AI/ML Assisted Roaming For Wi-Fi Networks

    公开(公告)号:US20240381066A1

    公开(公告)日:2024-11-14

    申请号:US18451556

    申请日:2023-08-17

    Abstract: Described herein are devices, systems, methods, and processes for managing roaming actions in a wireless network. The embodiments utilize a machine learning model to generate roaming recommendations based on a plurality of roaming-related metrics. The metrics include data about the current network conditions, the station's previous roaming experiences, and the capabilities of potential roaming target candidates. The roaming recommendations can be provided to a station by an access point (AP). The station can then attempt to perform a roaming action based on the recommendations. After the attempt, the station transmits a roaming feedback to the AP, which includes data about the success or failure of the roaming action and any additional relevant data. In case the station rejects the roaming recommendations, the station may also provide a feedback indicating the rejection. The feedback is utilized to update the machine learning model, thereby improving the accuracy of future roaming recommendations.

    CHARGING EXCHANGE FOR AMBIENT POWER DEVICES

    公开(公告)号:US20240380482A1

    公开(公告)日:2024-11-14

    申请号:US18497126

    申请日:2023-10-30

    Abstract: Charging for Ambient Power (AMP) devices and, in particular, AMP Backscatter Devices (BKDs) may be provided. AMP device charging may include a transmitting device transmitting an initial charging frame, the initial charging frame comprising a payload for charging. The transmitting device may detect a BKD in response to transmitting the initial charging frame. The transmitting device may then determine a new payload for a new charging frame to charge the BKD and transmit the new charging frame to charge to the BKD.

    METHOD FOR IMPLEMENTING CLOUD-BASED SECURITY PROTOCOLS FOR A USER DEVICE

    公开(公告)号:US20240073248A1

    公开(公告)日:2024-02-29

    申请号:US17898162

    申请日:2022-08-29

    CPC classification number: H04L63/20

    Abstract: A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.

    Identity verification for network access

    公开(公告)号:US11621957B2

    公开(公告)日:2023-04-04

    申请号:US17218602

    申请日:2021-03-31

    Abstract: This disclosure describes techniques for authentication related to verification of identity for network access. The techniques may include sending a challenge associated with authentication to a network to a mobile device. In response to sending the challenge, the techniques may include receiving a challenge response from the mobile device. The challenge response may include biometric credential information associated with a user of the mobile device. The challenge response may also include an indication of an authorization assertion associated with the authentication to the network. In some examples, the techniques may include tailoring access to the network for the mobile device based on the biometric credential information.

    TECHNIQUES FOR SELECTING NETWORK PROTOCOLS

    公开(公告)号:US20220322198A1

    公开(公告)日:2022-10-06

    申请号:US17846482

    申请日:2022-06-22

    Abstract: This disclosure describes techniques for selecting network protocols using heatmaps. For instance, a system may receive radio frequency information from one or more sources located within an environment. The system may then generate heatmaps using the radio frequency information, where the heatmaps represent characteristics associated with different network protocols. The characteristics may include signal strengths, throughputs, data packet drop rates, data packet retry rates, and/or the like for various locations within the environment. A user device may then receive the heatmaps from the system. Using a location of the user device and the heatmaps, the user device may determine to communicate using a network protocol from the different network protocols. The user device may then establish a connection using the network protocol.

    Cloud Content Load Balancing Based On Clean Energy Metrics

    公开(公告)号:US20250036482A1

    公开(公告)日:2025-01-30

    申请号:US18358533

    申请日:2023-07-25

    Abstract: Described herein are devices, systems, methods, and processes for energy-efficient routing in a cloud environment. The system includes a load balancer that distributes incoming traffic across multiple application instances hosted within different availability zones (AZs) based on a preference for sustainable energy sources as communicated by a client device. The client device communicates its preference for sustainable energy sources through a sustainability flag included in a service request. The load balancer steers the service request to the suitable resource based on the sustainability flag. In subsequent interactions, the client device can send a service request with a configuration, such as a sticky cookie. The configuration may allow the load balancer to consistently direct requests from the same client device to the same resource. Accordingly, the embodiments enable energy-efficient routing, client preference for sustainable energy, and consistent service, and contribute to environmental protection.

