18156869. SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION simplified abstract (Verizon Patent and Licensing Inc.)
Contents
SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION
Organization Name
Verizon Patent and Licensing Inc.
Inventor(s)
Deepak Majjiga of Tirupati West (IN)
Neeraj Bhatt of Vienna VA (US)
SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18156869 titled 'SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION
Simplified Explanation: The patent application describes a design function that receives security policy indications and generates network slices to simulate traffic flow, detecting conflicts to create a security template for resolution.
Key Features and Innovation:
- Design function receives security policy indications
- Identifies network slices with network functions
- Generates graphs to simulate traffic flow
- Detects conflicts and creates security template
- Resolves conflicts in network design
Potential Applications: This technology could be applied in telecommunications, network security, and software development industries.
Problems Solved: This technology addresses conflicts in network design, enhancing security and efficiency in traffic flow simulations.
Benefits:
- Improved network security
- Enhanced traffic flow simulations
- Efficient conflict resolution
- Streamlined network design process
Commercial Applications: The technology could be used in network security software, telecommunications infrastructure development, and network design consulting services.
Prior Art: Potential areas to search for prior art include network design software, traffic flow simulation tools, and security policy implementation in network architecture.
Frequently Updated Research: Stay updated on advancements in network security, traffic flow simulation, and conflict resolution in network design.
Questions about Network Slices: 1. How does the design function identify network slices based on security policy indications? 2. What are the potential implications of using network slices in network design and security protocols?
By following these guidelines, you can create a comprehensive, informative, and SEO-optimized article on the technology described in the patent application.
Original Abstract Submitted
In some implementations, a design function may receive a corresponding set of security policy indications. The design function may identify a plurality of network slices, each network slice including at least a subset of the set of network functions. The design function may generate at least one graph representing the plurality of network slices and may simulate, using the at least one graph, traffic through the plurality of network slices. Accordingly, the design function may determine a security template based on at least one conflict detected based on the simulating and may transmit the security template for resolving the at least one conflict.