ENHANCED TRANSMIT OPPORTUNITY SHARING IN MULTIPLE ACCESS POINT COORDINATION

    公开(公告)号:US20240357619A1

    公开(公告)日:2024-10-24

    申请号:US18303174

    申请日:2023-04-19

    CPC classification number: H04W72/27 H04W64/00 H04W72/0453 H04W72/12 H04W74/002

    Abstract: Techniques and systems for enhancing transmit opportunity (TXOP) sharing for multi-access point coordination (MAPC) are described. An example technique includes obtaining, for each access point (AP) of a plurality of APs in a MAPC group, historical mobility information of client stations (STAs) associated with the AP. A number of the client STAs associated with each AP that satisfies a mobility criteria is determined based on the historical mobility information. A determination of whether to enable TXOP sharing is made for each AP and an indication of the determination is transmitted to the AP. Another technique includes estimating traffic demand for a first set of client STAs associated with an AP. A second set of client STAs to make available for TXOP sharing is determined. Signal strength information associated with a communication link between each client STA in the second set and the AP is transmitted.

    COORDINATED MONITORING OF HETEROGENEOUS DOMAINS IN EXTENDED DETECTION AND RESPONSE (XDR) SYSTEMS

    公开(公告)号:US20240356950A1

    公开(公告)日:2024-10-24

    申请号:US18455491

    申请日:2023-08-24

    CPC classification number: H04L63/1425

    Abstract: A method may include receiving, by a processor, first monitoring data from a first monitoring component and second monitoring data from a second monitoring component. The method may further include determining, by the processor, that the first monitoring data represents a first activity pattern of a computing entity in a first period. The method may further include determining, by the processor, that the second monitoring data represents a second activity pattern of the computing entity in the first period. The method may further include determining, by the processor, first feedback data based on the first monitoring data. The method may further include determining, by the processor, second feedback data based on the second monitoring data. The method may further include providing, by the processor, the first feedback data to the second monitoring component and the second feedback data to the first monitoring component.

    INCIDENT DESCRIPTIONS FOR EXTENDED DETECTION AND RESPONSE TO SECURITY ANOMALIES

    公开(公告)号:US20240356942A1

    公开(公告)日:2024-10-24

    申请号:US18231815

    申请日:2023-08-09

    CPC classification number: H04L63/1425 H04L63/1416

    Abstract: Techniques described herein for extended detection and response to security anomalies in computing networks can perform automated analysis of anomalies occurring in different telemetry sources in a computer network, in order to synthesize the anomalies into analyst work units that are surfaced for further analysis by security response teams. Anomalies can initially be processed in order to identify and collect extended anomaly data. The extended anomaly data can then be used to group the anomalies according to a multi-stage grouping process which produces analyst work units. The analyst work units can be processed to produce analyst summaries that assist with analysis and response. Furthermore, the analyst work units can be prioritized for further analysis, and analyst interactions with the prioritized analyst work units can be used to influence subsequent anomaly grouping operations.

    EVENT-BASED THREAT DETECTION WITH WEAK LEARNER MODELS DATA SIGNAL AGGREGATION

    公开(公告)号:US20240356935A1

    公开(公告)日:2024-10-24

    申请号:US18237282

    申请日:2023-08-23

    CPC classification number: H04L63/1416

    Abstract: Techniques for identifying malicious threats for investigation using network telemetry data. The techniques include the use weak learner models to analyze data from multiple event sources. The techniques further include aggregating data signals from the weak learner models to generate a high-fidelity data signal of threat sources. The aggregated data signal can be sent to a Security Operation Center to provide a list of nodes with a high likelihood of malicious threats along with convicting evidence to aid in investigating the identified nodes.

    SYSTEM AND METHOD FOR QUANTUM RESISTANT KEY DISTRIBUTION FOR SECURING GTP TRAFFIC

    公开(公告)号:US20240356731A1

    公开(公告)日:2024-10-24

    申请号:US18136651

    申请日:2023-04-19

    CPC classification number: H04L9/0819 H04L9/0852 H04L9/0869 H04L63/0428

    Abstract: Techniques and architecture are described for securing traffic between nodes of a network against quantum computing attacks. For example, a first node of a network generates a random number input string and provides the random number input string to a second node. The first node may use the random number input string to generate at least one first key and an associated identifier. The first node may forward the associated identifier to the second node. Using the random number input string, the second node may generate at least one second key. Based at least in part on the associated identifier, the second node may select the at least one second key as a common encryption key. The at least one second key and the at least one first key are identical. Based at least in part on the common encryption key, the nodes may encrypt and decrypt traffic between them.

    COMBINATION BACKSCATTER DEVICE
    258.
    发明公开

    公开(公告)号:US20240356375A1

    公开(公告)日:2024-10-24

    申请号:US18302425

    申请日:2023-04-18

    CPC classification number: H02J50/20 H02J7/342 H02J7/345

    Abstract: The present disclosure describes a combination backscatter device and methods of operation involving the combination backscatter device. An apparatus includes a passive backscatter device, an active backscatter device, and a cover. The passive backscatter device transmits a first message using energy from a wireless signal. The active backscatter device includes a first capacitor that charges using energy from a wireless signal. The cover moves over the passive backscatter device based on an amount of energy stored in the first capacitor.

    Horizontal scaling for a software defined wide area network (SD-WAN)

    公开(公告)号:US12126688B2

    公开(公告)日:2024-10-22

    申请号:US18461391

    申请日:2023-09-05

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for managing networks. According to at least one example, a method is provided for connecting to a network controller across different regions. The method includes identifying a first connection with a network orchestrator during establishment of a second connection with the network orchestrator from a network controller; establishing a sibling session that links the second connection and the first connection at a control plane; inserting a sibling data message that identifies the sibling session into control messages sent; receiving a message from the network orchestrator over the second connection, the message including an address of the network controller associated with the second connection; and transmitting the second address of the network controller over the first connection to the network orchestrator.

Patent Agency Ranking