Graphical user interface for visualizing a plurality of issues with an infrastructure

    公开(公告)号:US11016836B2

    公开(公告)日:2021-05-25

    申请号:US16514340

    申请日:2019-07-17

    Abstract: Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.

    Network security indicator of compromise based on human control classifications

    公开(公告)号:US10958681B2

    公开(公告)日:2021-03-23

    申请号:US15933923

    申请日:2018-03-23

    Abstract: In one embodiment, a service classifies a device in a network as human-controlled or self-controlled. The service also classifies an online resource as designed for access by human-controlled devices or by self-controlled devices. The service obtains traffic data regarding an attempt by the device to access the online resource via the network. The service determines that the attempt by the device to access the online resource is a security violation, based on the classifications of the device and the online resource. The service initiates a mitigation action in the network for the security violation.

    Network traffic optimization using in-situ notification system

    公开(公告)号:US10819571B2

    公开(公告)日:2020-10-27

    申请号:US16024100

    申请日:2018-06-29

    Abstract: Aspects of the disclosed technology address the problems of manually identifying and optimizing service function chaining (SFC) performance in response to changes in traffic profiles. In one aspect of the present disclosure, a method includes monitoring, by a first network component, incoming data packets; detecting, by the first network component, a change in a traffic profile of the incoming data packets; generating, by the first network component, in-band information on changes in the traffic profile; and transmitting, by the first network component, the in-band information with one or more data packets of the incoming data packets, the in-band information being used by a second network component to adjust one or more corresponding settings for servicing the incoming data packets.

    Consumption-based licensing of network features based on blockchain transactions

    公开(公告)号:US10680915B2

    公开(公告)日:2020-06-09

    申请号:US15472849

    申请日:2017-03-29

    Abstract: Consumption-based licensing of network features based on blockchained transactions includes receiving, at a server having connectivity to a network including a plurality of network devices, a request from a particular network device of the plurality of network devices for a feature that is licensed in the network on a per-use basis. Feature-specific key blockchain elements and a feature-specific template are generated for the feature and at least one message that includes the feature-specific key blockchain elements and the feature-specific template is sent to the particular network device. The message enables the plurality of network devices to generate one or more blockchain transactions related to consumption of the feature when a usage interval associated with the feature expires.

    Delegated access control of an enterprise network

    公开(公告)号:US10158605B2

    公开(公告)日:2018-12-18

    申请号:US14950418

    申请日:2015-11-24

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

Patent Agency Ranking