-
1.
公开(公告)号:US20240364745A1
公开(公告)日:2024-10-31
申请号:US18532740
申请日:2023-12-07
Applicant: Ent. Services Development Corporation LP
Inventor: Frank R. Martinez , Eric Pulier
IPC: H04L9/40 , G06F9/455 , G06F9/50 , H04L12/46 , H04L12/64 , H04L12/66 , H04L67/00 , H04L67/02 , H04L67/10 , H04L67/51
CPC classification number: H04L63/20 , G06F9/455 , G06F9/45558 , G06F9/5072 , H04L12/4633 , H04L12/6418 , H04L12/66 , H04L63/0209 , H04L63/0272 , H04L63/102 , H04L63/105 , H04L67/02 , H04L67/10 , H04L67/34 , H04L67/51 , G06F2009/45587
Abstract: In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone.
-
公开(公告)号:US12132637B2
公开(公告)日:2024-10-29
申请号:US18499874
申请日:2023-11-01
Applicant: Netflow, UAB
Inventor: Karolis Kaciulis , Donatas Budvytis
IPC: G06F15/173 , H04L9/40 , H04L45/00 , H04L45/02
CPC classification number: H04L45/02 , H04L45/34 , H04L63/0272 , H04L63/0428
Abstract: A virtual private network (VPN) tunnel is established between a user device and a VPN gateway. The VPN gateway transmits first packets received from the user device to a first exit VPN server. A first subset of the first packets is transmitted by the first exit VPN server to a first target and a second subset of the first packets is transmitted by the first exit VPN server to a second target. A second exit VPN server that is different from the first exit VPN server is identified based on the first packets. Second packets are received by the VPN gateway from the user device. At least a subset of the second packets are transmitted to the second exit VPN server for forwarding to the second target.
-
公开(公告)号:US20240356894A1
公开(公告)日:2024-10-24
申请号:US18756295
申请日:2024-06-27
Applicant: Level 3 Communications, LLC
Inventor: Jin-Gen Wang , Travis D. Ewert
IPC: H04L9/40 , H04L41/08 , H04L41/0869 , H04L41/0893
CPC classification number: H04L63/0227 , H04L41/0869 , H04L41/0886 , H04L41/0893 , H04L63/0272
Abstract: Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.
-
公开(公告)号:US12124597B2
公开(公告)日:2024-10-22
申请号:US17868227
申请日:2022-07-19
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Stephen J. Griesmer , Himanshu Ranpura
CPC classification number: G06F21/6218 , G06F21/6209 , H04L63/0272 , H04L63/105
Abstract: Aspects of the subject disclosure may include, for example, a method that includes receiving user input to configure a secure storage unit (SSU) having a first portion attached to a network and storing encrypted data, a second portion attached to the network and storing unencrypted data, and a third portion attachable to the network. The user input defines a security level for each portion. The method also includes receiving a data object for storage in the SSU, and determining a data security level for the data object; the data security level is determined by user input regarding the data object and/or analysis of the data object by the processing system, and the analysis includes analysis of attributes of the data object and/or content of the data object. The method further includes storing the data object in the SSU according to the data security level. Other embodiments are disclosed.
-
公开(公告)号:US20240348585A1
公开(公告)日:2024-10-17
申请号:US18134467
申请日:2023-04-13
Applicant: VMware LLC
Inventor: Gaurav Jindal , Rasik Vallabhbhai Jesadiya , Hussaina Begum Nandyala , Neeraj Mantri
CPC classification number: H04L63/0272 , H04L12/4633
Abstract: Some embodiments provide a novel method for reducing load on a first virtual private network (VPN) gateway of a first datacenter by using a second VPN gateway to perform data message encryption needed for VPN communication with a second datacenter. The second gateway performs encryption for machines executing on several host computers of the first datacenter. The first gateway establishes a VPN session with a third gateway of the second datacenter and establishes a tunnel. The first gateway provides, to the second gateway, state information specifying that the second gateway is to perform encryption for a set of data messages exchanged along the tunnel. The first gateway receives, from the second gateway, an encrypted data message to be sent to a destination machine in the second datacenter. The first gateway forwards the encrypted data message to the third gateway for the third gateway to forward to the destination machine.
