TELEPROTECTION REQUIREMENT COMPLIANCE
    11.
    发明申请

    公开(公告)号:US20190020372A1

    公开(公告)日:2019-01-17

    申请号:US15650359

    申请日:2017-07-14

    Abstract: A methodology includes determining a first delay between a first relay and a first label edge router, a second delay between a second relay and a second label edge router, and a third delay of a label-switched path between the first label edge router and the second label edge router. Based on the first, second, and third delays, it is determined whether an end-to-end latency between the first relay and the second relay exceeds an end-to-end latency threshold.

    System for Cryptographic Key Sharing Among Networked Key Servers

    公开(公告)号:US20170359323A1

    公开(公告)日:2017-12-14

    申请号:US13945369

    申请日:2013-07-18

    Abstract: A technique for key sharing among multiple key servers connected to one another over a communication network is provided herein. Each key sever of the multiple key servers stores respective cryptographic keys, and provides the keys to a local device group connected with the key server, to enable the device group to encrypt messages with the keys. Each key server acts as a proxy for the other key servers in order to receive other keys from the other key servers over the network, and provide the other keys to the device group for use to decrypt messages received from other local device groups respectively connected with the other key servers that were encrypted with the other keys and to check message integrity. The multiple key servers may share keys with each other directly, or alternatively, indirectly through a central key server, as needed to support secure communications between their respective device groups.

    DYNAMIC SECURITY POLICY AND KEY MANAGEMENT FOR CONVERGED NETWORKS

    公开(公告)号:US20240348651A1

    公开(公告)日:2024-10-17

    申请号:US18134729

    申请日:2023-04-14

    CPC classification number: H04L63/20 H04L63/0263 H04L63/0435

    Abstract: Techniques and architecture are described for dynamic security policy and key management for converged networks. More particularly, the techniques and architecture provide for configuring and managing converged industrial networks and configuring the converged industrial networks with respect to security policy and key management when also configuring and managing the converged industrial networks for operation. In configurations, the techniques and architecture described herein provide a method to establish dynamic access control as well as continuous trusted access and control based on well-defined streams and pre-calculated schedules. Additionally, in configurations, the techniques and architecture described herein provide a method to establish automated and integrated key management for controller-based time-sensitive networking (TSN) networks. This enables highly adaptable network security for operational technology (OT)/industrial Internet of Things (IIoT) networks used for critical processes such as automation and control.

    Cloud service datacenter selection based on data sovereignty policies

    公开(公告)号:US11799948B2

    公开(公告)日:2023-10-24

    申请号:US16950132

    申请日:2020-11-17

    CPC classification number: H04L67/1004

    Abstract: Cloud services are provided by a distributed network including a number of geographically distributed datacenters, to client devices in accordance with data sovereignty requirements. A server within the distributed network may receive a service request and determine whether it complies with the data sovereignty requirements of the client. When the geographic location of the server does not comply with the client's data sovereignty requirements, the server may determine and transmit back to the client device a set of alternative datacenters within the distributed network that comply with the client's data sovereignty requirements. The client device may use network probes to select an alternative datacenter, and the cloud service request of the client device may be migrated from the server to the selected datacenter.

    MICRO-FIREWALLS IN A MICROSERVICE MESH ENVIRONMENT

    公开(公告)号:US20210400021A1

    公开(公告)日:2021-12-23

    申请号:US17464847

    申请日:2021-09-02

    Abstract: A server, in communication with a plurality of microservices in a microservices mesh environment, obtains data about inbound communications to a first microservice and outbound communications from the first microservice of the plurality of microservices. The server analyzes the data to learn an operational behavior of the first microservice and determine a firewall rule set to be applied associated with the first microservice based on the operational behavior learned for the first microservice. The server causes a micro-firewall to be instantiated for the first microservice. The micro-firewall is configured to apply the firewall rule set to inbound communications to the first microservice and outbound communications from the first microservice.

    Securing substation communications using security groups based on substation configurations

    公开(公告)号:US11005822B2

    公开(公告)日:2021-05-11

    申请号:US16402568

    申请日:2019-05-03

    Abstract: In one embodiment, a network policy engine obtains a substation configuration description for a substation, indicative of intelligent electronic devices (IEDs), associated network communication devices, and related communication configuration information. The network policy engine then creates a mapping of the IEDs and the associated network communication devices based on the substation configuration description, associating each of the IEDs to a corresponding network port of the associated network communication devices. The network policy engine may then further create network control parameters based on the substation configuration description, which comprise defined communication flows for the IEDs and associated security group tags (SGTs) for the defined communication flows. The techniques herein may then cause the SGTs to be imposed at mapped network ports of the network communication devices for the IEDs according to security group access (SGA)-based network control to thereby establish secure network communication for the IEDs within the particular substation.

    Application buffering of packets by fog computing node for deterministic network transport

    公开(公告)号:US10897516B2

    公开(公告)日:2021-01-19

    申请号:US15813289

    申请日:2017-11-15

    Abstract: In one embodiment, a method comprises: storing, by a computing device in a non-deterministic data network, a plurality of data packets originated by a source device into a mass storage medium associated with the computing device; receiving, by the computing device, a data request originated by an access point device providing deterministic reachability to a deterministic device in a deterministic data network providing reachability to multiple deterministic devices, the request specifying one or more deterministic constraints associated with reaching the deterministic device; and supplying, by the computing device, a selected one of the data packets to the access point device for delivery of data stored therein to the deterministic device according to the one or more deterministic constraints.

Patent Agency Ranking