Dynamic multi-network security controls

    公开(公告)号:US12267336B2

    公开(公告)日:2025-04-01

    申请号:US17365448

    申请日:2021-07-01

    Abstract: Dynamic multi-network security controls are provided herein. A method can include receiving a report of malicious network traffic observed by first network equipment operating in a first communication network, where the report indicates a second communication network distinct from the first communication network as an originating network of the malicious network traffic, identifying second network equipment operating in the second communication network as a source of the malicious network traffic, and based on the identifying, blocking communications from the second network equipment for a defined time interval.

    Facilitating quality of service and security via functional classification of devices in networks
    2.
    发明授权
    Facilitating quality of service and security via functional classification of devices in networks 有权
    通过网络中的设备功能分类,促进服务质量和安全

    公开(公告)号:US09544395B2

    公开(公告)日:2017-01-10

    申请号:US14512029

    申请日:2014-10-10

    Abstract: Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of devices of a network, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with data generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.

    Abstract translation: 通过对网络内的设备进行功能分类,便于服务质量和安全性。 一种方法包括由网络的设备的第一设备接收在所述网络的设备中存在第二设备的通知信息,其中所述设备被配置为传送关于与所述设备的相应操作相关联的事件的信息; 以及由所述第一设备生成指示所述第二设备的功能的身份和功能分类的第一信息。 该方法还包括由第一设备向网络内的控制器发起用于将指示第二设备的功能的功能分类的第三信息与由第二设备生成的数据相关联的第二信息的传输。 第二装置的功能的功能分类与第二装置的故障的潜在影响相关。

    FACILITATING QUALITY OF SERVICE AND SECURITY VIA FUNCTIONAL CLASSIFICATION OF DEVICES IN NETWORKS
    3.
    发明申请
    FACILITATING QUALITY OF SERVICE AND SECURITY VIA FUNCTIONAL CLASSIFICATION OF DEVICES IN NETWORKS 有权
    通过网络中设备的功能分类来提高服务质量和安全性

    公开(公告)号:US20160105531A1

    公开(公告)日:2016-04-14

    申请号:US14512029

    申请日:2014-10-10

    Abstract: Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of devices of a network, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with data generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.

    Abstract translation: 通过对网络内的设备进行功能分类,便于服务质量和安全性。 一种方法包括由网络的设备的第一设备接收在所述网络的设备中存在第二设备的通知信息,其中所述设备被配置为传送关于与所述设备的相应操作相关联的事件的信息; 以及由所述第一设备生成指示所述第二设备的功能的身份和功能分类的第一信息。 该方法还包括由第一设备向网络内的控制器发起用于将指示第二设备的功能的功能分类的第三信息与由第二设备生成的数据相关联的第二信息的传输。 第二装置的功能的功能分类与第二装置的故障的潜在影响相关。

    FACILITATING QUALITY OF SERVICE AND SECURITY VIA FUNCTIONAL CLASSIFICATION OF DEVICES IN NETWORKS
    5.
    发明申请
    FACILITATING QUALITY OF SERVICE AND SECURITY VIA FUNCTIONAL CLASSIFICATION OF DEVICES IN NETWORKS 有权
    通过网络中设备的功能分类来提高服务质量和安全性

    公开(公告)号:US20170078440A1

    公开(公告)日:2017-03-16

    申请号:US15359956

    申请日:2016-11-23

    Abstract: Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with fourth information generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.

    Abstract translation: 通过对网络内的设备进行功能分类,便于服务质量和安全性。 一种方法包括由第一设备接收在网络的设备中的第二设备的存在的通知信息,其中所述设备被配置为传送关于与所述设备的相应操作相关联的事件的信息; 以及由所述第一设备生成指示所述第二设备的功能的身份和功能分类的第一信息。 该方法还包括由第一设备向网络内的控制器发起用于将指示第二设备的功能的功能分类的第三信息与由第二设备生成的第四信息相关联的第二信息的传输。 第二装置的功能的功能分类与第二装置的故障的潜在影响相关。

    DYNAMIC MULTI-NETWORK SECURITY CONTROLS

    公开(公告)号:US20230007018A1

    公开(公告)日:2023-01-05

    申请号:US17365448

    申请日:2021-07-01

    Abstract: Dynamic multi-network security controls are provided herein. A method can include receiving, via an internet protocol network, a report of malicious network traffic observed by first network equipment operating in a first communication network communicatively coupled to the internet protocol network, wherein the report indicates a second communication network, communicatively coupled to the internet protocol network and distinct from the first communication network, as an originating network of the malicious network traffic; in response to receiving the report, identifying second network equipment operating in the second communication network as a source of the malicious network traffic; and causing a control device associated with the second communication network to prevent the second network equipment from transmitting network traffic, comprising the malicious network traffic, outside of the second communication network via the internet protocol network for a defined time interval.

    Tag-Based Security Policy Creation in a Distributed Computing Environment

    公开(公告)号:US20200213365A1

    公开(公告)日:2020-07-02

    申请号:US16817786

    申请日:2020-03-13

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

    Tag-based security policy creation in a distributed computing environment

    公开(公告)号:US10594735B2

    公开(公告)日:2020-03-17

    申请号:US15718347

    申请日:2017-09-28

    Abstract: Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.

Patent Agency Ranking