Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Juniper Networks Inc
Juniper Networks Inc_20100107
Juniper Networks Inc_20100121
Juniper Networks Inc_20100128
Juniper Networks Inc_20131212

Juniper Networks Inc patents


Recent patent applications related to Juniper Networks Inc. Juniper Networks Inc is listed as an Agent/Assignee. Note: Juniper Networks Inc may have other listings under different names/spellings. We're not affiliated with Juniper Networks Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "J" | Juniper Networks Inc-related inventors


Communicating igmp leave requests between load-balanced, multi-homed provider-edge routers in an ethernet virtual private network

In general, the disclosure describes techniques for communicating multicast group leave requests between two or more load-balanced, multi-homed PE routers included in an Ethernet Virtual Private Network (EVPN). The techniques of the disclosure enable the two or more PE routers to synchronize IGMP state and routing information amongst one another... Juniper Networks Inc

Adaptive load balancing for single active redundancy using evpn designated forwarder election

A provider edge (PE) device may receive an indication to perform a designated forwarder (DF) election associated with a network segment that includes the PE device, one or more other PE devices, and a client edge (CE) device. The PE device, the one or more other PE devices, and the... Juniper Networks Inc

Filtering data using malicious reference information

A device may receive data from a first endpoint device. The device may identify a network protocol. The network protocol may be associated with receiving the data. The device may identify a format. The format may be associated with encoding textual information in the data. The device may determine, based... Juniper Networks Inc

Method, system, and reducing the size of route updates

The disclosed method may include (1) establishing a communication session between a plurality of network nodes to enable the plurality of network nodes to exchange route updates with one another, and then during the communication session, (2) detecting, at one of the network nodes, at least one route update to... Juniper Networks Inc

Monitoring packet residence time and correlating packet residence time to input sources

An output circuit, included in a device, may determine counter information associated with a packet provided via an output queue managed by the output circuit. The output circuit may determine that a latency event, associated with the output queue, has occurred. The output circuit may provide the counter information and... Juniper Networks Inc

Automatically detecting an error in a communication and automatically determining a source of the error

A device may monitor a communication between network devices for an error associated with the communication. The device may detect the error associated with the communication between the network devices. The device may perform a comparison of an error metric and a threshold error metric. The error metric may be... Juniper Networks Inc

Auto discovery and auto scaling of services in software-defined network environment

Techniques are described for automatic discovery of two or more virtual service instances configured to apply a given service to a packet in a software-defined networking (SDN)/network functions virtualization (NFV) environment. Virtual service instances may be deployed as virtual entities hosted on one or more physical devices to offer individual... Juniper Networks Inc

Remotely updating routing tables

A network device may receive an instruction to update a data structure implemented by the network device and update the data structure based on receiving the instruction. The data structure may include a routing instruction to direct the network device to provide a data flow to a server device for... Juniper Networks Inc

Processing data flows based on information provided via beacons

A first component of a network device may provide an offload request to a second component of the network device to offload a data flow from the first component. The offload request may direct the second component to provide the data flow towards a destination device and bypass the first... Juniper Networks Inc

Bandwidth management for resource reservation protocol lsps and non-resource reservation protocol lsps

In general, techniques described are for bandwidth sharing between resource reservation protocol label switched paths (LSPs) and non-resource reservation protocol LSPs. For example, in networks where resource reservation protocol LSPs and non-resource reservation protocol LSPs co-exist within the same domain, resource reservation protocol LSPs and non-resource reservation protocol LSPs may... Juniper Networks Inc

Disaggregated broadband network gateway functionality for efficient content delivery network peering

A first device may receive information that assigns a function related to network traffic associated with a content delivery network. The first device may implement the function based on the information that assigns the function. The first device may receive the network traffic from the content delivery network and may... Juniper Networks Inc

Generating automatic bandwidth adjustment policies per label-switched path

A device may identify a plurality of first values associated with network traffic of a label-switched path of a plurality of label-switched paths. The device may determine an adjustment policy based on the plurality of first values. The adjustment policy may include one or more factors associated with a plurality... Juniper Networks Inc

