-
公开(公告)号:US12131082B2
公开(公告)日:2024-10-29
申请号:US18353547
申请日:2023-07-17
Applicant: PrinterLogic, Inc.
Inventor: Jarrett David Taylor , Ryan George Wedig , Corey Clint Ercanbrack , Devin Derrell Anderson
IPC: G06F3/12 , G06F8/61 , G06F9/4401 , H04L41/0253 , H04L41/046 , H04L41/0803 , H04L67/00 , H04L67/02 , H04N1/00 , H04L51/04 , H04L67/303
CPC classification number: G06F3/1225 , G06F3/1204 , G06F8/61 , G06F9/4411 , H04L41/0253 , H04L41/046 , H04L41/0803 , H04L67/02 , H04L67/34 , H04N1/00973 , H04L51/04 , H04L67/303
Abstract: A method for configuring, via a website, a computing device to communicate with a printer is described. The method includes creating, via the website, a printer definition for the printer. The printer definition includes a network address, a reference to a printer driver, and a reference to a printer profile. The method also includes sending an install uniform resource identifier (URI) associated with the printer definition. The method further includes receiving an indication that the install URI has been activated by the computing device. The method additionally includes sending an installer to the computing device. The installer installs the printer driver and configures the computing device to communicate with the printer using the network address, the printer driver and the printer profile.
-
公开(公告)号:US12120043B2
公开(公告)日:2024-10-15
申请号:US17671287
申请日:2022-02-14
Applicant: Oracle International Corporation
Inventor: Bjørn Dag Johnsen , Arvind Srinivasan , Line Holen
IPC: H04L49/25 , G06F9/451 , G06F9/455 , G06F16/22 , H04L9/40 , H04L12/44 , H04L41/046 , H04L41/0803 , H04L41/14 , H04L43/0823 , H04L43/0882 , H04L45/02 , H04L45/48 , H04L49/00 , H04L49/10 , H04L49/15 , H04L49/356 , H04L67/10 , H04L67/1097 , H04L41/12
CPC classification number: H04L49/25 , G06F9/451 , G06F9/45558 , G06F16/2237 , H04L12/44 , H04L41/046 , H04L41/0803 , H04L41/14 , H04L43/0823 , H04L43/0882 , H04L45/02 , H04L45/48 , H04L49/10 , H04L49/15 , H04L49/30 , H04L49/358 , H04L49/70 , H04L63/20 , H04L67/10 , H04L67/1097 , G06F2009/45579 , G06F2009/45595 , H04L41/12
Abstract: System and method for supporting scalable bitmap based P_Key table in a high performance computing environment. A method can provide, at least one subnet comprising one or more switches, a plurality of host channel adapters, and a plurality of end nodes. The method can associate the plurality of end nodes with at least one of a plurality of partitions, wherein each of the plurality of partitions are associated with a P_Key value. The method can associate each of the one or more switches with a bitmap based P_Key table of a plurality of bitmap based P_Key tables. The method can associate each of the host channel adapters with a bitmap based P_Key table of the plurality of bitmap based P_Key tables.
-
公开(公告)号:US12113684B2
公开(公告)日:2024-10-08
申请号:US17578375
申请日:2022-01-18
Applicant: Cisco Technology, Inc.
Inventor: Shashidhar Gandham , Rohit Chandra Prasad , Abhishek Ranjan Singh , Navindra Yadav , Khawar Deen , Varun Sagar Malhotra
IPC: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/455 , G06F16/11 , G06F16/13 , G06F16/16 , G06F16/17 , G06F16/174 , G06F16/23 , G06F16/2457 , G06F16/248 , G06F16/28 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/55 , G06F21/56 , G06N20/00 , G06N99/00 , G06T11/20 , H04J3/06 , H04J3/14 , H04L1/24 , H04L7/10 , H04L9/08 , H04L9/32 , H04L9/40 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/026 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0852 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/00 , H04L45/302 , H04L45/50 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/5007 , H04L67/01 , H04L67/10 , H04L67/1001 , H04L67/12 , H04L67/51 , H04L67/75 , H04L69/16 , H04L69/22 , H04W72/54 , H04W84/18 , H04L67/50
CPC classification number: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/45558 , G06F16/122 , G06F16/137 , G06F16/162 , G06F16/17 , G06F16/173 , G06F16/174 , G06F16/1744 , G06F16/1748 , G06F16/2322 , G06F16/235 , G06F16/2365 , G06F16/24578 , G06F16/248 , G06F16/285 , G06F16/288 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/552 , G06F21/556 , G06F21/566 , G06N20/00 , G06N99/00 , G06T11/206 , H04J3/0661 , H04J3/14 , H04L1/242 , H04L7/10 , H04L9/0866 , H04L9/3239 , H04L9/3242 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/026 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0841 , H04L43/0858 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/306 , H04L45/38 , H04L45/46 , H04L45/507 , H04L45/66 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/5007 , H04L63/0227 , H04L63/0263 , H04L63/06 , H04L63/0876 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1466 , H04L63/16 , H04L63/20 , H04L67/01 , H04L67/10 , H04L67/1001 , H04L67/12 , H04L67/51 , H04L67/75 , H04L69/16 , H04L69/22 , H04W72/54 , H04W84/18 , G06F2009/4557 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595 , G06F2221/033 , G06F2221/2101 , G06F2221/2105 , G06F2221/2111 , G06F2221/2115 , G06F2221/2145 , H04L67/535
Abstract: Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.