-
公开(公告)号:US20240348477A1
公开(公告)日:2024-10-17
申请号:US18300762
申请日:2023-04-14
Applicant: Wells Fargo Bank, N.A.
CPC classification number: H04L12/4641 , H04L12/4633 , H04L63/0272
Abstract: Various embodiments are generally directed to techniques for dynamic connectivity between computing entities. Some embodiments are particularly directed to an exchange controller that dynamically establishes and destroys dedicated connections between different computing entities in an on-demand manner that restrict unnecessary network connectivity. In several embodiments, a private network may connect the exchange controller to a first set of one or more computing entities, such as applications in a private cloud. In several such embodiments, the exchange controller may utilize virtual private networks (VPNs) to establish secure communication between the first set of one or more computing entities and a second set of one or more computing entities external to the private network, such as a server or database located in an external cloud.
-
公开(公告)号:US20240340360A1
公开(公告)日:2024-10-10
申请号:US18296098
申请日:2023-04-05
Applicant: Lenovo (Singapore) Pte. Ltd.
Inventor: Mauricio Pesci da Silva , Alan Rodrigues de Almeida , Davy Alves de Souza , Bruno Antunes da Silva , Renan Carlos Pereira , Fabio Jung Diegues , Giuliano Paes Carnielli
CPC classification number: H04L69/162 , H04L12/66 , H04L63/0272
Abstract: A computer implemented method includes establishing a local connection to a local private network via a gateway device. A connection is established between the gateway device and a management service in a remote network. A private network target device is discovered on the local private network and information identifying the private network device is provided to the management service. Communications are transferred between the management service and the private network target device via the gateway device over the connection.
-
公开(公告)号:US20240340270A1
公开(公告)日:2024-10-10
申请号:US18748103
申请日:2024-06-20
Applicant: Neone, Inc.
Inventor: Dave M. Glassco , Karl Eric Jarvis
IPC: H04L9/40 , G06F9/455 , G06F11/20 , H04L9/08 , H04W12/033
CPC classification number: H04L63/0407 , G06F11/2023 , H04L9/0819 , H04L63/0428 , H04W12/033 , G06F9/45533 , G06F2201/805 , H04L63/0272 , H04L63/0435 , H04L63/0442
Abstract: A computer that provides one or more verified personas for a distributed token (such as a non-fungible token or NFT) of a first user is described. Notably, the computer may provide the one or more verified personas for the first user that are based at least in part on their account(s) with a provider of a secure, virtual private network (SVPN) of the first user. Consequently, the identity of the first user may be known to the provider. However, the one or more verified personas may obfuscate the known identity of the first user when conducting one or more discrete secure transactions (such as a transaction associated with a cryptocurrency or the NFT) using or associated with the distributed token. In particular, the first user may associate or link the one or more verified personas with the distributed token, thereby providing the benefits of privacy and selective (as-needed) identification.
-
公开(公告)号:US20240340236A1
公开(公告)日:2024-10-10
申请号:US18296399
申请日:2023-04-06
Applicant: Cisco Technology, Inc.
Inventor: Bharath Vasudevan , Christian Schmutzer
CPC classification number: H04L45/50 , H04L12/66 , H04L45/66 , H04L63/0272
Abstract: Presented herein are techniques that remove the unnecessary provisioning system complexities of manual inter-domain service/circuit stitching by introducing a solution to perform dynamic end-to-end circuit setup in a hybrid networking environment. A method is provided that is performed by a gateway node at a boundary of a first domain and a second domain of a hybrid network, the first domain and the second domain using different types of transport and different types of control planes.
-
公开(公告)号:US20240323153A1
公开(公告)日:2024-09-26
申请号:US18368065
申请日:2023-09-14
Applicant: WALTON ADVANCED ENGINEERING INC.
Inventor: HONG CHI YU , MAO TING CHANG
CPC classification number: H04L51/06 , H04L63/0272
Abstract: The present invention relates to a method for high-security network message transmission based on a virtual private network. First, an authenticated first user machine joins a virtual private network and a proprietary name is assigned to a certificate in a backend name decoder of the virtual private network; secondly, a private message sent by the first user machine through a private transfer protocol server waits in the server for reception of a second user machine with the corresponding proprietary name or is forwarded to an outside network. The technical measure which effectuates high-security network message transmission is applicable to various situations for secure communications.
-
-
-
-
-
-
-
-
-