-
公开(公告)号:US10666512B2
公开(公告)日:2020-05-26
申请号:US15455079
申请日:2017-03-09
摘要: Systems and methods for configuring a device to operate based on a current configuration state of the device in a manner agnostic to an assumed configuration state of a device. Systems can include a local state aware device manager and a state aware device configuration agnostic mediator. Methods can include locally determining an actual current configuration state of a device in operation, generating desired configuration instructions based on the actual current configuration state of the device, and locally configuring the device to operate according to the desired configuration instructions.
-
公开(公告)号:US20200044958A1
公开(公告)日:2020-02-06
申请号:US16513654
申请日:2019-07-16
发明人: Matthew Stuart Gast , Liang Wang
IPC分类号: H04L12/761 , H04L12/18
摘要: A multicast frame directed to a plurality of devices coupled to a network can be received, where the plurality of devices comprising at least one intended recipient device and at least one unintended recipient device. A destination unicast address corresponding to an intended recipient device can be identified. The multicast frame can be converted into a unicast frame directed to the intended recipient device, the unicast frame configured with the destination unicast address. The unicast frame can be blocked from accessing the unintended recipient device. The unicast frame can be provided to the intended recipient device.
-
公开(公告)号:US20190261339A1
公开(公告)日:2019-08-22
申请号:US16286577
申请日:2019-02-26
发明人: Peter Wu , Sreekanth Reddy , Jianlin Zeng , Changming Liu
IPC分类号: H04W72/04 , H04W72/12 , H04L12/823 , H04W24/08 , H04W28/02 , H04L12/851
摘要: Airtime usage may be used as a factor in controlling network traffic flow to and from client devices via a wireless network interface. Received packets or other data are assigned to a quality of service profile. Additionally, a cost value for communicating the received data is determined at least in part based on an actual or estimated airtime usage for the received packet. The cost value is used to allocate wireless network airtime to data. The allocation of wireless network airtime may be varied dynamically based on operating conditions. The cost value may be based on factors including the airtime used to communicate data; whether the data is a retransmission; and wireless network overhead. The cost value of data may also be different depending on whether the data is being sent from a client device or to a client device.
-
公开(公告)号:US20190199586A1
公开(公告)日:2019-06-27
申请号:US16289642
申请日:2019-02-28
CPC分类号: H04L41/0806 , H04B7/0413 , H04L43/0876 , H04W24/02 , H04W24/08 , H04W84/12
摘要: A first wireless operating mode of a plurality of wireless operating modes may be selected. The plurality of wireless operating modes may be related to a plurality of antenna configurations and a plurality of wireless radio frequencies. In some implementations, the selecting of the first wireless operating mode may be based on the identified power mode of the first digital device. The first wireless operating mode may be associated with a first antenna configuration of the plurality of antenna configurations. The first wireless operating mode may be associated with a first wireless radio frequency of the plurality of wireless radio frequencies for the data to be accessed by the first digital device over the wireless access device.
-
公开(公告)号:US10321306B2
公开(公告)日:2019-06-11
申请号:US15262707
申请日:2016-09-12
摘要: Techniques for selectively synchronizing network devices to authenticate wireless device to access a network using a key. A system utilizing such techniques can include a unique pre-shared key assignment system and a network device selective synchronization system. A method utilizing such techniques can include unique pre-shared key assignment and selective synchronization management.
-
公开(公告)号:US10243956B2
公开(公告)日:2019-03-26
申请号:US15962816
申请日:2018-04-25
发明人: Kenshin Sakura , Matthew Stuart Gast , Long Fu
摘要: A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network, and allowing access at the first network. The technique can include filtering access to a network, thereby restricting access to users with acceptable credentials. Offering a service that incorporates these techniques can enable incorporation of the techniques into an existing system with minimal impact to network configuration.
-
公开(公告)号:US10230802B2
公开(公告)日:2019-03-12
申请号:US15666389
申请日:2017-08-01
发明人: Matthew Stuart Gast , Liang Wang
IPC分类号: H04L29/08
摘要: In various systems and methods, there can be received a request for a network service. A query for the network service can be formulated based on the request. A remote access device can be instructed to interrogate remote devices coupled to the remote network access device for the network service. Access parameters related to the network service can be received in response to the interrogation. The user device can be configured to access the network service based on the access parameters.
-
公开(公告)号:US10219254B2
公开(公告)日:2019-02-26
申请号:US15865027
申请日:2018-01-08
发明人: Peter Wu , Sreekanth Reddy , Jianlin Zeng , Changming Liu
IPC分类号: H04L12/26 , H04W72/04 , H04W72/12 , H04W28/02 , H04W24/08 , H04L12/851 , H04L12/823
摘要: Airtime usage may be used as a factor in controlling network traffic flow to and from client devices via a wireless network interface. Received packets or other data are assigned to a quality of service profile. Additionally, a cost value for communicating the received data is determined at least in part based on an actual or estimated airtime usage for the received packet. The cost value is used to allocate wireless network airtime to data. The allocation of wireless network airtime may be varied dynamically based on operating conditions. The cost value may be based on factors including the airtime used to communicate data; whether the data is a retransmission; and wireless network overhead. The cost value of data may also be different depending on whether the data is being sent from a client device or to a client device.
-
公开(公告)号:US10123168B2
公开(公告)日:2018-11-06
申请号:US15976596
申请日:2018-05-10
发明人: Changming Liu , William Hoppin , Chris Scheers
摘要: A proximity beacon signal transmitted by a network device-coupled proximity beacon transmitter is received at a network device. A RSSI reporting message is generated at the network device based on the proximity beacon signal. A position of the network device-coupled proximity beacon transmitter with respect to the network device is determined using the RSSI reporting message. A location of the network device within a region is determined using the RSSI reporting message and network device map data for the region. The location of the network device-coupled proximity beacon transmitter in the region is determined based on the position of the network device-coupled proximity beacon transmitter with respect to the network device and the location of the network device within the region.
-
公开(公告)号:US10116624B2
公开(公告)日:2018-10-30
申请号:US15682322
申请日:2017-08-21
IPC分类号: G06F9/00 , H04L29/06 , H04L12/64 , H04L12/931 , H04L12/721
摘要: A method of intelligently sorting packets/datagrams for sending through appropriate branches of a N-way split VPN tunnel according to embodiments of the present invention allow for efficient movement of network traffic to and from a remote network location. Intelligent sorting may be based on a wide range of criteria in order to implement different policies. For example, datagrams may be sorted for sending through the branches of a 3-way split tunnel so that all traffic from a remote network location ultimately destined to servers at a central location may be sent via a secure VPN tunnel, all traffic that matches a “white-list” of trusted external sites may be sent directly to and from these sites to the remote network location, and all other traffic may be redirected through a Web service that scrubs and filters the traffic to/from questionable sites. Furthermore, the VPN tunnel may be chosen to minimize latency, to detour around network failures, or to conserve energy by minimizing the number of routers a datagram passes through.
-
-
-
-
-
-
-
-
-