6040 patents
Page 7 of 302
Utility
Method using network controller to deploy virtual environment in production network
2 Jan 24
A method comprises: at a network device configured to be connected to a network and having control and data planes, and interfaces configured for network operations in the network: upon receiving, from a controller, instructions to form a local twin of the network device that is a virtual replica of the network device to be used for test purposes, creating the local twin and configuring the local twin to include virtual control and data planes, and virtual interfaces, which are virtual replicas of, and operate independently from, the control and data planes, and the interfaces, of the network device, respectively; and hosting the local twin on physical resources of the network device such that the local twin is configured for virtual network operations on the network device that replicate, but are independent from, the network operations.
Cesar Obediente, Craig Thomas Hill, Nagendra Kumar Nainar, David John Zacks, Jaganbabu Rajamanickam, Madhan Sankaranarayanan
Filed: 8 Dec 22
Utility
Dynamic load adjustment
2 Jan 24
Techniques for dynamically load balancing traffic based on predicted and actual load capacities of data nodes are described herein.
Leonardo Rangel Augusto, Grzegorz Boguslaw Duraj, Kyle Andrew Donald Mestery
Filed: 1 Jun 21
Utility
Systems and methods for scalable validation of multiple paths in a network using segment routing
2 Jan 24
Systems, methods, and computer-readable media are disclosed for a scalable process for validating multiple paths used for routing network traffic in a network using segment routing.
Amila Pradeep Kumara Tharaperiya Gamage, Michel Dean Taillon, Darren Russell Dukes
Filed: 29 Jul 22
Utility
Systems and methods for translating IPV6 packets for DIA in an SD-WAN environment
2 Jan 24
In one embodiment, a method includes determining, by a router, a common prefix pool from a transport interface associated with a transport virtual private network (VPN).
Changhong Shen, Sampath Kumar, Ruozhong Xuan, Yin Wang, Madhu Gindi, Garima Pal, Vincent Li
Filed: 8 Mar 22
Utility
Hierarchical provisioning of network devices
2 Jan 24
Automated techniques for converting network devices from a Layer 2 (L2) network into a Layer 3 (L3) network in a hierarchical manner are described herein.
Rajeev Kumar, Sanjay Kumar Hooda, Ramesh Chandra Yeevani-Srinivas
Filed: 27 Sep 21
Utility
Applying attestation to the border gateway protocol (BGP)
2 Jan 24
In one embodiment, a method by an apparatus of a Border Gateway Protocol (BGP) network includes accessing an attestation token for the apparatus.
Clarence Filsfils, Swadesh Agrawal, Apoorva Karan
Filed: 20 Mar 20
Utility
Adjusting security policies based on endpoint locations
2 Jan 24
This disclosure describes techniques for setting and/or adjusting a security policy associated with a device based on the physical locations of endpoint devices exchanging data with the device.
David J Zacks, Carlos M. Pignataro, Thomas Szigeti
Filed: 17 Feb 21
Utility
Remote access policies for IoT devices using manufacturer usage description (MUD) files
2 Jan 24
In one embodiment, a management service for a network that is executed by one or more devices establishes a trust relationship with an entity associated with an endpoint in the network.
Robert E. Barton, Jerome Henry, Vinay Saini
Filed: 12 Feb 21
Utility
Susceptibility-based warning techniques
2 Jan 24
In one embodiment, a method comprises training at least one model based at least in part on interactions between one or more users and electronic messages sent to addresses associated with the one or more users, receiving a first electronic message sent to a first address associated with a first user, analyzing the first electronic message to generate first feature data, determining one or more characteristics of the first user to generate second feature data, inputting, to the at least one model, the first feature data and the second feature data, and receiving, as output of the at least one model, data indicating whether to output, to the first user, a warning regarding the first electronic message.
Nikolaos Sapountzis, Fabio R. Maino, Madhuri Kolli, Daniela Alvim Seabra De Oliveira
Filed: 22 Mar 21
Utility
Dynamically tailored trust for secure application-service networking in an enterprise
2 Jan 24
Dynamically tailored trust for secure application-server networking and advanced enterprise security is provided.
Hendrikus G. P. Bosch, Sape Jurriƫn Mullender, Jeffrey Michael Napper, Alessandro Duminuco, Shivani Raghav
Filed: 6 May 20
Utility
On-demand security policy provisioning
2 Jan 24
Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules.
Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
Filed: 22 Nov 22
Utility
Active speaker tracking using a global naming scheme
2 Jan 24
A method includes, at a media bridge configured to distribute a plurality of media streams among a plurality of client devices connected to the media bridge over a network, receiving the plurality of media streams from the plurality of client devices via the media bridge.
Jacques Samain, Giovanna Carofiglio, Giulio Grassi, Enrico Loparco, Michele Papalini
Filed: 14 May 21
Utility
Secure access App Connectors
2 Jan 24
Techniques for creating in/out App Connectors for secure access solutions without the need for STUN, TURN, and/or a long-lived control plane component.
Vincent E. Parla
Filed: 23 Feb 23
Utility
Application performance monitoring and management platform with anomalous flowlet resolution
2 Jan 24
An application and network analytics platform can capture telemetry from servers and network devices operating within a network.
Ashutosh Kulshreshtha, Omid Madani, Vimal Jeyakumar, Navindra Yadav, Ali Parandehgheibi, Andy Sloane, Kai Chang, Khawar Deen, Shih-Chun Chang, Hai Vu
Filed: 5 May 23
Utility
Automated activation of unsolicited probe responses
2 Jan 24
Automated activation of unsolicited probe responses may be provided.
Pooya Monajemi, Vishal Satyendra Desai, Jerome Henry
Filed: 2 Jul 21
Utility
Uplink bandwidth estimation over broadband cellular networks
2 Jan 24
Disclosed are methods, systems and non-transitory computer readable mediums for estimating bandwidth over packet data networks, for example, 5G networks.
Keith Neil Mark Dsouza, Shivaji Pundlik Diwane, Madhusudana Rao Kata, Sendilvadivu Ganesan, Divya Sudhakaran Pillai
Filed: 8 Sep 20
Utility
Network slice based billing
2 Jan 24
Techniques are described herein for network sliced based billing.
Amit Agarwal, Rajpal Bhoria, Praveen Joseph
Filed: 3 Nov 20
Utility
Media stream handover using wireless connected devices
2 Jan 24
A first connection is established between a meeting server and a first endpoint device associated with a user.
Prapanch Ramamoorthy, David John Zacks
Filed: 16 Mar 22
Utility
Dynamic frequency coordination in shared wireless communication environments
2 Jan 24
Various embodiments herein disclose coordinating frequencies for an access point (AP).
Matthew A. Silverman, Mahesh Daisy, Jerome Henry, Vishal S. Desai
Filed: 8 Sep 21
Utility
Surge protector
2 Jan 24
According to an embodiment, a surge protector includes a capacitor, a switch, and a first transistor.
Xiqun Zhu, Sung K. Baek
Filed: 20 Oct 21