-
公开(公告)号:US10721708B1
公开(公告)日:2020-07-21
申请号:US16196701
申请日:2018-11-20
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Mukherji , Santosh G. Pandey , Rong Peng , Vinay Raghuram , Liu Huang
Abstract: Techniques for generating a prediction for a location of a mobile device includes a network controller obtaining signal strength information and angle-of-arrival information for mobile devices from a plurality of access points disposed at a location that includes two or more zones. The network controller extracts features from the obtained information. The features indicate whether the mobile devices are more likely in a first zone than in one or more of second zones of the two or more zones. The network controller generates a software model for classifying a mobile device into one of the two or more zones by applying a computer learning process to the extracted features. The network controller uses the software model to generate a prediction indicating that a first mobile device is in one of the two or more zones, and performs an action at the location based on the prediction.
-
公开(公告)号:US10334445B2
公开(公告)日:2019-06-25
申请号:US14882700
申请日:2015-10-14
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Poon Kuen Leung , Liu Huang , Vishwas Vijendra Bhat , Shweta Arvind Saraf
Abstract: A computer-implemented method is provided for a management entity to detect where a rogue access point is connected to the network infrastructure. The management entity receives from a wireless network controller an indication of an unauthorized frame wirelessly intercepted by an authorized access point. The unauthorized frame carries data between a rogue access point and a wireless client device. The rogue access point is connected to a compromised network element in a managed network at a compromised port of the compromised network element. The management entity extracts a client network address and a gateway network address from the indication of the unauthorized frame. The management entity traces a path through the managed network from a gateway network element associated with the gateway network address to the compromised network element. The management entity determines the compromised port in the compromised network element at which the rogue access point is connected.
-
公开(公告)号:US20170111360A1
公开(公告)日:2017-04-20
申请号:US14882700
申请日:2015-10-14
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Poon Kuen Leung , Liu Huang , Vishwas Vijendra Bhat , Shweta Arvind Saraf
CPC classification number: H04W12/12 , H04W12/00512 , H04W12/10 , H04W84/12 , H04W88/16
Abstract: A computer-implemented method is provided for a management entity to detect where a rogue access point is connected to the network infrastructure. The management entity receives from a wireless network controller an indication of an unauthorized frame wirelessly intercepted by an authorized access point. The unauthorized frame carries data between a rogue access point and a wireless client device. The rogue access point is connected to a compromised network element in a managed network at a compromised port of the compromised network element. The management entity extracts a client network address and a gateway network address from the indication of the unauthorized frame. The management entity traces a path through the managed network from a gateway network element associated with the gateway network address to the compromised network element. The management entity determines the compromised port in the compromised network element at which the rogue access point is connected.
-
-