CROSS-APPLICATION PREDICTIVE ROUTING
    291.
    发明公开

    公开(公告)号:US20240323112A1

    公开(公告)日:2024-09-26

    申请号:US18678206

    申请日:2024-05-30

    CPC classification number: H04L45/125 H04L45/123 H04L45/302 H04L47/122

    Abstract: In one embodiment, a device predicts, for each of a plurality of applications accessible via a network, quality metrics for different network paths where traffic for that application be routed via one or more paths among the different network paths. The device generates a congestion risk prediction model that predicts a risk of traffic congestion for a particular combination of: applications from among the plurality of applications, traffic flows associated with those applications, and paths among the network paths via which those traffic flows may be routed. The device performs a constrained optimization based on the predicted quality metrics and on the risk of traffic congestion predicted by the model, to assign traffic flows for the applications to a selected subset of the different paths. The device causes the traffic flows to be routed in the network via the selected subset of the different paths to which they are assigned.

    TRIGGER BASED FINE TIME MEASUREMENT IMPROVEMENT VIA EFFICIENT GROUPING

    公开(公告)号:US20240322878A1

    公开(公告)日:2024-09-26

    申请号:US18190078

    申请日:2023-03-25

    CPC classification number: H04B7/0626 H04B17/318

    Abstract: Fine Time Measurement (FTM) improvement and, specifically, trigger based FTM improvements via efficiently grouping initiators may be provided. A plurality of probe requests transmitted by a plurality of initiators is received. For each probe request, a Received Signal Strength Indication (RSSI) and Channel State Information (CSI) is determined, and a distance between an initiator and an associated responder associated with the probe request is determined based on the RSSI and the CSI. Line of Sight (LOS) or Non Line of Sight (NLOS) relationships between the plurality of initiators and one or more responders is determined based on the CSI. One or more groups of initiators is determined from the plurality of initiators based on the LOS or NLOS relationships and the distances determined for each probe request, wherein the responders and the initiators perform FTM based on the one or more groups of initiators.

    Demand-based scaling of enterprise workloads into cloud networks

    公开(公告)号:US12101257B2

    公开(公告)日:2024-09-24

    申请号:US17681079

    申请日:2022-02-25

    CPC classification number: H04L47/12 H04L67/141 H04L67/148

    Abstract: Techniques for scaling additional capacity for secure access solutions and other workloads of enterprise edge networks in and out of a cloud-computing network based on demand. The techniques may include determining that a capacity associated with a secure access node of an enterprise edge network meets or exceeds a threshold capacity. Based at least in part on the capacity meeting or exceeding the threshold capacity, the techniques may include causing a facsimile of the secure access node to be spun up on a cloud-computing network that is remote from the enterprise edge network. In this way, new connection requests received from client devices can be redirected to the facsimile of the secure access node. Additionally, or alternatively, one or more existing connections between client devices and the secure access node may be migrated to the facsimile of the secure access node in the cloud.

    ANCHORED WI-FI FINGERPRINTING FOR RISK-BASED AUTHENTICATION

    公开(公告)号:US20240314554A1

    公开(公告)日:2024-09-19

    申请号:US18122942

    申请日:2023-03-17

    CPC classification number: H04W12/06 H04W12/79 H04W84/12

    Abstract: This disclosure describes techniques for using an anchored endpoint to enhance MFA authentication of a client device. A method performed at least in part by a security service includes authenticating of a client device connecting to a secure resource. The method also includes determining a first Wi-Fi fingerprint of the client device, determining that the client device is within a threshold proximity to an anchor device, and determining a second Wi-Fi fingerprint of the anchor device. The method also includes detecting a change to the first Wi-Fi fingerprint of the client device and determining that the second Wi-Fi fingerprint of the anchor device has not changed. The method also includes determining whether the client device is within the threshold proximity of the anchor device, if it is, access to the secured resource continues to be allowed, if it is not, a reauthentication of the client device is triggered.

    ROUTING APPLICATION CONTROL AND DATA-PLANE TRAFFIC IN SUPPORT OF CLOUD-NATIVE APPLICATIONS

    公开(公告)号:US20240314219A1

    公开(公告)日:2024-09-19

    申请号:US18670513

    申请日:2024-05-21

    CPC classification number: H04L67/63 H04L45/74 H04L47/2475 H04L67/1001

    Abstract: Techniques for using computer networking protocol extensions to route control-plane traffic and data-plane traffic associated with a common application are described herein. For instance, a traffic flow associated with an application may be established such that control-plane traffic is sent to a control-plane node associated with the application and data-plane traffic is sent to a data-plane node associated with the application. When a client device sends an authentication request to connect to the application, the control-plane node may send an indication of a hostname to be used by the client device to send data-plane traffic to the data-node. As such, when a packet including the hostname corresponding with the data-plane node is received, the packet may be forwarded to the data-plane node.

    CELL-BASED ARCHITECTURE FOR AN EXTENSIBILITY PLATFORM

    公开(公告)号:US20240314047A1

    公开(公告)日:2024-09-19

    申请号:US18671429

    申请日:2024-05-22

    CPC classification number: H04L41/5003

    Abstract: According to one or more embodiments of the disclosure, an example method herein may comprise: managing a particular cell of a multi-celled architecture for an extensibility platform having one or more tenants served by datastores of the particular cell; connecting to a global cell manager for global cell management of all cells of the multi-celled architecture; identifying a consumption limit indicating a maximum amount of system resources that a particular tenant of the one or more tenants is allowed to consume of the particular cell; enforcing the consumption limit on the particular tenant; and ensuring that the particular tenant is provided system resources of the particular cell up to the consumption limit without limitation.

    Master data placement in distributed storage systems

    公开(公告)号:US12093577B2

    公开(公告)日:2024-09-17

    申请号:US17722458

    申请日:2022-04-18

    CPC classification number: G06F3/067 G06F3/0604 G06F3/0644 G06F3/0647

    Abstract: Systems, methods, and computer-readable media for managing a placement of data items on a distributed storage system. In some examples, a method can include determining a location of a master copy of a data item on a distributed storage system, the location including a data store on the distributed storage system; determining an access pattern associated with the master copy of the data item, the access pattern including originating locations of access requests received by the distributed storage system for the master copy of the data item and a respective number of access requests received from each of the originating locations; determining, based on the access pattern, a different location on the distributed storage system for storing the master copy of the data item, the different location including a different data store on the distributed storage system; and placing the master copy of the data item at the different location.

Patent Agency Ranking