H04L47/82

SYSTEMS AND METHODS FOR CONFIGURING A NETWORK FUNCTION PROXY FOR SECURE COMMUNICATION

A device may determine that a network function of a network is to use a secure communication protocol. The network function may be configured to facilitate communication via the network. The device may identify a component of a resource configuration that is to instantiate the network function. The device may instantiate, using the component, a proxy for the network function. The device may configure the proxy to obtain a certificate that is associated with the secure communication protocol. The device may cause the proxy to use the certificate to communicate with another proxy that is associated with the network function to perform an operation associated with the network function.

EXPEDITED AUTHORIZATION AND CONNECTIVITY OF CLIENT DEVICES
20230129776 · 2023-04-27 ·

Systems and methods are provided for authentication and authorizing a client device on a network. First, one or more packets are received from a computing entity indicating an authentication request from a client device requesting connection at a network. Next, identification information of the client device are extracted from a body of the packets. Credentials of the client device are verified based on the identification information. In response to verifying the credentials, a level of access of the client device at the network is determined. Based on the level of access, a VLAN is assigned to the client device. The systems concurrently transmit, in a single packet, to the computing entity, an indication of approval of the credentials and the assigned VLAN, wherein the computing entity provisions the assigned VLAN to the client device following an allocation of an IP address corresponding to the assigned VLAN to the client device.

Orchestrating apparatus, VNFM apparatus, managing method and program
11637789 · 2023-04-25 · ·

An orchestrating apparatus, comprising: a receiving part that receives virtual resource information attached to a VNF (Virtualized Network Function) from a VNFM (Virtualized Network Function Manager) that generated the VNF; a storage part that stores the virtual resource information in correspondence with the VNF; and a synchronizing part that transmits the virtual resource information corresponding to a designated VNF to a VNFM that has lost correspondence between the VNF and the virtual resource information, and causes the VNFM to restore the virtual resource information assigned to the VNF.

Intent-based orchestration using network parsimony trees

Novel tools and techniques are provided for implementing intent-based orchestration using network parsimony trees. In various embodiments, in response to receiving a request for network services that comprises desired characteristics and performance parameters for the requested network services without information regarding specific hardware, hardware type, location, or network, a computing system might generate a request-based parsimony tree based on the desired characteristics and performance parameters. The computing system might access, from a datastore, a plurality of network-based parsimony trees that are each generated based on measured network metrics, might compare the request-based parsimony tree with each of one or more network-based parsimony trees to determine a fitness score for each network-based parsimony tree, and might identify a best-fit network-based parsimony tree based on the fitness scores. The computing system might identify and might allocate network resources based on the identified best-fit network-based parsimony tree, for providing the requested network services.

Methods and apparatus for establishing network presence
11601381 · 2023-03-07 · ·

Methods and apparatus for establishing network presence. In an embodiment, a method is provided for determining a presence score. The method includes capturing an image of a QR code displayed on a secondary device, capturing a sound clip of a sound signal reproduced on the secondary device, and transmitting the image and the sound clip to a server. The method also includes receiving a presence score determined from at least one of a comparison of the QR code to the image and a comparison of the sound signal to the sound clip.

SCALABLE AND ON-DEMAND MULTI-TENANT AND MULTI REGION SECURE NETWORK
20230064092 · 2023-03-02 · ·

Provided herein are systems and methods for configuring a segmented cloud based network based on separate Internet Protocol (IP) segments, comprising receiving instructions to create one or more additional private virtual networks as respective additional segments in a multi-tenant multi-regional cloud based network segmented to a plurality of segments each mapped by a respective IP address range, calculating one or more non-conflicting new IP address range based on analysis of the IP address range of each of the segments, allocating a respective new IP address range to each additional segment, and deploying automatically one or more gateways. The gateways are configured to connect one or more client devices to the additional segment(s) by assigning each client device an IP address in the respective new IP address range and routing network packets between the client devices and the respective additional segment according to mapping of the respective new IP address range.

RECONFIGURABLE COMPUTING PODS USING OPTICAL NETWORKS
20230161638 · 2023-05-25 ·

Methods, systems, and apparatus, including an apparatus for generating clusters of building blocks of compute nodes using an optical network. In one aspect, a method includes receiving request data specifying requested compute nodes for a computing workload. The request data specifies a target n-dimensional arrangement of the compute nodes. A selection is made, from a superpod that includes a set of building blocks that each include an m-dimensional arrangement of compute nodes, a subset of the building blocks that, when combined, match the target n-dimensional arrangement specified by the request data. The set of building blocks are connected to an optical network that includes one or more optical circuit switches. A workload cluster of compute nodes that includes the subset of the building blocks is generated. The generating includes configuring, for each dimension of the workload cluster, respective routing data for the one or more optical circuit switches.

METHOD FOR ALLOCATING RESOURCE FOR STORING VISUALIZATION INFORMATION, APPARATUS, AND SYSTEM
20230112747 · 2023-04-13 · ·

A method for allocating a resource for storing visualization information, an apparatus, and a system are provided. The method includes: a first network device determines a first queue based on a constraint condition, where the first queue is a queue that needs to be visualized. Then, the first network device allocates a first storage resource to the first queue, where the first storage resource is used to store visualization information of the first queue, and the visualization information is information used to visualize the first queue. Therefore, occupation of storage resources in the first network device is reduced.

Equipment onboarding and deployment security system

A system that provides for management of resource interaction equipment fulfillment via a gateway apparatus that uses Application Programming Interface (API) services to connect and integrate with the various systems deployed by the equipment providers, such that, all data communication between the managing entity and the equipment providers is orchestrated through the gateway apparatus to track the occurrence of events associated with resource interaction equipment fulfillment. Additionally, a distributed trust computing network is implemented in which each of the equipment providers serve as a decentralized node in the distributed trust computing network capable of converging on a data block to verify the validity of the equipment fulfillment process event stored in the block.

Generating and deploying security policies for microsegmentation

Systems and methods include receiving network communication information about hosts in a network and applications executed on the hosts; automatically generating one or more microsegments in the network based on analysis of the obtained network communication information, wherein each microsegment of the one or more microsegments is a grouping of resources including the hosts and the applications executed on the hosts that have rules for network communication; and providing the one or more microsegments to one or more hosts of the hosts, for use by the one or more hosts to allow or block communications locally based on the one or more microsegments. Each of the one or more microsegments can be a grouping of workloads inside a data center.