INTEGRATED TRANSFORMER AND COMMON MODE CHOKE WITH TWISTED WINDING TO INCREASE BANDWIDTH

    公开(公告)号:US20250149226A1

    公开(公告)日:2025-05-08

    申请号:US18387888

    申请日:2023-11-08

    Abstract: In one embodiment, an electronic device includes a generally toroidal magnetic core having a first extension portion coupled to a first location of the generally toroidal magnetic core and a second extension portion coupled to a second location of the generally toroidal magnetic core generally opposite the first location and a common mode choke comprising a first wire and a second wire wound around the first extension portion and the second extension portion in a same winding direction. The first wire winds around the generally toroidal magnetic core in a first direction, and the second wire winds around the generally toroidal magnetic core in a second direction to form a primary winding. The electronic device further includes a transformer comprising the primary winding and a secondary winding, wherein the secondary winding of the transformer comprises a third wire and a fourth wire wound around the generally toroidal magnetic core in opposite directions.

    OBJECTIVE SELECTION FOR LLM-BASED NETWORK TROUBLESHOOTING AND MONITORING AGENTS

    公开(公告)号:US20250148290A1

    公开(公告)日:2025-05-08

    申请号:US18386833

    申请日:2023-11-03

    Abstract: In one implementation, a device receives an input request for a large language model-based troubleshooting agent for a network. The device selects an optimization criterion for the large language model-based troubleshooting agent based on the input request. The device provides the optimization criterion to the large language model-based troubleshooting agent to cause the large language model-based troubleshooting agent to select a particular large language model to process the input request based on the optimization criterion. The device sends, to a user interface, an indication of a result of the particular large language model processing the input request.

    Cell-based architecture for an extensibility platform

    公开(公告)号:US12294505B2

    公开(公告)日:2025-05-06

    申请号:US18671429

    申请日:2024-05-22

    Abstract: According to one or more embodiments of the disclosure, an example method herein may comprise: managing a particular cell of a multi-celled architecture for an extensibility platform having one or more tenants served by datastores of the particular cell; connecting to a global cell manager for global cell management of all cells of the multi-celled architecture; identifying a consumption limit indicating a maximum amount of system resources that a particular tenant of the one or more tenants is allowed to consume of the particular cell; enforcing the consumption limit on the particular tenant; and ensuring that the particular tenant is provided system resources of the particular cell up to the consumption limit without limitation.

    SECURE DEVICE LOCATION SHARING
    26.
    发明申请

    公开(公告)号:US20250142344A1

    公开(公告)日:2025-05-01

    申请号:US18495193

    申请日:2023-10-26

    Abstract: Secure device location sharing may be provided. Over a secured link, an indication that a peer-to-peer device desires Automated Frequency Coordination (AFC) based location sharing may be received. Then, from the peer-to-peer device over the secured link, an identity provider (IdP) may be received for the peer-to-peer device. Next, validation of the peer-to-peer device may be requested from the IdP. From the IdP in response to requesting validation of the peer-to-peer device from the IdP, authentication for the peer-to-peer device and an indication that the peer-to-peer device needs AFC based location sharing may be received. An indication that the peer-to-peer device is approved for AFC based location sharing may then be sent to the peer-to-peer device over the secured link.

    COMMAND LINE OBFUSCATION DETECTION TECHNIQUES

    公开(公告)号:US20250141893A1

    公开(公告)日:2025-05-01

    申请号:US18385591

    申请日:2023-10-31

    Abstract: Techniques described herein can perform obfuscation detection on command lines used at computing devices in a network. In response to detecting obfuscation in a command line, the disclosed techniques can output a notification for use in connection with network security analysis. The command line obfuscation detection techniques include pre-processing command line input data and converting command lines into token groups. The token groups are then provided as an input to a natural language processor or other machine learned model, which is trained to identify obfuscation probabilities associated with token groups can corresponding command lines. A notification is generated to trigger further analysis in response to an obfuscation probability exceeding a threshold obfuscation probability.

    PREVENTING DATA AND HARDWARE LOSS IN PRE-PROVISIONED DEVICES

    公开(公告)号:US20250141862A1

    公开(公告)日:2025-05-01

    申请号:US18495939

    申请日:2023-10-27

    Abstract: A method comprises: at a control entity configured to communicate with a network: linking a user identifier of a user having an account for call-related information to a hardware identifier of a device to be sent to the user, to produce linked identifiers; loading on the device a limited use token associated with the user that enables only basic call functions on the device, and prevents the device from accessing the account; determining whether the user possesses the device based on the linked identifiers and proximity pairing of the device with a pairing device; and based on determining, either provisioning the device with a full access token that enables full calling functions on the device and grants full access to the account by the device, or not provisioning the device with the full access token to prevent access to the account.

    REDUNDANT MULTICAST FOR DYNAMIC CONNECTIVITY

    公开(公告)号:US20250141788A1

    公开(公告)日:2025-05-01

    申请号:US18494586

    申请日:2023-10-25

    Abstract: In one aspect, a computer-implemented method for redundant multicast groups, includes receiving a request for an element of content from a device, where the element of content is associated with a first source address and a redundant source group identifying multiple servers in a network including the element of content, determining a second source address within the redundant source group has a shorter distance to a location of the device, and routing packets associated with the element of content from the second source address to the device. The method further includes determining the connection has failed, and routing, automatically upon determining the connection has failed, the device to a third source address of the multiple servers, where the third source address is selected according to a server selection policy.

Patent Agency Ranking