Control of network connected devices

    公开(公告)号:US10778775B2

    公开(公告)日:2020-09-15

    申请号:US15333313

    申请日:2016-10-25

    Abstract: Presented herein are techniques in which one or more network devices can use information provided by a special purpose network connected device to retrieve a usage profile (i.e., configuration file) associated with the special purpose network connected device. The retrieved usage profile, which includes/describes preselected (predetermined) usage descriptions associated with the special purpose network connected device, can then be used to configure one or more network devices. For example, the predetermined usage descriptions associated with the special purpose network connected device can be instantiated and enforced at a network device or the predetermined usage descriptions can be used for auditing the special purpose network connected device (e.g., monitoring of traffic within the network).

    DYNAMIC DEVICE ISOLATION IN A NETWORK
    22.
    发明申请

    公开(公告)号:US20180255092A1

    公开(公告)日:2018-09-06

    申请号:US15446707

    申请日:2017-03-01

    Abstract: In one embodiment, a device in a network inserts a profile tag into an address request sent by an endpoint node in the network to a lookup service. The lookup service is configured to identify one or more addresses with which the endpoint node is authorized to communicate based on a profile for the endpoint node associated with the inserted profile tag. The device receives an address response sent from the lookup service to the endpoint node that indicates the set of one or more addresses with which the endpoint node is authorized to communicate. The device determines whether a communication between the endpoint node and a particular network address is authorized using the set of one or more addresses with which the endpoint node is authorized to communicate. The device blocks the communication based on a determination that the particular network address is not in the set of one or more addresses with which the endpoint node is authorized to communicate.

    USING DOMAIN NAME SERVER QUERIES FOR MANAGING ACCESS CONTROL LISTS

    公开(公告)号:US20170111313A1

    公开(公告)日:2017-04-20

    申请号:US14882522

    申请日:2015-10-14

    CPC classification number: H04L61/1511 H04L61/2015 H04L61/6009 H04L63/0236

    Abstract: In one embodiment, a caching resolver receives a name server query from an end device for an Internet Protocol (IP) address for a hostname, and determines whether the hostname requested is in an access control list (ACL). In response to the hostname being in the ACL, the caching resolver examines a received response to the name server query for the hostname, wherein the received response contains a particular IP address for the hostname, and adds the particular IP address for the hostname to the ACL. In one embodiment, the ACL is local to the caching resolver, while in another embodiment, adding the particular IP address for the hostname to the ACL comprises sending a message to a remote ACL-maintaining device that maintains the ACL.

    MANUFACTURER USAGE DESCRIPTION (MUD) WIRELESS EMISSION POWER PROFILE EXTENSION

    公开(公告)号:US20250028376A1

    公开(公告)日:2025-01-23

    申请号:US18356473

    申请日:2023-07-21

    Abstract: Methods and systems are described herein for detecting deviations from an expected power profile of a device. The method comprises: retrieving a manufacturer usage description (MUD) associated with the device. The MUD includes a power profile associated with the device. An expected power consumption parameter can be determined from the power profile. The method may further comprise monitoring an actual power consumption parameter of the device and comparing the expected power consumption parameter to the actual power consumption parameter. The method may further comprise determining a deviation between the power consumption parameter and the expected power consumption indicated in the power profile, and outputting a notification when the deviation is equal to or greater than a threshold value.

    DELIVERING SECURED POWER TO DEVICES

    公开(公告)号:US20240388321A1

    公开(公告)日:2024-11-21

    申请号:US18531823

    申请日:2023-12-07

    Abstract: A power source that supplies power to authorized computing devices generates a query requesting the power usage of the computing devices over a predetermined time period. Each computing device receives the query and provides a response with an indication of the measured or estimated power usage during the predetermined time period. The power source adds up the power usage of each authorized computing device to determine a difference between the reported power usage and the power supplied to the authorized computing devices. The power source may mitigate any discrepancy by cutting off power to ports that are providing more power than is being reported as consumed by the authorized computing devices.

    Network configuration security using encrypted transport

    公开(公告)号:US11888898B2

    公开(公告)日:2024-01-30

    申请号:US17463751

    申请日:2021-09-01

    CPC classification number: H04L63/166 H04L61/5014 H04L63/0869 H04L63/0884

    Abstract: At an authentication server, a request for at least a first dynamic host configuration protocol (DHCP) option is received from a client device, and it is determined if the authentication server implements DHCP. Based at least in part on a determination that the authentication server does not implement a DHCP, the operations further include transmitting an application program interface (API) call to a DHCP server associated with the authentication server acting as a DHCP gateway, receiving a response from the DHCP server, and transmitting the response to the client device.

    Priority based selection of time services

    公开(公告)号:US11115266B2

    公开(公告)日:2021-09-07

    申请号:US16296434

    申请日:2019-03-08

    Inventor: Eliot Lear

    Abstract: In an embodiment, a method comprises at a network device in an enterprise network, selecting one or more time servers used for establishing a timing reference according to a predetermined priority order of selection that begins with determining whether the network device is configured with information indicating one or more time servers to be used. A timing reference is established for the network device based on a selected time server.

    SOFTWARE USAGE DESCRIPTION (SUD) FOR INSTALLABLE APPLICATIONS

    公开(公告)号:US20210226995A1

    公开(公告)日:2021-07-22

    申请号:US16746323

    申请日:2020-01-17

    Abstract: This disclosure describes techniques for providing manufacturer usage description (MUD) solution to automatically update network access policy for client application software. The method may include embedding metadata in the application binary. The metadata may include MUD uniform resource identifiers (URIs) that may point to MUD files describing the application's network access requirements. The MUD files may be hosted by application vendor's MUD servers. The system may include a network policy server that is able discover the MUD URIs. The MUD URIs may be discovered based on extracting the MUD URIs from the metadata and/or being provision with the set of MUD URIs for trusted applications. The method may include enterprise wide policy and individual host policy for implementation of the MUD files.

    FLEXIBLE DEVICE ONBOARDING VIA BOOTSTRAP KEYS

    公开(公告)号:US20200120502A1

    公开(公告)日:2020-04-16

    申请号:US16281864

    申请日:2019-02-21

    Abstract: This technology uses a bootstrap key (“BSK”) to securely onboard a computing device to a network. A unique BSK associated with an onboarding computing device is used to verify for various deployment models (1) that the computing device has proof the computing device is connecting to the correct wired or wireless network and (2) that the network has proof the computing device is trusted. The BSK may be an associated BSK or an embedded BSK. A computing device receives a signed voucher from the manufacturer authorized signing authority (“MASA”) before the computing device may onboard to a network. The MASA will issue a voucher to a Bootstrapping Remote Secure Key Infrastructure (“BRSKI”) registrar if the registrar proves knowledge of the computing device's BSK to the MASA or the registrar has an established trust relationship with the MASA.

    Delegating policy through manufacturer usage descriptions

    公开(公告)号:US10595320B2

    公开(公告)日:2020-03-17

    申请号:US15726961

    申请日:2017-10-06

    Abstract: A process for implementing temporary rules for network devices is described. In one embodiment, the process includes a controller receiving a manufacturer usage description (MUD) identifier from a first device. The controller retrieves a MUD file associated with the MUD identifier. The controller registers a device identifier associated with the first device with a delegated controller determined based on the MUD file. The delegated controller is configured to generate a dynamic policy for the first device. The controller receives a dynamic policy from the delegated controller for the first device. The dynamic policy may be configured to permit a communication session between the first device and a second device. The controller forwards the dynamic policy to an access control device in communication with the first device to enable the access control device to permit the communication session between the first device and the second device.

Patent Agency Ranking