Patent application number | Description | Published |
20100017510 | MULTI-LAYERED MEASUREMENT MODEL FOR DATA COLLECTION AND METHOD FOR DATA COLLECTION USING SAME - A method and system are described for collecting information from a device in a network at a collection interval. According to an exemplary embodiment, a method for collecting the information includes determining data needed from the device at the collection interval to evaluate the information. A measurement request is defined for collecting the data from the device at the collection interval. The measurement request is merged with other measurement requests for collecting the data from the device at the collection interval into a single merged measurement request at the collection interval. The measurement request is also merged with other measurement requests for collecting the data from the device at different collection intervals having a common integral divisor into a single merged measurement request at a highest of the different collection intervals. | 01-21-2010 |
20100189010 | NETWORK EDGE SWITCH CONFIGURATION BASED ON CONNECTION PROFILE - Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The network attributes for the assigned connection are sent to an edge switch for the source to configure the edge switch to accept traffic for the source. | 07-29-2010 |
20100191852 | SOURCE CONFIGURATION BASED ON CONNECTION PROFILE - Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes and server attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The source is authenticated using a credential, and server attributes from the connection profile are sent to the source to configure the source to use the connection. | 07-29-2010 |
20100192075 | NETWORK CONNECTION MANAGEMENT USING CONNECTION PROFILES - Connections for sources to connect to a network are managed by storing connection profiles identifying network attributes for the connections. Each connection profile includes a status of available or subscribed. Requests for connections are received. If a stored connection profile is available that matches the request, the connection for the matching connection profile is assigned to the source. | 07-29-2010 |
20120117218 | NETWORK CONNECTION MANAGEMENT USING CONNECTION PROFILES - Connections for sources to connect to a network are managed by storing connection profiles identifying network attributes for the connections. Each connection profile includes a status of available or subscribed. Requests for connections are received. If a stored connection profile is available that matches the request, the connection for the matching connection profile is assigned to the source. | 05-10-2012 |
20130028136 | NETWORK EDGE SWITCH CONFIGURATION BASED ON CONNECTION PROFILE - Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The network attributes for the assigned connection are sent to an edge switch for the source to configure the edge switch to accept traffic for the source. | 01-31-2013 |
20130031227 | TRANSMISSION OF CONFIGURATION TO A DEVICE FOR PROVISIONING IN A NETWORK - A method is provided that includes receiving a communication from a trusted device indicating that a device to be provisioned has been added to the network; obtaining identifying information of the device to be provisioned; accessing a stored configuration for the device based on the identifying information; and transmitting the configuration to the device for provisioning. Alternatively, a computer-readable medium is provided that stores instructions to perform a method to transmit a discovery communication to a trusted device, receive a communication originating at an administrative device including a configuration; and provision the device via reboot with the configuration. Alternatively, an apparatus is provided including a table of provisioning configurations, the table including a configuration for a device to be provisioned in a network and a provisioning module to retrieve the configuration of the device stored in the table of provisioning configurations based on identifying information received from a discovery communication. | 01-31-2013 |
20130111008 | NETWORK SERVICE MONITORING AT EDGE NETWORK DEVICE | 05-02-2013 |
20130191901 | SECURITY ACTIONS BASED ON CLIENT IDENTITY DATABASES - Example embodiments disclosed herein relate to authentication based on Media Access Control (MAC) addresses. A network security device receives one or more client identity databases from one or more edge network devices. The client identity databases include MAC addresses of clients and secondary identification information for each of the clients. The network security device determines that a client device has been connected to one of the edge devices. A security action is performed based on whether the MAC address and respective secondary identification information of one of the clients matches the MAC address and respective secondary identification information of the connected client device. | 07-25-2013 |
20140068252 | PUBLIC KEY GENERATION UTILIZING MEDIA ACCESS CONTROL ADDRESS - In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted. | 03-06-2014 |
20140165162 | MANAGING ACCESS TO A NETWORK - In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified. | 06-12-2014 |
20140355523 | INITIALIZING NETWORK ADVERTISEMENTS FROM PROBE REQUESTS - A probe request from a wireless station can cause the access point to contact a roaming enablement service and alter the services accessible through the access point. The roaming enablement service can identify preferred services of the wireless station and mediate automated negotiations between the access point and a service provider to determine whether the access point may provide a service from the service provider. Upon successful negotiations, the brokerage service can enable the access point to provide access to the preferred services. | 12-04-2014 |
20140359763 | Determination of Spoofing of a Unique Machine Identifier - In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed. | 12-04-2014 |