POLICY RULE BASED ON A REQUESTED BEHAVIOR
    1.
    发明申请
    POLICY RULE BASED ON A REQUESTED BEHAVIOR 审中-公开
    基于所要求的行为的政策规定

    公开(公告)号:US20160308905A1

    公开(公告)日:2016-10-20

    申请号:US15100710

    申请日:2013-12-04

    Abstract: In one implementation, an example system may include a policy engine. The policy engine may receive a context of an application to request a set of network traffic and provide a policy rule to a network device of a network path. In another implementation, an example system may identify a party and a requested behavior of the service and maintain a context to determine a policy rule to regulate a set of network traffic associated with the service based on the party and the requested behavior. In another implementation, an example method may comprise receiving a service request and an authentication, identifying a party, identifying a behavior, and deploying a policy to a network device of a network based on the party and the behavior.

    Abstract translation: 在一个实现中,示例系统可以包括策略引擎。 策略引擎可以接收应用的上下文以请求一组网络流量并且向网络路径的网络设备提供策略规则。 在另一实现中,示例系统可以识别服务的一方和所请求的行为,并维护上下文以确定策略规则,以基于该方和所请求的行为来规范与该服务相关联的一组网络流量。 在另一实现中,示例性方法可以包括基于该方和该行为来接收服务请求和认证,标识一方,识别行为以及将策略部署到网络的网络设备。

    ASYNCHRONOUS GARBAGE COLLECTION IN A DISTRIBUTED DATABASE SYSTEM
    2.
    发明申请
    ASYNCHRONOUS GARBAGE COLLECTION IN A DISTRIBUTED DATABASE SYSTEM 审中-公开
    分布式数据库系统中的异步收发

    公开(公告)号:US20160210228A1

    公开(公告)日:2016-07-21

    申请号:US14917160

    申请日:2013-10-30

    Inventor: Sebastien Tandel

    CPC classification number: G06F12/0269 G06F12/0253 G06F16/162 G06F16/2365

    Abstract: A method for asynchronous garbage collection in a distributed database is described herein, The method includes budding a set of candidates for garbage collection and transmitting a garbage collection task to each stage of a pipeline. The method also includes removing data from each stage of the pipeline based on the set of candidates for garbage collection.

    Abstract translation: 本文描述了分布式数据库中的异步垃圾收集方法。该方法包括:发布一组用于垃圾收集的候选项,并将垃圾回收任务发送到流水线的每个阶段。 该方法还包括基于用于垃圾收集的一组候选者从管道的每个阶段去除数据。

    Continuous multifactor device authentication

    公开(公告)号:US11546328B2

    公开(公告)日:2023-01-03

    申请号:US16255937

    申请日:2019-01-24

    Abstract: A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.

    IDENTIFYING DEVICE TYPES BASED ON BEHAVIOR ATTRIBUTES

    公开(公告)号:US20200067777A1

    公开(公告)日:2020-02-27

    申请号:US16106789

    申请日:2018-08-21

    Abstract: An example non-transitory memory resource including instructions executable by the processing resource to monitor device information for a plurality of devices, wherein the plurality of devices comprise at least one device of an unknown device type, identify behavior attributes for the plurality of devices based on the monitored device information, cluster the plurality of devices into groups based on the behavior attributes, identify a device type for the plurality of devices based on the group of the plurality of devices; and present identifiers for each of the plurality of devices, based on the device type of the plurality of devices.

    Policy rule based on a requested behavior

    公开(公告)号:US10044760B2

    公开(公告)日:2018-08-07

    申请号:US15100710

    申请日:2013-12-04

    Abstract: In one implementation, an example system may include a policy engine. The policy engine may receive a context of an application to request a set of network traffic and provide a policy rule to a network device of a network path. In another implementation, an example system may identify a party and a requested behavior of the service and maintain a context to determine a policy rule to regulate a set of network traffic associated with the service based on the party and the requested behavior. In another implementation, an example method may comprise receiving a service request and an authentication, identifying a party, identifying a behavior, and deploying a policy to a network device of a network based on the party and the behavior.

Patent Agency Ranking