Layer 3 convergence for evpn link failure

A network device is configured to provide, via an Ethernet segment with a customer network, active-active multi-homing L2 virtual bridge connectivity to the customer network using an EVPN instance (EVI) and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVI; to receive, from... Juniper Networks Inc

Selective verification of signatures by network nodes

A network node may include one or more processors. The one or more processors may receive a message that is associated with one or more signatures and one or more second signatures. The one or more signatures may have been validated by a particular node. The one or more processors... Juniper Networks Inc

Malware detection using internal and/or external malware detection operations

A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The system may perform the internal operation by modifying an environment, executing on a particular device, to form a modified environment. The system may perform the... Juniper Networks Inc

Mechanism to provide physical location information to any network device

An apparatus may be configured to be mounted on a rack. The apparatus may include a communication component. The communication component may be used for communicating with a network device when the network device is mounted on the rack. The apparatus may include a storage device. The storage device may... Juniper Networks Inc

Signaling ip address mobility in ethernet virtual private networks

In some examples, a provider edge device provides L2 virtual bridge connectivity for at least one customer network using an EVPN instance and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVPN instance; the provider edge device obtains an indication of a new... Juniper Networks Inc

Master/slave negotiation associated with a synchronous ethernet network

A device may determine a link master/slave relationship for an Ethernet link associated with a connection between a component of the device and a component of another device. The device may determine that Synchronous Ethernet (SyncE) is to be enabled on the Ethernet link. The device may identify the component... Juniper Networks Inc

Extended ping protocol for determining status for remote interfaces without requiring network reachability

An extend ping protocol is described that allow connectivity tests to be performed for individual network interfaces of a target device without requiring network reachability between the testing device and the remote interface whose status is being queried. Moreover, the extend ping protocol supports a plurality of different probe types... Juniper Networks Inc

Scaled inter-domain metrics for link state protocols

In general, techniques are described by which to provide a scaled end-to-end view of link metrics to integrate multiple non-uniform Interior Gateway Protocol (“IGP”) domains. For example, an Accumulated Interior Gateway Protocol (“AIGP”) attribute, a non-transitive BGP attribute, which includes a link metric assigned to a link within a first... Juniper Networks Inc

Service chaining within computer networks

Techniques are described for providing session-aware, stateful network services to subscriber packet flows. Devices within a service provider network direct subscriber packets along service chains. Each tunnel is established to direct traffic according a particular ordered set of network services for the corresponding service chain. An ingress device for the... Juniper Networks Inc

Preserving mobile network session data during radio access technology handover

An example gateway device determines that a first policy, applicable to a subscriber device when the subscriber device is coupled to a first access network, indicates that packets from the subscriber device are to be sent to a service device, and forwards a first set of packets from the subscriber... Juniper Networks Inc

Dissipating heat from an active region of an optical device

A device, such as an electroabsorption modulator, can modulate a light intensity by controllably absorbing a selectable fraction of the light. The device can include a substrate. A waveguide positioned on the substrate can guide light. An active region positioned on the waveguide can receive guided light from the waveguide,... Juniper Networks Inc

Supplemental connection fabric for chassis-based network device

A system may receive, by a switching component of the system, network traffic to be provided to an I/O component of the network device. The system may route, by the switching component, the network traffic to the I/O component based on whether the I/O component is connected to the switching... Juniper Networks Inc

Configuring a sandbox environment for malware testing

A device may receive a file to be analyzed in a sandbox environment, and may determine configuration information for configuring the sandbox environment. The configuration information may be determined based on at least one of: file information associated with the file to be analyzed, or client device information associated with... Juniper Networks Inc

Detecting keylogging

A device may detect or emulate a sequence of keystrokes to be used to detect a keystroke logger application. The device may determine a sequence of characters associated with the sequence of keystrokes. The sequence of characters may correspond to the sequence of keystrokes or a portion of the sequence... Juniper Networks Inc

