TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS

    公开(公告)号:US20240346180A1

    公开(公告)日:2024-10-17

    申请号:US18301058

    申请日:2023-04-14

    CPC classification number: G06F21/6263 H04L51/063 G06F2221/2141

    Abstract: Techniques are described herein for managing access to sensitive data detected within an electronic communication. In some embodiments, such techniques may comprise receiving, from a sender, an electronic communication directed toward a first recipient. The techniques may then comprise identifying one or more pieces of sensitive data within the electronic communication, providing a content of the one or more pieces of sensitive data to a data hosting device to be stored in a memory location and first information associated with the first recipient used to access the memory location, updating the electronic communication to replace the one or more pieces of sensitive data with a reference to the memory location, and transmitting the electronic communication to the first recipient.

    Dynamic Energy-Saving Video Transmissions for Sustainable Collaboration

    公开(公告)号:US20240333876A1

    公开(公告)日:2024-10-03

    申请号:US18194353

    申请日:2023-03-31

    CPC classification number: H04N7/157 G06F3/017 G06V20/44 H04N7/152

    Abstract: Devices, systems, methods, and processes for dynamically reducing the size of a video transmission are described herein. An energy-saving video transmission device can include a controller, a memory, a communication port coupled with at least a second device, and a virtual meeting logic configured to establish a virtual meeting with a video transmission. The video transmission is transmitted to at least the second device. The virtual meeting logic can determine a virtual meeting configuration and collect sustainability attributes data. Based on the collected data, an energy-saving video transmission rate can be selected. Often, this can indicate how often to capture and transmit keyframes of the video transmission instead of the entire video transmission. Finally, based on the energy-saving video transmission rate, a reduced size video transmission can be transmitted over a network. Subsequently, additional events can be detected that allow for the dynamic adjustment of the energy-saving video transmission rate.

    Energy-Aware Topology
    334.
    发明公开

    公开(公告)号:US20240333590A1

    公开(公告)日:2024-10-03

    申请号:US18194253

    申请日:2023-03-31

    CPC classification number: H04L41/0833 H04L41/12

    Abstract: A network of devices can be stabilized by administering an energy-aware topology that corresponds to a desired state derived in part from one or more sustainability metrics. Devices suitable for stabilization can include a processor, a memory, a plurality of elements, a communication port coupled with one or more neighboring devices, and an energy-aware topology logic. The energy-aware topology logic can monitor incoming traffic from one or more neighboring devices, receive current state data associated with the plurality of elements, and receive update data from the one or more neighboring devices via a sustainability-related augmented IGP. Also, the energy-aware topology logic can generate a desired state for the device based on at least the received current state data and update data. One or more of the plurality of elements may be modified in response to the generated desired state, wherein the modification involves changing one or more sustainability-related capabilities.

    SYSTEM AND METHOD OF DISCOVERING AND VALIDATING DIFFERENT NETWORK ACTION HARDWARE CAPABILITIES

    公开(公告)号:US20240195725A1

    公开(公告)日:2024-06-13

    申请号:US18360700

    申请日:2023-07-27

    CPC classification number: H04L43/12 H04L45/20 H04L45/50

    Abstract: Systems and methods for validating a hardware path capability are provided. The method includes generating, at an ingress node of a network, an operations, administration and maintenance (OAM) probe packet having an OAM bit set associated with validating the hardware path capability, wherein the OAM probe packet comprises a plurality of features; indicating, by each respective intermediate node of a plurality of intermediate nodes in the network along a network path and as instructed by the OAM bit set, whether the respective intermediate node can support the respective feature of the plurality of features; generating, at an egress node associated with the network path, a report regarding whether the plurality of intermediate nodes can support each respective feature of the plurality of features within the OAM probe packet; and determining, based on the report, whether to enable customer traffic implementing the plurality of features along the network path.

    Configuration validation in a disaggregated network OS environment

    公开(公告)号:US12001856B2

    公开(公告)日:2024-06-04

    申请号:US17898924

    申请日:2022-08-30

    CPC classification number: G06F9/44505 G06F8/65 H04L45/02

    Abstract: A network device has a first OS component, a second OS component is added to run concurrently with the first. The first OS component transmits routing information to the second OS component where it is stored in memory. The second OS component registers with a routing infrastructure to receive packets that are routed to the first OS component. A timestamp and a first ID are added to a first instance of a packet and transmitted to the first OS component. The timestamp and a second ID are added to a second instance of the packet and transmitted to the second OS component. First functionality data for the first OS component is transmitted to a controller. Second functionality data for the second OS component is transmitted to the controller. The first and second functionality data are compared to determine whether to replace the first OS component with the second OS component.

    Service assurance via federation-based network during roaming

    公开(公告)号:US11924190B2

    公开(公告)日:2024-03-05

    申请号:US17445295

    申请日:2021-08-17

    Abstract: Aspects of the disclosure include a method and associated network device. The method includes authenticating an identity of a user of a client device after the client device is associated with an access network provider. Authenticating the identity of the user comprises receiving, from an identity provider, a credential associated with the identity, and receiving, from the identity provider, information identifying a network-based service to be applied to network traffic with the client device. The method further includes establishing, using the credential and the received information, a secure connection between the access network provider and a service provider that is capable of providing the network-based service. The method further includes receiving network traffic from the service provider. Packets of the network traffic include an assurance value that enables the client device to determine that the network-based service is being provided by the service provider.

Patent Agency Ranking