Application Deployment Engine
    62.
    发明申请
    Application Deployment Engine 审中-公开
    应用程序部署引擎

    公开(公告)号:US20170078366A1

    公开(公告)日:2017-03-16

    申请号:US14851205

    申请日:2015-09-11

    Abstract: Concepts and technologies are disclosed herein for an application deployment engine. A processor that executes an application deployment engine can receive an application request. The processor can obtain network topology data that indicates availability of resources of a data center, an application template associated with the application, and a running time during which an application placement plan is to be identified out of a large number of placement scenarios within the running time. The application template can describe an application flow path associated with the application. The processor can identify the application placement plan, where the application placement plan can include an optimal placement of the application at the data center, before a given running time expires by pruning the large search space. The processor can generate a command to effect deployment of the application in accordance with the application placement plan.

    Abstract translation: 这里公开了应用部署引擎的概念和技术。 执行应用部署引擎的处理器可以接收应用请求。 处理器可以获得指示数据中心的资源的可用性,与应用程序相关联的应用模板的可用性的网络拓扑数据,以及运行时间,在该运行时间期间,在运行中的大量的放置场景中识别应用程序布置计划 时间。 应用程序模板可以描述与应用程序相关联的应用程序流程路径。 处理器可以识别应用程序布局计划,其中应用程序布局计划可以在给定运行时间到期之前通过修剪大型搜索空间来包括应用程序在数据中心的最佳布局。 处理器可以根据应用程序布局计划生成一个命令来实现应用程序的部署。

    CELLULAR NETWORK AREA OPTIMIZER
    63.
    发明申请

    公开(公告)号:US20250097805A1

    公开(公告)日:2025-03-20

    申请号:US18968048

    申请日:2024-12-04

    Abstract: The described technology is generally directed towards a cellular network area optimizer. The area optimizer observes cellular network conditions at multiple radio access network (RAN) nodes within a target area. Based on observed conditions, the area optimizer applies a set of parameter values at the multiple RAN nodes. The set of parameter values enhances the overall throughput, while maintaining or improving connection retainability and accessibility, of the multiple RAN nodes under the observed conditions. The area optimizer learns different sets of parameter values to apply in response to different observed conditions by making parameter value adjustments and observing the effect of the adjustments on overall throughput of the RAN nodes in the target area.

    Correlating Compromised Home Internet of Things Devices With Distributed Denial of Service Attacks

    公开(公告)号:US20250097262A1

    公开(公告)日:2025-03-20

    申请号:US18964834

    申请日:2024-12-02

    Abstract: A distributed denial of service (“DDoS”) attack profiler can determine a plurality of DDoS attack properties associated with a DDoS attack that utilizes an Internet of Things (“IoT”) device operating in communication with a home gateway. The DDoS attack profiler can create a DDoS attack profile and can provide a DDoS attack report based upon the DDoS attack profile to a correlator. An IoT device profiler can determine a plurality of IoT device properties and can create, based upon the plurality of IoT device properties, an IoT device profile. The IoT device profiler can create an anomaly report that identifies an anomaly associated with the IoT device. The correlator can correlate the DDoS attack report with the anomaly report to determine if a match exists. In response to determining that the match exists, the home gateway system can store the bot match record in a bot match repository.

    Home Gateway Monitoring for Vulnerable Home Internet of Things Devices

    公开(公告)号:US20230308467A1

    公开(公告)日:2023-09-28

    申请号:US17702858

    申请日:2022-03-24

    CPC classification number: H04L63/1433 G16Y30/10 H04L63/105

    Abstract: The concepts and technologies disclosed herein are directed to home gateway monitoring for vulnerable home Internet of Things (“IoT”) devices. According to one aspect disclosed herein, a home gateway can scan a home network address space of a home network for an IoT device. The home gateway can perform a vulnerability test on the IoT device to determine whether the IoT device is vulnerable to a known vulnerability. In response to determining that the IoT device is vulnerable to the known vulnerability, the home gateway can change a device status of the IoT device to a vulnerable status and can change a permissions level of the IoT device to a quarantine permissions level.

    SECURITY MANAGEMENT ON A MOBILE DEVICE
    68.
    发明公开

    公开(公告)号:US20230239694A1

    公开(公告)日:2023-07-27

    申请号:US18192295

    申请日:2023-03-29

    Inventor: Kaustubh Joshi

    CPC classification number: H04W12/08 H04W12/37 H04W88/02

    Abstract: Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.

    Seamless Reconfiguration of Distributed Stateful Network Functions

    公开(公告)号:US20230208908A1

    公开(公告)日:2023-06-29

    申请号:US18117683

    申请日:2023-03-06

    CPC classification number: H04L67/1029 H04L67/1038 H04L67/1031

    Abstract: A system can include a gateway, a plurality of network function nodes, and a distributed load balancer including load balancer nodes each having a flow table portion stored thereon. The load balancer nodes can form a node chain having a tail and head nodes. A load balancer node can receive a packet from the gateway. In response, the load balancer node can generate a query, directed to the tail node, that identifies the packet and a network function identifier associated with a network function node that is proposed to handle a connection. The tail node can determine whether an entry for the connection exists in a flow table portion associated with the tail node. If not, the tail node can initiate an insert request for writing the entry for the connection via the head node. The entry can then be written to all load balancer nodes in the node chain.

Patent Agency Ranking