NETWORK HIERARCHY-BASED AUTOMATIC ONBOARDING OF NETWORK DEVICES

    公开(公告)号:US20240333598A1

    公开(公告)日:2024-10-03

    申请号:US18320136

    申请日:2023-05-18

    CPC classification number: H04L41/12

    Abstract: Systems and methods provide for creating a network device hierarchy among a plurality of nodes. The network device hierarchy may include a plurality of geography-based groups defined by a corresponding number of geolocations. The operations further include associating each of the plurality of geography-based groups with a plurality of different configuration intents, associating each of the plurality of nodes with one of the plurality of geography-based groups, and deploying the plurality of nodes based on their respective one of the geolocations.

    Energy-Aware Traffic Forwarding and Loop Avoidance

    公开(公告)号:US20240333591A1

    公开(公告)日:2024-10-03

    申请号:US18381426

    申请日:2023-10-18

    CPC classification number: H04L41/0833 H04L41/12 H04L45/48

    Abstract: Energy-aware configurations can be utilized to operate a network based on sustainability-related metrics. In many embodiments, a suitable device includes a processor, a memory commutatively coupled to the processor, a plurality of elements, a communication port, and an energy-aware topology logic configured to collect topology data from one or more network devices, wherein each of the one or more network devices include a plurality of elements. The energy-aware topology logic can receive power source data and power usage data related to plurality of elements and generate an element energy coefficient (EEC) for a plurality of elements. Subsequently, the energy-aware topology logic can also generate an energy-aware configuration for at least one of the one or more network devices, and then pass the generated energy-aware configuration to the at least one network device, wherein the energy-aware configuration is configured to steer traffic based on at least one sustainability-related metric.

    SYSTEM AND METHOD FOR TRIAGING VULNERABILITIES BY APPLYING BUG REPORTS TO A LARGE LANGUAGE MODEL (LLM)

    公开(公告)号:US20240330480A1

    公开(公告)日:2024-10-03

    申请号:US18356178

    申请日:2023-07-20

    Inventor: Michael Roytman

    CPC classification number: G06F21/577 G06F21/563

    Abstract: A system and method are provided for predicting risks related to software vulnerabilities and thereby triaging said vulnerabilities. Input data (e.g., bug reports) are applied to a prediction engine (e.g., a machine learning (ML) method such as a large language model, a transformer neural network, or a classifier model), which outputs two or more scores for each vulnerability. A first score represents a likelihood of an exploit being developed (a threat), a second score represents a likelihood of being attacked (a greater threat), and a third score represents a likelihood of becoming a published common vulnerability and exposure (an even greater threat). Based on these scores, the vulnerabilities are triaged. Because the prediction engine is trained to make predictions using the unstructured data in bug reports, the vulnerabilities can be triaged soon after discovery, reducing the time to remediate vulnerabilities predicted to be significant threats.

    System and Method for Summarization of Complex Cybersecurity Behavioral Ontological Graph

    公开(公告)号:US20240330348A1

    公开(公告)日:2024-10-03

    申请号:US18360648

    申请日:2023-07-27

    CPC classification number: G06F16/345 G06F16/334

    Abstract: A system and method are provided for explaining ontological sub-graphs. The system and method include querying an ontology to determine a match between a query graph and a portion of an ontology graph. When there is a match, a subgraph representing the match is first translated into a simple summary using a simple language (e.g., triplets which include a subject and object corresponding to pairs of connected nodes in the subgraph and a verb/predicate representing a relation/edge in the subgraph that connect the pair nodes). This simple summary is then fed, as part of a prompt, to a large language model (LLM) that generates a human-readable summary based on the prompt.

    Automating trust in software upgrades

    公开(公告)号:US12107896B2

    公开(公告)日:2024-10-01

    申请号:US17560599

    申请日:2021-12-23

    Abstract: A method, computer system, and computer program product are provided for automatically analyzing software packages to identify the degree of differences between compared software packages and to apply security policies. A first software bill of materials for a software package is processed to extract a plurality of components of the software package, wherein the first software bill of materials indicates a first hierarchy of components based on relationships between components. The first hierarchy is compared to a second hierarchy, the second hierarchy corresponding to a second software bill of materials, to determine a degree of difference between the first hierarchy and the second hierarchy. The degree of difference is compared to one or more threshold values. A security policy is applied with respect to the software package according to a comparison of the degree of difference to the one or more threshold values.

    PROVISIONING FRAMEWORK SUPPORTING PLURAL DIFFERENT NETWORKS

    公开(公告)号:US20240323284A1

    公开(公告)日:2024-09-26

    申请号:US18326289

    申请日:2023-05-31

    CPC classification number: H04M15/55 G06Q30/04 H04M15/41

    Abstract: One or more processors of a device management platform map network identifiers to corresponding networks. An account of the device management platform manages devices on a plurality of networks based on the network identifiers. The one or more processors of the device management platform identify a network of a device associated with the account from the plurality of networks based on a mapping of a network identifier of the device to the network. The one or more processors of the device management platform perform an action for the device with respect to the network.

Patent Agency Ranking