UPDATING PUBLIC KEY CERTIFICATES IN NETWORK DEVICES USING A BLOCKCHAIN NETWORK

    公开(公告)号:US20220131691A1

    公开(公告)日:2022-04-28

    申请号:US17079718

    申请日:2020-10-26

    Abstract: Examples relate to a BC network including a plurality of network devices deployed in a network. The plurality of network devices includes an authoritative network device that generates a transaction in a distributed ledger. The transaction includes location information of a new public key certificate to be deployed in each of the network devices. In order to verify the transaction, a network device of the plurality of network devices verifies, using a smart contract, whether the new public key certificate is valid and whether the new public key certificate is different from a previously recorded public key certificate in the distributed ledger. In response to successful verification by at least a predefined number of network devices of the plurality of network devices, each of the network device record the transaction in the distributed ledger.

    ACCESS POINT UPDATE
    12.
    发明申请

    公开(公告)号:US20210160885A1

    公开(公告)日:2021-05-27

    申请号:US17164952

    申请日:2021-02-02

    Abstract: Systems and methods are provided for seamless and automatic upgrade of access points in a facility with minimal disruption, particularly, for important users of a network. The access points may be ranked, and the rankings may be aggregated to identify a sub-region of the facility with the lowest ranked access points. Various sub-sets of the access points in the identified sub-region can be updated separately so that spatial coverage by the other sub-sets maintains continuous access within the sub-region during the updates. Updates to later sub-sets and/or sub-regions can be performed contingent on the success of the earlier updates. In this way, updates can be verified on access points used by lower-priority users such as guest users of the network to avoid disruption of access to more important users such as executives or safety workers on the network.

    UPLINK SELECTION IN A SD-WAN
    13.
    发明申请

    公开(公告)号:US20200344163A1

    公开(公告)日:2020-10-29

    申请号:US16735028

    申请日:2020-01-06

    Abstract: An example non-transitory, computer-readable medium includes instructions that cause a device to determine, for uplinks of a branch gateway, a link health baseline. The instructions further cause the device to determine, for a set of criticality classes, a class link health baseline for each link health baseline, based on the link health baseline and a tolerance level of each criticality class. The instructions further cause the device to calculate, based in part on weighted parameters of the class link health baselines and an uplink cost, a path quality threshold score for each application category and for each uplink. The instructions further cause the device to select, for each application category, a primary uplink and a secondary uplink based on the path quality threshold scores. The instructions further cause the device to route network traffic through the primary uplink of the application category assigned to the network traffic.

    MANAGING BANDWIDTH BASED ON USER BEHAVIOR
    14.
    发明申请

    公开(公告)号:US20200314019A1

    公开(公告)日:2020-10-01

    申请号:US16371346

    申请日:2019-04-01

    Abstract: A method for managing bandwidth may include identifying a first tier of applications and a second tier of applications, determining a number of user sessions associated with at least one application among the first tier of applications and the second tier of applications, each user session consuming a percentage of bandwidth of at least one communication channel in a network, and baselining a second tier application bandwidth use for each user session associated with the second tier of applications to determine a first interval and a second interval. The method may also include calculating a second tier application usage score associated with the second tier of applications, the calculating including determining a percentage of bandwidth used by the second tier of applications in the first interval and determining a percentage of bandwidth used by the second tier of applications in the second interval, generating a user score based on the second tier application usage score and a percentage of use of the first tier of applications, and adjusting a bandwidth allocation based on the user score.

    Dynamic intrusion detection and prevention in computer networks

    公开(公告)号:US12088633B2

    公开(公告)日:2024-09-10

    申请号:US17586936

    申请日:2022-01-28

    CPC classification number: H04L63/205 H04L63/1425 H04L63/1433 H04L63/1458

    Abstract: The present disclosure describes dynamic intrusion detection and prevention in computer networks. The method includes generation of clusters of network sites based on a plurality of parameters related to operational features and network threats associated with the network sites. Data models are trained upon the clusters developed through the clustering. The data models are executed to predict a threat frequency of each network threat for each cluster. A difference between the predicted threat frequency of each network threat and corresponding baseline frequencies is determined. Dynamic rulesets are configured, based on the difference between the predicted threat frequency of each network threat and the corresponding baseline frequencies, for each cluster by integrating rules applicable to prevent each network threat.

