Cisco technology, inc. (20240303336). DYNAMIC SECURITY FOR FABRIC NETWORKS simplified abstract

From WikiPatents
Jump to navigation Jump to search

DYNAMIC SECURITY FOR FABRIC NETWORKS

Organization Name

cisco technology, inc.

Inventor(s)

Deepthi Tammireddy of Dublin CA (US)

Shilpa Avinash Sodani of Dublin CA (US)

Vishnuprasad Raghavan of Sammamish WA (US)

Hongqing Li of Sunnyvale CA (US)

DYNAMIC SECURITY FOR FABRIC NETWORKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240303336 titled 'DYNAMIC SECURITY FOR FABRIC NETWORKS

The abstract of the patent application describes a method of protecting networks by detecting compromised computing devices associated with security events and extracting their context to be propagated to a controller. The method involves fetching user identity from an Identity Services Engine (ISE) and provisioning the controller with a dynamic list and data policy matching the dynamic list, which are then advertised to the sites within the network.

  • Detect compromised computing devices associated with security events
  • Extract context of compromised devices and propagate to a controller
  • Fetch user identity from an Identity Services Engine (ISE)
  • Provision controller with dynamic list and data policy matching the list
  • Advertise dynamic list and data policy to sites within the network

Potential Applications: - Network security - Intrusion detection and prevention - User identity management

Problems Solved: - Enhancing network security by detecting compromised devices - Streamlining user identity provisioning and policy enforcement

Benefits: - Improved network security - Efficient user identity management - Enhanced policy enforcement

Commercial Applications: Title: "Dynamic Network Security Solution" This technology can be used in various industries such as cybersecurity firms, IT departments of companies, and network service providers to enhance network security and streamline user identity management processes.

Questions about the technology: 1. How does this method improve network security compared to traditional approaches? 2. What are the potential challenges in implementing this technology in large-scale networks?

Frequently Updated Research: Stay updated on the latest advancements in network security, intrusion detection, and user identity management to ensure the effectiveness of this technology in evolving threat landscapes.


Original Abstract Submitted

a method of protecting networks may include detecting a compromised computing device associated with a security event generated by a unified security policy from a plurality of sites within a network. a context of the compromised computing device may be extracted. the context may be propagated to a controller. the method may further include fetching from an identity services engine (ise), user identity associated with the compromised computing device, and provisioning the controller with a dynamic list and a data policy matching the dynamic list. the method may also include advertising the dynamic list and the data policy to at least one of the plurality of sites.