ADAPTIVE CODE ASSIGNMENT TO AMBIENT POWER STATIONS

    公开(公告)号:US20250168887A1

    公开(公告)日:2025-05-22

    申请号:US18511336

    申请日:2023-11-16

    Abstract: Embodiments herein describe using transmission codes for ambient power stations (AMP STAs) so multiple AMP STAs can transmit in parallel to a Wi-Fi access point (AP). In order for the AMP STAs to transmit in parallel, the STAs use different codes. In one embodiment, the AMP STAs can use random timers to determine when they transmit and select a code to use during transmission. Before the timer expires, the AMP STAs can listen to see whether other AMP STAs are using the same code (e.g., a collision), and if so, select a different code. However, some AMP STAs may not have the ability to detect a collision. In that case, the AP can determine collisions for the AMP STAs and instruct the AMP STAs to select different codes.

    VIRTUAL ACCESS POINT ASSIGNMENT TO MULTIPLE BASIC SERVICE SET IDENTIFIER SETS BASED ON PHYSICAL MODE

    公开(公告)号:US20250168753A1

    公开(公告)日:2025-05-22

    申请号:US18517993

    申请日:2023-11-22

    Abstract: Systems and techniques for dynamically assigning virtual access points (VAPs) to multiple basic service set identifier (MBSSID) sets are described. An example technique includes generating a set of VAPs, where each VAP of the set of VAPs has a non-configured state. A first VAP configuration is received and includes an indication of a physical (PHY) mode associated with the first VAP configuration. A first VAP of the set of VAPs is assigned to a first MBSSID set, based at least in part on the PHY mode. The first VAP is configured according to the first VAP configuration.

    SERVICE PLANE OPTIMIZATIONS WITH LEARNING-ENABLED FLOW IDENTIFICATION

    公开(公告)号:US20250168185A1

    公开(公告)日:2025-05-22

    申请号:US19034804

    申请日:2025-01-23

    Abstract: The disclosed technology relates to a process for optimizing data flow within a computer network. The technology utilizes shared memory and machine learning logic to improve the efficiency of how computing resources are used during a transmission of data packets in the computer network. The shared memory is implemented during the transmission of data packets between the data plane and the service plane so that the copying of data packets after the data packets have been received and processed by an application is not necessary. The machine learning logic is implemented during the processing of the data packets in order to adjust a frequency or extent that the data packets (and corresponding source of the data packets) need to be evaluated to ensure that malicious content is not being transmitted across the computer network.

    APPLICATION TRANSACTION MONITORING WITH CONTEXTUAL FLOW INFORMATION

    公开(公告)号:US20250168094A1

    公开(公告)日:2025-05-22

    申请号:US18442263

    申请日:2024-02-15

    Abstract: In one embodiment, a method includes evaluating, by a device while traversing a plurality of ordered telemetry spans of a given trace message, whether any of the plurality of ordered telemetry spans are starting point spans of an application transaction and reporting, by the device, metrics corresponding to a particular application transaction based on a corresponding starting point span. The method further includes reporting, by the device, additional metrics from subsequent spans of the plurality of ordered telemetry spans following the corresponding starting point span within a context of the particular application transaction.

    APPLICATION TRANSACTION RECOMMENDATION ENGINE BASED ON ENDPOINT FLOWS

    公开(公告)号:US20250168091A1

    公开(公告)日:2025-05-22

    申请号:US18442346

    申请日:2024-02-15

    Abstract: In one embodiment, a method comprises: evaluating, by a device while traversing a plurality of ordered telemetry spans of a given telemetry trace, whether any of the plurality of ordered telemetry spans are starting points for a respective endpoint flow that represents a possible path taken within a particular application flow; determining, by the device and based on evaluating, one or more particular endpoint flows to be included within a particular application transaction reporting structure associated with the particular application flow; and reporting, by the device, metrics corresponding to the one or more particular endpoint flows within a context of the particular application transaction reporting structure.

    ASIC Identity Auto-Provisioning
    6.
    发明申请

    公开(公告)号:US20250168009A1

    公开(公告)日:2025-05-22

    申请号:US19033167

    申请日:2025-01-21

    Inventor: Chirag K. Shroff

    Abstract: In one embodiment, a method to authenticate a hardware component, by a system, includes performing a verification process to determine whether the hardware component is authorized to run on the system. The hardware component comprises an electronic fuse storing a hash of a data package and a memory storing the data package, wherein the electronic fuse is configured to provide the hash to the memory. The verification process comprises transmitting a random value (K) to the hardware component to prompt the hardware component to sign a response. The verification process further comprises receiving a signed response containing the random value (K) and the data package, wherein the data package comprises a first serial number associated with the hardware component and a first system number associated with the system. The verification process further comprises decrypting the signed response to verify a value of the random value (K).

    Bias in powering down links to a switch (in redundant topologies), allow full switch shutdown for power saving

    公开(公告)号:US20250155959A1

    公开(公告)日:2025-05-15

    申请号:US18508120

    申请日:2023-11-13

    Abstract: Devices, networks, systems, methods, and processes for determining a dynamic bias associated with a network device are described herein. A communication network may include multiple network devices and multiple links between the network devices. The communication network may further include a controller that monitors the communication network to determine dynamic changes in a network topology of the communication network. The controller determines the dynamic bias associated with the network device based on the dynamic changes. The controller generates and transmits a control signal based on the dynamic bias. The network device receives the control signal and switches an operation state of the network device, or an operation state of the links connected to the network device, based on the control signal. The controller can thereby achieve reduction in power consumption of the communication network by switching off the network device without affecting reliability and availability of the communication network.

    End-to-end secure communications with history

    公开(公告)号:US12301703B2

    公开(公告)日:2025-05-13

    申请号:US17484827

    申请日:2021-09-24

    Abstract: In one embodiment, an illustrative method herein may comprise: determining, by a device of a communication session, that a new epoch has occurred within the communication session, wherein the communication session has one or more member devices; generating, by the device and in response to the new epoch, a new key encryption key and a key bundle comprising one or more keys to decrypt content of the communication session from one or more previous epochs of the communication session; encrypting, by the device, the key bundle with the new key encryption key to create an encrypted key bundle; and sharing, from the device, the encrypted key bundle with the one or more member devices to allow the one or more member devices to access the content of the communication session from the one or more previous epochs.

Patent Agency Ranking