-
公开(公告)号:US20240015788A1
公开(公告)日:2024-01-11
申请号:US18150691
申请日:2023-01-05
Applicant: Cisco Technology, Inc.
Inventor: Matthew A. SILVERMAN , Brian D. HART , Ardalan ALIZADEH , Robert E. BARTON , Jerome HENRY , Juan Carlos ZUNIGA , Malcolm M. SMITH , Scott R. BLUE , John M. SWARTZ
CPC classification number: H04W74/0816 , H04L5/0007 , H04L5/0055 , H04L1/0058
Abstract: Disclosed methods and systems for efficiently gathering reports from stations coupled to an access point via a wireless network. In some cases, the reports may be attached to block acknowledge frames, which often occur. Alternatively, when multiple stations operate with assigned resource units during a transmission opportunity (TXOP), the reports are embedded in the spare capacity of a physical protocol data units used during the TXOP.
-
公开(公告)号:US20240014859A1
公开(公告)日:2024-01-11
申请号:US18061977
申请日:2022-12-05
Applicant: Cisco Technology, Inc.
Inventor: Robert E. BARTON , Jerome HENRY , Matthew A. SILVERMAN , John M. SWARTZ
CPC classification number: H04B7/024 , H04B7/0617
Abstract: Techniques for beamforming from wireless stations (STAs) are disclosed. These techniques include identifying a plurality of STAs for a beamforming group, for transmission to a wireless access point (AP). The techniques further include receiving, at the AP, first data transmitted from each of the plurality of STAs in the beamforming group to the AP at least partially at the same time, wherein the transmitting the first data from each of the plurality of STAs results in constructive interference between the transmissions from the plurality of STAs to the AP, and wherein the same first data is received from each of the plurality of STAs in the beamforming group.
-
公开(公告)号:US20230059304A1
公开(公告)日:2023-02-23
申请号:US17445295
申请日:2021-08-17
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar NAINAR , Robert E. BARTON , Carlos M. PIGNATARO , Jerome HENRY , Bart A. BRINCKMAN
Abstract: Aspects of the disclosure include a method and associated network device. The method includes authenticating an identity of a user of a client device after the client device is associated with an access network provider. Authenticating the identity of the user comprises receiving, from an identity provider, a credential associated with the identity, and receiving, from the identity provider, information identifying a network-based service to be applied to network traffic with the client device. The method further includes establishing, using the credential and the received information, a secure connection between the access network provider and a service provider that is capable of providing the network-based service. The method further includes receiving network traffic from the service provider. Packets of the network traffic include an assurance value that enables the client device to determine that the network-based service is being provided by the service provider.
-
公开(公告)号:US20220385346A1
公开(公告)日:2022-12-01
申请号:US17332670
申请日:2021-05-27
Applicant: Cisco Technology, Inc.
Inventor: Jerome HENRY , Robert E. BARTON , Matthew A. SILVERMAN , Pooya MONAJEMI
Abstract: Spurious beamforming in high density environments can be reduced via transmitting a first signal from a first Access Point (AP) to a first endpoint associated with the first AP via a first beamforming arrangement; in response to identifying that the first beamforming arrangement is pollutive to a second endpoint associated with a second AP: deprecating the first beamforming arrangement; and transmitting a second signal from the first AP to the first endpoint via a second beamforming arrangement, different from the first beamforming arrangement.
-
公开(公告)号:US20220377002A1
公开(公告)日:2022-11-24
申请号:US17816887
申请日:2022-08-02
Applicant: Cisco Technology, Inc.
Inventor: Thomas SZIGETI , Jerome HENRY , Robert E. BARTON , Malcolm M. SMITH
IPC: H04L43/0864 , H04L43/0894 , H04L43/10 , H04W24/04 , H04W24/10 , H04W84/12
Abstract: Automating and extending path tracing through wireless links is provided by receiving request to perform a network trace over a wireless link provided by an Access Point (AP) configured as a transparent forwarder between a trace source and a trace target; monitoring a trace packet from a first time of arrival at the AP, a first time of departure from the AP, a second time of arrival at the AP, and a second time of departure from the AP; monitoring a buffer status of the AP at the first time of arrival and the second time of arrival; and in response to identifying a network anomaly based on the trace packet and the buffer status, adjusting a network setting at the AP.
