REGULATORY COMPLIANCE FOR WIDE BANDWIDTH WIFI-RANGING MEASUREMENTS

    公开(公告)号:US20250106676A1

    公开(公告)日:2025-03-27

    申请号:US18474551

    申请日:2023-09-26

    Abstract: Examples perform regulatory-compliant traffic checks for a wider bandwidth than a WLAN channel an AP is currently operating over before temporarily increasing the WLAN channel to the wider bandwidth to serve Wi-Fi ranging requests with improved precision. An example AP may: (1) while performing non-ranging Wi-Fi operations over a WLAN channel of a first bandwidth, perform a regulatory-compliant traffic check to determine whether a second bandwidth is clear of priority traffic, wherein the second bandwidth is wider than the first bandwidth; (2) responsive to receiving a Wi-Fi ranging request and determining the second bandwidth is clear of priority traffic, modify the WLAN channel from the first bandwidth to the second bandwidth to serve the Wi-Fi ranging request; and (3) upon completed service of the Wi-Fi ranging request, restore the WLAN channel to the first bandwidth for performing non-ranging Wi-Fi operations.

    Location detection with GNSS and device range measurements

    公开(公告)号:US12253612B2

    公开(公告)日:2025-03-18

    申请号:US17513552

    申请日:2021-10-28

    Abstract: Systems and methods are provided for improving geolocation services, like GPS, using network device measurements. For example, a plurality of access points (APs) or other network devices may be implemented in a network environment and constructed with a GPS chip. Range measurements can be collected from these network devices and incorporated with the GPS locations using various methods described herein to improve the overall location determination of these devices.

    SYSTEM WEAR LEVELING
    4.
    发明申请

    公开(公告)号:US20250086076A1

    公开(公告)日:2025-03-13

    申请号:US18329627

    申请日:2023-02-28

    Abstract: A technique includes receiving information relating to wear of computer nodes. Based on the information relating to the wear, the technique includes ranking the computer nodes according to respective expected remaining lifetimes of the computer nodes. The technique includes, responsive to an event that corresponds to at least one of a spare computer node being added to the system or a given computer node being removed from the system, reconfiguring the system based on the ranking.

    SHAPLEY VALUE COMPUTATION WITH ANALOG CAM

    公开(公告)号:US20250077584A1

    公开(公告)日:2025-03-06

    申请号:US18460425

    申请日:2023-09-01

    Abstract: Examples of the presently disclosed technology provide hardware accelerators (referred to herein as treeShap-aCAMs) that compute Shapley values with improved speed/efficiency leveraging the unique parallel search and analog capabilities of aCAMs. The parallel search capability of a treeShap-aCAM enables evaluation of all root-to-leaf paths of a decision tree (programmed into separate rows of the treeShap-aCAM) in a single clock cycle, greatly reducing time required to compute Shapley values. Relatedly, a treeShap-aCAM's ability to store/evaluate analog values (as opposed to merely binary values), can reduce footprint and hardware (e.g., reduce the number of CAM cells) required to perform Shapley value computations. Accordingly, treeShap-aCAMs can compute Shapley values more rapidly/efficiently than other types of hardware accelerators that e.g., implement algorithms that traverse root-to-leaf paths of decision trees node-to-node.

    STORAGE LOCATION METADATA FOR A DEDUPLICATION STORAGE SYSTEM

    公开(公告)号:US20250077489A1

    公开(公告)日:2025-03-06

    申请号:US18459326

    申请日:2023-08-31

    Abstract: Example implementations relate to deduplication operations in a storage system. An example includes receiving a stream of data units to be stored in a persistent storage of a deduplication storage system; generating a manifest to record a received order of the data units; indexing the data units in container indexes, where each container index records fingerprints and immutable storage locations of one or more data units; in response to a determination that the manifest has reached a threshold size, determining immutable storage locations that are recorded in the container indexes; and updating the manifest to record the determined immutable storage locations.

    Smart Network Interface Card Control Plane for Distributed Machine Learning Workloads

    公开(公告)号:US20250077456A1

    公开(公告)日:2025-03-06

    申请号:US18460043

    申请日:2023-09-01

    Abstract: In certain embodiments, a method includes receiving, at an interface of a Smart network interface card (SmartNIC) of a computing device, via a network, a network data unit; processing, by a data allocator of a SmartNIC subsystem of the SmartNIC, the network data unit to make a determination that data included in the network data unit is intended for processing by an accelerator of the computing device, wherein the accelerator is configured to execute a machine learning algorithm; storing, by the data allocator and based on the determination, the data in a local buffer of the SmartNIC subsystem; identifying, by the data allocator, a memory resource associated with the accelerator; and transferring the data from the local buffer to the memory resource.

    Associating pre-shared keys with client devices based on message integrity check values

    公开(公告)号:US12244695B2

    公开(公告)日:2025-03-04

    申请号:US18050083

    申请日:2022-10-27

    Abstract: A process includes accessing a first message that is sent from an access point device. The first message includes data representing a second message that is sent by a client device. The second message is part of an exchange of messages between the client device and the access point device associated with authentication of the client device and a derivation of a first key used to encrypt and decrypt data communicated between the client device and the access point device. The second message includes a first message integrity check value. The process includes identifying, based on the second message, a pre-shared key corresponding to the client device. The identification of the pre-shared key includes determining a second message integrity check value based on a candidate pre-shared key of a plurality of candidate pre-shared keys; comparing the second message integrity check value with the first message integrity check value; and based on a result of the comparison, selecting the given candidate pre-shared key as the pre-shared key. The process includes determining a user role based on the pre-shared key. The process includes causing a third message to be sent to the access point device, where the third message includes data representing the pre-shared key and data representing the user role.

    Managing security of enclosure based on a task status and geographical location of the enclosure

    公开(公告)号:US12235634B2

    公开(公告)日:2025-02-25

    申请号:US17475706

    申请日:2021-09-15

    Abstract: Examples described herein relate to a system and method for managing the security of an edge enclosure. The edge enclosure is deployed in a mobile environment and travels between a base location and a task location to perform a task. The task is defined and configured at a chassis manager by a management device. A server in the edge enclosure processes data associated with the task. The chassis manager detects a loss of communication between the chassis manager and the management device. The chassis manager performs a security action based on task status. The task status is either ongoing or completed. The security action performed at the edge enclosure protects the data present in the server from tampering. The management device transmits alerts to the customers of the edge enclosure after the task is completed.

    SELECTION OF TRANSMITTED VIRTUAL ACCESS POINT FOR MULTIPLE BASIC SERVICE SET IDENTIFIER GROUPS

    公开(公告)号:US20250063613A1

    公开(公告)日:2025-02-20

    申请号:US18449328

    申请日:2023-08-14

    Abstract: In implementations of the present disclosure, there is provided an approach for reducing unnecessary network down. A method comprises determining a plurality of virtual access points (VAPs) of the AP in a radio frequency (RF) band. Then, the plurality of VAPs are divided into a plurality of VAP zones based on a set of data forwarding entities corresponding to overlay VAPs in the plurality of VAPs, and the plurality of VAP zones includes a bridge zone and one or more overlay zones. A VAP is selected from the bridge zone for allocation to an MBSSID group of a set of MBSSID groups for the plurality of VAPs as a transmitted VAP (TX-VAP). The TX-VAP is used to transmit a beacon frame for the MBSSID group. Implementations of the present disclosure can help the AP to reduce unnecessary network down caused by data tunnel broken and limit the negative network impact.

Patent Agency Ranking