PROVIDING NETWORK SLICE ASSIGNMENT FOR A WIRELESS DEVICE BASED ON MANUFACTURER USAGE DESCRIPTION (MUD) PARAMETERS

    公开(公告)号:US20240284317A1

    公开(公告)日:2024-08-22

    申请号:US18172612

    申请日:2023-02-22

    CPC classification number: H04W48/18 H04W16/02

    Abstract: Provided herein are techniques to facilitate slice assignment for a wireless device based on Manufacturer Usage Description (MUD) parameters associated with the wireless device. In one instance, a method may include obtaining, by a provisioning server of a mobile network, a usage description object for a wireless device that has a session via an onboarding network slice of the mobile network in which the usage description object comprises usage parameters associated with the wireless device. The method may further include identifying, based on the usage parameters associated with the wireless device, a particular network slice that is to host the session for the wireless device and causing the session of the wireless device to be moved from the onboarding network slice to the particular network slice.

    WIRELESS LOCAL AREA NETWORK (WLAN) OPTIMIZATIONS UTILIZING RECONFIGURABLE INTELLIGENT SURFACE (RIS) DEVICES

    公开(公告)号:US20240236705A1

    公开(公告)日:2024-07-11

    申请号:US18150413

    申请日:2023-01-05

    CPC classification number: H04W16/28 H04W84/12

    Abstract: Provided herein are techniques through which a Reconfigurable Intelligent Surface (RIS) device can be controlled to facilitate various wireless local area network (WLAN) communication optimizations. In one example, a method may include providing, by a wireless access point (AP) to an RIS device that includes reflecting elements, tuning information for an RIS tuning procedure that is to be performed by the wireless AP involving a wireless client; performing the RIS tuning procedure with involving wireless client in which the RIS tuning procedure includes performing a plurality of transmissions in which the RIS device is to configure the reflecting elements according to a particular dispersion mode configuration for each transmission; and identifying a guard interval value and a particular dispersion mode configuration of the RIS device that is to be utilized for subsequent transmissions involving the wireless client.

    Cloud-delivered firewall rules for controlling commands sent to devices based on operational tolerance limits

    公开(公告)号:US12003486B2

    公开(公告)日:2024-06-04

    申请号:US17397230

    申请日:2021-08-09

    CPC classification number: H04L63/0263 H04L63/0876 H04L63/102 H04L63/20

    Abstract: Techniques for a network controller associated with a firewall service to determine a network policy based on operational tolerances associated with a device, and cause the network policy to be provisioned at the firewall service where control commands, such as, for example, supervisory control and data acquisition (SCADA) commands, may be allowed or denied transmission to the device based on the operational tolerance(s) associated with the device. In some examples, the network controller may be configured as a manufacturer usage description (MUD) controller configured to transmit a MUD uniform resource identifier (URI), emitted by the device, to a MUD file server associated with the manufacturer of the device. The MUD file may be enhanced to include the operational tolerances associated with the device and transmitted back to the MUD controller where it may be parsed to determine a corresponding network policy.

    AUTOMATED FREQUENCY COORDINATION (AFC) NEGOTIATED BAND ACCESS

    公开(公告)号:US20240171988A1

    公开(公告)日:2024-05-23

    申请号:US17990783

    申请日:2022-11-21

    CPC classification number: H04W16/14 H04W72/14 H04W84/12

    Abstract: Presented herein are techniques to allocate use of controlled wireless spectrum. A method includes receiving, from a wireless local area network service provider, a request for wireless local area network spectrum for a future time window, wherein the wireless local area network spectrum is subject to automated frequency coordination, in response to the request, sending, to an incumbent that uses the wireless local area network spectrum, a query consistent with the request for the wireless local area network spectrum for the future time window, receiving, from the incumbent, in response to the query, a grant to use the wireless local area network spectrum for the future time window, and in response to receiving the grant, sending permission to the wireless local area network service provider to use the wireless local area network spectrum for the future time window.

    Attribute-based encryption for microservices

    公开(公告)号:US11755762B2

    公开(公告)日:2023-09-12

    申请号:US17236936

    申请日:2021-04-21

    CPC classification number: G06F21/6218 G06F9/445 G06F21/62 H04L9/0861 H04L63/08

    Abstract: The disclosed technology provides solutions that enable scalable and secure data retrieval between microservices by using microservice attributes to encrypt container based data stores. A process of the technology can include steps for: instantiating a first microservice and a second microservice in a cloud environment, wherein the first microservice is associated with a first attribute label and the second microservice is associated with a second attribute label, generating a first key based on the first attribute label and a second key based on the second attribute label, associating a first data store with the first microservice, wherein the first data store is encrypted using the first key, and associating a second data store with the second microservice, wherein the second data store is encrypted using the second key. Systems and machine readable media are also provided.

    PREVENTING ABUSE OF MEDIA ACCESS CONTROL ADDRESSES BY ROGUE DEVICES

    公开(公告)号:US20230262465A1

    公开(公告)日:2023-08-17

    申请号:US17674304

    申请日:2022-02-17

    CPC classification number: H04W12/122

    Abstract: Methods are provided to determine validity of a MAC address. The methods involve obtaining a media access control (MAC) address validity message that indicates a plurality of valid MAC addresses in the wireless network using a fully-exploded format or a probabilistic data structure and determining whether a MAC address is valid based on the MAC address validity message. Other methods involve obtaining a query regarding a validity of a media access control (MAC) address, determining whether the MAC address is a value included in a data set of expected values of a probabilistic data structure. The data set represents a list of MAC addresses. The other methods involve determining whether the MAC address is valid in the wireless network based on determining whether the MAC address is the value included in the data set and providing a response indicating whether the MAC address is valid.

Patent Agency Ranking