FULLY AUTOMATED PEN TESTING WITH SECURITY POLICY CORRECTION USING GENERATIVE LLM

    公开(公告)号:US20250097237A1

    公开(公告)日:2025-03-20

    申请号:US18470021

    申请日:2023-09-19

    Inventor: Vincent Parla

    Abstract: In one aspect, a method for penetration testing for optimization of network security policies is disclosed. The method includes determining, by a security management service, that one or more cybersecurity threats successfully penetrated a security service protecting a pseudo-target in a penetration testing environment, analyzing, by the security management service, the one or more cybersecurity threats that successfully penetrated the security service to characterize the one or more cybersecurity threats, and generating, by the security management service, an update of a policy used by the security service that would prevent the one or more cybersecurity threats from penetrating the security service based on the analysis of the one or cybersecurity threats.

    PHYSICAL CODING SUBLAYER WITH MODIFIED BIT ORDERING TO IMPROVE ERROR BURST RESILIENCY

    公开(公告)号:US20250096928A1

    公开(公告)日:2025-03-20

    申请号:US18969740

    申请日:2024-12-05

    Inventor: Adee O. Ran

    Abstract: Techniques are provided to provide modified bit sequences generated by the Physical Coding Sublayer (PCS) functional block in a way that considers the subsequent bit-mux operation of the Physical Media Attachment (PMA) sublayer functional block, in order to create symbol sequences for transmission over the physical channels with properties that optimize the performance of the Forward Error Correction (FEC) decoder with error bursts.

    EFFICIENT SCALING OF PARTITIONED NEURAL NETWORK INFERENCE

    公开(公告)号:US20250094823A1

    公开(公告)日:2025-03-20

    申请号:US18368801

    申请日:2023-09-15

    Abstract: In one implementation, a controller determines performance of a partitioned neural network. The controller identifies, based on the performance, a particular partition of the partitioned neural network as a bottleneck. The controller configures a first device to execute a replica of the particular partition. The controller configures a multiplexer that provides an output of the particular partition or the replica of the particular partition as input to a downstream partition of the partitioned neural network.

    Service plane optimizations with learning-enabled flow identification

    公开(公告)号:US12255910B2

    公开(公告)日:2025-03-18

    申请号:US18462025

    申请日:2023-09-06

    Abstract: The disclosed technology relates to a process for optimizing data flow within a computer network. The technology utilizes shared memory and machine learning logic to improve the efficiency of how computing resources are used during a transmission of data packets in the computer network. The shared memory is implemented during the transmission of data packets between the data plane and the service plane so that the copying of data packets after the data packets have been received and processed by an application is not necessary. The machine learning logic is implemented during the processing of the data packets in order to adjust a frequency or extent that the data packets (and corresponding source of the data packets) need to be evaluated to ensure that malicious content is not being transmitted across the computer network.

    AP Localization Based on Client Anchoring

    公开(公告)号:US20250089013A1

    公开(公告)日:2025-03-13

    申请号:US18465594

    申请日:2023-09-12

    Abstract: Described herein are devices, systems, methods, and processes for improving the accuracy of access point (AP) location in a Wi-Fi network using client device data and AP ranging measurements. APs may be deployed across a specific area. The APs can range to one another and form a matrix of measurements. Techniques such as semidefinite programming or multidimensional scaling (MDS) can be employed to transform these AP-to-AP ranges into a set of coordinates. Client devices in the area may also range to the APs. The client devices may provide their location measurement report (LMR) feedback and geo-position estimation to the network. The client devices-provided data, along with the AP-to-AP matrices, may be returned to a location server. The location server can use the data to refine the accuracy of the AP-to-AP graph and ascertain the most probable geo-position of the APs.

    METHOD TO ELIMINATE CLOCK SYNCHRONIZATION FROM UNDESIRED CLOCK SOURCES

    公开(公告)号:US20250088346A1

    公开(公告)日:2025-03-13

    申请号:US18958309

    申请日:2024-11-25

    Abstract: In one embodiment, methods for monitoring devices within a network by a controller are described. The method may include receiving a first request from a first device to authenticate a role of the first device as a grandmaster in a precision time protocol (PTP). Additionally, the method may include granting the first request designating the role of the first device as the grandmaster. The method may further include receiving a second request from a second device to authenticate that a clock announce message is from an authorized grandmaster. Additionally, the method may include determining whether the first device is authorized to send the clock announce message to the second device and, based on the determining, sending a message granting or denying permission for the first device to sync with the second device.

Patent Agency Ranking