Multitenant network orchestration

    公开(公告)号:US12267328B2

    公开(公告)日:2025-04-01

    申请号:US17695265

    申请日:2022-03-15

    Abstract: Methods are provided in which a network device hosts distinct network access resources that are managed by different entities. The method includes obtaining a request for partitioning one or more network resources of an on-premise network device for connecting one or more endpoints to a first network managed by a first entity. The on-premise network device connects one or more endpoints to a second network managed by a different entity. The method further involves partitioning, based on the request, the one or more network resources and connecting the one or more endpoints to the first network using the one or more network resources. The one or more network resources are managed by the first entity while at least one other network resource of the on-premise network device is managed by the different entity and is associated with connecting the one or more endpoints to the second network.

    DYNAMIC RESOURCE ALLOCATION FOR NETWORK SECURITY

    公开(公告)号:US20230036547A1

    公开(公告)日:2023-02-02

    申请号:US17390229

    申请日:2021-07-30

    Abstract: Systems, methods, and computer-readable media are provided for dynamic allocation of network security resources and measures to network traffic between end terminals on a network and a network destination, based in part on an independently sourced reputation score of the network destination. In one aspect, a method includes receiving, at a cloud network controller, a request from an end terminal for information on a network destination; determining, at the cloud network controller, a reputation score for the network destination; determining, at the cloud network controller, one or more security measures to be applied when accessing the network destination, based on the reputation score; and communicating, by the cloud network controller, the one or more security measures to the end terminal, wherein the end terminal communicates the one or more security measures to a third-party security service provider for applying to communications between the end terminal and the network destination.

    NETWORK TOPOLOGY MODEL GENERATION AND DEPLOYMENT FOR MACHINE LEARNING SYSTEMS

    公开(公告)号:US20230032585A1

    公开(公告)日:2023-02-02

    申请号:US17390527

    申请日:2021-07-30

    Abstract: Techniques are described herein for generating and deploying network topologies to implement machine learning systems. A topology deployment system may receive data representing a logical model corresponding to a machine learning system, and may analyze the machine learning system to determine various components and attributes of the machine learning system to be deployed. Based on the components and attributes of the machine learning system, the topology deployment system may select target resources and determine constraints for the deployment of the machine learning system. A corresponding network topology may be generated and deployed across one or a combination of workload resource domains. The topology deployment system also may monitor and update the deployed network topology, based on performance metrics of the machine learning system and/or the current status of the system in a machine learning pipeline.

    ON-DEMAND CREATION OF CONTEXTUALLY RELEVANT AND LOCATION-AWARE EPHEMERAL SERVICES

    公开(公告)号:US20220408217A1

    公开(公告)日:2022-12-22

    申请号:US17350567

    申请日:2021-06-17

    Abstract: Techniques are for provided located-based contextual services to users by automatically creating location-based contextually relevant communication sessions that may take on a variety of forms, including contextual chats and micro-local services that are ephemeral, curated by a location owner and personalized by a user. As a user's context shifts throughout the day (from work to shopping to entertainment, etc.) the presented techniques filter content differently based on what the user may care about at a particular moment when the user is at a particular venue. The automatic creation and deletion of an ephemeral space/channel provides a dynamic application that changes its content or behavior based on a user's location. The user may control the interactivity level based on an adaptive user identifier by which a user's identity may take on different versions depending on location and time of day.

    Analyzing deployed networks with respect to network solutions

    公开(公告)号:US11456917B2

    公开(公告)日:2022-09-27

    申请号:US16889306

    申请日:2020-06-01

    Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.

    SYSTEMS AND METHODS FOR CONTEXTUAL NETWORK ASSURANCE BASED ON CHANGE AUDITS

    公开(公告)号:US20220014444A1

    公开(公告)日:2022-01-13

    申请号:US17482408

    申请日:2021-09-22

    Abstract: Aggregated health information for a managed network may be retrieved and processed in response to changes to the managed network topology, configuration, or software. In response to receiving notification that a change to a component of the managed network has occurred, a change audit analysis engine can retrieve performance indicator information from components along a traceroute including the component which underwent the change. The retrieved performance indicator information can be processed by a memory based neural network to predict an impact of the change on the aggregated health of the managed network. The predicted impact can be compared to network health information retrieved through an ongoing basis and issues can be determined based on a comparison of the predict impact and the retrieved health information.

    ANALYZING DEPLOYED NETWORKS WITH RESPECT TO NETWORK SOLUTIONS

    公开(公告)号:US20210377114A1

    公开(公告)日:2021-12-02

    申请号:US16889306

    申请日:2020-06-01

    Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.

Patent Agency Ranking