TRUST-BASED MODEL FOR DEPLOYING ISSUE IDENTIFICATION AND REMEDIATION CODE

    公开(公告)号:US20250117201A1

    公开(公告)日:2025-04-10

    申请号:US18482138

    申请日:2023-10-06

    Abstract: A method, computer system, and computer program product are provided for selectively deploying code modules for issue identification and remediation tasks. A plurality of code modules is obtained, wherein each code module includes instructions for issue identification and remediation. A trust score for each code module of the plurality of code modules is determined, wherein the trust score includes a first trust score component for issue identification and a second trust score component for issue remediation, and wherein the trust score is based on a source of each code module selected from a group of a human-generated source and an artificial intelligence model-generated source. A particular code module of the plurality of code modules is deployed based on the trust score of the particular code module satisfying a threshold value. The trust score for the particular code module is updated based on results of deploying the particular code module.

    Prioritized scheduling for UWB ranging

    公开(公告)号:US12273787B2

    公开(公告)日:2025-04-08

    申请号:US18502421

    申请日:2023-11-06

    Abstract: Presented herein are techniques for scheduling Ultra-Wideband (UWB) anchors and mobile devices for client ranging. A control device can determine respective ranging priorities for a plurality of mobile devices, which are each assigned to at least one UWB anchor. The control device can obtain at least one collision mapping identifying, for a respective pair of the mobile devices, a collision probability that a UWB signal associated with a ranging procedure involving a first mobile device of the respective pair will collide with a UWB signal associated with a ranging procedure involving a second mobile device of the respective pair. The control device can establish a ranging schedule for the mobile devices and UWB anchors based on the respective UWB ranging priorities and the collision mapping(s). The control device can send at least one command to cause UWB ranging procedures to be performed according to the ranging schedule.

    Anti-Greenwashing Carbon Data Aggregation and Disaggregation

    公开(公告)号:US20250111382A1

    公开(公告)日:2025-04-03

    申请号:US18478435

    申请日:2023-09-29

    Abstract: Described herein are devices, systems, methods, and processes for assessing and managing the carbon footprint of information technology (IT) infrastructures. The system can utilize distributed public key infrastructure (PKI) to ensure data security, trustworthiness, and anonymity. It may provide real-time, accurate, and comprehensive data on the carbon footprint of the entire infrastructure, enabling administrators to make informed decisions based on live, aggregated, and anonymized power consumption data and carbon footprint metrics. The system can also support the management of carbon-related metrics during processes such as device migration or infrastructure renewal. Furthermore, it can enable various stakeholders, including IT infrastructure owners, auditors, and generic users, to access and analyze the data based on their specific roles and permissions. This approach can enhance the transparency and accountability of IT operations, contributing to environmental sustainability efforts in the IT industry.

    Enabling internal and external verification of hash-based signature computations by signing server

    公开(公告)号:US12267437B2

    公开(公告)日:2025-04-01

    申请号:US17669302

    申请日:2022-02-10

    Abstract: Methods and systems enable internal and external verification of computations performed by a code signing server according to hash-based signature techniques using unique state, and further for a code signing server to expose parts of a hash-based signature log without negating the security of the one-time signature key pairs generated by the code signing server. A signing module of a code signing server receives a signing request from a client computing system. The signing module configures the code signing server to generate a one-time signature key pair based on a Merkle tree state. The signing module configures the code signing server to issue a hash-based signature to the client computing system. The code signing server is configured to record the Merkle tree state and the issued HBS in an immutably ordered log at a logging server.

    Multitenant network orchestration
    56.
    发明授权

    公开(公告)号:US12267328B2

    公开(公告)日:2025-04-01

    申请号:US17695265

    申请日:2022-03-15

    Abstract: Methods are provided in which a network device hosts distinct network access resources that are managed by different entities. The method includes obtaining a request for partitioning one or more network resources of an on-premise network device for connecting one or more endpoints to a first network managed by a first entity. The on-premise network device connects one or more endpoints to a second network managed by a different entity. The method further involves partitioning, based on the request, the one or more network resources and connecting the one or more endpoints to the first network using the one or more network resources. The one or more network resources are managed by the first entity while at least one other network resource of the on-premise network device is managed by the different entity and is associated with connecting the one or more endpoints to the second network.

    Service assurance via federation-based network during roaming

    公开(公告)号:US12267314B2

    公开(公告)日:2025-04-01

    申请号:US18414137

    申请日:2024-01-16

    Abstract: Aspects of the disclosure include a method and associated network device. The method includes authenticating an identity of a user of a client device after the client device is associated with an access network provider. Authenticating the identity of the user comprises receiving, from an identity provider, a credential associated with the identity, and receiving, from the identity provider, information identifying a network-based service to be applied to network traffic with the client device. The method further includes establishing, using the credential and the received information, a secure connection between the access network provider and a service provider that is capable of providing the network-based service. The method further includes receiving network traffic from the service provider. Packets of the network traffic include an assurance value that enables the client device to determine that the network-based service is being provided by the service provider.

    Specifying routes to enable Layer-2 mobility in hybrid-cloud environments

    公开(公告)号:US12267240B2

    公开(公告)日:2025-04-01

    申请号:US18656479

    申请日:2024-05-06

    Abstract: Techniques for using more-specific routing to perform scalable Layer-2 (L2) stretching of subnets across hybrid-cloud environments. Routing tables in a public cloud may allow for routes that are more specific than the default local route, and the more-specific routes may be used to send all traffic to a dedicated, cloud router. The more-specific routes are set up for a VPC where a subnet resides such that the more specific-routes cover at least a portion of subnet range. The next hop for the more-specific routes point to the cloud router which is capable of doing host routing and segmentation extension. Thus, traffic originating from endpoints in a VPC is routed to the cloud router, and the cloud router determines whether the traffic is to be re-routed back to a destination endpoint in the VPC (or another cloud location), or sent to a destination endpoint residing in the on-premises site.

    Methods and apparatus for encoding local processing metadata in network headers

    公开(公告)号:US12267233B2

    公开(公告)日:2025-04-01

    申请号:US17538513

    申请日:2021-11-30

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media to encode network functions in a packet header. A method includes receiving a first packet from a source device that is to be delivered to a destination address through a network; determining a route to the destination address; identifying at least one network function for the first packet; encapsulating the first packet in a second packet, wherein a header of the second packet includes the route to the destination address in a destination address field and local processing metadata associated with the at least one network function in a source address field; and forwarding the second packet to a next network node of the network identified in the destination address.

    Network connected device energy conservation

    公开(公告)号:US12265437B2

    公开(公告)日:2025-04-01

    申请号:US18172993

    申请日:2023-02-22

    Abstract: Enhanced network level information for power control is described. The enhanced network level information enables network connected electronic devices to enter and exit standby modes based on system level information. The network level information also enables the use of a respective network connected device in a seamless manner from the perspective of the user, while decreasing the amount of energy consumed by the device when not in active operation. In some examples, a Network Monitoring Application (NMA) classifies electronic devices into power control categories, monitors a physical environment associated with the plurality of connected electronic devices, and provides a power control signal to the various electronic devices upon detection of a change in the physical environment.

Patent Agency Ranking