Network enclave attestation for network and compute devices

    公开(公告)号:US12199969B2

    公开(公告)日:2025-01-14

    申请号:US18481765

    申请日:2023-10-05

    Abstract: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.

    Optimizing IPSec for hierarchical SD-WAN

    公开(公告)号:US12199868B2

    公开(公告)日:2025-01-14

    申请号:US17804333

    申请日:2022-05-27

    Abstract: According to some embodiments, a method is performed by a software defined wide area network (SD-WAN) edge router in a hierarchical SD-WAN network comprising a plurality of edge routers and a plurality of border routers. The method comprises: originating a SD-WAN system route for advertising reachability to the edge router, the system route comprising an encryption key associated with the edge router; and transmitting the system route to one or more SD-WAN border routers. The method may further comprise: receiving a packet destined for the edge router from one of the one or more SD-WAN border routers, wherein the packet is at least partially encrypted with the encryption key associated with the edge router; and decrypting the received packet.

    Data network duplicate flow detection in hardware with line rate throughput

    公开(公告)号:US12199859B2

    公开(公告)日:2025-01-14

    申请号:US18100489

    申请日:2023-01-23

    Abstract: Techniques for detecting duplicate data flows. A data packet of a data flow is received by computer hardware the data packet having a first five tuple, an ingress interface and a VLAN tag. Data is sent to a central processing unit. The central processing unit installs policy tiles into a policy tile database of the computer hardware, the policy tiles including the first five tuple, the first ingress interface and the first VLAN tag. A second data packet is received and compared with the policy tiles in the policy tile database. If the second data packet has the same five tuple as the first data packet but has either a different ingress interface or a different VLAN tag, then the second data packet is determined to be a duplicate of the first data flow and is dropped.

    Audio watermarking to prevent meeting howl

    公开(公告)号:US12197810B2

    公开(公告)日:2025-01-14

    申请号:US17902005

    申请日:2022-09-02

    Abstract: Presented herein are techniques in which a first device connects to a communication session in which a plurality of devices communicates. The plurality of devices includes the first device and a second device. The first device outputs first audio that includes a first audio watermark associated with the communication session and the second device outputs second audio that includes a second audio watermark associated with the communication session. The first device detects the second audio watermark in the second audio outputted by the second device and one or more actions are performed in response to detecting the second audio watermark.

    MANAGING PREEMPTION IN MULTI-LINK OPERATIONS

    公开(公告)号:US20250016821A1

    公开(公告)日:2025-01-09

    申请号:US18477233

    申请日:2023-09-28

    Abstract: Techniques for coordinating traffic and performing preemption in multi-link operations are provided. At least a first portion of a first element of data is transmitted by the first network device via a first link. A second element of data is identified by the first network device. The transmission of the first element of data is interrupted by the first network device to transmit the second element of data via the first link. A remaining portion of the first element of data is transmitted by the first network device via a second link.

    ONBOARDING CLIENT DEVICE TO USER-DEFINED NETWORK USING FEDERATION-BASED NETWORK IDENTITY

    公开(公告)号:US20250016147A1

    公开(公告)日:2025-01-09

    申请号:US18803058

    申请日:2024-08-13

    Abstract: Aspects described herein include a method of automated grouping of client devices for a user-defined network (UDN). The method includes receiving, from a first client device, an authentication request to join an access provider network. The authentication request includes a unique identifier of the first client device. The method also includes transmitting the unique identifier to a UDN cloud and receiving a first list from the UDN cloud. The first list indicates that the UDN is associated with the unique identifier. The method further includes joining the first client device with a second client device present on the access provider network based on a second list from the UDN cloud. The second list indicates that the UDN is associated with the second device.

    OVERLAY-BASED OAM FOR BGP FAULT DETECTION

    公开(公告)号:US20250016092A1

    公开(公告)日:2025-01-09

    申请号:US18372443

    申请日:2023-09-25

    Abstract: Techniques for generating and utilizing overlay-based Border Gateway Protocol (BGP) Operations, Administration, and Maintenance (OAM) packets to detect issues with an underlay network. The techniques may include receiving, from a BGP peer device via a control plane path, an OAM probe indicating a forwarding path to be used for sending the traffic to a destination associated with a prefix. The techniques may also include determining, based at least in part on the OAM probe, that a next-hop device is incapable of being utilized to forward the traffic to the destination, the next-hop device determined based on an origination of the prefix. The techniques may further include performing a policy-based action based at least in part on determining that the next-hop device is incapable of being utilized to forward the traffic to the destination.

    END-TO-END NETWORK PATH VISIBILITY ACROSS CLOUD APPLICATION ENVIRONMENTS

    公开(公告)号:US20250016084A1

    公开(公告)日:2025-01-09

    申请号:US18218785

    申请日:2023-07-06

    Abstract: In one embodiment, a device identifies a port associated with a backend probing agent for a cloud-hosted application. The device performs external probing of a path to the cloud-hosted application by sending a probe along the path to the port, to generate external probing results. The device triggers the backend probing agent to generate backend probing results by performing backend probing of a backend service used by the cloud-hosted application. The device causes formation of unified probing results that correlate the external probing results and the backend probing results.

Patent Agency Ranking