INTERNET OF THINGS SECURITY SYSTEM
    41.
    发明申请

    公开(公告)号:US20190260751A1

    公开(公告)日:2019-08-22

    申请号:US15898590

    申请日:2018-02-18

    Abstract: In one embodiment, a device including a processor, and a memory to store data used by the processor, wherein the processor is operative to run a manufacturer usage description (MUD) controller operative to obtain a MUD profile of an Internet of Things (IoT) device from a MUD server, the MUD profile of the IoT device including: access rights of the IoT device, and any one or more of the following a default device username and/or a default device password of the IoT device, a recommended/required device password complexity of the IoT device, at least one service that should be enabled/disabled on the IoT device, and/or allowed security protocols and/or ciphers for communication to and/or from the IoT device, enforce security of the IoT device according to the MUD profile of the IoT device. Related apparatus and methods are also described.

    META BEHAVIORAL ANALYTICS FOR A NETWORK OR SYSTEM

    公开(公告)号:US20190173762A1

    公开(公告)日:2019-06-06

    申请号:US15830797

    申请日:2017-12-04

    Abstract: Meta behavioral analytics techniques include, at one or more network devices that are operatively coupled to a plurality of behavioral analytics systems associated with a network or system, monitoring data outputs of the plurality of behavioral analytics systems that are representative of activity in the network or system. The one or more network devices correlate the data outputs from two or more of the plurality of behavioral analytics systems that are dedicated to analyzing different subject matter domains. Additionally, based on the correlating, the one or more network devices detect a previously unidentified condition in (a) the network or system; or (b) one of the plurality of behavioral analytics systems.

    System to determine the placement of smart light emitters

    公开(公告)号:US10098204B1

    公开(公告)日:2018-10-09

    申请号:US15920073

    申请日:2018-03-13

    Abstract: A computer implemented method, computer program product, and system, relating to a geographic lighting controller. A controller receives an instruction for a smart lighting effect, the instruction including a target geographic location. The controller retrieves from a database, based on the target geographic location, information identifying a first plurality of smart lights to activate as part of the smart lighting effect. The controller determines a plurality of network addresses and a plurality of orientations for the first plurality of smart lights, based on the retrieved information, generates a lighting effect command relating to the first plurality of smart lights, and transmits the lighting effect command to create the smart lighting effect.

    Internet of things security system
    44.
    发明授权

    公开(公告)号:US12143391B2

    公开(公告)日:2024-11-12

    申请号:US18121413

    申请日:2023-03-14

    Abstract: In one embodiment, a device including a processor, and a memory to store data used by the processor, wherein the processor is operative to run a manufacturer usage description (MUD) controller operative to obtain a MUD profile of an Internet of Things (IoT) device from a MUD server, the MUD profile of the IoT device including: access rights of the IoT device, and any one or more of the following a default device username and/or a default device password of the IoT device, a recommended/required device password complexity of the IoT device, at least one service that should be enabled/disabled on the IoT device, and/or allowed security protocols and/or ciphers for communication to and/or from the IoT device, enforce security of the IoT device according to the MUD profile of the IoT device. Related apparatus and methods are also described.

    EXCHANGE ENGINE FOR SECURE ACCESS SERVICE EDGE (SASE) PROVIDER ROAMING

    公开(公告)号:US20240146727A1

    公开(公告)日:2024-05-02

    申请号:US17976009

    申请日:2022-10-28

    CPC classification number: H04L63/0876 H04L63/0263 H04L63/20

    Abstract: Techniques are described herein for implementing and using a secure access service edge (SASE) exchange system to allow SASE providers to share SASE services with other providers. A SASE exchange system may be used by any number of SASE providers to support SASE roaming by user endpoints between different SASE providers. A user endpoint may use SASE roaming to access additional sets of SASE services and capabilities that cannot be provided by a home SASE provider and/or other current SASE provider(s) of the user endpoint. In some examples, a SASE exchange system may be used to transition user endpoints from one SASE provider to another. Additionally or alternatively, the SASE exchange system may determine a combination of SASE providers that can be used to provide different subsets of shared SASE services/capabilities to a user endpoint.

    AUTOMATED GENERATION OF STANDARD NETWORK DEVICE CONFIGURATIONS

    公开(公告)号:US20220247638A1

    公开(公告)日:2022-08-04

    申请号:US17164339

    申请日:2021-02-01

    Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.

    IDENTIFICATION OF NETWORK DEVICE CONFIGURATION CHANGES

    公开(公告)号:US20220247630A1

    公开(公告)日:2022-08-04

    申请号:US17165364

    申请日:2021-02-02

    Abstract: In one example, a logical representation of a first graph is generated. The first graph indicates a configuration of a network device in a network at a first time. The first graph includes a first node representative of a first configuration block of the network device, a second node representative of a second configuration block of the network device, and a first link that indicates, by connecting the first node and the second node, that the first configuration block is associated with the second configuration block. The logical representation of the first graph is compared to a logical representation of a second graph that indicates an actual or planned configuration of the network device at a second time subsequent to the first time. In response, one or more changes in the configuration of the network device from the first time to the second time are identified.

Patent Agency Ranking