METHOD AND SYSTEM FOR CAPABILITY AWARENESS IN STEERING OF ROAMING

    公开(公告)号:US20250088952A1

    公开(公告)日:2025-03-13

    申请号:US18463057

    申请日:2023-09-07

    Abstract: Systems and methods are provide to bring network capability awareness to steering of roaming (SoR). A home network includes a capabilities list of visited networks and their associated with the network capabilities. For SoR, he user equipment (UE) maintains a roaming partners list (RPL). The RPL provides a list of visited networks arranged in order of priority/preference (e.g., the first visited network in the RPL has first priority). The first visited network receives a registration request from the UE and relays a corresponding authentication request to the home network. The visited network in the RPL can be reordered when the UE requires a network capability not supported by the first visited network in the RPL, as indicated by the capabilities list. Depending on the implementation, the UE or the home network can make this decision to reorder the RPL.

    OPTIMIZED AGENT DEPLOYMENT FOR DATACENTER MONITORING

    公开(公告)号:US20250088448A1

    公开(公告)日:2025-03-13

    申请号:US18244597

    申请日:2023-09-11

    Abstract: In one implementation, a device determines a plurality of routes from one or more sources in a localized network domain to external addresses via a plurality of border leaf nodes of the localized network domain. The device selects, based on a specific performance test from a particular source of the one or more sources to a particular endpoint with a corresponding external address, a particular border leaf node of the plurality of border leaf nodes that is along a utilized route from the particular source to the particular endpoint based on the corresponding external address and the plurality of routes. The device causes the specific performance test to be executed from a particular testing agent installed on the particular border leaf node to the particular endpoint.

    MONITORING OF AUTOMATED FREQUENCY COORDINATION NETWORK TO DETECT AND MITIGATE SUCCESSIVE INTERFERENCE

    公开(公告)号:US20250088294A1

    公开(公告)日:2025-03-13

    申请号:US18466612

    申请日:2023-09-13

    Abstract: Systems and techniques for mitigating interference to incumbent users in a wireless network are described. An example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. A source of the interference is determined using key performance indicator(s), in response to the indication. A set of actions is determined and performed to mitigate the interference. Another example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. Interference information is obtained from a controller associated with the wireless network and includes KPI(s) associated with a set of access points (APs) operating on the channel. A source of the interference is determined based on the interference information. A set of actions to mitigate the interference are determined and performed on one or more of the set of APs.

    MODEL ASSEMBLY WITH KNOWLEDGE DISTILLATION

    公开(公告)号:US20250086493A1

    公开(公告)日:2025-03-13

    申请号:US18243259

    申请日:2023-09-07

    Abstract: In one implementation, a device receives, via a user interface, one or more constraint parameters for each of a plurality of machine learning models that perform different analytics tasks. The device computes, based on the one or more constraint parameters, a set of weights for the plurality of machine learning models. The device generates a unified model by performing knowledge distillation on the plurality of machine learning models using the set of weights. The device deploys the unified model for execution by a particular node in a network.

    Regional Position Estimator for Network Devices

    公开(公告)号:US20250085442A1

    公开(公告)日:2025-03-13

    申请号:US18466716

    申请日:2023-09-13

    Abstract: Devices, systems, methods, and processes for accurately determining a location of a device are described herein. The device may receive Global Navigation Satellite System (GNSS) data from two satellites in two time periods. The device can determine two pseudo range differences corresponding to the two satellites. The device may further determine two contours based on the two pseudo range differences. An overlap between the two contours may be utilized by the device to determine the location. The device can also determine the location of the device based on a contour and an estimated location. The device may utilize a Global Positioning System (GPS) database, an Access Points (AP) database, or one or more servers to retrieve the estimated location. The device can further configure an operating frequency and an output power based on the location in real-time.

    RETROSPECTIVE CAMPAIGN DETECTION, CATEGORIZATION, CLASSIFICATION, AND REMEDIATION

    公开(公告)号:US20250080577A1

    公开(公告)日:2025-03-06

    申请号:US18475896

    申请日:2023-09-27

    Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.

    VULNERABILITY MANAGEMENT BASED ON NETWORK INFRASTRUCTURE SECURITY CONTEXT

    公开(公告)号:US20250080564A1

    公开(公告)日:2025-03-06

    申请号:US18460786

    申请日:2023-09-05

    Abstract: Provided herein are techniques to facilitate vulnerability management for one or more endpoint devices of a network based on network infrastructure security context. In one example, a computer-implemented method may include determining a base vulnerability score for a particular vulnerability that is detected for an endpoint device of an enterprise network; determining topology information for the endpoint device within the enterprise network; translating the particular vulnerability to triggering information; performing a comparison between the security policies for the one or more network security mechanisms of network security infrastructure and the triggering information to determine whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device; and generating an updated vulnerability score for the particular vulnerability by adjusting the base vulnerability score based on whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device.

Patent Agency Ranking