)日:2019-09-24

    申请号:US15293591

    申请日:2016-10-14

    Abstract: In one embodiment, a method includes receiving content in a first format at a first interface at an adaptive bit rate client, playing the content received at the first interface at the adaptive bit rate client, monitoring network conditions at the first interface, receiving the content in a second format at a second interface at the adaptive bit rate client, and upon identifying a change in the network conditions at the first interface, switching from playing the content received on the first interface to playing the content received at the second interface at the adaptive bit rate client. An apparatus and logic are also disclosed herein.

    ADAPTIVE BIT RATE STREAMING WITH MULTI-INTERFACE RECEPTION

    公开(公告)号:US20180109579A1

    公开(公告)日:2018-04-19

    申请号:US15293591

    申请日:2016-10-14

    Abstract: In one embodiment, a method includes receiving content in a first format at a first interface at an adaptive bit rate client, playing the content received at the first interface at the adaptive bit rate client, monitoring network conditions at the first interface, receiving the content in a second format at a second interface at the adaptive bit rate client, and upon identifying a change in the network conditions at the first interface, switching from playing the content received on the first interface to playing the content received at the second interface at the adaptive bit rate client. An apparatus and logic are also disclosed herein.

    DIFFERENTIATED QUALITY OF SERVICE USING TUNNELS WITH SECURITY AS A SERVICE
    16.
    发明申请
    DIFFERENTIATED QUALITY OF SERVICE USING TUNNELS WITH SECURITY AS A SERVICE 有权
    使用安全作为服务的隧道的差异化服务质量

    公开(公告)号:US20160352628A1

    公开(公告)日:2016-12-01

    申请号:US14724635

    申请日:2015-05-28

    CPC classification number: H04L45/38 H04L12/4633 H04L45/302

    Abstract: A computer-implemented method includes sending a first request message to a first server associated with a first access network indicative of a request for an indication of whether the first server is configured to support prioritization of tunneled traffic, receiving a first response message from the first server indicative of whether the first server is configured to support prioritization of tunneled traffic, establishing one or more first tunnels with a security service when the first response message is indicative that the first server is configured to support prioritization of tunneled traffic, sending first flow characteristics and a first tunnel identifier to the first server; and receiving the first flow characteristics for each first tunnel from the first server at a first network controller. The first network controller is configured to apply a quality of service policy within the first access network for each tunnel in accordance with the flow characteristics.

    Abstract translation: 计算机实现的方法包括向与第一接入网络相关联的第一服务器发送指示对第一服务器是否被配置为支持隧道通信的优先级的指示的请求的第一请求消息,从第一接入网络接收第一响应消息 服务器,其指示第一服务器是否被配置为支持隧道传输的流量的优先级,当第一响应消息指示第一服务器被配置为支持隧道传输的流量的优先级时,建立与安全服务的一个或多个第一隧道,发送第一流特性 以及到所述第一服务器的第一隧道标识符; 以及在第一网络控制器处从第一服务器接收针对每个第一隧道的第一流特性。 第一网络控制器被配置为根据流量特性为每个隧道在第一接入网络内应用服务质量策略。

    Supporting captions for devices without native captions capability

    公开(公告)号:US12200168B2

    公开(公告)日:2025-01-14

    申请号:US17682584

    申请日:2022-02-28

    Abstract: A call is conducted with a first device of a user, the first device lacking captions capability. A second device of the user is identified for receiving captions for the call from among a plurality of second devices of the user based on one or more from a group of distances of the second devices to a location of the first device, display quality of the second devices, status of the second devices, and user preferences for the second devices. An identified second device is joined to the call to receive the captions during the call conducted with the first device.

    MULTI-FACTOR AUTHENTICATION FOR IOT DEVICES
    18.
    发明公开

    公开(公告)号:US20240147232A1

    公开(公告)日:2024-05-02

    申请号:US18052013

    申请日:2022-11-02

    CPC classification number: H04W12/06 H04L63/20 H04W12/63 H04L2463/082

    Abstract: Disclosed herein are systems, methods, and computer-readable media for enabling multi-factor authentication (MFA) for an Internet Of Things (IoT) device. In one aspect, a method includes receiving a network connection request from the IoT device to connect to a network. In one aspect, the method includes fetching authentication information for the device in response to the request. In one aspect, the method includes authenticating the device to the network. In one aspect, the method includes in response to the authentication of the device to the network, establishing a network connection between the IoT device and the network. In one aspect, the method includes applying the MFA policy. In one aspect, the method includes after successful compliance with the MFA policy establishing a session between the device and the application over the network.

    DYNAMIC VIRTUAL BACKGROUND IMAGE SELECTION FOR A VIDEO COLLABORATION SESSION

    公开(公告)号:US20230262102A1

    公开(公告)日:2023-08-17

    申请号:US17673231

    申请日:2022-02-16

    CPC classification number: H04L65/403 G06F3/0484 H04L65/1066

    Abstract: Presented herein are techniques to facilitate dynamic virtual background image selection for a video collaboration session. In one example, a method may include storing each of a plurality of virtual background images for a first user of a video collaboration system in association with one or more keywords; and upon initiation of a video collaboration session for the first user, automatically providing a first virtual background image for the first user based, at least in part, on at least one of, a first context keyword for the session matching at least one keyword stored in association with the first image or scheduling information associated with the session. In one instance, the method automatically providing a second virtual background image for the first user based on a second context keyword obtained from a transcript of the session that matches at least one keyword stored in association with the second image.

    Distributed denial of service mitigation for web conferencing

    公开(公告)号:US11108814B2

    公开(公告)日:2021-08-31

    申请号:US16551280

    申请日:2019-08-26

    Abstract: A web conferencing operator can enable participants to share multimedia content in real-time despite one or more of the participants operating from behind a middlebox via network address translation (NAT) traversal protocols and tools, such as STUN, TURN, and/or ICE. In NAT traversal, participants share a transport addresses that the participants can use to establish a joint media session. However, connectivity checks during NAT traversal can expose a media distribution device hosted by the web conferencing operator to various vulnerabilities, such as distributed denial of service (DDoS) attacks. The web conferencing operator can minimize the effects of a DDoS attack during the connectivity checks at scale and without significant performance degradation by configuring the middlebox to validate incoming requests for the connectivity checks without persistent signaling between the web conference operator and the middlebox.

Patent Agency Ranking