FAST REPOWERING USING CRYPTOGRAPHICALLY PROTECTED IDENTITY

    公开(公告)号:US20240388435A1

    公开(公告)日:2024-11-21

    申请号:US18452276

    申请日:2023-08-18

    Abstract: A computing device connected to a power source via a combined power/data connection obtains an authentication request from the power source. The authentication request includes a freshness mechanism provided by the power source. The computing device signs an authentication response with a private key associated with a verified identity stored on the computing device. The authentication response includes the freshness mechanism. The computing device provides the authentication response to the power source, and receives power from the power source.

    MINIMIZED PROCESSING OF STREAMING CHANGES INTO A SEMANTIC REASONER
    3.
    发明申请
    MINIMIZED PROCESSING OF STREAMING CHANGES INTO A SEMANTIC REASONER 审中-公开
    将流动变化的最小化处理转换为语义原因

    公开(公告)号:US20160292581A1

    公开(公告)日:2016-10-06

    申请号:US14677768

    申请日:2015-04-02

    CPC classification number: G06N5/047 H04L41/0233 H04L41/0866 H04L41/0893

    Abstract: An aspect of the present disclosure aims to reduce or eliminate the problems associated with processing quickly changing large sets of data. To that end, systems and methods are disclosed, enabling a semantic reasoner to identify and process incremental changes to a rules base rather than re-processing the entire rules base. Such incremental stream reasoning (i.e., only reasoning upon pushed object changes) provides an efficient and fast manner for reacting to quickly changing data.

    Abstract translation: 本公开的一个方面旨在减少或消除与处理快速变化的大量数据相关联的问题。 为此,公开了系统和方法,使得语义推理者能够识别和处理规则库的增量更改,而不是重新处理整个规则库。 这种增量流推理(即仅推动对象改变时的推理)提供了用于对快速变化的数据做出反应的有效且快速的方式。

    Commmon agent framework for network devices
    4.
    发明授权
    Commmon agent framework for network devices 有权
    Commmon代理框架为网络设备

    公开(公告)号:US09100346B2

    公开(公告)日:2015-08-04

    申请号:US13843715

    申请日:2013-03-15

    Abstract: Techniques are provided for automating a common framework for network devices. In one example, a network device (e.g., switch, router, etc.) is configured to resolve the handling unknown packets automatically. The network device can detect whether or not a protocol is unknown to the network device, perform a lookup, determine if a matching protocol is available for the network device, and dynamically load an appropriate protocol handler into a memory of the network device. Advantageously, the present technology provides a mechanism for flexible on-demand push of protocol information. If a new protocol is noted on the network, the network device can look up the type of packet and can use a single platform kit to dynamically load drivers and control logic for that protocol onto the network device. Likewise, other network devices in the packet's path or in the network generally can load the drivers and control logic, as needed.

    Abstract translation: 提供了用于自动化网络设备的通用框架的技术。 在一个示例中,网络设备(例如,交换机,路由器等)被配置为自动解决处理未知分组。 网络设备可以检测网络设备的协议是否未知,执行查找,确定匹配协议是否可用于网络设备,以及将适当的协议处理程序动态加载到网络设备的存储器中。 有利地,本技术提供了一种灵活的按需推送协议信息的机制。 如果在网络上注明新的协议,则网络设备可以查找分组的类型,并且可以使用单个平台工具来动态地将该协议的驱动程序和控制逻辑加载到网络设备上。 同样,数据包路径或网络中的其他网络设备通常可以根据需要加载驱动程序和控制逻辑。

    In-Band Sustainable Packet Management

    公开(公告)号:US20250039047A1

    公开(公告)日:2025-01-30

    申请号:US18360353

    申请日:2023-07-27

    Abstract: Devices and methods that incorporate sustainability data within a header of a data packet to allow for the generation of sustainable configurations for various network devices are disclosed. Power efficiency is obtained at a node-level by including metadata to existing network flows, in an in-band/in-situ configuration. This information may be used for optimum flow placement. Received data packets may be formatted with sustainability data within a metadata shim. The received data packets are processed, and a sustainable configuration is generated for the one or more network devices. The generated sustainable configuration is transmitted to the one or more network devices to enable efficient and effective management of network devices by incorporating sustainability data into the data packets.

