Smarter policy decisions based on metadata in data flows

    公开(公告)号:US10320676B2

    公开(公告)日:2019-06-11

    申请号:US14194348

    申请日:2014-02-28

    Abstract: Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content including audio streams, video streams, and data stream/channels. The present disclosure describes mechanisms for a Port Control Protocol (PCP) server to provide feedback to PCP clients to enforce certain policies on the transport of such media content for a network. A policy may include a traffic handling policy for enforcing differentiated quality of service characteristics for different types of media streams. Another policy may include a security policy ensuring a data files being transmitted over a data channel from one endpoint travels to a security application via a relay element before the packets reaches another endpoint. The mechanisms are transparent to the endpoints, and advantageously preserve the user experience for these user applications.

    Smarter policy decisions based on metadata in data flows
    34.
    发明授权
    Smarter policy decisions based on metadata in data flows 有权
    基于数据流中元数据的更明智的政策决策

    公开(公告)号:US09282040B2

    公开(公告)日:2016-03-08

    申请号:US14255701

    申请日:2014-04-17

    Abstract: Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content including audio streams, video streams, and data stream/channels. The present disclosure describes mechanisms for a Port Control Protocol (PCP) server to provide feedback to PCP clients to enforce certain policies on the transport of such media content for a network. A policy may include a traffic handling policy for enforcing differentiated quality of service characteristics for different types of media streams. Another policy may include a security policy ensuring a data files being transmitted over a data channel from one endpoint travels to a security application via a relay element before the packets reaches another endpoint. The mechanisms are transparent to the endpoints, and advantageously preserve the user experience for these user applications.

    Abstract translation: 现代用户应用程序利用WebRTC,WebEx和Jabber等新型通信技术,允许设备连接和交换包括音频流,视频流和数据流/频道在内的媒体内容。 本公开描述了端口控制协议(PCP)服务器向PCP客户端提供反馈以对网络上的这种媒体内容的传输执行某些策略的机制。 策略可以包括用于为不同类型的媒体流实施差异化服务质量特征的流量处理策略。 另一策略可以包括安全策略,以确保在分组到达另一端点之前通过数据信道从一个端点传送数据文件经由中继元件传播到安全应用。 这些机制对端点是透明的,并且有利地保留这些用户应用的用户体验。

    SMARTER POLICY DECISIONS BASED ON METADATA IN DATA FLOWS
    35.
    发明申请
    SMARTER POLICY DECISIONS BASED ON METADATA IN DATA FLOWS 审中-公开
    基于数据流中元数据的更为明智的政策决策

    公开(公告)号:US20150249606A1

    公开(公告)日:2015-09-03

    申请号:US14194348

    申请日:2014-02-28

    Abstract: Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content including audio streams, video streams, and data stream/channels. The present disclosure describes mechanisms for a Port Control Protocol (PCP) server to provide feedback to PCP clients to enforce certain policies on the transport of such media content for a network. A policy may include a traffic handling policy for enforcing differentiated quality of service characteristics for different types of media streams. Another policy may include a security policy ensuring a data files being transmitted over a data channel from one endpoint travels to a security application via a relay element before the packets reaches another endpoint. The mechanisms are transparent to the endpoints, and advantageously preserve the user experience for these user applications.

    Abstract translation: 现代用户应用程序利用WebRTC,WebEx和Jabber等新型通信技术,允许设备连接和交换包括音频流,视频流和数据流/频道在内的媒体内容。 本公开描述了端口控制协议(PCP)服务器向PCP客户端提供反馈以对网络上的这种媒体内容的传输执行某些策略的机制。 策略可以包括用于为不同类型的媒体流实施差异化服务质量特征的流量处理策略。 另一策略可以包括安全策略,以确保在分组到达另一端点之前通过数据信道从一个端点传送数据文件经由中继元件传播到安全应用。 这些机制对端点是透明的,并且有利地保留这些用户应用的用户体验。

