OPENROAMING BASED REMOTE WORKER
    21.
    发明申请

    公开(公告)号:US20220224565A1

    公开(公告)日:2022-07-14

    申请号:US17148481

    申请日:2021-01-13

    Abstract: A method for establishing a VPN with a client device is provided. In the method, an AP can receive an access request directed to an OpenRoaming (OR) Service Set Identifier (SSID) from the client device. The AP can send the access request to an OR connector. In response to the access request, the AP may receive an access response from the OR connector. The access response can include an attribute indicating an address to connect to a company Virtual Private Network (VPN) headend. The AP may then use the attribute to establish the VPN connection with the company VPN headend.

    NETWORK DESCRIPTION MECHANISMS FOR ANONYMITY BETWEEN SYSTEMS
    22.
    发明申请
    NETWORK DESCRIPTION MECHANISMS FOR ANONYMITY BETWEEN SYSTEMS 有权
    网络描述系统之间的无关性的机制

    公开(公告)号:US20160359728A1

    公开(公告)日:2016-12-08

    申请号:US14729810

    申请日:2015-06-03

    CPC classification number: H04L45/14 H04L45/02 H04L45/04 H04L63/00

    Abstract: Techniques are disclosed for exchanging anonymized information between autonomous systems. In one example, a method comprises accessing an eigenvalue, wherein the eigenvalue is based on topology data associated with the first autonomous system; encoding the eigenvalue into a message; and transmitting, by a network element located in the first autonomous system, the message to an external edge router located in the second autonomous system. A further method can comprise receiving, by a network component located in a first autonomous system, a message, wherein the message comprises an eigenvalue and the message is received from an external network element located in a second autonomous system; accessing another other eigenvalue, the another eigenvalue corresponding to an autonomous system different from the first autonomous system; analyzing the another eigenvalue and the eigenvalue; and executing, by the network element, an action based on the analyzing.

    Abstract translation: 公开了用于在自治系统之间交换匿名信息的技术。 在一个示例中,一种方法包括访问特征值,其中特征值基于与第一自治系统相关联的拓扑数据; 将特征值编码成消息; 以及通过位于所述第一自治系统中的网络单元将所述消息发送到位于所述第二自治系统中的外部边缘路由器。 另一方法可以包括通过位于第一自治系统中的网络组件接收消息,其中所述消息包括特征值,并且所述消息是从位于第二自治系统中的外部网络元件接收的; 访问另一个特征值,对应于与第一自治系统不同的自治系统的另一个特征值; 分析另一个特征值和特征值; 并且由网元执行基于分析的动作。

    OPPORTUNISTIC RELAY AMONG MOBILE COMMUNICATION DEVICES

    公开(公告)号:US20250097697A1

    公开(公告)日:2025-03-20

    申请号:US18368997

    申请日:2023-09-15

    Abstract: In one embodiment, a method is disclosed comprising monitoring dynamic locations of a plurality of mobile communication devices within a physical area covered by a wireless communication network, wherein keys are distributed to the mobile communication devices at association time; determining that a particular mobile communication device should have a relay for communication with the network based on a first location of the particular mobile communication device and inadequate wireless communication characteristics at the first location; selecting an opportunistic relay device from the mobile communication devices based on a second location of the opportunistic relay device and adequate wireless communication characteristics of the opportunistic relay device within the network and to the first location from the second location; and directing the opportunistic relay device to relay communications for the particular mobile communication device at the first location, wherein the communications are encrypted based on the keys.

    IDENTIFYING ROGUE WIRELESS DEVICES USING MAC ADDRESS ROTATION TECHNIQUES

    公开(公告)号:US20250016568A1

    公开(公告)日:2025-01-09

    申请号:US18892955

    申请日:2024-09-23

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

Patent Agency Ranking