    Dynamic selection of a VPNC gateway based on user behavior

    公开(公告)号:US11929988B2

    公开(公告)日:2024-03-12

    申请号:US17171963

    申请日:2021-02-09

    Abstract: Systems and methods are provided for dynamic virtual private network concentrators (VPNC) gateway selection and on-demand VRF-ID configuration. A dynamic VPNC gateway selection component can dynamically route to a particular VPNC gateway based on multiple user-specific factors, including: a) behavior of users on the network; and b) performance of a destination service/device. A dynamic VPNC gateway selection component can rank a user based on one or more factors relating to the behavior of the user. Also, the dynamic VPNC gateway selection component can determine whether a VPNC gateway at a data center is healthy, and whether a destination service at the data center is healthy. The dynamic VPNC gateway selection component can dynamically select a VPNC gateway from a plurality of VPNC gateways at the data center for communicating forwarded traffic from the user based on the user's ranking if either the VPNC gateway or the service are unhealthy.

    ADAPTIVE ENFORCEMENT OF SECURITY WITHIN A NETWORK

    公开(公告)号:US20230262093A1

    公开(公告)日:2023-08-17

    申请号:US17672262

    申请日:2022-02-15

    Abstract: A system receives one or more ingress data packets from a client device or a user in a network. The system obtains attributes, via packet inspection, from the one or more ingress data packets, and determines one or more embedding vectors from the attributes. The one or more embedding vectors represent a status of a session during which the ingress data packets are obtained. The system transmits the one or more embedding vectors as inputs to a trained machine learning model. The system infers, using the trained machine learning mode, one or more security policies based on the embedding vectors. The system provides or implementing the one or more security policies.

    Troubleshooting and resolving access point failures on computer networks

    公开(公告)号:US11405776B2

    公开(公告)日:2022-08-02

    申请号:US16176491

    申请日:2018-10-31

    Abstract: A method for troubleshooting and resolving access point device uplink failures. The method includes detecting an unresponsive access point on a wired computer network. In addition, the method includes retrieving a record of peer access points to determine the peer access points for the unresponsive access point. Further, the method proceeds to sending a first request to a peer access point of the unresponsive access point to query the unresponsive access point for a response over a wireless network. In response to the query, the network management system sends a notification that the unresponsive access point has a cable malfunction if the unresponsive access point responds to the query. Furthermore, the method includes, in response to the query, sending a notification to the network management system to inform that the unresponsive access point has a power malfunction if the unresponsive access point fails to respond to the query.

    Managing bandwidth based on user behavior

    公开(公告)号:US11374869B2

    公开(公告)日:2022-06-28

    申请号:US16371346

    申请日:2019-04-01

    Abstract: A method for managing bandwidth may include identifying a first tier of applications and a second tier of applications, determining a number of user sessions associated with at least one application among the first tier of applications and the second tier of applications, each user session consuming a percentage of bandwidth of at least one communication channel in a network, and baselining a second tier application bandwidth use for each user session associated with the second tier of applications to determine a first interval and a second interval. The method may also include calculating a second tier application usage score associated with the second tier of applications, the calculating including determining a percentage of bandwidth used by the second tier of applications in the first interval and determining a percentage of bandwidth used by the second tier of applications in the second interval, generating a user score based on the second tier application usage score and a percentage of use of the first tier of applications, and adjusting a bandwidth allocation based on the user score.

    Network device configuration update using rank and health

    公开(公告)号:US11374814B2

    公开(公告)日:2022-06-28

    申请号:US16529598

    申请日:2019-08-01

    Abstract: Systems and methods are provided for network device configuration update. A method includes selecting a group of network devices to receive a configuration update; ranking the network devices according to an importance; updating each of the network devices in order of the ranking, from least important to most important, comprising: generating a first health score for the network device, the first health score representing a performance level of the network device prior to the configuration update; updating a configuration of the network device according to the configuration update subsequent to generating the first health score; generating a second health score for the updated network device subsequent to updating the configuration of the network device; and responsive to the second health score being lower than the first health score by more than a predetermined score threshold, rolling back the configuration update for the network devices that have been updated.

Patent Agency Ranking