Monitoring network management activity

A device is configured to receive, from a network device, a first message associated with a network management activity performed by using an application of the network device. The device is further configured to determine whether the first message satisfies a criterion, and to classify the first message based on... Juniper Networks Inc

Switching fabric topology based on traversing asymmetric routes

A system may include a set of 4N packet processors and a switching fabric to interconnect the set of 4N packet processors. The switching fabric may include the following switching elements having a size of at least 3N×3N: a first switching element, a second switching element, a third switching element,... Juniper Networks Inc

Distributed learning and aging for management of internet protocol (ip) addresses

A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with... Juniper Networks Inc

Using a probability-based model to detect random content in a protocol field associated with network traffic

A device may receive network traffic. The device may identify candidate text included in a protocol field associated with the network traffic. The device may identify a set of candidate strings included in the candidate text. The device may identify a set of characters that precedes or follows a candidate... Juniper Networks Inc

Detecting a malicious file infection via sandboxing

A device may receive a trigger to determine whether a malicious file is operating on a client device. The device may determine a network activity profile associated with the malicious file based on receiving the trigger to determine whether the malicious file is operating on the client device. The network... Juniper Networks Inc

Identifying malware based on a relationship between a downloader file and a downloaded file

A device may analyze a first file for malware. The device may determine that the first file causes a second file to be downloaded. The device may store linkage information that identifies a relationship between the first file and the second file based on determining that the first file causes... Juniper Networks Inc

Egress node protection for broadcast, unknown unicast, or multicast traffic in evpn topologies

A first device may receive network traffic including a first label. The first label may be an inclusive multicast label associated with a second device. The second device may be a designated forwarder for an Ethernet segment. The first device may determine a second label based on receiving the network... Juniper Networks Inc

Detecting and preventing man-in-the-middle attacks on an encrypted connection

A client device may provide, to a host device, a request to access a website associated with a host domain. The client device may receive, based on the request, verification code that identifies a verification domain and a resource, associated with the verification domain, to be requested to verify a... Juniper Networks Inc

Dynamically optimizing performance of a security appliance

A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores. The device may determine, based on the set... Juniper Networks Inc

11/09/17 / #20170324679

Multi-chassis switch having a modular center stage chassis

A system may comprise a first group of switches, each switch including a first group of inputs and outputs, and a first group of controllers, each controller being independent from one another and corresponding to a switch of the first group of switches, to selectively control the switch to connect... Juniper Networks Inc

11/09/17 / #20170324756

Remote remediation of malicious files

A device may determine that a file of a client device is a malicious file. The device may obtain remote access to the client device using a connection tool. The connection tool may provide access and control of the client device. The remote access may include access to a file... Juniper Networks Inc

11/02/17 / #20170317777

Methods and logical associations between routers and optical nodes within a wavelength division multiplexing (wdm) system

An apparatus includes a memory and a processor operatively coupled to the memory. The processor is configured to partition a set of ports of an optical multiplexer into a set of port groups including a first port group having a first set of ports and a second port group having... Juniper Networks Inc

11/02/17 / #20170317780

Point-to-multipoint path computation for wide area network optimization

In some examples, a controller for a network includes a path computation module configured for execution by one or more processors to obtain configuration information for at least one point-to-multipoint label switched path (P2MP LSP); obtain, from the network via at least one protocol, network topology information defining a network... Juniper Networks Inc

11/02/17 / #20170317849

Using a multicast address as a tunnel remote gateway address in a layer 2 tunneling protocol access concentrator

A layer 2 tunneling protocol access concentrator (LAC) may receive an indication to set up a layer 2 tunneling protocol (L2TP) tunnel. The LAC may determine, based on the indication, a multicast address associated with initiating setup of the L2TP tunnel. The LAC may provide, to the multicast address, a... Juniper Networks Inc

10/26/17 / #20170308422

Method, system, and debugging networking malfunctions within network nodes

The disclosed computer-implemented method for debugging network nodes may include (1) detecting a computing event that is indicative of a networking malfunction within a network node, (2) determining, based at least in part on the computing event, one or more potential causes of the networking malfunction, (3) identifying one or... Juniper Networks Inc

