Mobile time-sync distribution
    11.
    发明授权

    公开(公告)号:US12256355B2

    公开(公告)日:2025-03-18

    申请号:US18200231

    申请日:2023-05-22

    Abstract: This technology allows time synchronization in wireless networks with mobile stations. A wireless network controller transmits instructions to access points (“APs”) within the wireless network to monitor transmissions for time synchronization. One or more second APs observe fine time measurement (“FTM”) exchanges between a first AP and a mobile station. A particular second AP determines whether to perform a time synchronization with the first AP based on the detection of the FTM exchange or a determination that the station is moving toward the second AP. For time synchronization, the second AP determines the time that the first AP transmitted the FTM exchange and the time of transmission from the first AP to the second AP. The second AP synchronizes a second AP clock to the summation of the time of the transmission of the FTM exchange and the time of transmission from the first AP to the second AP.

    Method to control multiple cameras in a conference room based on audio tracking and head detection data

    公开(公告)号:US12256173B1

    公开(公告)日:2025-03-18

    申请号:US17943433

    申请日:2022-09-13

    Abstract: A method comprises, at a video conference system having cameras and microphone arrays each co-located with a corresponding one of the cameras: detecting a face of a participant, and estimating orientations of the face relative to the cameras, based on video captured by the cameras; receiving, from each of the microphone arrays, at least two microphone signals that represent detected audio from the participant; separately correlating the at least two microphone signals from each of the microphone arrays against each other using a correlation function, to produce correlation peaks for the microphone arrays corresponding to the microphone arrays and the cameras; determining a preferred camera among the cameras based on the correlation peaks and the orientations of the face relative to the cameras; and transmitting the video captured by the preferred camera to a network.

    Leveraging contextual metadata communication to improve DNS security

    公开(公告)号:US12255868B2

    公开(公告)日:2025-03-18

    申请号:US17862019

    申请日:2022-07-11

    Abstract: Techniques for leveraging efficient metadata communications to improve domain name system (DNS) security are described. The DNS service uses a hash value to uniquely identify a client, and detect any change in metadata in order to keep policies up-to-date for the client. In an example method a first DNS query for a client device is intercepted. A cryptographic hash function is applied to metadata associated with the client device to generate a hash value. The hash value is added to an additional records section of the first DNS query to generate a second DNS query. The second DNS query is transmitted to a DNS service. The metadata associated with the client device is transmitted to the DNS service on an out-of-band encrypted channel. A DNS response, including the hash value, is received from the DNS service and transmitted to the client device.

    METHOD AND SYSTEM FOR CAPABILITY AWARENESS IN STEERING OF ROAMING

    公开(公告)号:US20250088952A1

    公开(公告)日:2025-03-13

    申请号:US18463057

    申请日:2023-09-07

    Abstract: Systems and methods are provide to bring network capability awareness to steering of roaming (SoR). A home network includes a capabilities list of visited networks and their associated with the network capabilities. For SoR, he user equipment (UE) maintains a roaming partners list (RPL). The RPL provides a list of visited networks arranged in order of priority/preference (e.g., the first visited network in the RPL has first priority). The first visited network receives a registration request from the UE and relays a corresponding authentication request to the home network. The visited network in the RPL can be reordered when the UE requires a network capability not supported by the first visited network in the RPL, as indicated by the capabilities list. Depending on the implementation, the UE or the home network can make this decision to reorder the RPL.

    OPTIMIZED AGENT DEPLOYMENT FOR DATACENTER MONITORING

    公开(公告)号:US20250088448A1

    公开(公告)日:2025-03-13

    申请号:US18244597

    申请日:2023-09-11

    Abstract: In one implementation, a device determines a plurality of routes from one or more sources in a localized network domain to external addresses via a plurality of border leaf nodes of the localized network domain. The device selects, based on a specific performance test from a particular source of the one or more sources to a particular endpoint with a corresponding external address, a particular border leaf node of the plurality of border leaf nodes that is along a utilized route from the particular source to the particular endpoint based on the corresponding external address and the plurality of routes. The device causes the specific performance test to be executed from a particular testing agent installed on the particular border leaf node to the particular endpoint.

    MONITORING OF AUTOMATED FREQUENCY COORDINATION NETWORK TO DETECT AND MITIGATE SUCCESSIVE INTERFERENCE

    公开(公告)号:US20250088294A1

    公开(公告)日:2025-03-13

    申请号:US18466612

    申请日:2023-09-13

    Abstract: Systems and techniques for mitigating interference to incumbent users in a wireless network are described. An example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. A source of the interference is determined using key performance indicator(s), in response to the indication. A set of actions is determined and performed to mitigate the interference. Another example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. Interference information is obtained from a controller associated with the wireless network and includes KPI(s) associated with a set of access points (APs) operating on the channel. A source of the interference is determined based on the interference information. A set of actions to mitigate the interference are determined and performed on one or more of the set of APs.

Patent Agency Ranking