System and method for validating correctness of changes to network device configurations

    公开(公告)号:US11082293B2

    公开(公告)日:2021-08-03

    申请号:US16867382

    申请日:2020-05-05

    Abstract: A network configuration change validation environment is disclosed. In particular, this disclosure is related to an interface to initiate automated test actions (e.g., network monitoring commands, application monitoring commands, etc.) and to view results in an efficient manner to support a network communication infrastructure. In one example, results of a set of commands executed prior to a configuration change may serve as a baseline and one or more results of the same set of commands may be intelligently compared to the baseline to identify any potential issues that have arisen. For example, as a result of a specific network configuration change or application update. The disclosed network change validation command initiator and validation report viewer represent part of an overall network configuration change validation environment that includes automated techniques such that it may be used within a given change window.

    SELF-TUNING NETWORKS USING DISTRIBUTED ANALYTICS

    公开(公告)号:US20210044498A1

    公开(公告)日:2021-02-11

    申请号:US16537411

    申请日:2019-08-09

    Abstract: Systems and methods are provided for self-tuning networks using distributed analytics for network devices. In some embodiments, the method includes instantiating, in a network device, an agent for a network protocol, wherein the agent: monitors a performance parameter for a resource of the network protocol, and responsive to a value of the performance parameter exceeding a threshold value, reports an anomaly for the network protocol to a remote management server, receives a new threshold value from the remote management server, the new threshold value being based on the anomaly reported by the network device, and anomalies reported by other network devices according to respective thresholds employed by the network devices for the performance parameter for the resource of the network protocol, and replaces the threshold value of the performance parameter for the resource of the network protocol with the new threshold value received from the remote management server.

    System and method for validating correctness of changes to network device configurations

    公开(公告)号:US10778517B2

    公开(公告)日:2020-09-15

    申请号:US15934806

    申请日:2018-03-23

    Abstract: A network configuration change validation environment is disclosed. In particular, this disclosure is related to an interface to initiate automated test actions (e.g., network monitoring commands, application monitoring commands, etc.) and to view results in an efficient manner to support a network communication infrastructure. In one example, results of a set of commands executed prior to a configuration change may serve as a baseline and one or more results of the same set of commands may be intelligently compared to the baseline to identify any potential issues that have arisen. For example, as a result of a specific network configuration change or application update. The disclosed network change validation command initiator and validation report viewer represent part of an overall network configuration change validation environment that includes automated techniques such that it may be used within a given change window.

    DATA ENCRYPTION DETECTION
    36.
    发明公开

    公开(公告)号:US20230306108A1

    公开(公告)日:2023-09-28

    申请号:US17700958

    申请日:2022-03-22

    CPC classification number: G06F21/552 G06F2221/034

    Abstract: In some examples, a system applies an inline detection of a write of data in a storage, the inline detection to detect potential data encryption of the data. In response to an indication of the potential data encryption, the system creates a first object that represents a first version of the data, and applies a further analysis to determine whether the potential data encryption constitutes unauthorized data encryption, the further analysis based on the first object and a second object that represents a second version of the data that is prior to the first version of the data.

    Network health monitoring
    37.
    发明授权

    公开(公告)号:US11463341B2

    公开(公告)日:2022-10-04

    申请号:US17142389

    申请日:2021-01-06

    Abstract: An example method is described for monitoring a network. The method includes detecting that a network attribute has been updated at a network device. The method further includes selecting, based in part on the updated network attribute, a set of network functionality tests from a group of network functionality tests. The method further includes executing the set of network functionality tests. The method further includes receiving information describing functionality of the network during the set of network functionality tests at the network device. The method further includes determining results of the set of network functionality tests based on the information describing functionality of the network. The method further includes calculating a network functionality score based, in part, on the results of the set of network functionality tests.

    Implicit attestation for network access

    公开(公告)号:US11438161B2

    公开(公告)日:2022-09-06

    申请号:US16671088

    申请日:2019-10-31

    Abstract: A method and apparatus for use in a trusted network environment together or separately employ an implicit attestation that a requesting computing resource is in a trusted state before access to a network resource is granted. The method includes: verifying that a requesting computing resource is in a trusted state; accessing the private key using the released key authorization value; and creating a digital signature for the requesting device from the accessed private key. The apparatus may implement the method.

    Self-tuning networks using distributed analytics

    公开(公告)号:US11316756B2

    公开(公告)日:2022-04-26

    申请号:US16537411

    申请日:2019-08-09

    Abstract: Systems and methods are provided for self-tuning networks using distributed analytics for network devices. In some embodiments, the method includes instantiating, in a network device, an agent for a network protocol, wherein the agent: monitors a performance parameter for a resource of the network protocol, and responsive to a value of the performance parameter exceeding a threshold value, reports an anomaly for the network protocol to a remote management server, receives a new threshold value from the remote management server, the new threshold value being based on the anomaly reported by the network device, and anomalies reported by other network devices according to respective thresholds employed by the network devices for the performance parameter for the resource of the network protocol, and replaces the threshold value of the performance parameter for the resource of the network protocol with the new threshold value received from the remote management server.

    Configuring a network based on a centroid configuration of a group of network entities

    公开(公告)号:US11290329B2

    公开(公告)日:2022-03-29

    申请号:US16864037

    申请日:2020-04-30

    Abstract: Examples described herein configure a network based on a centroid configuration of a group of network entities. Examples herein include classifying a plurality of network entities into a classification, wherein the network entities are configured on a plurality of network devices that are connected to the network. Examples herein include, based on the classification of the network entities, grouping the network entities into a plurality of groups. Examples herein include determining, for each of the groups, a centroid configuration of the network entities in the group. Examples herein include sending instructions to configure the network according to the centroid configuration of a selected one of the groups, wherein at least one network entity is configured according to the centroid configuration of the selected group in response to receiving the instructions.

Patent Agency Ranking