-
1.
公开(公告)号:US20240364748A1
公开(公告)日:2024-10-31
申请号:US18764557
申请日:2024-07-05
CPC分类号: H04L63/20 , G06F9/4552 , G06F9/547
摘要: The present technology includes applying a security policy by an application security system to a transaction within an application that is monitored by the application security system. The present technology includes monitoring transaction occurring between a client device an application over a network. The present technology also includes identifying a first transaction from the transactions as a sensitive transaction. The sensitive transaction is associated with an authentication policy requiring an authentication. The present technology also includes interrupting the application. The present technology also includes prompting the client device for the authentication.
-
公开(公告)号:US20240364687A1
公开(公告)日:2024-10-31
申请号:US18306700
申请日:2023-04-25
IPC分类号: H04L9/40
CPC分类号: H04L63/0876
摘要: This disclosure describes techniques for validating a network device based on an operational context of the network device. The techniques may include receiving, via an intercepting node, a DNS query from a querying device. The techniques may include extracting the metadata from the DNS query. Based at least in part on verifying a signature of the metadata, the techniques may include extracting a location code from the metadata. Based at least in part on comparing the location code to an expected location of the intercepting node, the techniques may include sending a response to the querying device indicating a contextual validation of the querying device.
-
公开(公告)号:US20240364589A1
公开(公告)日:2024-10-31
申请号:US18307777
申请日:2023-04-26
发明人: Vishal S Desai , Young Il Choi , Abhishek Datta
IPC分类号: H04L41/082 , H04L41/0823 , H04L41/149
CPC分类号: H04L41/082 , H04L41/0836 , H04L41/149
摘要: The disclosed technology relates to determining a period in which a non-urgent RRM update should be deferred. The method may comprise applying a first update to an existing configuration of the plurality of wireless access points in the network based on an analysis of telemetry received from the plurality of wireless access points received over a period spanning at least two busy periods. The method may further comprise applying a second update that modifies the first preferred network configuration based on an analysis of telemetry received during the first busy period. The method may further comprise applying a maintenance update to the tweaked network configuration based on telemetry received during the next busy period.
-
公开(公告)号:US20240364561A1
公开(公告)日:2024-10-31
申请号:US18641898
申请日:2024-04-22
发明人: Neeraj Malhotra , Balaji Pitta Venkatachalapathy , Krishnaswamy Muddenahally Ananthamurthy , Ali Sajassi , Dhananjaya Kasargod Rao
IPC分类号: H04L12/46 , H04L45/00 , H04L45/02 , H04L45/50 , H04L45/741 , H04L101/622
CPC分类号: H04L12/4641 , H04L45/02 , H04L45/50 , H04L45/66 , H04L45/741 , H04L2101/622
摘要: In one embodiment, a method includes receiving, by a route reflector, a subscription request from a first provider edge node in a network and generating a subscription policy for the first provider edge node. The method also includes receiving a first Ethernet Virtual Private Network (EVPN) Type 2 Route from a second provider edge node, assigning a sequence number to the first EVPN Type 2 Route, and communicating the first EVPN Type 2 Route with the sequence number to the first provider edge node. The method further includes receiving a second EVPN Type 2 Route from a third provider edge node, generating an updated sequence number in response to receiving the second EVPN Type 2 Route from the third provider edge node, and communicating the second EVPN Type 2 Route with the updated sequence number to the first provider edge node and the second provider node.
-
公开(公告)号:US12132604B2
公开(公告)日:2024-10-29
申请号:US17505891
申请日:2021-10-20
IPC分类号: H04L41/06 , G06F16/901 , H04L41/0681 , H04L41/142 , H04L43/0817
CPC分类号: H04L41/06 , G06F16/9024 , H04L41/0681 , H04L41/142 , H04L43/0817
摘要: A method and system for managing resources of a computer network may be provided. A first request to detect a first event in a computer network may be received. A first element of the first event may be detected at a first computing resource of the computer network. After detecting the first element of the first event at the first computing resource, a second computing resource of the computer network may be determined. First data corresponding to the first event from the first computing resource may be provided to the second computing resource. A second element of the first event may be detected at the second computing resource.
