Traffic steering between different wireless networks

    公开(公告)号:US10856181B2

    公开(公告)日:2020-12-01

    申请号:US16130904

    申请日:2018-09-13

    Abstract: A method comprising obtaining, from a first wireless network characterized by a first radio access technology (RAT), a first set of wireless network policies. The first set of wireless network policies characterizes a first wireless channel provided to a client device by the first wireless network. The method includes obtaining, from a second wireless network characterized by a second RAT different from the first RAT, a second set of wireless network policies. The second set of wireless network policies characterizes a second wireless channel provided to the client device by the second wireless network. The method includes generating a set of aggregated policies by aggregating the first and second sets of wireless network policies based on one or more aggregation criteria. The method includes providing the set of aggregated policies. The set of aggregated policies directs the client device to steer traffic to the first and second wireless networks.

    ACCESS POINT PROXIMITY GRAPHING
    114.
    发明申请

    公开(公告)号:US20200008169A1

    公开(公告)日:2020-01-02

    申请号:US16024377

    申请日:2018-06-29

    Abstract: In one embodiment, a process determines how often client devices roam from a given access point (AP) to each particular neighbor AP of a plurality of neighbor APs of the given AP, and correspondingly determines a roaming distance from the given AP to each particular neighbor AP, the roaming distance being shorter for neighbor APs roamed to more often, and longer for neighbor APs roamed to less often, within a given interval. Successful but temporary roams to the plurality of neighbor APs may also be detected and removed from consideration in the roaming distance to that particular neighbor AP. The process then generates a proximity list of one or more of the neighboring APs having the shortest roaming distances, and feeds the proximity list to the given AP to cause the given AP to provide the proximity list to client devices for optimized client roaming.

    Hierarchical Fog Nodes for Controlling Wireless Networks

    公开(公告)号:US20190132206A1

    公开(公告)日:2019-05-02

    申请号:US15795723

    申请日:2017-10-27

    Abstract: A method includes obtaining performance characterization values from endpoints managed by a first fog node at a first hierarchical level in a hierarchy of fog nodes. The method includes changing a first operating characteristic of the wireless network based on the performance characterization values. The first operating characteristic affects the operation of one or more of the endpoints. The method includes transmitting a portion of the performance characterization values to a second fog node at a second hierarchical level in the hierarchy of fog nodes. The method includes changing a second operating characteristic of the wireless network based on an instruction from the second fog node. The second operating characteristic affects the operation of the first fog node and/or other fog nodes at the first hierarchical level. Changing one or more of the first operating characteristic and the second operating characteristic satisfies an operating threshold for the wireless network.

    Central scheduling for enterprise wireless randomizing changing/rotating MAC address

    公开(公告)号:US12278801B2

    公开(公告)日:2025-04-15

    申请号:US18507349

    申请日:2023-11-13

    Abstract: A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.

    Method for implementing cloud-based security protocols for a user device

    公开(公告)号:US12225053B2

    公开(公告)日:2025-02-11

    申请号:US17898162

    申请日:2022-08-29

    Abstract: A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.

    Manufacturer usage description (MUD) extensions for secure access service edge (SASE) services

    公开(公告)号:US12206646B2

    公开(公告)日:2025-01-21

    申请号:US18537156

    申请日:2023-12-12

    Abstract: Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine that a security recommendation included in the MUD file is to be implemented by a cloud-based security service provided by the SASE service and cause the IoT device to establish a connection with a secure internet gateway associated with the cloud-based security service. Additionally, or alternatively, the MUD file may include SASE extensions indicating manufacturer recommended cloud-based security services. Further, cloud-based security services may be implemented if local services are unavailable.

Patent Agency Ranking