Patent classifications
H04L41/024
THREAT MITIGATION SYSTEM AND METHOD
A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.
Technologies for dynamically managing resources in disaggregated accelerators
Technologies for dynamically managing resources in disaggregated accelerators include an accelerator. The accelerator includes acceleration circuitry with multiple logic portions, each capable of executing a different workload. Additionally, the accelerator includes communication circuitry to receive a workload to be executed by a logic portion of the accelerator and a dynamic resource allocation logic unit to identify a resource utilization threshold associated with one or more shared resources of the accelerator to be used by a logic portion in the execution of the workload, limit, as a function of the resource utilization threshold, the utilization of the one or more shared resources by the logic portion as the logic portion executes the workload, and subsequently adjust the resource utilization threshold as the workload is executed. Other embodiments are also described and claimed.
System and method for network management automation
Systems and methods are disclosed for providing visual network programming for network management automation. One exemplary method may include providing a GUI for automating network management tasks and receiving a plurality of graphical icons. Each graphical icon may be associated with one or more operations or functions. The method may also include associating the plurality of graphical icons with a device table for defining a device queue by storing information of at least one network device in the computer network and a device data table for storing information to be retrieved from the at least one network device defined in the device queue. The method may also include generating a network application based on the plurality of graphical icons and associated device table and device data table.
Securely sharing public and private blockchain data
A blockchain consortium network can be implemented in which nodes of one or more blockchains generate data for pipeline-based processing by a consortium pipeline system. The generated data can include private blockchain data, public blockchain data, and machine data, such as logs or operational metrics from the nodes. The data is collected from different network levels and can be transformed via pipeline processes of the consortium pipeline system to securely share data in the blockchain consortium network.
Device configuration method and apparatus that are based on network configuration protocol
A device configuration method, apparatus, and system based on Network Configuration Protocol (NETCONF), and belong to the field of communications technologies. The method includes establishing, by a network management device, a model of configuration data using a predefined Yet Another Next Generation (YANG) model, and sending the configuration data to a managed device based on NETCONF. The predefined YANG model includes n reference fields and one or more object fields separately corresponding to each reference field. Hence, resolves problems that when an extension field is added to a NETCONF message to indicate a target lower-level device of configuration data in the NETCONF message in a device cascading scenario, solution universality is relatively poor, configuration processing efficiency is relatively low, and a data storage processing procedure is relatively complex.
QUARANTINE FOR CLOUD-BASED SERVICES
A quarantine system could be disposed between an outer firewall and an inner firewall. The quarantine system may include persistent storage containing mappings between computing devices disposed within the inner firewall and data sources disposed outside the outer firewall. The quarantine system may include one or more processors configured to perform operations that include requesting and receiving, based on the mappings, a software-related update from a data source, the software-related update being targeted for deployment on the computing devices. The operations may also include assigning the software-related update for review by a group of one or more agents authorized to approve or reject the software-related update. The operations may also receiving an indication that the software-related update has been approved by the one or more agents and, responsive to receiving the indication, transmitting, based on the mappings, the software-related update to a recipient device within the inner firewall.
Web services for smart entity management for sensor systems
One or more non-transitory computer readable media contain program instructions that, when executed by one or more processors, cause the one or more processors to perform operations including generating a database of interconnected smart entities. The smart entities include sensor object entities representing each of the plurality of sensors and data entities representing measurements received from the sensors. The smart entities are interconnected by relational objects indicating relationships between the smart entities. The instructions cause the one or more processors to receive a new measurement from a first sensor, identify a first data entity from a relational object for the first sensor, the first data entity including a plurality of past measurements received from the first sensor, and modify the first data entity within the database of smart entities to include the new measurement received from the first sensor.
SERVICE MAP CONVERSION WITH PRESERVED HISTORICAL INFORMATION
A first type of service map may be converted to a second type of a service map by adding a conversion tag to a set of configuration items (CIs) presented by the service map. The conversion tag includes data that may be used to link historical information associated with the service map of the first type, such as information related to incidents, alerts, change requests, and other events, to the second type. A second service map may be generated using the conversion tags and/or tag-based filtering processes such that the second service map displays different CIs as compared to the first service map.
STRUCTURED DATA DISCOVERY AND CRYPTOGRAPHIC ANALYSIS
Structured Data Discovery and Cryptographic Analysis. In an embodiment, transport sessions are assembled from raw packets captured in network traffic. Data is extracted from two or more encapsulation layers of each transport session. In particular, each encapsulation layer may be classified into a protocol, and data may be extracted from the encapsulation layer based on the protocol. For example, cryptographic metadata may be extracted from a cryptographic encapsulation layer. The extracted data is incorporated into a data model of the network, which comprises tallies of traffic within the network, grouped according to a plurality of dimensions. Analytic model(s) may be applied to the data model to, for example, generate a data web of the network that represents structured data stores and data flows to and/or from the data stores within the network.
Web services for creation and maintenance of smart entities for connected devices
One or more non-transitory computer readable media containing program instructions that, when executed by one or more processors, cause the one or more processors to perform operations: generating a database of interconnected smart entities, the smart entities including object entities representing each of the plurality of physical devices and data entities representing data generated by the devices, the smart entities being interconnected by relational objects indicating relationships between the object entities and the data entities; receiving data from a first device of the plurality of physical devices; determining a second device from a relational object for the first device based on the received data; and modifying a data entity connected to an object entity of the second device within the database of smart entities based on the received data for the first device.