Authentication, authorization and accounting in managed cloud computing services

    公开(公告)号:US11637830B2

    公开(公告)日:2023-04-25

    申请号:US16863321

    申请日:2020-04-30

    Abstract: In an embodiment, a computer implemented method comprises receiving, at a first computing device associated with a managing entity, a request to perform an operation of a managed service; publishing to a first block of a distributed ledger system, by the first computing device associated with the managing entity, identification information of the managing entity; identifying, by a second computing device associated with the managed service, the identification information published to the first block of the distributed ledger system; publishing to a second block of the distributed ledger system, by the second computing device associated with the managed service, acknowledgement information comprising an indication that the identification information of the managing entity published to the first block was received and verified; publishing to a third block of the distributed ledger system, by the second computing device associated with the managed service, management request information comprising an operation request for the managing entity; identifying, by the first computing device associated with the managing entity, the management request information published to the third block of the distributed ledger system; publishing to a fourth block of the distributed ledger system, by the first computing device associated with the managing entity, management request acknowledgment information comprising an indication that the management request information of the third block was received; and in response to a performance of an operation included in the management request information published to the third block, publishing to a fifth block of the distributed ledger system, by the first computing device associated with the managing entity, management operation record information including a history of operations performed by the managing entity.

    PROACTIVE ADJUSTMENT BASED ON NETWORKING IMPACT RELATED EVENT

    公开(公告)号:US20230080872A1

    公开(公告)日:2023-03-16

    申请号:US17476821

    申请日:2021-09-16

    Abstract: In one example, one or more devices monitor one or more data feeds from one or more sources of updates regarding networking impact related events for an indication that one or more networking impact related events are occurring or will occur. Based on the one or more data feeds, the device(s) determine that a networking impact related event of the one or more networking impact related events is occurring or will occur in a geographic region. In response to determining that the networking impact related event is occurring or will occur in the geographic region, the device(s) automatically identify one or more target adjustments to a network and/or to one or more services provided over the network. The device(s) implement the one or more target adjustments to the network and/or to the one or more services provided over the network.

    MULTI-DOMAIN AND MULTI-TENANT NETWORK TOPOLOGY MODEL GENERATION AND DEPLOYMENT

    公开(公告)号:US20220385538A1

    公开(公告)日:2022-12-01

    申请号:US17335798

    申请日:2021-06-01

    Abstract: Techniques are described herein for generating network topologies based on models, and deploying the network topologies across hybrid clouds and other computing environments that include multiple workload resource domains. A topology deployment system may receive data representing a logical topology model, and may generate a network topology for deployment based on the logical model. The network topology may include various services and/or other resources provided by different tenants in the computing environment, and tenant may be associated with different set of resources and deployment constraints. The topology deployment system may determine and generate the network topology to use the various resources and comply with various deployment constraints of the different tenants providing the services, and the tenants consuming the network topology.

    CONTEXT-AWARE SECURE ACCESS SERVICE EDGE (SASE) ENGINE

    公开(公告)号:US20220321534A1

    公开(公告)日:2022-10-06

    申请号:US17219157

    申请日:2021-03-31

    Abstract: Techniques for a context-aware secure access service edge (SASE) engine for generating security profile(s) associated with endpoint device(s) accessing the network and using the security profile(s) to evaluate a traffic flow from the endpoint device(s). The SASE engine may execute on an edge device of a computing resource network and may be configured to maintain a security profile database including an endpoint security profile mapping. Endpoint device(s) accessing the network may share endpoint, application, and/or user specific information with the SASE engine so that the SASE engine may generate a security profile specific to the endpoint, application, and/or user. Additionally, an enterprise network, associated with endpoint device(s) accessing the network, may provide default SASE security profile templates to the SASE engine. Further, a feedback loop may be established between the SASE engine and the endpoint device(s), enabling the SASE engine with the ability to autonomously and dynamically update security profiles.

    Service traffic replication and dynamic policy enforcement in a multi-cloud service mesh

    公开(公告)号:US10855577B2

    公开(公告)日:2020-12-01

    申请号:US16107040

    申请日:2018-08-21

    Abstract: In an embodiment, a data processing method comprises receiving, at a BIER replicator node that is programmed to implement Bit Index Explicit Replication (BIER) protocol, from a data source, a multicast stream packet identifying a service-level multicast group address; using the BIER replicator node, replicating the multicast stream packet according to BIER protocol and transmitting two or more replicated packet streams to two or more BIER receiver nodes that are programmed to implement BIER; using the two or more BIER receiver nodes, transmitting the two or more replicated packet streams to two or more receivers. Other embodiments may use modified iOAM (In-situ Operations, Administration, and Maintenance) techniques.

    SYSTEM AND METHOD OF PROVIDING SEGMENT ROUTING AS A SERVICE

    公开(公告)号:US20200328969A1

    公开(公告)日:2020-10-15

    申请号:US16915657

    申请日:2020-06-29

    Abstract: Disclosed is a system and method of providing a segment routing as a service application. The method includes receiving a configuration of an internet protocol environment. The configuration can be a layer 3 configuration of a single cloud environment or even across multiple cloud environments. The configuration defines routing, forwarding, and paths in the environment between different entities such as virtual machines. The method includes receiving a parameter associated with a workload of a tenant. The parameter can be a service level agreement (i.e., a best bandwidth available), a pathway requirement, a parameter associated with specific workload, and so forth. Based on the configuration and the parameter, the method includes generating tenant-defined layer 3 overlay segment routing rules that define how the workload of the tenant will route data in the internet protocol environment using segment routing.

    Enforcing network endpoint policies in a cloud-based environment using a covert namespace

    公开(公告)号:US10742686B2

    公开(公告)日:2020-08-11

    申请号:US16116521

    申请日:2018-08-29

    Abstract: A method and apparatus for dynamic integration of a covert namespace are provided. A Software-Defined Networking (SDN) controller is configured to send a request for workload transfer to an endpoint where the endpoint is connected to a virtual switch. The SDN controller determines that a connection between the endpoint and the virtual switch is secure based on a tenant-specific policy associated with the endpoint. A first covert namespace is configured to be connected between the endpoint and the virtual switch to communicate to the endpoint and the virtual switch directly. The operations of the virtual switch are executed using the first covert namespace according to the tenant-specific policy. A workload is caused to be transmitted to the endpoint through the first covert namespace.

Patent Agency Ranking