-
公开(公告)号:US20220092011A1
公开(公告)日:2022-03-24
申请号:US17029640
申请日:2020-09-23
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jiabao JIN , Yafeng JIANG , Jian DONG , Chunfeng WANG , Berend DUNSBERGEN
Abstract: In embodiments of the present disclosure, there is provided a solution for managing a USB connection between a USB device and a host device. According to embodiments of the present disclosure, a USB management server receives, from a USB management client at a host device, USB ID information for identifying a USB device that is plugged into the host device. Whether the USB ID information is valid is determined based on an authentication policy for authenticating the USB device. If the USB ID information is valid, the USB management client is instructed to permit a connection between the USB device and the host device. Accordingly, the connection may be managed by the USB management server. Embodiments of the present disclosure present an effective way for managing USB connections in a centralized way, which provides various flexible authentication policies and requires less manual operations.
-
公开(公告)号:US20220038422A1
公开(公告)日:2022-02-03
申请号:US16944671
申请日:2020-07-31
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Hao LU , Berend DUNSBERGEN , Xiaoding SHANG , Yafeng JIANG
Abstract: Examples of authentication and firewall enforcement for Internet of Things (IoT) devices are described. In an example, a request to authenticate an IoT device coupled to a network device is sent to an authentication server. The request includes a Media Access Control (MAC) address of the IoT device. A response indicative of successful authentication of the IoT device based on the MAC address is received from the authentication server. The response includes a first attribute indicative of a network address of a remote server to connect with the IoT device. A firewall role for the IoT device is generated based on a combination of an Internet Protocol (IP) address of the IoT device and the first attribute. The IoT device is associated with the firewall role.
-
公开(公告)号:US20240365134A1
公开(公告)日:2024-10-31
申请号:US18308407
申请日:2023-04-27
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Qiang ZHOU , Berend DUNSBERGEN , Xuguang JIA
Abstract: Systems and methods are provided for performing live upgrading of Access Points (APs) in WiFi-7. A method of upgrading an AP having Multi-Link Operation (MLO) and a Multi-Link Device (MLD) comprising a UMAC sublayer (MLD UMAC) and an LMAC sublayer (MLD LMAC), includes determining whether the MLD is in tunnel mode, and when the MLD is not in tunnel mode, switching the MLD to tunnel mode. Contents of the MLD UMAC are transferred to a controller; and contents of the MLD LMAC, comprising one or more MLD links, are transferred to one or more neighbor APs. Live upgrade of the upgrading AP is performed, after which the upgrading AP is rebooted. The MLD links previously transferred to the one or more neighbor APs are transferred back to the upgraded AP, and the contents of the MLD UMAC are copied from the controller to the UMAC of the upgraded AP.
-
公开(公告)号:US20210084584A1
公开(公告)日:2021-03-18
申请号:US17108773
申请日:2020-12-01
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Berend DUNSBERGEN , Kannan KONATH , Mohd Shahnawaz SIRAJ
IPC: H04W52/02 , G06F15/78 , G06F1/3206 , H04W4/80
Abstract: Example implementations relate to an access point (AP) that can via up from power save mode via a including Bluetooth low energy (BLE) system-on-chip (SoC) within the AP. The AP can include a power source, a power reset logic component in communication with the power source, a BLE SoC, a processor, and a non-transitory memory resource instructions executable by the processor that signals the AP is in a power save mode, receives an indication, via the BLE SoC, to wake up the AP, and wake up, via the BLE SoC, the AP in response to receiving the indication.
-
公开(公告)号:US20200252380A1
公开(公告)日:2020-08-06
申请号:US16268526
申请日:2019-02-06
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Tejas SATHE , Mohd Shahnawaz SIRAJ , Manoj THAWANI , Berend DUNSBERGEN , Jian DONG , Kannan KONATH , Vaibhav MITTAL
Abstract: Examples described herein provide network enabled control of a security device. Examples include determining that a client device is connected to a network, receiving a request from the client device to instruct a security device to perform an action, wherein the request comprises a key, authenticating the key received from the request, and based on the determination that the client device is authorized to connect to the network, and based on the authentication of the key, sending, by a network device, a signal to instruct the security device to perform the action.
-
-
-
-