-
公开(公告)号:US12095629B2
公开(公告)日:2024-09-17
申请号:US16878652
申请日:2020-05-20
Applicant: VMWARE, INC.
Inventor: Nakul Ogale , Shirish Vijayvargiya , Sachin Shinde
IPC: H04L12/24 , G06F9/455 , H04L29/12 , H04L41/046 , H04L41/28 , H04L61/4511
CPC classification number: H04L41/28 , G06F9/45558 , H04L41/046 , H04L61/4511 , G06F2009/45587 , G06F2009/45595
Abstract: Example methods and systems for a computer system to perform security threat detection during service query handling are described. In one example, a process running on a virtualized computing instance supported by the computer system may generate and send a first service query specifying a query input according to a service protocol. The first service query may be detected by a security agent configured to operate in a secure enclave that is isolated from the process. Next, the security agent may generate and send a second service query specifying the query input in the first service query. It is then determined whether there is a potential security threat based on a comparison between (a) a first reply received responsive to the first service query and (b) a second reply received responsive to the second service query.
-
公开(公告)号:US12068905B2
公开(公告)日:2024-08-20
申请号:US17213735
申请日:2021-03-26
Applicant: Gigamon Inc.
Inventor: Anil Rao
IPC: H04L12/24 , H04L12/26 , H04L12/46 , H04L12/751 , H04L12/851 , H04L12/931 , H04L29/08 , H04L41/046 , H04L41/12 , H04L41/22 , H04L43/022 , H04L43/028 , H04L43/062 , H04L43/12 , H04L45/02 , H04L47/24 , H04L49/00 , H04L67/10
CPC classification number: H04L41/046 , H04L12/4633 , H04L41/12 , H04L41/22 , H04L43/022 , H04L43/028 , H04L43/062 , H04L43/12 , H04L45/02 , H04L47/24 , H04L49/70 , H04L67/10
Abstract: With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as Amazon Web Services, VMware, or OpenStack. But it can be difficult to manage how the visibility platform handles incoming virtualized traffic. Introduced here, therefore, are graphs that visually represent the network fabric of a visibility platform. When the network fabric of the visibility platform is represented as a graph, an end user can easily modify the network fabric, for example, by adding, removing, or modifying nodes that represent network objects, adding, removing, or modifying connections between pairs of nodes that represent traffic flows between pairs of network objects, etc.
-
公开(公告)号:US12063140B2
公开(公告)日:2024-08-13
申请号:US17977458
申请日:2022-10-31
Applicant: Keysight Technologies, Inc.
Inventor: Christian Paul Sommers , Peter J. Marsico
IPC: H04L41/046 , H04L41/12 , H04L41/14
CPC classification number: H04L41/046 , H04L41/12 , H04L41/14
Abstract: Methods, systems, and computer readable media for test system agent deployment in a smartswitch computing environment are disclosed. One example method occurs at a test system, the method comprising: obtaining test information indicating a smartswitch or a data processing unit (DPU) of the smartswitch for testing in a smartswitch computing environment or at least one test system agent deployment factor, wherein the smartswitch includes a switch processor and DPUs; determining, using the test information and topology information about the smartswitch computing environment, at least one location for deploying at least one test system agent; and providing placement information indicating the at least one location for deploying the at least one test system agent to a target system or to a test system agent controller.
-
公开(公告)号:US12057991B2
公开(公告)日:2024-08-06
申请号:US18321980
申请日:2023-05-23
Applicant: JumpCloud, Inc.
Inventor: Rajat Bhargava , James Brown , Christopher Marie
IPC: H04L41/046 , H04L9/40 , H04L41/28
CPC classification number: H04L41/046 , H04L41/28 , H04L63/04 , H04L63/166
Abstract: Methods, systems, and devices are described for orchestrating server management in a modern IT network. The described techniques may be implemented to manage any number of networked severs, whether local, remote, or both. Server orchestration may leverage a central, cloud-based management system and/or one or more autonomous agents installed on servers with the network. The autonomous agents may each be registered with the supervisory server and may have awareness of one another.
