Blockchain based software licensing enforcement

    公开(公告)号:US10572688B2

    公开(公告)日:2020-02-25

    申请号:US15482036

    申请日:2017-04-07

    Abstract: A server compiles a software program with a randomly generated string to produce compiled code. The server also computes a hash of the compiled code to produce a unique identifier for the software program. Upon receiving a request from a user to download the software program, the server generates a transaction for a blockchain that has a transaction identifier and the transaction including a user identifier for the user and the unique identifier. The server embeds the transaction identifier and the unique identifier with the software program, and downloads the software program to a computing device associated with the user.

    Distributed security system
    42.
    发明授权

    公开(公告)号:US10567441B2

    公开(公告)日:2020-02-18

    申请号:US15870957

    申请日:2018-01-14

    Abstract: In one embodiment, a system includes a first host computer including a host interface configured to receive traffic from a domain ingress node of a first domain, and processing machinery configured to instantiate worker nodes, instantiate a master node and a security gateway agent on the master node, instantiate a plurality of security clients on the worker nodes, wherein each worker node includes at least one security client, wherein each security client is configured to monitor at least part of the traffic being forwarded in the one worker node for malicious traffic, and report a first data item about the malicious traffic to the security gateway agent, and wherein the security gateway agent is configured to forward a second data item about the malicious traffic to a security server to determine at least one security policy to mitigate the malicious traffic, and to be enforced by a node.

    On-demand modular fog computing resources

    公开(公告)号:US10555054B2

    公开(公告)日:2020-02-04

    申请号:US15096337

    申请日:2016-04-12

    Abstract: In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.

    Dataplane-based seamless bidirectional forwarding detection monitoring for network entities

    公开(公告)号:US10447571B2

    公开(公告)日:2019-10-15

    申请号:US15869322

    申请日:2018-01-12

    Abstract: Dataplane-based Seamless Bidirectional Forwarding Detection (S-BFD) monitoring for network entities is provided. In one embodiment, a method of S-BFD monitoring includes assigning, by a network element, a unique segment identifier (ID) to each entity of a plurality of entities that are monitored by the network element. The method includes receiving an S-BFD control packet at the network element, including a first segment ID associated with a particular entity. The method also includes performing a lookup operation for the first segment ID in stored data of the network element. Based on the lookup operation, when a first action is designated in the stored data for the first segment ID, the method includes returning the S-BFD control packet to its source, and, when a second action is designated in the stored data for the first segment ID, the method includes forwarding the S-BFD control packet to an S-BFD reflector session.

    Multipoint Seamless Bi-Directional Forwarding Detection

    公开(公告)号:US20190297005A1

    公开(公告)日:2019-09-26

    申请号:US15927334

    申请日:2018-03-21

    Abstract: Multipoint seamless Bi-directional Forwarding Detection (BFD) may be provided. First, a discriminator and data identifying a headend device may be received by a node from the headend device. The discriminator may be received over a point-to-multipoint pseudowire between the node and the headend device. Next, the node may start a reflector session in response to receiving the discriminator. The reflector session may correspond to the discriminator and the data identifying the headend device. The reflector session may then receive a control packet from the headend device and determine that the control packet includes the discriminator. The control packet may be received over the point-to-multipoint pseudowire. Next, the reflector session on the node may send a reply packet to the headend device in response to determining that the control packet includes the discriminator. The reply packet may be sent over a unicast pseudowire between the node and the headend device.

    MULTI-PATH AWARE TRACING AND PROBING FUNCTIONALITY AT SERVICE TOPOLOGY LAYER

    公开(公告)号:US20190288923A1

    公开(公告)日:2019-09-19

    申请号:US16383956

    申请日:2019-04-15

    Abstract: In one embodiment, a system and method are disclosed for sending a request and receiving a reply. The request contains a network service header including a flow label field and a target index field. The flow label field contains a set of available flow labels. The target index field includes a value indicating a target node. The reply contains information indicating which of the flow labels can be used to route a packet to each of the next hop nodes downstream from the device that sent the reply. This process can be repeated for other nodes on a path, and other paths in a service topology layer. The information determined by this process can be used to perform other necessary functionalities at the service topology layer.

    PREDICTING AND MITIGATING LAYER-2 ANOMALIES AND INSTABILITIES

    公开(公告)号:US20190281078A1

    公开(公告)日:2019-09-12

    申请号:US15915335

    申请日:2018-03-08

    Abstract: In one embodiment, a server may receive both layer-2 topology information and layer-2 telemetry information from a plurality of layer-2 switches. The server may then apply behavioral learning to both the layer-2 topology information and the layer-2 telemetry information to detect layer-2 patterns that are indicative of one or more problematic layer-2 behaviors. As such, based on the behavioral learning, the server then creates predictive rules to be applied within layer-2 networks to predict the one or more problematic layer-2 behaviors. The predictive rules may then be used within a particular layer-2 network to cause i) prediction of one or more particular problematic layer-2 behaviors within the particular layer-2 network based on data from a plurality of switches within the particular layer-2 network, and ii) mitigation against the predicted one or more particular problematic layer-2 behaviors within the particular layer-2 network.

    BIT INDEXED EXPLICIT REPLICATION FOR LAYER 2 NETWORKING

    公开(公告)号:US20190215176A1

    公开(公告)日:2019-07-11

    申请号:US16237575

    申请日:2018-12-31

    Abstract: Functionality for creating a bit routing table for use in a bit-indexed explicit replication (“BIER”) environment in disclosed herein. In one embodiment, this functionality includes receiving information from a host, and determining whether the information comprises a MAC address that is a bit-indexed explicit replication (“BIER”) MAC address. In response to determining that the information comprises a BIER MAC address, this functionality creates an entry corresponding to the MAC address in a bit routing table. This functionality also analyzes the information to determine a bit position that is associated with the host, and also determines a port via which the host is reachable. The functionality updates the bit routing table by storing information identifying the bit position and the port in the entry, such that the bit position and the port both correspond to the MAC address. This functionality can be used to route packets in a BIER environment.

Patent Agency Ranking