Dynamic Target State Translations
    61.
    发明申请

    公开(公告)号:US20250158877A1

    公开(公告)日:2025-05-15

    申请号:US18508130

    申请日:2023-11-13

    Abstract: Devices, systems, methods, and processes for converting target state data are described herein. Network devices are configured with a variety of settings that can be adjusted based on the desired network deployment. These changes can be made by a network engineer, user, or the like. However, the specific commands to adjust the settings are very technical and specific for a user to understand. Thus, the user is presented with an abstract representation of the network that they can understand and adjust to a desired deployment configuration. This abstract network configuration is packaged as element target state data, which is then transmitted and converted to network target state data that is used internally within a controller to route to a network device. The network target state data is converted to a material target state data which can be processed by the network devices to apply the desired settings within the device.

    Workload migration for multipath routed network sessions

    公开(公告)号:US12255831B2

    公开(公告)日:2025-03-18

    申请号:US17866932

    申请日:2022-07-18

    Abstract: Techniques for migrating on-premises and/or cloud-based workloads to follow a network session as it potentially migrates, due to multipathing techniques, across multiple edge and/or cloud datacenters. The techniques may include determining, by a controller of a network, that a traffic flow between an endpoint device and a workload has migrated to a different path of a multipath flow such that the traffic flow terminates at a different termination point than the workload. Based at least in part on determining that the traffic flow has migrated, the controller may cause a migration of a state of the workload to a location associated with the different termination point. That is, the controller may cause the workload to be migrated in its current state, which may be specific to the endpoint device, to follow the traffic flow.

    Creating Network-Based Consent Contracts

    公开(公告)号:US20250047684A1

    公开(公告)日:2025-02-06

    申请号:US18924631

    申请日:2024-10-23

    Abstract: Techniques for creating consent contracts for devices that indicate whether the devices consent to receiving network-based communications from other devices. Further, the techniques include enforcing the consent contracts such that network-based communications are either allowed or disallowed in the network-communications layer prior to the network communications reaching the devices. Rather than simply allowing a device to communicate with any other device over a network, the techniques described herein include building in consent for network-based communications where the consent is consulted at one or more points in a communication process to make informed decisions about network-based traffic.

    DETERMINING SECURITY ACTIONS AT POLICY-ENFORCEMENT POINTS USING METADATA REPRESENTING A SECURITY CHAIN FOR A DATA FLOW

    公开(公告)号:US20250039135A1

    公开(公告)日:2025-01-30

    申请号:US18779939

    申请日:2024-07-22

    Abstract: A system and method are provided that use metadata encoded in a data flow to determine security actions to perform at a policy-enforcement point based on the security-chain context for the data flow that is provided by metadata (e.g., the security-chain context can include which security operations have been performed upstream on which data packets). The policy-enforcement point receives the data flow and the metadata, including attestations of the security operations that have previously (e.g., upstream) been applied to the data flow. Based on the attested to security operations, the policy-enforcement point selects what security actions to apply next to the data flow, e.g., additional security operations to apply, allow the data flow into a workload or trust zone, drop the workload, perform dynamic load balancing.

    QUIC and anycast proxy resiliency
    67.
    发明授权

    公开(公告)号:US12149596B2

    公开(公告)日:2024-11-19

    申请号:US18542094

    申请日:2023-12-15

    Abstract: Techniques for managing migrations of QUIC connection session(s) across proxy nodes, data centers, and/or private application nodes are described herein. A global key-value datastore, accessible by proxy nodes and/or application nodes, may store mappings between a first QUIC connection, associated with a proxy node and a client device, on the frontend of the proxy node and a second QUIC connection, associated with the proxy node and an application node, on the backend of the proxy node. With the global key-value datastore being accessible by the proxy nodes, when a proxy node receives a QUIC packet on the front end or the back end, the proxy node may determine where to map this connection to on the opposite end. Additionally, with the global key-value datastore being accessible to the application nodes, when an application node receives a QUIC packet, the application node may determine the client device associated with the connection.

    Network Address Translation (NAT)-based Traffic Steering

    公开(公告)号:US20240364628A1

    公开(公告)日:2024-10-31

    申请号:US18769185

    申请日:2024-07-10

    CPC classification number: H04L45/74 H04L69/165

    Abstract: Techniques for NAT-based steering of traffic in cloud-based networks. The techniques may include establishing, by a frontend node of a network, a connection with a client device. The frontend node may receive, via the connection, a packet including an indication of an identity of a service hosted on a backend node of the network. Based at least in part on the indication, the frontend node may establish a second connection with the backend node. Additionally, the frontend node may store a mapping indicating that packets received from the client device are to be sent to the backend node. The techniques may also include receiving another packet at the frontend node or another frontend node of the network. Based at least in part on the mapping, the frontend node or other frontend node may alter one or more network addresses of the other packet and forward it to the backend node.

    Dynamic proxy placement for policy-based routing

    公开(公告)号:US12107937B2

    公开(公告)日:2024-10-01

    申请号:US17679499

    申请日:2022-02-24

    Abstract: Techniques for operationalizing workloads at edge network nodes, while maintaining centralized intent and policy controls. The techniques may include storing, in a cloud-computing network, a workload image that includes a function capability. The techniques may also include receiving, at the cloud-computing network, a networking policy associated with an enterprise network. Based at least in part on the networking policy, a determination may be made at the cloud-computing network that the function capability is to be operationalized on an edge device of the enterprise network. The techniques may also include sending the workload image to the edge device to be installed on the edge device to operationalize the function capability. In some examples, the function capability may be a security function capability (e.g., proxy, firewall, etc.), a routing function capability (e.g., network address translation, load balancing, etc.), or any other function capability.

    CLOUD-NATIVE WORKLOAD OPTIMIZATION
    70.
    发明公开

    公开(公告)号:US20240137320A1

    公开(公告)日:2024-04-25

    申请号:US18544079

    申请日:2023-12-18

    Abstract: Techniques for orchestrating workloads based on policy to operate in optimal host and/or network proximity in cloud-native environments are described herein. The techniques may include receiving flow data associated with network paths between workloads hosted by a cloud-based network. Based at least in part on the flow data, the techniques may include determining that a utilization of a network path between a first workload and a second workload is greater than a relative utilization of other network paths between the first workload and other workloads. The techniques may also include determining that reducing the network path would optimize communications between the first workload and the second workload without adversely affecting communications between the first workload and the other workloads. The techniques may also include causing at least one of a redeployment or a network path re-routing to reduce the networking proximity between the first workload and the second workload.

Patent Agency Ranking