Trustworthiness evaluation of network devices

    公开(公告)号:US11652824B2

    公开(公告)日:2023-05-16

    申请号:US17669123

    申请日:2022-02-10

    CPC classification number: H04L63/108 H04L41/0803 H04L63/0876 H04L63/20

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    TRUSTWORTHINESS EVALUATION OF NETWORK DEVICES

    公开(公告)号:US20220166779A1

    公开(公告)日:2022-05-26

    申请号:US17669123

    申请日:2022-02-10

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    TRUSTWORTHINESS EVALUATION OF NETWORK DEVICES

    公开(公告)号:US20200322348A1

    公开(公告)日:2020-10-08

    申请号:US16715271

    申请日:2019-12-16

    Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.

    System and Method for Adaptive Encryption for SD-WAN

    公开(公告)号:US20240422140A1

    公开(公告)日:2024-12-19

    申请号:US18817596

    申请日:2024-08-28

    Abstract: A system and method for adaptive encryption for SD-WAN includes identifying an encrypted conversational flow and determining whether a duration of the encrypted conversational flow exceeds a threshold. The method also includes selecting a header-less tunnel for the encrypted conversational flow when the duration is more than the threshold. The method further includes transmitting the encrypted conversational flow to an egress router over the selected header-less tunnel.

    PROXY STATE SIGNALING FOR NETWORK OPTIMIZATIONS

    公开(公告)号:US20240214319A1

    公开(公告)日:2024-06-27

    申请号:US18201998

    申请日:2023-05-25

    CPC classification number: H04L47/2475 H04L67/564

    Abstract: Techniques for signaling, to a network controller, a connection state of a proxy for use by the network controller to correlate proxied-connections with application pairs for traffic optimization. In some examples, the techniques may include receiving, at a controller of a network, control plane information associated with a proxy that manages a proxied flow through the network. Based on the control plane information, the controller may determine that application traffic is flowing across the proxied flow between a first application and a second application. In this way, based at least in part on a policy associated with at least one of the first application or the second application, the controller may reconfigure a network element of the network for optimizing the application traffic flowing across the proxied flow.

    PERSONAL NETWORK SOFTWARE DEFINED-WIDE AREA NETWORKS (SD-WANS) WITH ATTESTED PERMISSIONS

    公开(公告)号:US20240106745A1

    公开(公告)日:2024-03-28

    申请号:US17935159

    申请日:2022-09-26

    CPC classification number: H04L45/54 H04L45/745 H04W12/71

    Abstract: Personal network Software Defined-Wide Area Networks (SD-WANs) with attested permissions may be provided. A first one of a plurality Personal Area Network (PAN) devices in a PAN may seed a routing table entry for at least one application that the first one of the plurality PAN devices supports. The routing table entry may include at least one characteristic associated with an egress link between the first one of the plurality PAN devices and a device outside of the PAN. The routing table entry may be exchanged among the plurality of PAN devices in the PAN. Then data may be routed, based on the exchanged routing table entry, in the PAN through the first one of the plurality PAN devices through the egress link to the device outside of the PAN.

Patent Agency Ranking