ADAPTIVE ENFORCEMENT OF SECURITY WITHIN A NETWORK

    公开(公告)号:US20230262093A1

    公开(公告)日:2023-08-17

    申请号:US17672262

    申请日:2022-02-15

    Abstract: A system receives one or more ingress data packets from a client device or a user in a network. The system obtains attributes, via packet inspection, from the one or more ingress data packets, and determines one or more embedding vectors from the attributes. The one or more embedding vectors represent a status of a session during which the ingress data packets are obtained. The system transmits the one or more embedding vectors as inputs to a trained machine learning model. The system infers, using the trained machine learning mode, one or more security policies based on the embedding vectors. The system provides or implementing the one or more security policies.

    CHASSIS HAVING AN INSERTION KEY ASSEMBLY FOR A PLUGGABLE MODULE

    公开(公告)号:US20230261410A1

    公开(公告)日:2023-08-17

    申请号:US17673233

    申请日:2022-02-16

    CPC classification number: H01R13/4534

    Abstract: Example implementations relate to an insertion key assembly for a pluggable module. The insertion key assembly includes a stopper element having a stopping tab, a biasing element, and a driver element having a driving tab. The biasing element is connected to the stopper element and the driver element. In a relaxed state of the biasing element: i) the stopper element is pushed outwards by the biasing element to protrude the stopping tab into a passageway defined by a plurality of walls of a chassis, to block insertion of the pluggable module inside the passageway, and ii) the driver element is pushed outwards by the biasing element to protrude the driving tab into adjacent passageway. In a biased state of the biasing element, the stopper element is pulled inwards by the biasing element to retract the stopping tab from the passageway to allow insertion of the pluggable module inside the passageway.

    Uplink connectivity in ring networks

    公开(公告)号:US11729022B2

    公开(公告)日:2023-08-15

    申请号:US17644940

    申请日:2021-12-17

    CPC classification number: H04L12/437 H04L43/10 H04L45/26

    Abstract: Techniques for uplink connectivity determination are disclosed. In an example, a Frame Link Module (FLM) in a frame, belonging to a group of frames connected in a ring network, may generate an uplink discovery packet. The FLM may determine, based on a Link Layer Discovery Protocol (LLDP) packet received by the standby uplink from a customer network accessing the ring that the standby uplink has a link to the customer network. The FLM may forward the uplink discovery packet to the standby uplink via a Peripheral Component Interconnect (PCI) interface. The FLM may send the uplink discovery packet to the customer network through the standby uplink directed to an owner FLM. The owner FLM may monitor receipt of the uplink discovery packet from the customer network through a current active uplink and on successful receipt may determine that the standby uplink and switches in the customer network are correctly configured.

    CONFIGURATION OF FRONTEND SERVICES IN STORAGE NODES

    公开(公告)号:US20230251784A1

    公开(公告)日:2023-08-10

    申请号:US17650167

    申请日:2022-02-07

    CPC classification number: G06F3/0629 G06F3/0604 G06F3/0679

    Abstract: In some examples, a system causes execution, in each respective storage node of a cluster of storage nodes, of a respective frontend service that provides a frontend to a client over a network for access by the client of a storage volume accessible by the cluster of storage nodes. The system obtains node-specific configuration data portions from a configuration data repository, the node-specific configuration data portions being for respective storage nodes of the cluster of storage nodes, and sends the node-specific configuration data portions to the respective frontend services for configuring the frontend services.

    Optical pass-through link training
    268.
    发明授权

    公开(公告)号:US11722237B2

    公开(公告)日:2023-08-08

    申请号:US17495789

    申请日:2021-10-06

    Abstract: Systems, methods, and computer-readable media are described for performing link training to enable optical pass-through (OPT) capabilities of a network node. OPT capabilities may refer to on-chip wavelength routing for a multi-wavelength data input, whereby an intermediate node detects wavelengths that are intended for OPT and transparently passes the wavelengths through to downstream nodes. When executed at an intermediate network node, an OPT link training algorithm can result in the creation of one or more wavelength routing maps that associate wavelengths received on particular inputs to the node with particular outputs of the node. An intermediate node may generate a respective wavelength routing map for each transmit node from which it receives input data. The wavelength routing maps may together implement OPT capabilities at the intermediate node as each wavelength routing map may indicate the manner in which wavelengths are passed through the intermediate node for a given transmit node.

    MANAGING USE OF MANAGEMENT CONTROLLER SECRETS BASED ON FIRMWARE OWNERSHIP HISTORY

    公开(公告)号:US20230246827A1

    公开(公告)日:2023-08-03

    申请号:US17588620

    申请日:2022-01-31

    CPC classification number: H04L9/0861 H04L9/0891 H04L9/0894 G06F9/4401

    Abstract: A management controller of a computer platform, determines whether an ownership history of management firmware for the management controller represents multiple owners. The management controller includes a set of one-time programmable elements that represent a first secret. The management controller manages use of the first secret based on the ownership history. The management includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, generating, by the management controller, a second secret to replace the first secret. The management further includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, storing, by the management controller, the second secret in a non-volatile memory and generating, by the management controller, cryptographic keys based on the second secret.

Patent Agency Ranking