10/26/17 / #20170308503

Virtual network optimizing a physical network

One or more devices are configured to receive information regarding network devices associated with a physical network. The one or more devices are configured further to generate configuration data based on the information regarding the network devices. The one or more devices are configured further to generate a virtual network... Juniper Networks Inc

10/26/17 / #20170310587

Efficient synchronization of stored information using a parallel ring network topology

A routing system may include a primary message group to be used for synchronizing stored information. The primary message group may include multiple primary network devices. The multiple primary network devices may be configured with a first configuration regarding synchronizing the stored information. The primary message group may form a... Juniper Networks Inc

10/26/17 / #20170310589

Egress peer engineering using ipv4-mapped ipv6 addresses

A first device may determine an Internet Protocol version R (IPvR) interface address associated with a second device, where R is greater than or equal to four. The first device and the second device may be associated with an external border gateway protocol peering session. The first device may generate... Juniper Networks Inc

10/19/17 / #20170302085

Mitigating an effect of a downstream failure in an automatic transfer switching system

A system may comprise a first switch connected to an output of a first power source, a second switch connected to an output of a second power source, a first sensor connected to an output of the first switch, a second sensor connected to an output of the second switch,... Juniper Networks Inc

10/19/17 / #20170302519

Overlay tunnel and underlay path correlation

A device may receive an indication to generate a probe packet associated with a tunnel included in a first network. The tunnel may include a first tunnel endpoint and a second tunnel endpoint and may correspond to a path, associated with a second network, between the first tunnel endpoint and... Juniper Networks Inc

10/19/17 / #20170302548

Service latency monitoring using two way active measurement protocol

A device may establish a communication session, with a client device, for monitoring a latency of a service. The device may receive, from the client device, a request for a monitored service list. The monitored service list may identify one or more services for which service latency monitoring is supported.... Juniper Networks Inc

10/19/17 / #20170302566

Bit index explicit replication (bier) forwarding for network device components

A network device receives multicast packets that include information identifying destinations in the network, identifies next hops associated with the destinations, and populates a cache with the destinations and addresses of the identified next hops. The network device receives a particular multicast packet that includes information identifying particular destinations included... Juniper Networks Inc

10/19/17 / #20170302699

Limiting the efficacy of a denial of service attack by increasing client resource demands

A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem to be provided to the client device, where the computationally expensive problem requires a computation by the client... Juniper Networks Inc

10/05/17 / #20170288946

Performing a protocol, such as micro bidirectional forwarding detection, on member links of an aggregated link that uses an address of the aggregated link

The problem of being unable to run microBFD using an IPv6 address over any member links of a layer 2 LAG when the LAG is DOWN (and its IPv6 address becomes or is TENTATIVE), is solved by running DAD for the address configured for the microBFD once the individual link... Juniper Networks Inc

10/05/17 / #20170288948

Failure handling for active-standby redundancy in evpn data center interconnect

Techniques are described for avoiding traffic black-holing in a multi-homed Ethernet virtual private networks (EVPNs) in which a customer device (CE) is multi-homed to a plurality of multi-homing provider edge devices (PEs) via respective links of an Ethernet segment. An overlay network is created over the Ethernet segment, and the... Juniper Networks Inc

10/05/17 / #20170288970

Mass mac withdrawal for evpn-dci using virtual esi

The techniques described are directed to providing mass withdrawal of media access control (MAC) routes for network devices in an Ethernet virtual private network data center interconnect (EVPN DCI). MAC routes to reach the learned MAC addresses are stored in routing tables with corresponding top-of-rack Ethernet segment identifier (TOR-ESI) values... Juniper Networks Inc

10/05/17 / #20170288987

Application signature generation and distribution

A network device may receive network traffic for an application. The network device may identify an application layer protocol being used for the network traffic. The network device may obtain contextual information, from the network traffic, to obtain an item of contextual information, and the item of contextual information may... Juniper Networks Inc

