Setting device operational parameters using manufacturer usage description files

    公开(公告)号:US11677830B2

    公开(公告)日:2023-06-13

    申请号:US17370044

    申请日:2021-07-08

    CPC classification number: H04L67/12 G16Y40/30

    Abstract: In one embodiment, a controller in a network obtains information associated with one or more nodes connected to a particular node in the network. The controller sends a Manufacturer Usage Description request for the particular node that includes the information associated with the one or more nodes connected to the particular node. The controller receives, in response to sending the Manufacturer Usage Description request, operational parameter values for the particular node. The controller configures the particular node using the operational parameter values.

    SETTING DEVICE OPERATIONAL PARAMETERS USING MANUFACTURER USAGE DESCRIPTION FILES

    公开(公告)号:US20230010856A1

    公开(公告)日:2023-01-12

    申请号:US17370044

    申请日:2021-07-08

    Abstract: In one embodiment, a controller in a network obtains information associated with one or more nodes connected to a particular node in the network. The controller sends a Manufacturer Usage Description request for the particular node that includes the information associated with the one or more nodes connected to the particular node. The controller receives, in response to sending the Manufacturer Usage Description request, operational parameter values for the particular node. The controller configures the particular node using the operational parameter values.

    VERIFYING DATA SOURCES USING ATTESTATION BASED METHODS

    公开(公告)号:US20230126851A1

    公开(公告)日:2023-04-27

    申请号:US17511415

    申请日:2021-10-26

    Abstract: In one embodiment, methods for monitoring network traffic are described. The method may include receiving network traffic that is flowing through the network. The method further includes generating one or more packets that include metadata representing a monitored characteristic of the network traffic. Additionally, the method may include generating, at least partly by a secure hardware chip of the network device and using a private key, a signature indicating the metadata was generated at the network device and a time at which the metadata was generated at the network device. The method may further include populating the one or more packets with the signature. Additionally, the method may include sending the one or more packets to a collection system associated with a network monitoring system.

Patent Agency Ranking