18156869. SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION simplified abstract (Verizon Patent and Licensing Inc.)

From WikiPatents
Revision as of 04:44, 26 July 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION

Organization Name

Verizon Patent and Licensing Inc.

Inventor(s)

Deepak Majjiga of Tirupati West (IN)

Neeraj Bhatt of Vienna VA (US)

SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18156869 titled 'SYSTEMS AND METHODS FOR NETWORK SECURITY CONFLICT RESOLUTION

Simplified Explanation: The patent application describes a design function that receives security policy indications and generates network slices to simulate traffic flow, detecting conflicts to create a security template for resolution.

Key Features and Innovation:

  • Design function receives security policy indications
  • Identifies network slices with network functions
  • Generates graphs to simulate traffic flow
  • Detects conflicts and creates security template
  • Resolves conflicts in network design

Potential Applications: This technology could be applied in telecommunications, network security, and software development industries.

Problems Solved: This technology addresses conflicts in network design, enhancing security and efficiency in traffic flow simulations.

Benefits:

  • Improved network security
  • Enhanced traffic flow simulations
  • Efficient conflict resolution
  • Streamlined network design process

Commercial Applications: The technology could be used in network security software, telecommunications infrastructure development, and network design consulting services.

Prior Art: Potential areas to search for prior art include network design software, traffic flow simulation tools, and security policy implementation in network architecture.

Frequently Updated Research: Stay updated on advancements in network security, traffic flow simulation, and conflict resolution in network design.

Questions about Network Slices: 1. How does the design function identify network slices based on security policy indications? 2. What are the potential implications of using network slices in network design and security protocols?

By following these guidelines, you can create a comprehensive, informative, and SEO-optimized article on the technology described in the patent application.


Original Abstract Submitted

In some implementations, a design function may receive a corresponding set of security policy indications. The design function may identify a plurality of network slices, each network slice including at least a subset of the set of network functions. The design function may generate at least one graph representing the plurality of network slices and may simulate, using the at least one graph, traffic through the plurality of network slices. Accordingly, the design function may determine a security template based on at least one conflict detected based on the simulating and may transmit the security template for resolving the at least one conflict.