6040 patents
Page 15 of 302
Utility
Controlling performance of a wireless device in a heterogeneous network
28 Nov 23
A method of controlling performance of a wireless device is performed by a node that is in electronic communication with a cellular network.
Mark Grayson, Santosh Ramrao Patil, Gangadharan Byju Pularikkal, Kedar K. Gaonkar
Filed: 20 Oct 21
Utility
BSS-color grading in a WLAN infrastructure
28 Nov 23
Embodiments herein describe techniques for conveying performance parameters to client devices using BSS coloring.
Vishal S. Desai, Jerome Henry, Matthew A. Silverman, Robert E. Barton
Filed: 24 Jan 20
Utility
Neighborhood management between WiFi and unlicensed spectrum radios
28 Nov 23
Techniques for neighborhood management between WiFi and unlicensed spectrum radios.
Gautam D. Bhanage, Matthew A. Silverman, Sivadeep R. Kalavakuru, Ardalan Alizadeh
Filed: 29 Jun 21
Utility
Assigning UWB anchors for client ranging
28 Nov 23
Presented herein are techniques for assigning Ultra-Wideband (UWB) anchors for client ranging.
Jerome Henry, Robert Edgar Barton, Matthew Aaron Silverman
Filed: 11 Aug 22
Utility
Device to device communications in hybrid networks
28 Nov 23
Device-to-Device (D2D) communications in hybrid networks are provided by identifying a first dual-mode endpoint seeking to communicate with a second dual-mode endpoint via a D2D communications session; identifying a first communications pattern of network resource usage for the first Radio Access Technology (RAT) and a second communications pattern of network resource usage for the second RAT in the heterogeneous wireless network environment; assigning the D2D communications session to the first RAT based on the first communication pattern and the second communication pattern; and in response to detecting network resource usage changes in the first RAT, transitioning the D2D communications session to the second RAT.
Mukesh Taneja, Indermeet S. Gandhi, Jerome Henry
Filed: 7 Apr 21
Utility
Wireless Spectrum Management and Optimization for Dual Transceiver Operation
23 Nov 23
An access point allocates resource units within a first channel to mitigate interference from an adjacent second channel.
Matthew Aaron Silverman, Pooya Monajemi, Vishal Satyendra Desai, John Martin Blosco
Filed: 3 Aug 23
Utility
Thermal Interface Material (Tim) Filling Structure for High Warpage Chips
23 Nov 23
A Thermal Interface Material (TIM) for chip warpage may be provided.
Yongguo Chen, Yaotsan Tsai, Vic Hong Chia, Hua Yang
Filed: 28 Jul 23
Utility
Integrating an Existing Cloud Network into a Target Environment
23 Nov 23
This disclosure describes techniques for integrating an existing cloud network into a new cloud network.
Rajagopalan Janakiraman, Sai Vemuri, Sonia Gulrajani, Sree Balaji Varadharajan, Jose Carlos Recuero Arias
Filed: 23 May 22
Utility
Intelligent Closed-loop Device Profiling for Proactive Behavioral Expectations
23 Nov 23
According to one or more embodiments of the disclosure, intelligent closed-loop device profiling for proactive behavioral expectations is described herein.
Thomas Szigeti, Robert E. BARTON
Filed: 19 May 22
Utility
Forwarding Decisions Based on Header Compression In Industrial Networks
23 Nov 23
In one embodiment, an illustrative method herein may comprise: receiving, at an access device for a network, a packet having a set of packet features; making, by the access device, a determination that the set of packet features of the packet match a forwarding ruleset that defines differentiated services for different types of packets based on their packet features; formulating, by the access device and based on the determination, a compressed header for the packet that has one or more differentiated service indicators based on the forwarding ruleset; and forwarding, from the access device, the packet with the compressed header, to cause forwarding decisions to be made within the network for the packet based on the one or more differentiated service indicators in its compressed header.
Pascal Thubert, Patrick WETTERWALD, Eric LEVY-ABEGNOLI, Jonas ZADDACH
Filed: 20 May 22
Utility
Elastic Overlay Network Generation
23 Nov 23
In one embodiment, a device obtains path probing data for paths between a set of network nodes wherein a first subset of the set of network nodes are operated by a provider of an online application or service and a second subset of the set of network nodes operated by affiliates.
Cody Hartsook, John Parello, Tirthankar Ghose, Giles Douglas Yorke Heron, Felix Sebastian Kaechele
Filed: 18 May 22
Utility
Dynamically Enabling a Transport Control Protocol Proxy for Satellite Networks
23 Nov 23
Techniques for a TCP proxy to communicate over a LEO satellite network on behalf of a client device by selecting a TCP congestion-control algorithm that is optimal for the LEO satellite network based on the time of day and/or location of the TCP proxy.