10/05/17 / #20170289013

Method, system, and improving forwarding capabilities during route convergence

The disclosed computer-implemented method for improving forwarding capabilities during route convergence may include (1) identifying, at an upstream network device, a set of updated routes that define network paths that have each experienced at least one topology change since the upstream network device last converged with a downstream network device,... Juniper Networks Inc

10/05/17 / #20170289027

Routing inter-as lsps with centralized controller

Techniques are described for routing inter-AS LSPs with a centralized controller taking inter-AS TE metric values for inter-AS links into account. The inter-AS TE metric values, e.g., local preference values, MED values, or EROS, indicate route preferences for routes between ASes. The disclosed techniques enable network devices within either or... Juniper Networks Inc

10/05/17 / #20170289028

Label switched path reporting

Techniques are described for reporting, by non-ingress routers for traffic engineering label switched paths (TE LSPs) and to a path computation element, actual paths taken by the TE LSPs through the network. A first network device: receives, from a second network device, an LSP path signaling message that includes a... Juniper Networks Inc

10/05/17 / #20170289094

Performing duplicate address detection for an integrated routing and bridging device

A device may activate a layer 3 interface of the device based on activation of a first layer 2 interface associated with the layer 3 interface. The device may detect activation of a second layer 2 interface, associated with the layer 3 interface, after activating the layer 3 interface. The... Juniper Networks Inc

10/05/17 / #20170289216

Hot root standby support for multicast

In general, techniques are described for providing Hot-Root Standby in Global Table Multicast (GTM) environments. For example, in such GTM environments, normally a single unicast route to the customer multicast source (“C-Source”) will be available to egress provider edge (PE) routers. As described herein, ingress PE routers may advertise multiple... Juniper Networks Inc

10/05/17 / #20170289217

Selectively signaling selective tunnels in multicast vpns

In some examples, a method includes receiving, by a first ingress network device for a network, a source tree join route message from an egress network device for the network, specifying a multicast source and a multicast group, and in response to receiving the source tree join route message, determining,... Juniper Networks Inc

10/05/17 / #20170289291

Providing user subscription nomadicity in wireline broadband networks

In general, techniques are described for providing user nomadicity in wireline broadband networks. A network device positioned in a wireline broadband network comprising a processor and an interface may be configured to perform the techniques. The processor may be configured to execute a first virtual customer premises equipment to provide,... Juniper Networks Inc

09/28/17 / #20170279675

Methods and a self-organized layer-2 enterprise network architecture

In some embodiments, an apparatus includes a network node operatively coupled within a network. The network node is configured to send a first authentication message upon boot up, and receive, in response to the first authentication message, a second authentication message configured to be used to authenticate the network node.... Juniper Networks Inc

09/28/17 / #20170279705

Method, system, and preventing tromboning in inter-subnet traffic within data center architectures

The disclosed computer-implemented method for preventing tromboning in inter-subnet traffic within data center architectures may include (1) detecting, at a leaf node of a data center, a route advertisement that advertises a route to a spine node of another data center that interfaces with the data center, (2) identifying, at... Juniper Networks Inc

09/28/17 / #20170279709

Method, system, and forwarding network traffic using minimal forwarding information bases

The disclosed computer-implemented method for forwarding network traffic using minimal Forwarding Information Bases (FIBS) may include (1) identifying a Routing Information Base (RIB) that includes a set of routes that define paths to destinations both inside and outside a network and then (2) creating a FIB that includes a subset... Juniper Networks Inc

09/28/17 / #20170279773

Dynamic prioritization of network traffic based on reputation

A network device may determine a plurality of reputation indicators that indicate a measure of reputation associated with the flow. A first reputation indicator, of the plurality of reputation indicators, may be determined based on applying a first reputation analysis technique in association with the flow. A second reputation indicator,... Juniper Networks Inc

09/21/17 / #20170272307

Methods and a common control protocol for wired and wireless nodes

In some embodiments, an apparatus comprises of a control module implemented in at least one of a memory or a processing device that is configured to receive, via a network and from a wireless access point or an access network node, a control packet defined based on a control protocol.... Juniper Networks Inc

