- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 9/40 H04W 12/06 H04W 12/48 H04W 12/088
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. A system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06 H04W 12/00 H04W 12/08
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
- Palo Alto CA, US Aaron Sekhri - Palo Alto CA, US Andreja Kogovsek - London, GB Benjamin Dawes - Claverley, GB Brandon Burr - San Francisco CA, US Chang Li - Palo Alto CA, US Elizabeth Caudill - San Francisco CA, US Zachary Romanow - Washington DC, US
International Classification:
G01C 21/34 G01C 21/36 G06Q 10/08
Abstract:
Systems and methods are provided for event-based route planning. Information of events taking place in a predetermined geographic area is received. An origin and at least one destination are determined. One or more first routes for traveling from the origin to the destination are determined from the predetermined geographic area. One or more segments in each of the first routes are determined based on the received information, each segment being associated with a corresponding recommendation for travelling via the segment.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality of latency measures associated with monitored network communications; correlating the plurality of latency measures associated with the monitored network communications to detect anomalous network activity based on a profile; and performing a mitigation response to the anomalous network activity based on a policy.
Disclosed herein are systems and methods for video advertising, sales and marketing including techniques for creating images and video, editing those images and videos, characterizing those images and videos and providing those images and videos to multiple users using social networks. Also include are methods for product placement and advertising associated with those videos including method for analyzing user interactions with the images and videos and optimizing ad placement in response to the user interactions.
Name / Title
Company / Classification
Phones & Addresses
Chang Quan Li
KIJI STEAKHOUSE INC
Chang Li Manager
Nakamura Realty Co Inc Subdivider/Developer Real Estate Agent/Manager
2554 Martn Lthr Kg Jr Way, Berkeley, CA 94704 2554 Martin Luther King Jr Way, Berkeley, CA 94704 (510)8482750, (510)8482724, (510)8482813
Queens Eye Center 6010 Main St FL 1, Flushing, NY 11355 (718)6618800 (phone), (718)4609351 (fax)
Languages:
Chinese English Korean Spanish
Description:
Dr. Li works in Flushing, NY and specializes in Optometry. Dr. Li is affiliated with New York Presbyterian Hospital Weill Cornell Medical Center and Queens Hospital Center.
Smartronix
Senior Data Architect
Lam Research
Software Engineer
Skills:
Enterprise Architecture It Strategy Requirements Analysis Business Intelligence Cloud Computing Solution Architecture Sharepoint Integration Sdlc Soa Information Assurance