David John Zacks, Jeff Apcar, Oliver Boehmer, Thomas Szigeti
Filed: 18 May 22
Utility
Orchestration System for Migrating User Data and Services Based on User Information
23 Nov 23
Systems, methods, and computer-readable media for orchestrating data center resources and user access to data.
Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke, Chidambaram Arunachalam, Nagendra Kumar Nainar, Avraham Poupko
Filed: 10 Jul 23
Utility
Providing Switchport Protected Functionality Across Enterprise Access (Fabric) Networks
23 Nov 23
Techniques and architecture are described that utilize switchport protected flags to provide switchport protected functionality across network devices, e.g., switches, routers, etc., in fabric networks.
Sanjay Kumar Hooda, Victor Manuel Moreno, Prakash C. Jain
Filed: 20 May 22
Utility
Authorization and Audit Control In a Multi-protocol Iot Domain
23 Nov 23
In one embodiment, an authorizing device (e.g., a gateway) receives a native protocol request packet from a requesting device destined to a serving device, and translates the native protocol request packet into an authorization protocol mapping.
Jagadish Chundury, Venkat R, Jaswanth D K
Filed: 19 May 22
Utility
Secure Access Service Edge Function with Configured Metric Collection Intelligence
23 Nov 23
In one embodiment, a method herein comprises: receiving, at a device, a registration request from a telemetry exporter that transmits telemetry data; generating, by the device, a telemetry configuration file for the telemetry exporter, the telemetry configuration file defining a policy for transmission of telemetry data from the telemetry exporter and an authentication token for the telemetry exporter; sharing, by the device, the policy with a security enforcer; and sending, by the device, the telemetry configuration file to the telemetry exporter, wherein the telemetry exporter is caused to connect with the security enforcer using the authentication token, send the telemetry configuration file to the security enforcer, and transmit collected telemetry data to the security enforcer, and wherein the security enforcer is caused to create a dynamic publish-subscribe stream for publishing the collected telemetry data received from the telemetry exporter based on the telemetry configuration file and the policy.
Vinay Saini, Rajesh Indira VISWAMBHARAN, Nagendra Kumar NAINAR, Akram Ismail SHERIFF, David John ZACKS
Filed: 20 May 22
Utility
Continuous Trusted Access of Endpoints
23 Nov 23
In one embodiment, an illustrative method herein may comprise: determining, by a device, a profile of an asset in a network, the profile identifying a type of the asset and a particular activity of the asset; determining, by the device, a specific context of the asset within the network; assigning, by the device, a risk score for the profile based on one or more risk factors associated with the profile and a comparison of the profile to an expected behavior of the type of the asset within the specific context; and performing, by the device, one or more mitigation actions based on the risk score.
Robert E. Barton, Nancy Cam-Winget, Thomas Szigeti, Jerome Henry, Flemming Stig Andreasen
Filed: 20 May 22
Utility
Network Api Path Tracing
23 Nov 23
In one embodiment, a device receives traffic flow information regarding an application programming interface call made to a particular endpoint via a path in a network.
Thomas Szigeti, Hendrikus G.P. BOSCH, David John ZACKS, Walter Theodore HULICK, JR., Nagendra Kumar NAINAR
Filed: 20 May 22
Utility
Wireless Transmission Rate Selection with Stateless and Offline Dictionary Compression
23 Nov 23
In one embodiment, a device in a wireless network selects a transmission rate for one or more packets to be sent, based on a received signal strength indicator value.
Alessandro Erta, Carmine BENEDETTO, Rupak CHANDRA, Luca BISTI
Filed: 20 May 22
Utility
Inter-pan Optimization by Controller Device Redirecting Target Network Devices to Attach to Selected Parent Devices
23 Nov 23
In one embodiment, a method comprises: determining, by a controller device, load attributes for respective wireless network devices in a data network comprising at least a first wireless data network rooted by a first root network device, each wireless network device attached to at least an identified parent network device; identifying, by the controller device based on at least a subset of the load attributes, that at least one targeted device among the wireless network devices needs to migrate to a different parent network device in the data network; and causing, by the controller device, the targeted device to detach from its identified parent network device and attach to the different parent network device based on generating and outputting an individual attachment directive destined for the targeted device.
PASCAL THUBERT, HUIMIN SHE, LI ZHAO
Filed: 18 May 22