AUTHENTICATING AN INTERMEDIATE COMMUNICATION DEVICE

    公开(公告)号:US20230068972A1

    公开(公告)日:2023-03-02

    申请号:US17461390

    申请日:2021-08-30

    Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.

    USB connection management
    4.
    发明授权

    公开(公告)号:US11561917B2

    公开(公告)日:2023-01-24

    申请号:US17029640

    申请日:2020-09-23

    Abstract: In embodiments of the present disclosure, there is provided a solution for managing a USB connection between a USB device and a host device. According to embodiments of the present disclosure, a USB management server receives, from a USB management client at a host device, USB ID information for identifying a USB device that is plugged into the host device. Whether the USB ID information is valid is determined based on an authentication policy for authenticating the USB device. If the USB ID information is valid, the USB management client is instructed to permit a connection between the USB device and the host device. Accordingly, the connection may be managed by the USB management server. Embodiments of the present disclosure present an effective way for managing USB connections in a centralized way, which provides various flexible authentication policies and requires less manual operations.

    Authenticating an intermediate communication device

    公开(公告)号:US12095905B2

    公开(公告)日:2024-09-17

    申请号:US17461390

    申请日:2021-08-30

    Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.

    Detection and defense system of a network credential sharing application

    公开(公告)号:US11722898B2

    公开(公告)日:2023-08-08

    申请号:US17385652

    申请日:2021-07-26

    CPC classification number: H04W12/121 H04L63/029

    Abstract: Systems and methods are provided for a detection and defense system relating to a network connection sharing application. For example, the system can simulate a request for a network password using a conventional application that shares this information. The application may be implemented on, for example, a mobile device or a virtual machine (VM). In some embodiments, the mobile device/VM attempts to establish a network connection to an access point (AP) using the shared password over a tunnel established between the AP and mobile device/VM. If the mobile device/VM can connect to the AP, an assumption may be made that the user credentials have been leaked and a potential security risk exists. An alert can be sent to a network administrator of the communication network (e.g., to perform an action, etc.). The action may include, for example, changing the password, removing access from one or more users, and the like.

    Adjusting data rates in wireless networks

    公开(公告)号:US11082880B2

    公开(公告)日:2021-08-03

    申请号:US16753246

    申请日:2017-10-27

    Abstract: An example wireless device, comprising: a radio system including an antenna, to receive receiver feedback information, the receiver feedback information being information collected by a receiver relating to receiving status of the receiver; a memory; and a processor executing instructions stored on the memory to: determine whether a level of noises and interferences associated with the receiver exceeds a predefined threshold based on the receiver feedback information; in response to determining that the level of noises and interferences associated with the receiver does not exceed the predefined threshold, obtain a revised data error ratio based on an original data error ratio and the receiver feedback information, the original data error ratio being a data error ratio collected by the wireless device; and adjust the data rate associated with the receiver based on the revised data error ratio.

    COEXISTENCE OF WIFI AND TDMA COMMUNICATIONS WITHIN AN ACCESS POINT IN AN IOT NETWORK

    公开(公告)号:US20200236640A1

    公开(公告)日:2020-07-23

    申请号:US16250790

    申请日:2019-01-17

    Abstract: Systems and methods are provided for implementing a coexistence coordinator in an access point (AP) operating in a Internet of Things (IoT) network. The coexistence coordinator coordinates transmission of both IoT-related data from an IoT radio and WiFi data from a WiFi radio, the IoT radio and the WiFi radio coexisting in the AP. The coexistence coordinator synchronizes time between the WiFi radio and the IoT radio so that times during which IoT-related data is to be sent from the IoT radio (in accordance with Time-Division Multiple Access (TDMA) channel access method) can be determined. Operation of the WiFi radio is suspended during those times when the IoT-related data is transmitted from the IoT radio.

Patent Agency Ranking