Secure frame encryption as a service

    公开(公告)号:US12052229B2

    公开(公告)日:2024-07-30

    申请号:US17389708

    申请日:2021-07-30

    Inventor: Sebastian Jeuk

    CPC classification number: H04L63/0471 H04L63/02 H04L63/029 H04L69/324

    Abstract: Systems, methods, and computer-readable media are provided for performing secure frame encryption as a service. For instance, a network device can receive a first request for encrypting a first media stream associated with a first endpoint. In response to the first request, the network device can obtain a first encryption key for encrypting the first media stream associated with the first endpoint. The network device can receive, from the first endpoint, a first plurality of media frames corresponding to the first media stream and encrypt each of the first plurality of media frames using the first encryption key to yield a first plurality of encrypted media frames. The network device can packetize the first plurality of encrypted media frames into a first plurality of data packets for transmission to a second endpoint.

    Multi-domain and multi-tenant network topology model generation and deployment

    公开(公告)号:US11575580B2

    公开(公告)日:2023-02-07

    申请号:US17335798

    申请日:2021-06-01

    Abstract: Techniques are described herein for generating network topologies based on models, and deploying the network topologies across hybrid clouds and other computing environments that include multiple workload resource domains. A topology deployment system may receive data representing a logical topology model, and may generate a network topology for deployment based on the logical model. The network topology may include various services and/or other resources provided by different tenants in the computing environment, and tenant may be associated with different set of resources and deployment constraints. The topology deployment system may determine and generate the network topology to use the various resources and comply with various deployment constraints of the different tenants providing the services, and the tenants consuming the network topology.

    DYNAMIC RESOURCE ALLOCATION FOR NETWORK SECURITY

    公开(公告)号:US20230036547A1

    公开(公告)日:2023-02-02

    申请号:US17390229

    申请日:2021-07-30

    Abstract: Systems, methods, and computer-readable media are provided for dynamic allocation of network security resources and measures to network traffic between end terminals on a network and a network destination, based in part on an independently sourced reputation score of the network destination. In one aspect, a method includes receiving, at a cloud network controller, a request from an end terminal for information on a network destination; determining, at the cloud network controller, a reputation score for the network destination; determining, at the cloud network controller, one or more security measures to be applied when accessing the network destination, based on the reputation score; and communicating, by the cloud network controller, the one or more security measures to the end terminal, wherein the end terminal communicates the one or more security measures to a third-party security service provider for applying to communications between the end terminal and the network destination.

    NETWORK TOPOLOGY MODEL GENERATION AND DEPLOYMENT FOR MACHINE LEARNING SYSTEMS

    公开(公告)号:US20230032585A1

    公开(公告)日:2023-02-02

    申请号:US17390527

    申请日:2021-07-30

    Abstract: Techniques are described herein for generating and deploying network topologies to implement machine learning systems. A topology deployment system may receive data representing a logical model corresponding to a machine learning system, and may analyze the machine learning system to determine various components and attributes of the machine learning system to be deployed. Based on the components and attributes of the machine learning system, the topology deployment system may select target resources and determine constraints for the deployment of the machine learning system. A corresponding network topology may be generated and deployed across one or a combination of workload resource domains. The topology deployment system also may monitor and update the deployed network topology, based on performance metrics of the machine learning system and/or the current status of the system in a machine learning pipeline.

    KEY SHARING FOR MEDIA FRAMES USING BLOCKCHAIN

    公开(公告)号:US20220407689A1

    公开(公告)日:2022-12-22

    申请号:US17349816

    申请日:2021-06-16

    Inventor: Sebastian Jeuk

    Abstract: This disclosure describes techniques for exchanging keys associated with encrypted media sessions using blockchains. In an example method, one or more encrypted frames are generated by encrypting one or more media frames based on an encryption key. Data indicating a ledger in a blockchain is transmitted to one or more computing devices. The ledger includes a decryption key configured to decrypt the one or more encrypted frames. Data packets are generated by packetizing the one or more encrypted frames. The data packets are transmitted to the one or more computing devices.

    Machine-learning infused network topology generation and deployment

    公开(公告)号:US11424989B2

    公开(公告)日:2022-08-23

    申请号:US16901558

    申请日:2020-06-15

    Abstract: Techniques are described herein for deploying, monitoring, and modifying network topologies comprising various computing and network nodes deployed across multiple workload resource domains. A deployment system may receive operational data from a network topology deployed across multiple workload resource domains, such as public or private cloud computing environments, on-premise data centers, and the like. The operational data may be provided to a trained machine-learning model, and output from the trained model may be used, along with constraint inputs and resource inventories of the workload resource domains, to determine updated topology models which may be deployed within the workload resource domains.

Patent Agency Ranking