Patent classifications
H04L2101/00
Providing network efficiencies in forwarding packets among provider networks and applying segment routing policies
In one embodiment, a third-party client network access device sends Internet Protocol (IP) encapsulating packets with a predetermined destination address of a node of the network client service provider (NCSP), with these IP encapsulating packets encapsulating original data packets. These IP encapsulating packets are communicated through the ISP network being used by the NCSP in providing its network services. The predetermined destination address, which is typically also a segment identifier, causes network service processing (e.g., according to a corresponding segment routing function) of the received packet by the node of the NCSP. This processing typically includes creating a segment routing packet encapsulating the original packet (extracted from the received IP encapsulating packet) with its segment list(s) being populated with segment identifier(s) according to a current NCSP segment routing policy reflective of a sequence of forwarding and service chaining operations of the NCSP service offering.
Learning of tunnel endpoint selections
Some embodiments provide a method for a managed forwarding element (MFE). At the MFE, the method receives a first packet from a particular tunnel endpoint. The first packet originates from a particular data compute node associated with multiple tunnel endpoints including the particular tunnel endpoint. Based on the first packet, the method stores an association of the particular tunnel endpoint with the particular data compute node. The method uses the stored association to encapsulate subsequent packets received at the MFE and having the particular data compute node as a destination address with the particular tunnel endpoint as a destination tunnel endpoint.
Load Balancing and Session Persistence in Packet Networks
A node may generate a data packet comprising an Internet Protocol (IP) header and a destination options extension header (DOEH). The DOEH may comprise one or more data fields and an IP payload. The node may send the data packet to another node in a data network.
Anomaly detection based on information technology environment topology
Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges. The entity relationship graph can then be monitored to detect anomalous activity.
SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD
The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.
Systems and methods for updating multiple value data structures using a single electronic activity
The present disclosure relates to systems and methods for updating multiple value data structures using a single electronic activity. Exemplary embodiments may include hardware processors configured by machine-readable instructions to access electronic activities transmitted or received via electronic accounts associated with data source providers; to maintain and update node profiles; to determine a first activity field-value pair and a second activity field-value pair associated with a participant of the first electronic activity; to identify a first node profile of the node profiles that includes a first node field-value pair that matches the first activity field-value pair; to update a first value data structure corresponding to a first value included in the first node field-value pair by adding a first entry to the first value data structure identifying the first electronic activity; and to update a second value data structure corresponding to a second value.
Systems and methods for matching electronic activities to record objects using feedback based match policies
Systems and methods for matching electronic activities to record objects using feedback based match policies can include accessing a plurality of electronic activities and record objects. The systems and method can include identifying candidate record objects by applying a matching model. The systems and methods can include selecting a record object based on a match score. The systems and methods can include configuring the matching model in a first configuration responsive to a first feedback type or configuring the matching model in a second configuration responsive to a second feedback type.
Systems and methods for auto discovery of filters and processing electronic activities using the same
The present disclosure relates to systems and methods for filtering electronic activities. Exemplary implementations may include ingesting a first electronic activity; identifying an associated entity; and selecting a first filtering model based on the entity, the first filtering model trained to indicate whether to restrict further processing of ingested electronic activities. The method may further include generating a plurality of structured data tags for the first electronic activity; applying the selected first filtering model to the plurality of structured data tags for the first electronic activity to determine whether the first electronic activity satisfies a first restriction condition; and responsive to the first electronic activity satisfying the first restriction condition, restricting the first electronic activity from further processing; or responsive to the first electronic activity not satisfying the first restriction condition, further processing, by the one or more processors, the first electronic activity.
Systems and methods for node deduplication based on a node merging policy
The present disclosure relates to node deduplication based on a node merging policy. A plurality of node profiles may be maintained. Each node profile may include plurality of fields. Each field of the plurality of fields may include one or more values. For a node profile including one or more field-value pairs, each field-value pair may be identified. Each field-value pair may include a value of a field. A respective weight may be assigned to each field-value pair based on a number of field-value pairs or a confidence score. Based on the respective weights assigned to each field-value pair, it may be determined that node profiles satisfy a node profile merging policy. The node profiles may be merged based on the node profiles satisfying the node profile merging policy. Field-value pairs including a value of a field may be identified.
SYSTEMS AND METHODS FOR RESTRICTING GENERATION AND DELIVERY OF INSIGHTS TO SECOND DATA SOURCE PROVIDERS
The present disclosure relates to restricting generation and delivery of insights to data source providers. Electronic activities and record objects may be accessed. Each record object may correspond to a record object type and have one or more object field-value pairs. Node profiles may be maintained. Updates to a node graph or corresponding to a record object may be detected. A number of data source providers having respective electronic activities or record objects from which the update to the node graph or corresponding to the record object can be determined. Provisioning of a content item to a second data source provider may be restricted.