ANONYMIZING CLIENT-SIDE ADDRESSES
    91.
    发明申请

    公开(公告)号:US20250071083A1

    公开(公告)日:2025-02-27

    申请号:US18237578

    申请日:2023-08-24

    Abstract: Techniques for using Prefix Address Translation (PAT), Mobile Internet Protocol (MIP), and/or other techniques to anonymize server-side addresses in data communications. Rather than allowing a server and/or endpoint have visibility of a client IP address of a client device accessing the server and/or endpoint, a virtual network service instead returns a PAT IP address that is mapped to the client device and/or the endpoint device. In this way, IP addresses of clients devices are obfuscated by the virtual network. The client device may then communicate data packets to the server and/or endpoint using the PAT IP address as the source address, and the virtual network service that works in conjunction with the server and/or endpoints can convert the PAT IP address to the actual IP address of the client for return packets using PAT and forward the return packet onto the client device.

    DISTRIBUTED PATH COMPUTATION AND CENTRALIZED PATH ENFORCEMENT IN COMPUTER NETWORTKS

    公开(公告)号:US20250071044A1

    公开(公告)日:2025-02-27

    申请号:US18454704

    申请日:2023-08-23

    Abstract: This disclosure describes techniques for enabling distributed path computation and centralized path enforcement in a computer network used to implement a software application. In some cases, the disclosed techniques include using a central controller that initializes and coordinates monitoring agents deployed to network regions. The monitoring agents may collect monitoring data associated with application segments in their respective regions and share this data with each other. Using the aggregated data, the agents can compute optimal paths between application segment pairs spanning multiple regions. The optimal inter-region paths may be sent to the controller, which can program the paths into the routing application programming interfaces (APIs) of the various network environments like public cloud and on-premises networks.

    CLIENT DEVICE VERIFICATION
    95.
    发明申请

    公开(公告)号:US20250070980A1

    公开(公告)日:2025-02-27

    申请号:US18237583

    申请日:2023-08-24

    Abstract: Techniques for using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to anonymize server-side addresses in data communications and verify an authenticity of a client device attempting to use a virtual IP (VIP) address. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a VIP address that is mapped to the client device and the endpoint device. The client device may then communicate data packets to the server using the VIP address as the destination address, and a virtual network service that works in conjunction with DNS can verify an authenticity of the client device and convert the VIP address to the actual IP address of the server using NAT and forward the data packet onto the server.

    Heat sink with adaptive curvature to mitigate thermal runaway for a circuit component

    公开(公告)号:US12238856B2

    公开(公告)日:2025-02-25

    申请号:US17503000

    申请日:2021-10-15

    Abstract: A heat sink component includes a cold plate including a first surface configured to engage a circuit component and a second surface opposing the first surface, and a plurality of fins extending transversely from the second surface of the cold plate. The first surface includes a non-planar surface portion and a planar surface portion surrounding the non-planar surface portion. The non-planar surface portion of the cold plate provides an adaptive contour to complement a surface of a circuit component that experiences thermal warpage due to change in temperature during operation.

    Detecting and mitigating multi-stage email threats

    公开(公告)号:US12238054B2

    公开(公告)日:2025-02-25

    申请号:US17699579

    申请日:2022-03-21

    Abstract: Techniques for an email-security system to detect multi-stage email scam attacks, and engage an attacker to obtain additional information. The system may analyze emails for users and identify scam emails by analyzing metadata of the emails. The system may then classify the scam emails into particular classes from among a group of scam-email classes. The system may then engage the attacker that sent the scam email. In some instances, the scam emails may be multi-stage attacks, and the system may automatically engage the attacker to move to the next stage of the scam attack. For instance, the system may send a lure email that is responsive to the particular scam class to prompt or provoke the attacker to send more sensitive information, such as a phone number, a bank account, etc. The system may then harvest this sensitive information of the attacker, and use that information for various remedial actions.

    OPTIMIZING CHANNEL ACCESS FOR IMPROVED LATENCE IN WI-FI

    公开(公告)号:US20250063590A1

    公开(公告)日:2025-02-20

    申请号:US18449560

    申请日:2023-08-14

    Abstract: The present disclosure is directed to determining a first radio as a downlink for transmitting data frames from a first wireless endpoint device to second wireless endpoint devices, determining a second radio as an uplink for transmitting data frames from the second wireless endpoint devices to the first wireless endpoint device, enabling transmissions of data frames from the second wireless endpoint devices to the first wireless endpoint device on the uplink, detecting a first data frame with a latency requirement to be transmitted from the first wireless endpoint device to a targeted second wireless endpoint device, replacing any data frame not associated with a latency requirement in an aggregated MAC protocol data unit with the first data frame, and transmitting the first data frame to the targeted second wireless endpoint device on the downlink.

    MULTI-FACTOR AUTHENTICATION USING GESTURES

    公开(公告)号:US20250063033A1

    公开(公告)日:2025-02-20

    申请号:US18936901

    申请日:2024-11-04

    Abstract: This disclosure describes techniques for performing multi-factor authentication (MFA) by utilizing user generated authenticating gestures. The techniques may include establishing and monitoring peer-to-peer communication links between user devices. The techniques may include monitoring channel properties for fluctuations in the channel properties associated with the user generated authenticating gesture passing through signals of the communication links. The techniques may further include comparing a gesture performed by a user to a predefined authenticating gesture. The techniques may include determining a pattern of fluctuations in the channel properties associated with the predefined authenticating gesture. The techniques may include determining a confidence score associated with comparing the gesture performed and the predefined authenticating gesture. The techniques may further include determining a proximity of the user and/or the gesture to the user device. The techniques may further include granting or denying the user based at least in part on the proximity and/or the comparison.

Patent Agency Ranking