Patent classifications
H04L41/0286
RETRIEVING AND PROVISIONING ENTITIES BASED ON INHERITANCE
Systems and methods are provided for deriving, based on a service for which an entity is to be selected or provisioned, a query to determine, from candidate nodes, one or more node instances within a topology that fulfill one or more criteria provided by one or more classes; and an additional criterion. The candidate nodes represent respective entities. The evaluation of the query includes determining the classes that satisfy or fulfill the one or more criteria, determining one or more second classes that match, or inherit from, the one or more classes, partially evaluating the additional criterion within respective contexts of the candidate nodes and each of the one or more second classes, based on the partial evaluation, processing the query to determine the node instances, and provisioning or presenting an entity represented by a node instance of the node instances to the service.
IPSEC Acceleration Method, Apparatus, and System
An Internet Protocol Security (IPSec) acceleration method, an apparatus, and a system, where the method includes generating, by an Internet Key Exchange (IKE) device, an IKE link establishment session packet according to an IPSec configuration parameter and a security policy in a security policy database (SPD), sending, by the IKE device, the IKE link establishment session packet to a peer device, establishing a security association (SA) with the peer device, and sending, by the IKE module, the SA to a data forwarding device. The IKE device and the data forwarding device are discrete devices. In this way, the IKE device and the data forwarding device can be deployed in different devices in order to increase the IPSec speed.
Cascade-based classification of network devices using multi-scale bags of network words
In one embodiment, a device classification service uses feature vectors that represent how frequently one or more traffic features were observed in a network during different time windows to train a cascade of machine learning classifiers to label one or more devices in the network with a device type. The service receives traffic features of traffic associated with a particular device in the network, and then uses the cascade of machine learning classifiers to assign a device type label to the particular device based on the traffic features of the traffic associated with the particular device. The service initiates enforcement of a network policy regarding the device based on its device type based on the device type label assigned to the particular device.
IPSec acceleration method, apparatus, and system
An Internet Protocol Security (IPsec) acceleration method includes generating, by an Internet Key Exchange (IKE) device, an IKE link establishment session packet according to an IPSec configuration parameter and a security policy in a security policy database (SPD), sending, by the IKE device, the IKE link establishment session packet to a peer device, establishing a security association (SA) with the peer device, and sending, by the IKE module, the SA to a data forwarding device, where the IKE device and the data forwarding device are discrete devices.
INFORMATION PROCESSING SYSTEM, IMAGE FORMING APPARATUS AND METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
An information processing system including an image forming apparatus provided with an output function for outputting operating information to a management server and an information processing apparatus capable of operating as a proxy of the output function is provide. The image forming apparatus provides a predetermined web service, and accepts a request for setting the proxy of the output function via the predetermined web service. The information processing apparatus transmits a request for setting a proxy for making use of the information processing apparatus as a proxy for the output function to the image forming apparatus providing the predetermined web service among apparatuses on a network.
Retrieving and provisioning entities based on inheritance
Systems and methods are provided for deriving, based on a service for which an entity is to be selected or provisioned, a query to determine, from candidate nodes, one or more node instances within a topology that fulfill one or more criteria provided by one or more classes; and an additional criterion. The candidate nodes represent respective entities. The evaluation of the query includes determining the classes that satisfy or fulfill the one or more criteria, determining one or more second classes that match, or inherit from, the one or more classes, partially evaluating the additional criterion within respective contexts of the candidate nodes and each of the one or more second classes, based on the partial evaluation, processing the query to determine the node instances, and provisioning or presenting an entity represented by a node instance of the node instances to the service.
Method and apparatus for outputting information
Embodiments of the present disclosure provide a method and apparatus for outputting information. The method includes: summarizing event information into an event database in response to receiving the event information, where the event information includes an event start time, an event end time, a machine name, and an event content; associating and storing event information of a same machine name; querying an event database for event information including a target machine name and an event end time greater than or equal to a predetermined time before a current time and an event start time less than or equal to the current time, in response to receiving a query request including the target machine name; and outputting queried event information.
IPSEC Acceleration Method, Apparatus, and System
An Internet Protocol Security (IPsec) acceleration method includes generating, by an Internet Key Exchange (IKE) device, an IKE link establishment session packet according to an IPSec configuration parameter and a security policy in a security policy database (SPD), sending, by the IKE device, the IKE link establishment session packet to a peer device, establishing a security association (SA) with the peer device, and sending, by the IKE module, the SA to a data forwarding device, where the IKE device and the data forwarding device are discrete devices.
CASCADE-BASED CLASSIFICATION OF NETWORK DEVICES USING MULTI-SCALE BAGS OF NETWORK WORDS
In one embodiment, a device classification service uses feature vectors that represent how frequently one or more traffic features were observed in a network during different time windows to train a cascade of machine learning classifiers to label one or more devices in the network with a device type. The service receives traffic features of traffic associated with a particular device in the network, and then uses the cascade of machine learning classifiers to assign a device type label to the particular device based on the traffic features of the traffic associated with the particular device. The service initiates enforcement of a network policy regarding the device based on its device type based on the device type label assigned to the particular device.
Migrating a monolithic software application to a microservices architecture
A network-based services may be supported by a single, monolithic application that is responsible for responding to many different types of requests. The monolithic application may be replaced with multiple microservices that correspond respectively to multiple operations supported by the monolithic application. Each microservice is designed to honor the same application programming interface (API) contract that the monolithic application uses for the corresponding operation. Migration to a microservices-based architecture can be performed gradually, over time, by appropriately configuring a number of API gateways to redirect certain requests, for certain operations, to appropriate microservices. For each operation and corresponding microservice, the number of APIs configured in this manner can be increased until all requests for the operation are being directed to a corresponding microservice. In addition, microservices corresponding to different operations can be introduced over time, again by appropriate configuration of the API gateways.