-
6.
公开(公告)号:US20240357648A1
公开(公告)日:2024-10-24
申请号:US18303286
申请日:2023-04-19
IPC分类号: H04W74/08
CPC分类号: H04W74/0816
摘要: Systems and techniques for mitigating interference in multi-access point coordination (MAPC) deployments are described. An example technique includes obtaining interference information associated with at least one device interfering with multi-access point communication. The interference information includes at least one of an indication of a frequency of occurrence of interference with the multi-access point communication or an indication of a duration of the interference. Resource allocation is performed for the multi-access point communication, based on the interference information.
-
公开(公告)号:US20240357619A1
公开(公告)日:2024-10-24
申请号:US18303174
申请日:2023-04-19
IPC分类号: H04W72/27 , H04W64/00 , H04W72/0453 , H04W72/12 , H04W74/00
CPC分类号: H04W72/27 , H04W64/00 , H04W72/0453 , H04W72/12 , H04W74/002
摘要: Techniques and systems for enhancing transmit opportunity (TXOP) sharing for multi-access point coordination (MAPC) are described. An example technique includes obtaining, for each access point (AP) of a plurality of APs in a MAPC group, historical mobility information of client stations (STAs) associated with the AP. A number of the client STAs associated with each AP that satisfies a mobility criteria is determined based on the historical mobility information. A determination of whether to enable TXOP sharing is made for each AP and an indication of the determination is transmitted to the AP. Another technique includes estimating traffic demand for a first set of client STAs associated with an AP. A second set of client STAs to make available for TXOP sharing is determined. Signal strength information associated with a communication link between each client STA in the second set and the AP is transmitted.
-
8.
公开(公告)号:US20240356950A1
公开(公告)日:2024-10-24
申请号:US18455491
申请日:2023-08-24
发明人: Cenek Skarda , David Sislak
IPC分类号: H04L9/40
CPC分类号: H04L63/1425
摘要: A method may include receiving, by a processor, first monitoring data from a first monitoring component and second monitoring data from a second monitoring component. The method may further include determining, by the processor, that the first monitoring data represents a first activity pattern of a computing entity in a first period. The method may further include determining, by the processor, that the second monitoring data represents a second activity pattern of the computing entity in the first period. The method may further include determining, by the processor, first feedback data based on the first monitoring data. The method may further include determining, by the processor, second feedback data based on the second monitoring data. The method may further include providing, by the processor, the first feedback data to the second monitoring component and the second feedback data to the first monitoring component.
-
公开(公告)号:US20240356942A1
公开(公告)日:2024-10-24
申请号:US18231815
申请日:2023-08-09
发明人: Martin Kopp , Cenek Skarda
IPC分类号: H04L9/40
CPC分类号: H04L63/1425 , H04L63/1416
摘要: Techniques described herein for extended detection and response to security anomalies in computing networks can perform automated analysis of anomalies occurring in different telemetry sources in a computer network, in order to synthesize the anomalies into analyst work units that are surfaced for further analysis by security response teams. Anomalies can initially be processed in order to identify and collect extended anomaly data. The extended anomaly data can then be used to group the anomalies according to a multi-stage grouping process which produces analyst work units. The analyst work units can be processed to produce analyst summaries that assist with analysis and response. Furthermore, the analyst work units can be prioritized for further analysis, and analyst interactions with the prioritized analyst work units can be used to influence subsequent anomaly grouping operations.
-
公开(公告)号:US20240356935A1
公开(公告)日:2024-10-24
申请号:US18237282
申请日:2023-08-23
IPC分类号: H04L9/40
CPC分类号: H04L63/1416
摘要: Techniques for identifying malicious threats for investigation using network telemetry data. The techniques include the use weak learner models to analyze data from multiple event sources. The techniques further include aggregating data signals from the weak learner models to generate a high-fidelity data signal of threat sources. The aggregated data signal can be sent to a Security Operation Center to provide a list of nodes with a high likelihood of malicious threats along with convicting evidence to aid in investigating the identified nodes.
-
-
-
-
-
-
-
-
-