    Multi-factor authentication using gestures

    公开(公告)号:US12184631B2

    公开(公告)日:2024-12-31

    申请号:US17875105

    申请日:2022-07-27

    Abstract: This disclosure describes techniques for performing multi-factor authentication (MFA) by utilizing user generated authenticating gestures. The techniques may include establishing and monitoring peer-to-peer communication links between user devices. The techniques may include monitoring channel properties for fluctuations in the channel properties associated with the user generated authenticating gesture passing through signals of the communication links. The techniques may further include comparing a gesture performed by a user to a predefined authenticating gesture. The techniques may include determining a pattern of fluctuations in the channel properties associated with the predefined authenticating gesture. The techniques may include determining a confidence score associated with comparing the gesture performed and the predefined authenticating gesture. The techniques may further include determining a proximity of the user and/or the gesture to the user device. The techniques may further include granting or denying the user based at least in part on the proximity and/or the comparison.

    TRAFFIC-BASED TUNNEL ENDPOINT ASSIGNMENT FOR LOCAL AREA NETWORKS

    公开(公告)号:US20240388996A1

    公开(公告)日:2024-11-21

    申请号:US18198635

    申请日:2023-05-17

    Abstract: A network function orchestrator (NFO) of a local area network (LAN) controller can configure multiple different tunnel endpoints in the LAN based on network traffic observed within the LAN. The NFO can monitor network traffic communicated from client devices and through access points in the LAN. The network traffic can be associated with multiple different destinations. The NFO can determine, based on the network traffic and using network topology data, network devices to serve as tunnel endpoints within the LAN. Different tunnel endpoints can be configured for use in connection with different traffic destinations. The NFO can communicate with the network devices and the access points to configure the LAN to use the different tunnel endpoints.

    DYNAMIC OPEN RADIO ACCESS NETWORK RADIO UNIT SHARING BETWEEN MULTIPLE TENANT OPEN RADIO ACCESS NETWORK DISTRIBUTED UNITS

    公开(公告)号:US20240236182A9

    公开(公告)日:2024-07-11

    申请号:US18047828

    申请日:2022-10-19

    CPC classification number: H04L67/1097 H04W72/04

    Abstract: Dynamic Open Radio Access Network Radio Unit (O-RU) sharing between multiple tenant Open RAN Distributed Units (O-DU) may be provided. A Near Real Time RAN Intelligent Controller (nRT-RIC) may receive tenant policies for a first tenant and a second tenant. The nRT-RIC may then determine initial sharing templates for the first tenant and the second tenant based on the tenant policies. The nRT-RIC may send the initial sharing templates to a first tenant Distributed Unit (DU) and a second tenant DU. The nRT-RIC may receive operating metrics from the first tenant DU and the second tenant DU. The nRT-RIC may then determine operational factors based on the operating metrics. The nRT-RIC may alter an allocation of resources between the first tenant and the second tenant based on the operational factors. Finally, the nRT-RIC may send the altered allocation of resources to the first tenant DU and the second tenant DU.

    Dynamic open radio access network radio unit sharing between multiple tenant open radio access network distributed units

    公开(公告)号:US12015669B2

    公开(公告)日:2024-06-18

    申请号:US18047828

    申请日:2022-10-19

    CPC classification number: H04L67/1097 H04W72/04

    Abstract: Dynamic Open Radio Access Network Radio Unit (O-RU) sharing between multiple tenant Open RAN Distributed Units (O-DU) may be provided. A Near Real Time RAN Intelligent Controller (nRT-RIC) may receive tenant policies for a first tenant and a second tenant. The nRT-RIC may then determine initial sharing templates for the first tenant and the second tenant based on the tenant policies. The nRT-RIC may send the initial sharing templates to a first tenant Distributed Unit (DU) and a second tenant DU. The nRT-RIC may receive operating metrics from the first tenant DU and the second tenant DU. The nRT-RIC may then determine operational factors based on the operating metrics. The nRT-RIC may alter an allocation of resources between the first tenant and the second tenant based on the operational factors. Finally, the nRT-RIC may send the altered allocation of resources to the first tenant DU and the second tenant DU.

Patent Agency Ranking