-
公开(公告)号:US20220338010A1
公开(公告)日:2022-10-20
申请号:US17301971
申请日:2021-04-20
Applicant: Cisco Technology, Inc.
Inventor: Jerome HENRY , Robert E. BARTON , Bart A. BRINCKMAN
Abstract: Techniques for trusted roaming between identity federation based networks. A first wireless access point (AP) receives a roaming request from a wireless station (STA), to roam from the first AP to a second AP. The first AP is associated with a first access network provider (ANP), the second AP is associated with a second ANP, and the first ANP is different from the second ANP. Authentication information relating to the STA is transmitted from the first ANP to the second ANP using a trusted connection. The trusted connection was previously established between the first ANP and the second ANP based on a query to an identity federation to which both the first and second ANP belong. The STA is de-associated from the first AP. The STA is re-associated at the second AP using the transmitted authentication information
-
公开(公告)号:US20220286447A1
公开(公告)日:2022-09-08
申请号:US17249644
申请日:2021-03-08
Applicant: Cisco Technology, Inc.
Inventor: Robert E. BARTON , Jerome HENRY , Nagendra Kumar NAINAR , Carlos M. PIGNATARO , Bart A. BRINCKMAN
IPC: H04L29/06
Abstract: Aspects described herein include a method and related network device and computer program product. The method includes authenticating an identity of a user of a client device associated with an access network provider. Authenticating the identity of the user includes receiving, from an identity provider, a credential associated with the identity and information identifying a network-based security service to be provided to the client device. The method further includes establishing, using the credential and the received information, a secure connection between the access network provider and a security service provider that is capable of providing the network-based security service to the client device.
-
公开(公告)号:US20220141714A1
公开(公告)日:2022-05-05
申请号:US17148146
申请日:2021-01-13
Applicant: Cisco Technology, Inc.
Inventor: Malcolm M. SMITH , Jerome HENRY , Mark GRAYSON , Robert E. BARTON , Bart A. BRINCKMAN
Abstract: Embodiments herein describe techniques for dynamically negotiating an SLA between a roaming device and a VN in an identity federation. Instead of an IDP having to individually negotiate with a VN to decide on an SLA before a user device roams to the VN, the parties can dynamically negotiate the SLA after the user device has detected the VN (but before the device is permitted to connect or associate with the VN). In one embodiment, when a roaming user device comes within wireless range of a VN, the roaming device receives an advertisement from the VN that indicates the current SLA (or SLAs) offered by the VN. The roaming device can compare this offered SLA to a stored SLA in an identity profile the device received from the IDP to determine whether to accept the offer. In another embodiment, the SLA is instead negotiated between VN and the IDP.
-
公开(公告)号:US20220132365A1
公开(公告)日:2022-04-28
申请号:US17077865
申请日:2020-10-22
Applicant: Cisco Technology, Inc.
Inventor: Robert E. BARTON , Jerome HENRY , Akram I. SHERIFF , Thomas SZIGETI
Abstract: Techniques and apparatus for managing congestion in a wireless network are provided. One technique includes receiving one or more buffer status reports (BSRs) from one or more client stations. Each BSR indicates an amount of traffic in a transmit queue of the client station. An allocation of resource units (RUs) for the one or more client stations is determined, based on at least a type of traffic in each transmit queue of the one or more client stations, upon a determination that there is congestion on an uplink wireless channel shared by the one or more client stations. A frame that includes an indication of the allocation of RUs for the one or more client stations is generated. The frame is transmitted to the one or more client stations.
-
公开(公告)号:US20210364597A1
公开(公告)日:2021-11-25
申请号:US16880797
申请日:2020-05-21
Applicant: Cisco Technology, Inc.
Inventor: Akram I. SHERIFF , Jerome HENRY , Robert E. BARTON , Pooya MONAJEMI
Abstract: Embodiments for securing fine timing measurement (FTM) communications are described. FTM communications include FTM frames sent and received from an initiating station (ISTA) and a responding station (RSTA). The RSTA records a plurality of parameters associated with the FTM frames and uses the plurality of parameters to learn and identify a device profile for the ISTA. The device profile is used to determine a behavior filter for the FTM from the ISTA and the RSTA filters FTM traffic according to the behavior filter to prevent malicious attacks in the FTM communications.
-
-
-
-
-
-
-
-
-