    Method and apparatus to scale authenticated firewall traversal using trusted routing point
    36.
    发明授权
    Method and apparatus to scale authenticated firewall traversal using trusted routing point 有权
    使用可信路由点来扩展验证的防火墙穿越的方法和装置

    公开(公告)号:US09094373B2

    公开(公告)日:2015-07-28

    申请号:US14317633

    申请日:2014-06-27

    CPC classification number: H04L63/029 G06F2221/2101 H04L9/3234 H04L61/2575

    Abstract: A Trusted Routing Point (TROP) generates a signaling message that includes an authorization token used to authorize a firewall to open a pinhole. The signaling message contains a first indicator that indicates whether a data field in the signaling message represents a source address of a media flow. The signaling message also includes a second indicator that indicates whether the firewall should derive the source address of the media flow from the data field. The authorization token is generated using a one-way hash function over information that may be included in the signaling message, including the first indicator and the second indicator.

    Abstract translation: 可信路由点(TROP)生成包含用于授权防火墙打开针孔的授权令牌的信令消息。 信令消息包含指示信令消息中的数据字段是否表示媒体流的源地址的第一指示符。 信令消息还包括第二指示符,其指示防火墙是否应从数据字段导出媒体流的源地址。 使用单向哈希函数生成授权令牌,该信息可以包括在信令消息中的信息,包括第一指示符和第二指示符。

    Application specific network slices

    公开(公告)号:US11824674B2

    公开(公告)日:2023-11-21

    申请号:US17509918

    申请日:2021-10-25

    CPC classification number: H04L12/189 H04L12/185 H04L12/1813 H04W28/20

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices. A method includes transmitting a request to a mobile network operator (MNO) for setup of a data connection with a device for a meeting provided by an application provider; receiving allowed network slices for the data connection that are generated by the MNO for the meeting; identifying a network slice from the allowed network slices for the meeting based on one or more characteristics specific to the meeting; and establishing the data connection with the mobile network operator based on the network slice.

    ENCRYPTED DATA PACKET FORWARDING
    38.
    发明公开

    公开(公告)号:US20230198964A1

    公开(公告)日:2023-06-22

    申请号:US17553375

    申请日:2021-12-16

    Abstract: A method of transmitting an encrypted data packet includes, with a processor, in response to receiving the encrypted data packet, executing an extended Berkeley packet filter (eBPF) application at an express data path (XDP) hook point located within a kernel space, determining whether the encrypted data packet is to be processed via a trusted application (TA) within a trusted execution environment (TEE) based on an analysis by the eBPF application, and identifying application intelligence data defining packet forwarding decisions based on a manner in which the encrypted data packet is processed.

    APPLICATION SPECIFIC NETWORK SLICES

    公开(公告)号:US20230132233A1

    公开(公告)日:2023-04-27

    申请号:US17509918

    申请日:2021-10-25

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices. A method includes transmitting a request to a mobile network operator (MNO) for setup of a data connection with a device for a meeting provided by an application provider; receiving allowed network slices for the data connection that are generated by the MNO for the meeting; identifying a network slice from the allowed network slices for the meeting based on one or more characteristics specific to the meeting; and establishing the data connection with the mobile network operator based on the network slice.

    Verifying accuracy of ML pipelines using third party co-ordination

    公开(公告)号:US11070575B2

    公开(公告)日:2021-07-20

    申请号:US16293937

    申请日:2019-03-06

    Abstract: Systems, methods, computer-readable media, and devices are disclosed for verifying traffic classification. At a first node, a classification to a received packet is designated according to a local model. The classification of the packet by the first node is verified by sending packet information describing the packet to a distributed network comprising multiple nodes, where the packet information includes attributes of the packet. The classification of the packet is verified from receiving results from a second node that, based on the attributes, independently classifies the packet. Based on the verified classification, decentralized information for classifying packets is updated.

Patent Agency Ranking