H04L2463/082

AUTHENTICATION SCHEME IN A VIRTUAL PRIVATE NETWORK

A method including receiving, by a first server from a second server, an encrypted authentication packet to enable the first server and the second server to conduct an authentication process, the encrypted authentication packet including a crypted code field indicating a type associated with the encrypted authentication packet and a crypted payload including one or more encrypted fields; and transmitting, by the first server to the second server, a response based at least in part on determining the type associated with the encrypted authentication packet and on decrypting the one or more encrypted fields. Various other aspects are contemplated.

AUTHENTICATION SCHEME IN A VIRTUAL PRIVATE NETWORK

A method including configuring a first server to determine an encrypted authentication packet, the configuring including, configuring the first server to determine a crypted code field to indicate a type associated with the encryption authentication packet and that at least a portion of the encryption authentication packet is encrypted, and configuring the first server to determine a crypted payload based at least in part on encrypting one or more fields of an initial authentication packet; and configuring the first server to transmit, to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.

EXECUTABLE POLICY DECLARATIONS FOR NETWORK SECURITY

A policy created through an administrative user interface is converted into an intermediate representation that can be compiled for execution by a gateway or converted into a human-readable form for modifications by the administrator.

SOFTWARE ROLLBACK OF CLUSTER OF NETWORK DEVICES

In a cluster of network devices using a consensus protocol for cluster synchronization, a full software rollback is performed by backing up a cluster state on a primary instance for the cluster, and then restarting all devices at the same time from a prior partition. The primary instance can then start a cluster management service and other devices can join the cluster using the consensus state stored by the primary instance.

UPDATING A CLUSTER OF NODES IN A NETWORK APPLIANCE

An administrator can initiate an automatic software update to a network appliance that is configured as a cluster of nodes. The update is performed sequentially on a node-by-node basis in order to maintain availability and performance of the network appliance during the update.

EXTENDING EXPIRATION OF USER SESSIONS WITH AUTHENTICATION REFRESH

A gateway performs silent authentication refreshes with an identity management platform in order to extend the expiration of a cookie provided to an endpoint that accesses network applications through the gateway.

NETWORK CONFIGURATION UPDATE
20230119503 · 2023-04-20 ·

A cluster of nodes are sequentially updated with new network configuration settings in order to maintain availability of the cluster during the update. In the sequential update, each node conditionally updates network configuration settings, tests connectivity, and retains an update to the configuration only if the node is able to restore connectivity suitable for operation in the cluster.

Threat response using event vectors

A security platform uses a sensor-event-analysis-response methodology to iteratively adapt to a changing security environment by continuously creating and updating entity models based on observed activities and detecting patterns of events that deviate from these entity models.

PARTNER INTEGRATION NETWORK

Systems and methods are provided for a media provider to allow a user to access media objects with a third-party partner that authenticates the user and authorizes the user to access certain media objects. The media provider offers access to media objects, such as video content or audio content. The partner, through a relationship with the media provider, similarly offers access to the media provider's media objects, for example, as a service or benefit to the partner's customers or users. In particular, a partner integration server mediates user authentication and authorization by the partner. The partner integration server also allows the media provider to easily and flexibly to add and integrate additional partners.

Login Method and System Based on Cloud Application Instance, and Related Device
20230054057 · 2023-02-23 ·

A login method and system based on a cloud application instance, and a related device are provided. The method includes the following steps: A cloud application instance sends a login request for an application service node to a terminal device, such that after obtaining a login password input by a user, the terminal device sends a verification request carrying the login password and a device identity of the cloud application instance to an account management node. The account management node may verify the login password, and send verification success information to the cloud application instance. The cloud application instance logs in to the application service node based on the verification success information using.