COLLABORATION APPLICATION INTEGRATION FOR USER-IDENTITY VERIFICATION

    公开(公告)号:US20250047667A1

    公开(公告)日:2025-02-06

    申请号:US18926800

    申请日:2024-10-25

    Abstract: Disclosed are methods, systems, and non-transitory computer-readable media for utilizes a collaboration application to provide data beneficial to the authentication of the user. The present application discloses receiving at least one item of personal identifying information for a user from a primary multi-factor authentication device. The present application further discloses receiving at least one item of personal identifying information for a user from a conferencing service in which the user is engaged in a conference. The present application also discloses determining whether to authenticate the user based on the items of personal identifying information from the primary multi-factor authentication device and from the conferencing service.

    Performance tracing for mobile network environments

    公开(公告)号:US12192096B2

    公开(公告)日:2025-01-07

    申请号:US18323134

    申请日:2023-05-24

    Abstract: Provided herein are techniques to facilitate multi-level performance tracing for a mobile network environment. In one instance, a method may include obtaining, by a mobile network, a trigger from an enterprise to initiate an underlay-level trace for a wireless device of the enterprise, wherein the trigger includes a correlation identifier that correlates the underlay-level trace with an enterprise-level trace for the wireless device and providing the underlay-level trace for a session of the wireless device by including a first trace flag for IP packets for the session and including a second trace flag for encapsulations of the IP packets for the session in which the first and second trace flag are unique to the session of the wireless device and enable elements of the mobile network to provide underlay trace information for the underlay-level trace for the session of the wireless device to a trace.

    NETWORK FAILURE PREVENTION
    55.
    发明申请

    公开(公告)号:US20240414045A1

    公开(公告)日:2024-12-12

    申请号:US18208659

    申请日:2023-06-12

    Abstract: Techniques for mitigating network failures (e.g., SLA violations, service degradations, network outages, etc.) based on output(s) from a predictive network system. The techniques may include determining that a failure is predicted to occur in a network and determining a correlation between the failure and a previous failure that occurred in the network. In examples, the correlation may be determined using a machine-learned model. The techniques may also include determining, based at least in part on the correlation, a condition contributing to the failure. In this way, prior to occurrence of the failure, a parameter associated with the network may be altered based at least in part on the condition to mitigate or otherwise prevent the failure.

    Virtual testing of network resiliency

    公开(公告)号:US12149436B2

    公开(公告)日:2024-11-19

    申请号:US17979640

    申请日:2022-11-02

    Abstract: Technologies for testing resiliency of a data network with real-world accuracy without affecting the flow of production data through the network. A method according to the technologies may include receiving a production data packet and determining a preferred data route toward a destination node for the production data packet based on a first routing information base, wherein the first routing information base includes a database where routes and route metadata are stored according to a routing protocol. The method may also include, receiving a test data packet, and determining an alternate data route toward the destination node for the test data packet based on a second routing information base, wherein the second routing information base simulates an error in the preferred data route. The method may include sending the production data packet to the preferred data route and sending the test data packet to the alternate data route.

    APPLICATION-AWARE ROUTING THROUGH PATHS OF SATELLITE NETWORKS

    公开(公告)号:US20240297708A1

    公开(公告)日:2024-09-05

    申请号:US18116493

    申请日:2023-03-02

    CPC classification number: H04B7/18513

    Abstract: Techniques for a low Earth orbit (LEO) satellite to route data through optimal satellite paths based on latency thresholds (and/or other QoS thresholds) for the application generating the data. The LEO satellite may identify the latency threshold from a data packet, where the latency threshold indicates an amount of time for the data packet to be relayed back down to a destination ground device. The LEO satellite determines available satellite paths through which data packets may be routed to destination ground stations. Further, the LEO satellite may determine latencies for transmitting traffic over the available satellite paths. The LEO satellite may compare the latency threshold for the data packet with the latencies of the available satellite paths, and select a satellite path that is optimal for transmitting the data packet. In this way, LEO satellites intelligently route data through satellite paths based on the type of traffic being transmitted.

    ENHANCED CLOUD ACCESS SECURITY BROKER FUNCTIONALITY UTILIZING IN-BAND APPLICATION OBSERVABILITY

    公开(公告)号:US20240291816A1

    公开(公告)日:2024-08-29

    申请号:US18174177

    申请日:2023-02-24

    CPC classification number: H04L63/0876 H04L63/0245 H04L63/20

    Abstract: Provided herein are techniques to facilitate enhanced cloud access security broker (CASB) functionality via in-band application observability in which a CASB can be implemented in-line between the client device and an embedded application security service. In one instance, a method may include, obtaining, by a CASB from a client device, a first message for an application transaction involving an application operating via the client device. The first message can be augmented to include first security metadata and can be forwarded to trigger one or more actions by an embedded application security service associated with the application. The CASB may obtain a second message from the embedded application security service that includes second security metadata, and one or more actions can be triggered at the CASB based, at least in part, on the second security metadata included in the second message.

Patent Agency Ranking