    OPPORTUNISTIC DE-ENERGIZING OF EXCESS NETWORK REDUNDANCY

    公开(公告)号:US20240381218A1

    公开(公告)日:2024-11-14

    申请号:US18313672

    申请日:2023-05-08

    Abstract: Methods are provided for selectively depowering any device(s) that seem unnecessarily redundant to strike a balance between resiliency and sustainability to reduce energy costs. The analysis may include a current application mix in use on network paths. For example, a policy may require that at least two available paths are actively energized when real-time collaboration apps are running. Examples of a real-time collaboration app may be data mining in an online database stored elsewhere in the network or holding a video conference call. This double path redundancy can deliver increased application availability. And, in instances where just web/email are actively running, then a backup path that may be energized in less than a second, if a primary path loses connectivity. This lower-power method can also provide increased application availability.

    Energy-aware traffic forwarding and loop avoidance

    公开(公告)号:US11863388B1

    公开(公告)日:2024-01-02

    申请号:US18193935

    申请日:2023-03-31

    CPC classification number: H04L41/0833 H04L41/12 H04L45/48

    Abstract: Energy-aware configurations can be utilized to operate a network based on sustainability-related metrics. In many embodiments, a suitable device includes a processor, a memory commutatively coupled to the processor, a plurality of elements, a communication port, and an energy-aware topology logic configured to collect topology data from one or more network devices, wherein each of the one or more network devices include a plurality of elements. The energy-aware topology logic can receive power source data and power usage data related to plurality of elements and generate an element energy coefficient (EEC) for a plurality of elements. Subsequently, the energy-aware topology logic can also generate an energy-aware configuration for at least one of the one or more network devices, and then pass the generated energy-aware configuration to the at least one network device, wherein the energy-aware configuration is configured to steer traffic based on at least one sustainability-related metric.

    ADMISSION CONTROL BASED ON UNIVERSAL REFERENCES FOR HARDWARE AND/OR SOFTWARE CONFIGURATIONS

    公开(公告)号:US20230385120A1

    公开(公告)日:2023-11-30

    申请号:US17826411

    申请日:2022-05-27

    CPC classification number: G06F9/505 G06F9/44505 G06F9/5044 G06F9/5055

    Abstract: A method, computer system, and computer program product are provided for performing admission control tasks. A universal reference for an executing application is obtained, wherein the universal reference identifies one or more components of the executing application by additional universal references assigned to the one or more components. A description of the executing application is determined by enumerating each additional universal reference of the one or more components and additional sub-components, wherein the description exhaustively identifies components and sub-components of the executing application. The identified one or more components and sub-components are assessed to perform an admission control operation between the executing application and a second application.

    ROUTING AND/OR FORWARDING INFORMATION DRIVEN SUBSCRIPTION AGAINST GLOBAL SECURITY POLICY DATA

    公开(公告)号:US20180139240A1

    公开(公告)日:2018-05-17

    申请号:US15475235

    申请日:2017-03-31

    CPC classification number: H04L63/20 H04L63/1433

    Abstract: Techniques are provided by which devices in a network may subscribe to a rapidly changing rules in central threat repository. The policies associated with threats are filtered so that just current attack vectors from within subnets learned via routing and/or forwarding information (at the network level of the network) are installed in the local access control list/policy database of the network devices. As routing changes occur, the list of applied policies are continually refined/revisited and pulled from a central security application. Publish/subscribe mechanisms ensure “zombie” policies are not left over in the device after reboot or routing changes occur.

Patent Agency Ranking