MONITORING OF AUTOMATED FREQUENCY COORDINATION NETWORK TO DETECT AND MITIGATE SUCCESSIVE INTERFERENCE

    公开(公告)号:US20250088294A1

    公开(公告)日:2025-03-13

    申请号:US18466612

    申请日:2023-09-13

    Abstract: Systems and techniques for mitigating interference to incumbent users in a wireless network are described. An example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. A source of the interference is determined using key performance indicator(s), in response to the indication. A set of actions is determined and performed to mitigate the interference. Another example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. Interference information is obtained from a controller associated with the wireless network and includes KPI(s) associated with a set of access points (APs) operating on the channel. A source of the interference is determined based on the interference information. A set of actions to mitigate the interference are determined and performed on one or more of the set of APs.

    MODEL ASSEMBLY WITH KNOWLEDGE DISTILLATION

    公开(公告)号:US20250086493A1

    公开(公告)日:2025-03-13

    申请号:US18243259

    申请日:2023-09-07

    Abstract: In one implementation, a device receives, via a user interface, one or more constraint parameters for each of a plurality of machine learning models that perform different analytics tasks. The device computes, based on the one or more constraint parameters, a set of weights for the plurality of machine learning models. The device generates a unified model by performing knowledge distillation on the plurality of machine learning models using the set of weights. The device deploys the unified model for execution by a particular node in a network.

    Regional Position Estimator for Network Devices

    公开(公告)号:US20250085442A1

    公开(公告)日:2025-03-13

    申请号:US18466716

    申请日:2023-09-13

    Abstract: Devices, systems, methods, and processes for accurately determining a location of a device are described herein. The device may receive Global Navigation Satellite System (GNSS) data from two satellites in two time periods. The device can determine two pseudo range differences corresponding to the two satellites. The device may further determine two contours based on the two pseudo range differences. An overlap between the two contours may be utilized by the device to determine the location. The device can also determine the location of the device based on a contour and an estimated location. The device may utilize a Global Positioning System (GPS) database, an Access Points (AP) database, or one or more servers to retrieve the estimated location. The device can further configure an operating frequency and an output power based on the location in real-time.

    RETROSPECTIVE CAMPAIGN DETECTION, CATEGORIZATION, CLASSIFICATION, AND REMEDIATION

    公开(公告)号:US20250080577A1

    公开(公告)日:2025-03-06

    申请号:US18475896

    申请日:2023-09-27

    Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.

    VULNERABILITY MANAGEMENT BASED ON NETWORK INFRASTRUCTURE SECURITY CONTEXT

    公开(公告)号:US20250080564A1

    公开(公告)日:2025-03-06

    申请号:US18460786

    申请日:2023-09-05

    Abstract: Provided herein are techniques to facilitate vulnerability management for one or more endpoint devices of a network based on network infrastructure security context. In one example, a computer-implemented method may include determining a base vulnerability score for a particular vulnerability that is detected for an endpoint device of an enterprise network; determining topology information for the endpoint device within the enterprise network; translating the particular vulnerability to triggering information; performing a comparison between the security policies for the one or more network security mechanisms of network security infrastructure and the triggering information to determine whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device; and generating an updated vulnerability score for the particular vulnerability by adjusting the base vulnerability score based on whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device.

    USER EQUIPMENT ROUTE SELECTION POLICY FOR MULTI-LINK OPERATION OVER MULTIPLE RADIO ACCESS TECHNOLOGIES

    公开(公告)号:US20250080454A1

    公开(公告)日:2025-03-06

    申请号:US18951757

    申请日:2024-11-19

    Abstract: The present disclosure is directed to a comprehensive Route Selection Policy (URSP) based on Wi-Fi multi-link operation. In one aspect, a method includes identifying a user device connected to an enterprise network that provides network connectivity to user devices over multiple radio access technologies; receiving network capability information indicating that the user device is capable of a multi-link operation over a Wi-Fi network, the Wi-Fi network being one of the multiple radio access technologies; determining a URSP for the user device, wherein the URSP is a singular route selection policy for the user device to send and receive data over the multiple radio access technologies and defines, in part, a per-application traffic routing rule for routing a portion of traffic for an application used on the user device, over one of multiple links available on the Wi-Fi network; and transmitting the URSP to the user device.

    Method and System for Network Segmentation Using Safety Integrity Level (SIL)

    公开(公告)号:US20250080393A1

    公开(公告)日:2025-03-06

    申请号:US18461267

    申请日:2023-09-05

    Abstract: Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.

Patent Agency Ranking