-
公开(公告)号:US20240259413A1
公开(公告)日:2024-08-01
申请号:US18630537
申请日:2024-04-09
Applicant: Headwater Research LLC
Inventor: Gregory G. Raleigh , James Lavine , Alireza Raissinia , Michael J. Sabin
IPC: H04L9/40 , G06F21/57 , H04L41/046 , H04W12/12 , H04W12/128
CPC classification number: H04L63/1425 , H04L41/046 , H04W12/12 , H04W12/128 , G06F21/575
Abstract: Secure device data records (DDRs) are provided. In some embodiments, a system for secure DDRs includes a processor of a wireless communication device for wireless communication with a wireless network, in which the processor is configured with a secure execution environment, and in which the secure execution environment is configured to: monitor service usage of the wireless communication device with the wireless network; and generate a plurality of device data records of the monitored service usage of the wireless communication device with the wireless network, in which each device data record is associated with a unique sequence order identifier; and a memory coupled to the processor and configured to provide the processor with instructions. In some embodiments, the secure execution environment is located in an application processor, in a modem processor, and/or in a subscriber identity module (SIM).
-
公开(公告)号:US12047230B2
公开(公告)日:2024-07-23
申请号:US17518630
申请日:2021-11-04
Applicant: Comcast Cable Communications, LLC
Inventor: Pak Siripunkaw , John Jason Brzozowski , Srinivas Avirneni , Emery J. Weber
IPC: H04L41/0806 , H04L12/28 , H04L41/046 , H04L41/082 , H04L41/084 , H04L61/5014 , H04N7/173 , H04N21/426 , H04N21/443 , H04N21/61 , H04L61/00
CPC classification number: H04L41/0806 , H04L12/2801 , H04L41/046 , H04L41/082 , H04L41/0843 , H04L61/5014 , H04N7/17309 , H04N21/42676 , H04N21/42684 , H04N21/4432 , H04N21/6118 , H04L61/00
Abstract: A method of initializing, provisioning, and managing a cable modem and a customer premise equipment device includes sending a customized configuration file to the cable modem. The configuration file contains service provisioning information and further includes information indicative of a network address type for the customer premise equipment device. A message is passed from the cable modem to the customer premise equipment device indicative of the network address type. The customer premise equipment device is provided with a network address in accordance with the network address type indicated in the message. In this way, the customer premise equipment device knows what kind of address to obtain, and excessive transactions are avoided.
-
公开(公告)号:US20240214285A1
公开(公告)日:2024-06-27
申请号:US18435803
申请日:2024-02-07
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Jackson Ngoc Ki Pang , Navindra Yadav , Anubhav Gupta , Shashidhar Gandham , Supreeth Hosur Nagesh Rao , Sunil Kumar Gupta
IPC: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/455 , G06F16/11 , G06F16/13 , G06F16/16 , G06F16/17 , G06F16/174 , G06F16/23 , G06F16/2457 , G06F16/248 , G06F16/28 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/55 , G06F21/56 , G06N20/00 , G06N99/00 , G06T11/20 , H04J3/06 , H04J3/14 , H04L1/24 , H04L7/10 , H04L9/08 , H04L9/32 , H04L9/40 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/026 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0852 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/00 , H04L45/302 , H04L45/50 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/5007 , H04L67/01 , H04L67/10 , H04L67/1001 , H04L67/12 , H04L67/50 , H04L67/51 , H04L67/75 , H04L69/16 , H04L69/22 , H04W72/54 , H04W84/18
CPC classification number: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/45558 , G06F16/122 , G06F16/137 , G06F16/162 , G06F16/17 , G06F16/173 , G06F16/174 , G06F16/1744 , G06F16/1748 , G06F16/2322 , G06F16/235 , G06F16/2365 , G06F16/24578 , G06F16/248 , G06F16/285 , G06F16/288 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/552 , G06F21/556 , G06F21/566 , G06N20/00 , G06N99/00 , G06T11/206 , H04J3/0661 , H04J3/14 , H04L1/242 , H04L7/10 , H04L9/0866 , H04L9/3239 , H04L9/3242 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/026 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0841 , H04L43/0858 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/306 , H04L45/38 , H04L45/46 , H04L45/507 , H04L45/66 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/5007 , H04L63/0227 , H04L63/0263 , H04L63/06 , H04L63/0876 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1466 , H04L63/16 , H04L63/20 , H04L67/01 , H04L67/10 , H04L67/1001 , H04L67/12 , H04L67/51 , H04L67/75 , H04L69/16 , H04L69/22 , H04W72/54 , H04W84/18 , G06F2009/4557 , G06F2009/45587 , G06F2009/45591 , G06F2009/45595 , G06F2221/033 , G06F2221/2101 , G06F2221/2105 , G06F2221/2111 , G06F2221/2115 , G06F2221/2145 , H04L67/535
Abstract: An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
-
-
-
-
-
-
-
-
-