DEVICE ADDRESS ROTATION AUTHORIZATION AND VERIFICATION

    公开(公告)号:US20230269219A1

    公开(公告)日:2023-08-24

    申请号:US17677134

    申请日:2022-02-22

    CPC classification number: H04L61/6022 H04L61/2015 H04W12/108 H04W12/71

    Abstract: An authorization device obtains a registration request associated with an end device, the registration request including a new randomized media access control (MAC) address associated with the end device; determines whether the end device is authorized to use the new randomized MAC address; transmits a message to the end device with a first randomly generated number when it is determined that the end device is authorized to use the new randomized MAC address; obtains integrity information associated with the end device, the first integrity information being computed based on the first randomly generated number; transmits a request to a validation system to validate the end device based on the first integrity information; obtains an indication that the end device is validated; determines policies associated with the end device when it is determined that the end device is validated; and applies the policies to the end device.

    In situ triggered function as a service within a service mesh

    公开(公告)号:US11716264B2

    公开(公告)日:2023-08-01

    申请号:US16102395

    申请日:2018-08-13

    CPC classification number: H04L43/028 G06F8/4441 G06F9/4881

    Abstract: The present technology is directed to a system and method for automatic triggering of relevant code segments corresponding to a sequence of code segments or function codes having a preferred execution order. The automatic triggering action is based on the snooping of a response generated from an execution of a previous code segment. Information with respect to the next code segment in the preferred execution order may be obtained by directing a network proxy, such as Envoy to snoop the Uniform Resource Identifier (URI) field of a response packet being forwarded to a client entity. In this way, a network proxy may preemptively spawn and instantiate the following function codes (pointed to by the snooped Uniform Resource Identifier) prior to receiving the corresponding client request. As such, by the time a client request for the subsequent function code is received the code ready for execution.

    DECENTRALIZED MACHINE LEARNING ACROSS SIMILAR ENVIRONMENTS

    公开(公告)号:US20230092777A1

    公开(公告)日:2023-03-23

    申请号:US17479237

    申请日:2021-09-20

    Abstract: A method, computer system, and computer program product are provided for decentralized machine learning. A plurality of computing networks are identified by determining that each computing network of the plurality of computing networks satisfies a predetermined number of criteria. A decentralized learning agent is provided to each computing network, wherein the decentralized learning agent is provided with input parameters for training and is trained using training data associated with a computing network to which the decentralized learning agent is provided. A plurality of learned parameters are obtained from the plurality of computing networks, wherein each learned parameter of the plurality of learned parameters is obtained by training the decentralized learning agent provided to each respective computing network. A global model is generated based on the plurality of learned parameters.

    CROSS SUB-DOMAIN MANAGEMENT OF SERVICE LEVEL OBJECTIVES

    公开(公告)号:US20230062502A1

    公开(公告)日:2023-03-02

    申请号:US17463807

    申请日:2021-09-01

    Abstract: Aggregation of cross domain service level indications provide an estimate of available end to end error budget within a service chain of a network system. In some embodiments, service level indications are obtained from a plurality of sub-domains, and aggregated to determine an end to end reliability score. The end to end reliability score is then distributed one or more of the sub-domains. The sub-domains then consider whether to implement a change based on local service level indications as well as the end to end reliability score. In other embodiments, a sub-domain requests approval to implement a change from an error manager. The error manager consults the end to end reliability score to determine whether adequate margin exists in the service chain to allow the change to occur, while still meeting service level objectives of the service chain. The error manager conditionally approves the request based on the determination.

    OAM-based suboptimal ECMP path detection in software-defined fabric

    公开(公告)号:US11582140B2

    公开(公告)日:2023-02-14

    申请号:US17123294

    申请日:2020-12-16

    Abstract: A node of a network configured to forward packets based on network programming instructions encoded in the packets, performs a method. The method includes generating a probe packet encoded with a replication network programming instruction. The replication network programming instruction is configured to validate equal-cost multi-path (ECMP) routing in the network from the node to a destination by remotely triggering transit nodes of the network, that are traversed by the probe packet, to each perform replicate-and-forward actions. The replicate-and-forward actions include: identifying ECMP paths toward the destination; generating, for the ECMP paths, replicated probe packets that each include the replication network programming instruction; and forwarding the replicated probe packets along the ECMP paths. The method further includes forwarding the probe packet toward the destination.

    Service assurance of ECMP using virtual network function hashing algorithm

    公开(公告)号:US11575593B2

    公开(公告)日:2023-02-07

    申请号:US17231445

    申请日:2021-04-15

    Abstract: Techniques are presented for evaluating Equal Cost Multi-Path (ECMP) performance in a network that includes a plurality of nodes. According to an example embodiment, a method is provided that includes obtaining information indicating equal cost multi-path (ECMP) paths in the network and a branch node in the network. For the branch node in the network, the method includes instantiating a virtual network function that simulates an ECMP hashing algorithm employed by the branch node to select one of multiple egress interface of the branch node; providing to the virtual network function for the branch node, a query containing entropy information as input to the ECMP hashing algorithm that returns interface selection results; and obtaining from the virtual network function a reply that includes the interface selection results. The method further includes evaluating ECMP performance in the network based on the interface selection results obtained for the branch node.

    Physical layer shielding of wireless communications

    公开(公告)号:US11575413B1

    公开(公告)日:2023-02-07

    申请号:US17582689

    申请日:2022-01-24

    Abstract: Presented herein are techniques to shield transmissions from being received and the information contained in them recovered by unwanted devices. Multi-user multiple-input multiple-output (MU-MIMO) techniques are employed, and in particular the spatial dimension aspects of those techniques. Shield nodes are controlled to transmit in a way to obscure the downlink streams transmitted by a wireless access point that are intended for a particular client device to anything outside of the shielded area, and also to obscure uplink streams from one or more client devices to the wireless access point to anything outside of the shielded area but allowing the uplink streams to be well received by the wireless access point.

Patent Agency Ranking