Managing security of enclosure based on a task status and geographical location of the enclosure

    公开(公告)号:US12235634B2

    公开(公告)日:2025-02-25

    申请号:US17475706

    申请日:2021-09-15

    Abstract: Examples described herein relate to a system and method for managing the security of an edge enclosure. The edge enclosure is deployed in a mobile environment and travels between a base location and a task location to perform a task. The task is defined and configured at a chassis manager by a management device. A server in the edge enclosure processes data associated with the task. The chassis manager detects a loss of communication between the chassis manager and the management device. The chassis manager performs a security action based on task status. The task status is either ongoing or completed. The security action performed at the edge enclosure protects the data present in the server from tampering. The management device transmits alerts to the customers of the edge enclosure after the task is completed.

    SELECTION OF TRANSMITTED VIRTUAL ACCESS POINT FOR MULTIPLE BASIC SERVICE SET IDENTIFIER GROUPS

    公开(公告)号:US20250063613A1

    公开(公告)日:2025-02-20

    申请号:US18449328

    申请日:2023-08-14

    Abstract: In implementations of the present disclosure, there is provided an approach for reducing unnecessary network down. A method comprises determining a plurality of virtual access points (VAPs) of the AP in a radio frequency (RF) band. Then, the plurality of VAPs are divided into a plurality of VAP zones based on a set of data forwarding entities corresponding to overlay VAPs in the plurality of VAPs, and the plurality of VAP zones includes a bridge zone and one or more overlay zones. A VAP is selected from the bridge zone for allocation to an MBSSID group of a set of MBSSID groups for the plurality of VAPs as a transmitted VAP (TX-VAP). The TX-VAP is used to transmit a beacon frame for the MBSSID group. Implementations of the present disclosure can help the AP to reduce unnecessary network down caused by data tunnel broken and limit the negative network impact.

    Uninterrupted multiple basic service set identifiers

    公开(公告)号:US12232018B2

    公开(公告)日:2025-02-18

    申请号:US17513832

    申请日:2021-10-28

    Abstract: Systems and methods are provided for generating an MBSSID virtual access point (VAP) to facilitate an uninterrupted MBSSID. An access point (AP) can determine characteristics, or network properties, of VAPs associated with the AP. The AP can generate an MBSSID VAP based on the characteristics of the VAPs. An MBSSID beacon can be generated using the MBSSID VAP as a transmitted VAP (TX VAP) of the MBSSID beacon. The MBSSID VAP serves as a TX-VAP that is not subject to changes and does not need to be interrupted to have changes made to it. As the MBSSID VAP serves as a TX VAP that is not subject to changes or interruptions, the MBSSID based on the MBSSID VAP does not need to be interrupted for changes to be made to other VAPs associated with the MBSSID.

    Electrical frequency response fluid analysis

    公开(公告)号:US12227433B2

    公开(公告)日:2025-02-18

    申请号:US15569650

    申请日:2016-02-19

    Abstract: In the examples provided herein, a system includes an electrochemical sensor having two electrodes inserted in a fluid to be tested, where an alternative current (AC) voltage is applied across the two electrodes; an electrochemical sensor having two electrodes inserted in a fluid to be tested, wherein an alternative current (AC) voltage across the two electrodes; and a frequency response analyzer to analyze the measured the electrical response across multiple frequencies. The system also includes a memory to store a baseline of the electrical response across multiple frequencies, and a processor to determine from the stored baseline and the measured electrical response whether the electrical response is outside a predetermined range.

    LOAD BALANCING CLIENT CONNECTIONS ACROSS SERVERS OF A TRUST NETWORK

    公开(公告)号:US20250047605A1

    公开(公告)日:2025-02-06

    申请号:US18773755

    申请日:2024-07-16

    Abstract: In some examples, a proxy system establishes a client-side secure network tunnel between the proxy system and a client device, and establishes a plurality of server-side secure connections between the proxy system and respective servers of a trust network. The proxy system load balances a plurality of connections of the client device in the client-side secure network tunnel across the servers of the trust network through respective server-side secure connections of the plurality of server-side secure connections.

    GUIDANCE TOOL FOR CONFIGURING CLOUD SOLUTIONS

    公开(公告)号:US20250047567A1

    公开(公告)日:2025-02-06

    申请号:US18362626

    申请日:2023-07-31

    Abstract: In certain embodiments, a method includes receiving, in association with a configuration of a proposed cloud solution, a selection of a first cloud solution aspect made by a user of a guidance tool, and generating, using a hybrid recommender system, a recommendation for a subsequent selection of a second cloud solution aspect of the configuration of the proposed cloud solution. The hybrid recommender system may include a collaborative filtering system and a content-based filtering system, and may generate the recommendation according to information that includes user information, prior configuration information, and the selection. The method further includes providing the recommendation to the user via a user interface of the guidance tool; receiving the subsequent selection; and generating, by the guidance tool, a proposed cloud solution output based at least in part on the selection and the subsequent selection.

    DATA CENTER CARBON EFFICIENCY OPTIMIZATION

    公开(公告)号:US20250045772A1

    公开(公告)日:2025-02-06

    申请号:US18469681

    申请日:2023-09-19

    Abstract: Examples described herein relate to monitoring a carbon efficiency metric associated with a data center and determining a recommendation to improve the carbon efficiency metric. A data processing device may determine a carbon efficiency metric associated with a data center based on determining a power consumption of an infrastructure device of the data center. The data processing device may determine the carbon efficiency metric further based on estimating a performance of the infrastructure device based on the power consumption. The data processing device may also determine a recommendation to change the data center to improve the carbon efficiency metric based on predicting, using a machine learning model and based on a time-series dataset, whether the carbon efficiency metric is associated with a temporary event. The data processing device may provide the recommendation to an output device.

    Prioritized Message Access Lists for Inter-Process Communication

    公开(公告)号:US20250045132A1

    公开(公告)日:2025-02-06

    申请号:US18362696

    申请日:2023-07-31

    Abstract: In certain embodiments, a method includes providing, by an inter-process communication (IPC) manager, an initial prioritized message access list information set; receiving a second request for at least one prioritized message access list; and providing a prioritized message access list within a shared memory pool. The prioritized message access list may include a prioritized message access list identifier, an intra-list priority range, and a prioritized message access list size. The method may also include parsing, by the IPC manager, a message posted to the prioritized message access list to determine a time at which to alert a receiving process about the message; notifying the receiving process at the determined time; and decrementing, in response to the receiving process consuming the message, a message reference count.

    SYSTEM AND METHOD FOR FILE SCANNING BETWEEN A SOURCE AND CLIENT IN A ZERO TRUST ENVIRONMENT

    公开(公告)号:US20250039195A1

    公开(公告)日:2025-01-30

    申请号:US18359527

    申请日:2023-07-26

    Abstract: A system and method for providing file scanning between a client device and a resource through a zero trust network environment (ZTNE) are disclosed. The method includes detecting in network traffic between the client device and the ZTNE a request to receive a first content from a resource deployed in a private network, wherein the resource is accessible to the user device making first request through the ZTNE; detecting in network traffic between the client device and the ZTNE a second request to send a second content from the client device to a public network, wherein the public network is accessible to the user device making the second request through the ZTNE; sending the request to the public network, in response to determining that the second content is allowable; and blocking the request to the public network, in response to determining that the second content is not allowable network traffic.

Patent Agency Ranking