USING A CURRICULUM FOR REINFORCEMENT LEARNING TO TRAIN AN LLM-BASED NETWORK TROUBLESHOOTING AGENT

    公开(公告)号:US20250148291A1

    公开(公告)日:2025-05-08

    申请号:US18388010

    申请日:2023-11-08

    Abstract: In one implementation, a device may determine how well a large language model-based troubleshooting agent for a network was able to perform during a first test having a first difficulty. The device may update the large language model-based troubleshooting agent using reinforcement learning based on how well the large language model-based troubleshooting agent was able to perform during the first test. The device may select a second difficulty for a second test based on how well the large language model-based troubleshooting agent was able to perform during the first test. The device may initiate the second test to assess how well the large language model-based troubleshooting agent is able to perform.

    STRUCTURED QUERY LANGUAGE GENERATION USING LARGE LANGUAGE MODELS

    公开(公告)号:US20250147956A1

    公开(公告)日:2025-05-08

    申请号:US18387278

    申请日:2023-11-06

    Abstract: In one embodiment, a method herein comprises: inputting, by a device, an input prompt to a first large language model to generate an output; computing, by the device, a reward metric in part by using a solver to process the output; tuning, by the device and based on the reward metric, a second large language model configured to correct errors of the first large language model using reinforcement learning; and using, by the device, the second large language model to correct an error of the first large language model.

    Verifying trust postures of heterogeneous confidential computing clusters

    公开(公告)号:US12294614B2

    公开(公告)日:2025-05-06

    申请号:US17583284

    申请日:2022-01-25

    Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for providing security postures for a service provided by a heterogenous system. A method for verifying trust by a service node includes receiving a request for a security information of the service node from a client device, wherein the request includes information identifying a service to receive from the service node, identifying a related node to communicate with the service node based on the service, after identifying the related node, requesting a security information of the related node, generating a composite security information from the security information of the service node and the security information of the related node, and sending the composite security information to the client device. The composite security information provides security claims for a service implemented by a heterogenous devices that have different trusted execution environments.

    Authorization scope management for low-code programming environments

    公开(公告)号:US12294583B2

    公开(公告)日:2025-05-06

    申请号:US17479182

    申请日:2021-09-20

    Inventor: Neelesh Pateriya

    Abstract: In one embodiment, a device receives a set of actions for a low-code workflow specified via a user interface. The device determines authorization scopes for targets of the set of actions. The device compares the authorization scopes for the targets to authorization scopes needed for the set of actions. The device provides, to the user interface, an excessive authorization notification, when the authorization scopes for the targets exceed the authorization scopes needed for the set of actions.

    Receiver photodiode biasing circuit

    公开(公告)号:US12292329B1

    公开(公告)日:2025-05-06

    申请号:US18421976

    申请日:2024-01-24

    Abstract: The present disclosure describes an optical system that uses a source optical signal to bias a receiver photodiode. The system includes an optical source, a receiver photodiode, a first biasing photodiode, a variable optical attenuator, and a compensation photodiode. The optical source produces a first optical signal. The receiver photodiode converts a second optical signal into an electrical signal. The first biasing photodiode generates a bias voltage for the receiver photodiode based on a first portion of the first optical signal. The variable optical attenuator produces a third optical signal based on (i) a second portion of the first optical signal and (ii) a portion of the electrical signal. The compensation photodiode passes the portion of the electrical signal based on the third optical signal.

    COORDINATED FREQUENCY DIVISION MULTIPLE ACCESS

    公开(公告)号:US20250142556A1

    公开(公告)日:2025-05-01

    申请号:US18583495

    申请日:2024-02-21

    Abstract: Coordinated Frequency Division Multiple Access (C-FDMA) for the simultaneous transmission of a basic Physical Layer Protocol Data Unit (PPDU) may be provided. C-FDMA may include determining sub-channels of a channel for one or more Access Points (APs). The sub-channels may then be assigned to the one or more APs. Transmit Opportunities (TxOps) may be scheduled for the one or more APs on the sub-channels. It may then be determined that a basic PPDU and an enhanced PPDU will be simultaneously transmitted on adjacent sub-channels. In response to determining the basic PPDU and the enhanced PPDU will be simultaneously transmitted on adjacent sub-channels, one or more Resource Units (RUs) of a sub-channel the enhanced PPDU will be transmitted on may be selected to disable transmission in.

    Method to Achieve Dynamic NAT66 Encryption and Decryption

    公开(公告)号:US20250141855A1

    公开(公告)日:2025-05-01

    申请号:US18498877

    申请日:2023-10-31

    Abstract: The disclosed technology addresses the need in the art for systems and methods of dynamic but stateless NAT encryption and decryption. The disclosed technology provides a robust encryption/decryption algorithm for concurrently obfuscating source and destination IPv6 addresses for SNAP deployments with 100% reversal and zero collisions, thereby providing protection to both the source and destination IPv6 simultaneously.

    HYBRID OVERLAY AND UNDERLAY PATH SELECTION

    公开(公告)号:US20250141791A1

    公开(公告)日:2025-05-01

    申请号:US18384552

    申请日:2023-10-27

    Abstract: Techniques for achieving hybrid control over overlay and underlay path selection by integrating underlay path identities into software-defined wide area network (SD-WAN) sessions to create individual SD-WAN sessions for each underlay path. The techniques may include receiving first path identification data associated with an underlay path of an overlay network domain that is disposed between a first edge node and a second edge node of an SD-WAN system. Based on the first path identification data, an SD-WAN session may be generated that is to utilize the underlay path for sending traffic through the overlay network domain. In some examples, the underlay path may be mapped to the SD-WAN session and the SD-WAN session may be bound to a data plane output forwarding chain associated with the underlay path such that the traffic sent over the SD-WAN session traverses the underlay path of the overlay network domain.

    TECHNIQUES TO FACILITATE CONSUMER-DEFINED WORKLOADS FOR A NETWORK SLICE OF A SLICE PROVIDER NETWORK

    公开(公告)号:US20250141745A1

    公开(公告)日:2025-05-01

    申请号:US18497209

    申请日:2023-10-30

    Abstract: Provided herein are techniques to facilitate providing consumer-defined workloads for a network slice of a slice provider network. In at least one example, a method may include transmitting a query to a slice provider function for topology information of an instantiated network slice in which the instantiated network slice includes slice resources provided at a plurality of network locations. The method may further include obtaining the topology information that identifies, at least in part, the plurality of network locations at which the slice resources and identifying, based at least in part on the topology information, at least one network location of the instantiated network slice at which to instantiate a consumer-defined workload, and transmitting a request to instantiate the consumer-defined workload that includes at least one location identifier of the at least one network location and a workload identifier of the consumer-defined workload to be instantiated.

Patent Agency Ranking