CLIENT DEVICE IDENTIFIER FOR DUAL-WI-FI CONNECTIONS

    公开(公告)号:US20250071831A1

    公开(公告)日:2025-02-27

    申请号:US18816893

    申请日:2024-08-27

    Abstract: A client device identifier for dual-Wi-Fi connections may be provided. First, it may be determined that a client device has associated over a first link having a first Media Access Control (MAC) address. Next, from the client device over the first link, a first management frame may be received that identifies a MAC address of a second link associated with the client device. Then, based on information in the first management frame, it may be determined that the first link and the second link are associated with the client device.

    ADDRESS RESOLUTION PROTOCOL (ARP)-PROXY UPDATE FOR ROAMING CLIENT DEVICES

    公开(公告)号:US20250071086A1

    公开(公告)日:2025-02-27

    申请号:US18813893

    申请日:2024-08-23

    Abstract: Address Resolution Protocol (ARP)-proxy update for roaming client devices may be provided. A client device may query for a list of active Internet Protocol (IP) addresses used by the client device. Next, the client device may determine that an Access Point (AP) supports a collaborative IP exchange function. Then the client device may send, in response to determining that the AP supports the collaborative IP exchange function, the list of active Internet Protocol (IP) addresses to the AP.

    RADIO RESOURCE MANAGEMENT DRIVEN ENERGY MANAGEMENT IN WIRELESS NETWORKS

    公开(公告)号:US20250063493A1

    公开(公告)日:2025-02-20

    申请号:US18450688

    申请日:2023-08-16

    Abstract: A method to manage access points in a wireless network to save power during off-peak hours. The method includes operating a wireless local area network including access points with the access points powered on, receiving information indicative of channel utilization levels for each of the access points over a predetermined period of time, receiving respective indications of occupancy levels of a space that is covered by the access points during the predetermined period of time, predicting a low occupancy period of the space based on the channel utilization levels and the respective indications of occupancy levels, and during the low occupancy period, causing a first group of the access points to be powered off, and causing a second group of the access points to remain powered on.

    Method for implementing cloud-based security protocols for a user device

    公开(公告)号:US12225053B2

    公开(公告)日:2025-02-11

    申请号:US17898162

    申请日:2022-08-29

    Abstract: A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.

    Dynamic security policy for sharing content in collaborative applications

    公开(公告)号:US12204659B2

    公开(公告)日:2025-01-21

    申请号:US17673193

    申请日:2022-02-16

    Abstract: A method, computer system, and computer program product are provided for applying a dynamic security policy to shared content in collaborative applications. A selection of one or more content items is received for sharing in a communication session. A security policy is queried using a key that is associated with each of the one or more content items to determine a security policy for each of the one or more content items. A plurality of users participating in the communication session are identified. Each content item of the one or more content items is selectively presented to a subset of the plurality of users based on an identity of a respective user and the security policy of each content item.

    IDENTIFYING ROGUE WIRELESS DEVICES USING MAC ADDRESS ROTATION TECHNIQUES

    公开(公告)号:US20250016568A1

    公开(公告)日:2025-01-09

    申请号:US18892955

    申请日:2024-09-23

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

    Dynamic frequency coordination in shared wireless communication environments

    公开(公告)号:US12160819B2

    公开(公告)日:2024-12-03

    申请号:US18329285

    申请日:2023-06-05

    Abstract: Various embodiments herein disclose coordinating frequencies for an access point (AP). A corresponding method comprises evaluating a performance profile for the AP, the performance profile comprising a first part related to a first network generated by a first radio of the AP and a second part related to a second network generated by a second radio of the AP. The method also comprises selecting first channels on which the AP generates the first network based on the performance profile and spectral regrowth profiles for transmission power levels of the first radio. The method additionally comprises selecting second channels on which the AP generates the second network based at least in part on the performance profile and the spectral regrowth profiles. Furthermore, the method comprises enabling communications between a first set of devices on the first channels and enabling communications between a second set of devices on the second channels.

    Backscatter device certificate on-boarding for secure communication

    公开(公告)号:US12155426B2

    公开(公告)日:2024-11-26

    申请号:US18194435

    申请日:2023-03-31

    Abstract: In Wi-Fi 8, backscatter devices (BKDs) may be viewed as part of the 802.11 wireless local area network (WLAN). BKDs in a WLAN have limited transmission interactions with a Wi-Fi access point (AP). Onboarding BKDs to the WLAN is described, which allows for the AP and BKD to participate as elements of the same local network, with security controls. The onboarding of the BKD to a WLAN may occur after discovery of the BKD at an AP and includes replacing an Initial Device Identifier (IDevID) on the BKD with a Local Device Identifier (LDevID) in order to provide for secure communications between the BKD and the WLAN.

Patent Agency Ranking