Patent Packs
09/21/17 / #20170272312

Methods and centralized virtual switch fabric control

In some embodiments, an apparatus comprises a processing module, disposed within a first switch fabric element, configured to detect a second switch fabric element having a routing module when the second switch fabric element is operatively coupled to the first switch fabric element. The processing module is configured to define... Juniper Networks Inc

09/07/17 / #20170257311

Processing inter-vlan traffic in an ethernet tree

A device may receive, from a first device associated with a first LAN, network traffic destined for a second LAN. The device may provide the first LAN with access to a core network. The device may not provide the second LAN with access to the core network. The device may... Juniper Networks Inc

09/07/17 / #20170257328

Methods and flow control associated with a switch fabric

In some embodiments, an apparatus includes a flow control module configured to receive a first data packet from an output queue of a stage of a multi-stage switch at a first rate when an available capacity of the output queue crosses a first threshold. The flow control module is configured... Juniper Networks Inc

08/31/17 / #20170250904

Split-horizon packet forwarding in a multi-home pbb-evpn network

Techniques are described to provide split-horizon packet forwarding so as to ensure that packets from the customer network that are injected into the provider backbone bridging Ethernet Virtual Private Network (PBB-EVPN) by one of the provider edge (PE) devices of the multi-homed Ethernet segment are not forwarded back toward the... Juniper Networks Inc

08/31/17 / #20170250995

Obtaining suspect objects based on detecting suspicious activity

A device may detect a suspicious activity. The device may automatically obtain a suspect object from a client device that is associated with the suspicious activity and based on detecting the suspicious activity. The suspect object may be an object that is possibly associated with the suspicious activity. The device... Juniper Networks Inc

08/31/17 / #20170251038

Failure detection manager

A network device is configured to receive information regarding a group of content streams and determine a buffer size for each of the content streams. The network device is further configured to receive the content streams from one or more encoding devices. The network device is further configured to buffer... Juniper Networks Inc

08/24/17 / #20170244621

Lsp ping and traceroute for bypass tunnels

A method performed by a network device may include assembling a multiprotocol label switching (MPLS) echo request, the echo request including an instruction for a transit node to forward the echo request via a bypass path associated with the transit node, and an instruction for an egress node to send... Juniper Networks Inc

08/17/17 / #20170237661

Processing packets by a network device

A method and apparatus for performing a lookup in a switching device of a packet switched network where the lookup includes a plurality of distinct operations each of which returns a result that includes a pointer to a next operation in a sequence of operations for the lookup. The method... Juniper Networks Inc

08/10/17 / #20170228542

Multi-file malware analysis

A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment. The device may monitor the malware testing environment for behavior indicative of malware. The device may detect the behavior indicative of malware. The device... Juniper Networks Inc

07/13/17 / #20170201389

System for avoiding traffic flooding due to asymmetric mac learning and achieving predictable convergence for pbb-evpn active-active redundancy

In one example, a method includes performing L2 learning of a C-MAC address included in a first L2 data message by a first provider edge (PE) router included in an Ethernet Segment of a Provider-Backbone Bridging Ethernet Virtual Private Network (PBB-EVPN); sending to a second PE router within the Ethernet... Juniper Networks Inc

07/13/17 / #20170200026

Apparatus, system, and detecting theft of network devices

The disclosed apparatus may include a secure storage device that securely stores an initial geographic location of a network device that facilitates network traffic within a network. This apparatus may also include a processing unit communicatively coupled to the secure storage device. The processing unit may determine a current geographic... Juniper Networks Inc

07/13/17 / #20170201979

Methods and controlling wireless access points

In some embodiments, an apparatus comprises of a first Control And Provisioning of Wireless Access Points (CAPWAP) module implemented in at least one of a memory or a processing device that is configured to be designated as a backup control module for a wireless access point during a first time... Juniper Networks Inc

07/06/17 / #20170195135

Traffic black holing avoidance and fast convergence for active-active pbb-evpn redundancy

