- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 9/40 H04W 12/06 H04W 12/48 H04W 12/088
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. A system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06 H04W 12/00 H04W 12/08
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
- Palo Alto CA, US Aaron Sekhri - Palo Alto CA, US Andreja Kogovsek - London, GB Benjamin Dawes - Claverley, GB Brandon Burr - San Francisco CA, US Chang Li - Palo Alto CA, US Elizabeth Caudill - San Francisco CA, US Zachary Romanow - Washington DC, US
International Classification:
G01C 21/34 G01C 21/36 G06Q 10/08
Abstract:
Systems and methods are provided for event-based route planning. Information of events taking place in a predetermined geographic area is received. An origin and at least one destination are determined. One or more first routes for traveling from the origin to the destination are determined from the predetermined geographic area. One or more segments in each of the first routes are determined based on the received information, each segment being associated with a corresponding recommendation for travelling via the segment.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality of latency measures associated with monitored network communications; correlating the plurality of latency measures associated with the monitored network communications to detect anomalous network activity based on a profile; and performing a mitigation response to the anomalous network activity based on a policy.
Queens Eye Center 6010 Main St FL 1, Flushing, NY 11355 (718)6618800 (phone), (718)4609351 (fax)
Languages:
Chinese English Korean Spanish
Description:
Dr. Li works in Flushing, NY and specializes in Optometry. Dr. Li is affiliated with New York Presbyterian Hospital Weill Cornell Medical Center and Queens Hospital Center.
Apple
Software Engineer - System
Megvii旷视 Jun 2018 - Sep 2018
Research Intern
New Oriental Education & Technology Group (Nyse:edu) Sep 2016 - May 2017
Toefl Teacher
Education:
University of Washington 2017 - 2018
Master of Science, Masters, Computer Engineering
Shanghai Jiao Tong University 2013 - 2017
Bachelors, Bachelor of Science, Electrical Engineering
University of Melbourne 2015 - 2015