Mobile communications over secure enterprise networks

    公开(公告)号:US10785195B2

    公开(公告)日:2020-09-22

    申请号:US15854181

    申请日:2017-12-26

    Abstract: In various implementations, a method includes receiving a request to establish an end-to-end encrypted session between a device in an enterprise network and an external entity that is outside the enterprise network. In some implementations, the end-to-end encrypted session allows encrypted packets to be transmitted between the device and the external entity. In various implementations, the method includes determining whether the request satisfies an enterprise security criterion for establishing the end-to-end encryption session. In various implementations, the method includes in response to determining that the request satisfies the enterprise security criterion, triggering the establishment of the end-to-end encrypted session between the device in the enterprise network and the external entity that is outside the enterprise entity.

    CLOUD MANAGEMENT CONNECTIVITY ASSURANCE
    64.
    发明申请

    公开(公告)号:US20190312775A1

    公开(公告)日:2019-10-10

    申请号:US15947107

    申请日:2018-04-06

    Abstract: The disclosed technology relates a system is configured to generate a protected configuration for a network device based on network connectivity data for a plurality of devices in a managed network associated with a cloud management system. The system is further configured to receive a configuration change for the managed network, determine that the configuration change is incompatible with the protected configuration, and generate a notification that the configuration change is incompatible with the protected configuration.

    Identifying Anomalies in a Network
    65.
    发明申请

    公开(公告)号:US20190289028A1

    公开(公告)日:2019-09-19

    申请号:US16434564

    申请日:2019-06-07

    Abstract: Various implementations disclosed herein enable identifying anomalies in a network. For example, in various implementations, a method of identifying anomalies in a network is performed by a network node. In various implementations, the network node includes one or more processors, and a non-transitory memory. In various implementations, the method includes generating a characteristic indicator that characterizes a device type based on communications associated with a first device of the device type. In various implementations, the method includes determining, based on communications associated with the first device, a performance indicator that indicates a performance of the first device. In various implementations, the method includes synthesizing an anomaly indicator as a function of the performance indicator in relation to the characteristic indicator.

    ENCRYPTED TRAFFIC ANALYTICS OVER A MULTI-PATH TCP CONNECTION

    公开(公告)号:US20190245868A1

    公开(公告)日:2019-08-08

    申请号:US15891708

    申请日:2018-02-08

    CPC classification number: H04L63/1408 H04L43/04 H04L69/16

    Abstract: Methods and systems to estimate encrypted multi-path TCP (MPTCP) network traffic include restricting traffic in a first direction (e.g., uplink) to a single path, and estimating traffic of multiple subflows of a second direction (e.g., downlink) based on traffic over the single path of the first direction. The estimating may be based on, without limitation, acknowledgment information of the single path, a sequence of acknowledgment numbers of the single path, an unencrypted initial packet sent over the single path as part of a secure tunnel setup procedure, TCP header information of the unencrypted initial packet (e.g., sequence number, acknowledgment packet, and/or acknowledgment packet length), and/or metadata of packets of the single path (e.g., regarding cryptographic algorithms, Diffie-Helman groups, and/or certificate related data).

    System and method for providing handover to an ambiguous small cell access point in a network environment

    公开(公告)号:US09699696B2

    公开(公告)日:2017-07-04

    申请号:US14299905

    申请日:2014-06-09

    CPC classification number: H04W36/04 H04W36/0061

    Abstract: An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel.

Patent Agency Ranking