In one example, a method includes configuring a first provider edge (PE) router of a Provider Backbone Bridging (PBB) Ethernet Virtual Private Network (EVPN) to join an Ethernet Segment in active-active mode with at least a second PE router that is operating as a designated forwarder for the Ethernet Segment;... Juniper Networks Inc

07/06/17 / #20170195199

Oam mechanisms for evpn active-active services

A method and network device to execute an Ethernet Virtual Private Network (EVPN) protocol to configure the network device to participate as one of a plurality of customer edge (CE) routers that provide an active-active configuration for an Ethernet segment coupling the CE routers to a plurality of provider edge... Juniper Networks Inc

07/06/17 / #20170195209

Reducing false alarms when using network keep-alive messages

Techniques are described to reduce false alarms in network devices utilizing keepalive messaging schemes. In order to potentially avoid false alarms, a transmitting network device adjusts quality of service QOS/TOS settings in keep-alive probe packets that are sent later in a current detection interval such that the keep-alive probe packets... Juniper Networks Inc

Patent Packs
07/06/17 / #20170195210

Static route advertisement

A network device operable as a provide edge router is described. The network device comprises one or more processors operably coupled to a memory; a configuration interface configured for execution by the one or more processors to receive configuration data configuring the network device as a provider edge router of... Juniper Networks Inc

07/06/17 / #20170195216

Refresh interval independent fast reroute facility protection tear down messaging

In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router.... Juniper Networks Inc

07/06/17 / #20170195220

Media access control address and internet protocol address binding proxy advertisement for network devices of a network

A device may receive, via a first message, first route information for directing network traffic for a network. The first route information may identify a media access control (MAC) route corresponding to a MAC address associated with a host device connecting to a subnet of the network. The first route... Juniper Networks Inc

07/06/17 / #20170195291

Network session data sharing

In general, techniques for sharing of network session data are described. The techniques may enable security devices to leverage application classification information in a federated manner. An example security device includes a memory and one or more processors. The processor(s) are configured to receive data representative of an application classification... Juniper Networks Inc

06/29/17 / #20170185508

Systems and methods for unit testing of functions on remote kernels

The disclosed computer-implemented method may include (1) providing a framework that includes (A) a user-space component that runs at a client site and (B) a kernel-space component that runs at a remote site, (2) identifying attributes of objects that reside at the remote site and whose addresses are unknown at... Juniper Networks Inc

06/29/17 / #20170185779

Identifying an evasive malicious object based on a behavior delta

A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors associated with executing the object in a live environment. The security device may determine test behavior information associated with the object. The test behavior information may identify... Juniper Networks Inc

06/29/17 / #20170187603

Application visibility in layer 3 networks

A device may receive configuration information for generating an application probe. The application probe may be used to request network information, associated with an application, from network devices. The device may determine, based on the configuration information, traffic parameters associated with the application. The device may determine a requested type... Juniper Networks Inc

06/29/17 / #20170187615

Simple hierarchical label-switched paths

A device may identify a portion of a label-switched path (LSP) on which a simple hierarchical LSP (sH-LSP) is to be used for transferring traffic via a network. The device may determine attribute information associated with the sH-LSP. The attribute information may include information associated with one or more characteristics... Juniper Networks Inc

06/29/17 / #20170187619

Apparatus and methods to aggregate fcoe (fibre channel over ethernet) filter rules of a single interface in a single or few rules on a first-hop fcoe networking element

In one embodiment, an apparatus can include a filter module configured to receive multiple Media Access Control (MAC) addresses associated with multiple virtual ports instantiated at a first network device. Each virtual port from the multiple virtual ports can be associated with a MAC address from the multiple MAC addresses.... Juniper Networks Inc

06/29/17 / #20170187624

Two stage bloom filter for longest prefix match

A device may receive a packet that includes a destination address. The device may analyze a first Bloom filter, based on the destination address, in order to identify a prefix range entry associated with the destination address and included in a set of prefix range entries associated with the first... Juniper Networks Inc

