SYSTEM AND METHOD FOR PROVIDING SMALL CELL GATEWAY REDUNDANCY
    71.
    发明申请
    SYSTEM AND METHOD FOR PROVIDING SMALL CELL GATEWAY REDUNDANCY 有权
    用于提供小型网关冗余的系统和方法

    公开(公告)号:US20170063671A1

    公开(公告)日:2017-03-02

    申请号:US14838139

    申请日:2015-08-27

    CPC classification number: H04L45/28 H04L45/22 H04W24/02 H04W84/045

    Abstract: An example method is provided and may include steps of configuring a HeNB with plurality of global eNode B identities (global eNB IDs), where each global eNB ID is associated with one of a plurality of HeNB gateways (HeNB-GWs), and broadcasting a first global eNB ID by the HeNB when the HeNB is served by a first HeNB-GW. When/if the HeNB loses connectivity with the first HeNB-GW, the method provides a step of switching the broadcasting from the first global eNB ID to a second global eNB ID and re-parenting the HeNB, now broadcasting or is configured to start/continue broadcasting the second global eNB ID, from being served by the first HeNB-GW to being served by a second HeNB-GW.

    Abstract translation: 提供了一种示例性方法,并且可以包括以多个全球eNode B身份(全球eNB ID)来配置HeNB的步骤,其中每个全局eNB ID与多个HeNB网关(HeNB-GW)中的一个相关联,并且广播 当HeNB由第一HeNB-GW服务时,由HeNB提供第一全局eNB ID。 当HeNB与第一HeNB-GW失去连接时,该方法提供将广播从第一全局eNB ID切换到第二全局eNB ID并重新加载HeNB的步骤,现在广播或被配置为启动/ 继续广播第二全球eNB ID,从第一HeNB-GW服务到由第二HeNB-GW服务。

    VULNERABILITY MANAGEMENT BASED ON NETWORK INFRASTRUCTURE SECURITY CONTEXT

    公开(公告)号:US20250080564A1

    公开(公告)日:2025-03-06

    申请号:US18460786

    申请日:2023-09-05

    Abstract: Provided herein are techniques to facilitate vulnerability management for one or more endpoint devices of a network based on network infrastructure security context. In one example, a computer-implemented method may include determining a base vulnerability score for a particular vulnerability that is detected for an endpoint device of an enterprise network; determining topology information for the endpoint device within the enterprise network; translating the particular vulnerability to triggering information; performing a comparison between the security policies for the one or more network security mechanisms of network security infrastructure and the triggering information to determine whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device; and generating an updated vulnerability score for the particular vulnerability by adjusting the base vulnerability score based on whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device.

    USER EQUIPMENT ROUTE SELECTION POLICY FOR MULTI-LINK OPERATION OVER MULTIPLE RADIO ACCESS TECHNOLOGIES

    公开(公告)号:US20250080454A1

    公开(公告)日:2025-03-06

    申请号:US18951757

    申请日:2024-11-19

    Abstract: The present disclosure is directed to a comprehensive Route Selection Policy (URSP) based on Wi-Fi multi-link operation. In one aspect, a method includes identifying a user device connected to an enterprise network that provides network connectivity to user devices over multiple radio access technologies; receiving network capability information indicating that the user device is capable of a multi-link operation over a Wi-Fi network, the Wi-Fi network being one of the multiple radio access technologies; determining a URSP for the user device, wherein the URSP is a singular route selection policy for the user device to send and receive data over the multiple radio access technologies and defines, in part, a per-application traffic routing rule for routing a portion of traffic for an application used on the user device, over one of multiple links available on the Wi-Fi network; and transmitting the URSP to the user device.

    Inter-network short message service among private and public 5G networks

    公开(公告)号:US12219437B2

    公开(公告)日:2025-02-04

    申请号:US17316205

    申请日:2021-05-10

    Abstract: Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.

    END-TO-END NETWORK PATH VISIBILITY ACROSS CLOUD APPLICATION ENVIRONMENTS

    公开(公告)号:US20250016084A1

    公开(公告)日:2025-01-09

    申请号:US18218785

    申请日:2023-07-06

    Abstract: In one embodiment, a device identifies a port associated with a backend probing agent for a cloud-hosted application. The device performs external probing of a path to the cloud-hosted application by sending a probe along the path to the port, to generate external probing results. The device triggers the backend probing agent to generate backend probing results by performing backend probing of a backend service used by the cloud-hosted application. The device causes formation of unified probing results that correlate the external probing results and the backend probing results.

    Pairing disaggregated network elements

    公开(公告)号:US12192090B2

    公开(公告)日:2025-01-07

    申请号:US17497426

    申请日:2021-10-08

    Abstract: Techniques are described herein for pairing disaggregated network elements. In one example, a pairing manager obtains an indication to prioritize high availability when pairing disaggregated network elements. The disaggregated network elements include first disaggregated network elements and second disaggregated network elements. The pairing manager obtains, from one or more of the disaggregated network elements, topology information of the disaggregated network elements. Based on the topology information and the indication to prioritize high availability, the pairing manager pairs topologically-adjacent ones of the first disaggregated network elements with different ones of the second disaggregated network elements.

    AUTOCOMPLETE SUGGESTIONS FOR SPEAKERS IN ONLINE MEETINGS

    公开(公告)号:US20240404517A1

    公开(公告)日:2024-12-05

    申请号:US18325600

    申请日:2023-05-30

    Abstract: Audio is captured from an online meeting and words being spoken by a participant during the online meeting from the audio are identified. One or more suggested next words or phrases to be spoken by the participant are determined based on the words being spoken by the participant and one or more scores associated with previous words spoken by the participant. The words being spoken by the participant and the one or more suggested next words or phrases are generated for display to the participant.

    ROAMING BETWEEN GENERATIONS ACCESS POINTS UTILIZES DIFFERENT SECURITY PROTOCOLS

    公开(公告)号:US20240381188A1

    公开(公告)日:2024-11-14

    申请号:US18356962

    申请日:2023-07-21

    Abstract: The present technology provides for efficient re-association of a STA from a first Wi-Fi AP to a second Wi-Fi AP where the respective Wi-Fi APs utilize different security protocols. Since the association and key management (AKM) protocols are different and the cipher suites between generations of Wi-Fi technology, a STA normally would not be able to take advantage of the fast transition process. However, since the present technology allows the STA to derive the security keys in advance, the STA can perform the fast transition and efficiently roam to the Wi-Fi AP that utilizes a different association and key management (AKM) version.

Patent Agency Ranking