06/29/17 / #20170187638

Apparatus, system, and timely detection of increases in the maximum transmission unit of paths within networks

The disclosed apparatus may include (1) at least one communication port that facilitates communication between a source computing device and a destination computing device via a path within a network and (2) a processing unit communicatively coupled to the communication port, wherein the processing unit (A) monitors the network for... Juniper Networks Inc

06/29/17 / #20170187647

Apparatus, system, and preventing multicast traffic drops at egress routers in e-tree topologies

The disclosed apparatus may include (1) a database that maintains a pruned multicast distribution tree and (2) a processing unit having access to the database, wherein the processing unit (A) receives at least one type 3 Ethernet Segment Identifier (ESI) message from at least one other bridge domain on at... Juniper Networks Inc

06/29/17 / #20170187687

Partitioning a filter to facilitate filtration of packets

A method may include obtaining a match vector that indicates one or more filter rules that are potentially applicable to a packet. The method may include partitioning the match vector into a plurality of segments. The method may include generating a summary vector that identifies one or more portions of... Juniper Networks Inc

06/29/17 / #20170187713

Preserving an authentication state by maintaining a virtual local area network (vlan) association

A method may include detecting a presence of a first server device; communicating, with the first server device, to obtain information associated with the first server device; sending, to a second server device, a request for authentication services, where the request includes the information associated with the first server device;... Juniper Networks Inc

06/22/17 / #20170177864

Analyzing a password-protected file for malware

A device may receive a password-protected file to be accessed for analysis. The device may identify a contextual term, associated with the password-protected file, to be used as a password to attempt to access the password-protected file. The contextual term may be identified based on at least one of: metadata... Juniper Networks Inc

06/22/17 / #20170177869

Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes

A device may receive a trigger to determine whether one or more client devices, of a set of client devices, are infected by a malicious file. The device may generate file identification information associated with the malicious file based on receiving the trigger to determine whether the one or more... Juniper Networks Inc

06/22/17 / #20170180207

Propagating leaf count information to facilitate switching between a segmented tunnel and a non-segmented tunnel

A device may provide information associated with initiating a segmented tunnel to be used to transfer multicast traffic via a network covering a plurality of areas. The device may receive acknowledgement information associated with the segmented tunnel. The acknowledgement information may include information that identifies a number of egress devices,... Juniper Networks Inc

06/22/17 / #20170180248

Establishing label switched paths having refresh interval independent fast reroute facility protection

In one example, techniques of this disclosure may enable a point of local repair (PLR) network device to signal availability of link protection or node protection to a merge point (MP) network device and enable a network device to actively determine whether or not it is a merge point router.... Juniper Networks Inc

06/22/17 / #20170180374

Result reporting for authentication, authorization and accounting protocols

In general, techniques are described for provided result reporting via authentication, authorization and accounting (AAA) protocols. An authorization server comprising a control unit may be configured to perform the techniques. The control unit may authorize a network access server to allow an endpoint device to access one or more services... Juniper Networks Inc

06/15/17 / #20170168859

Using public key infrastructure for automatic device configuration

A device may receive a digital voucher, a customer certificate, and configuration information for automatically configuring the device. The digital voucher may include a first customer identifier that identifies a customer associated with the device and a device identifier that identifies the device. The customer certificate may include a second... Juniper Networks Inc

06/08/17 / #20170163530

Signaling aliasing capability in data centers

Techniques are described for signaling aliasing capability between routers in a multi-tenant data center that uses VPNs, such as Ethernet VPNs. In the multi-tenant data center, two or more PE routers may be connected to a CE router by a multi-homed L2 segment in an all-active mode. Aliasing refers to... Juniper Networks Inc

06/08/17 / #20170163544

Tiered services in border gateway protocol flow specification

A device may receive information, via one or more border gateway protocol messages, identifying a first network traffic service and a second network traffic service. The device may map the information identifying the first network traffic service and the second network traffic service to information identifying a first tier of... Juniper Networks Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Juniper Networks Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Juniper Networks Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###