Intelligent dynamic air baffle
Granted: January 28, 2025
Patent Number:
12213276
A dynamic air baffle comprises: spaced-apart first and second plates configured to be positioned adjacent to at least one heat source to be cooled by an airflow; a heat insulator sandwiched between the first and second plates; and an air flap coupled to the first and second plates and extending into the airflow; wherein the first and second plates are configured such that a differential temperature between the first and second plates causes a differential expansion in lengths of the…
Slice resource management for reducing the negative impacts of slice quotas
Granted: January 28, 2025
Patent Number:
12213095
A mobile network is operative to perform a quota validation procedure in relation to a maximum number of user equipments (UEs) permitted in a network slice. In one illustrative example, a control plane (CP) function of the mobile network may receive, from the UE, a message which indicates a registration request for registration and includes a slice ID of the network slice. The CP function may manage a registration procedure for assigning resources of the network slice to the UE. The CP…
Observing virtual connectivity reactivity upon mobility events
Granted: January 28, 2025
Patent Number:
12213052
In one embodiment, an illustrative method herein may comprise: receiving, at a first edge device, a direct indication from a second edge device that a mobile device has moved from the first to the second edge device; determining, based on the direct indication, a first time at which the mobile device attached to the second edge device; receiving a network routing update message indicative of a routing update for the mobile device having moved to the second edge device; determining, based…
In-band metadata for authenticity and role-based access in enterprise video streaming services
Granted: January 28, 2025
Patent Number:
12212819
A device receives a video stream, where one or more frames of the video stream include embedded metadata that is embedded directly into the one or more frames. The device extracts the embedded metadata from the one or more frames. The device makes an authentication determination regarding the video stream, based on whether the embedded metadata includes a digital signature associated with a sender of the video stream. The device controls, based on the authentication determination,…
System and method for network policy simulation
Granted: January 28, 2025
Patent Number:
12212476
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.
Dynamic management of security rules and policies
Granted: January 21, 2025
Patent Number:
12206709
A method of managing security rules may include extracting metadata from a data packet received at a first network device. The metadata including network metadata and network system metadata. The method may further include distributing the metadata to at least one service endpoint registered with the first network device, receiving from the at least one service endpoint, an indication as to how traffic associated with the data packet is to be handled, and enabling the traffic based at…
Cooling fan assembly with air guider
Granted: January 21, 2025
Patent Number:
12207435
A fan assembly comprises: a fan having a fan intake and a fan exit downstream from the fan intake, wherein the fan is configured to draw air into the fan intake and propel the air downstream through the fan exit; a housing having a housing inlet coupled to the fan exit and a housing outlet downstream from the housing inlet; and an air guider, mounted inside the housing adjacent to the housing inlet, having a conical shape with a base adjacent to the housing inlet and an apex opposite the…
Facilitating services for devices in private mobile networks based on device authentications in an operator network
Granted: January 21, 2025
Patent Number:
12207354
In one illustrative example, a unified data management (UDM) of a mobile network is established in a UDM set with a plurality of private network UDMs instances of a plurality of private mobile networks. The UDM of the mobile network provides access to a plurality of subscription profiles associated with a plurality of subscribers of the mobile network, and each private network UDM instance provides access to a subset of the subscription profiles associated with a subset of the…
Mobile edge computing with low latency traffic segregation within a PDN using dedicated bearers
Granted: January 21, 2025
Patent Number:
12207125
Presented herein are embodiments that provide mobile edge computing (MEC) with low latency traffic segregation within a packet data network (PDN) using dedicated bearers. Techniques are provided that are performed at an edge user plane entity and a control plane entity to coordinate the directing of low latency traffic over a dedicated bearer broken out at the edge, and to communicate normal latency traffic over a default bearer that is centrally broken out.
Active speaker tracking using a global naming scheme
Granted: January 21, 2025
Patent Number:
12206715
A method includes, at a media bridge configured to distribute a plurality of media streams among a plurality of client devices connected to the media bridge over a network, receiving the plurality of media streams from the plurality of client devices via the media bridge. The media bridge connects the plurality of client devices. The method further includes assigning a pair of names for each of the plurality of media streams. The pair of names include a contribution name and a…
Graph-based detection of network security issues
Granted: January 21, 2025
Patent Number:
12206693
The disclosed techniques relate to a graph-based network security analytic framework to combine multiple sources of information and security knowledge in order to detect risky behaviors and potential threats. In some examples, the input can be anomaly events or simply regular events. The entities associated with the activities can be grouped into smaller time units, e.g., per day. The riskiest days of activity can be found by computing a risk score for each day and according to the…
Security profile selection and configuration of network devices via ownership voucher extension
Granted: January 21, 2025
Patent Number:
12206664
Techniques and architecture are described for providing a configurable security posture for a network device using an extended ownership artifact, e.g., an ownership voucher, an ownership certificate, etc., and a security profile mechanism that scales to user needs and desires for security profiles on network devices, i.e., easily and securely customizable on thousands of nodes of a network. The configurable security posture may be achieved using the manufacturer authorized signing…
Manufacturer usage description (MUD) extensions for secure access service edge (SASE) services
Granted: January 21, 2025
Patent Number:
12206646
Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine…
Path signatures for data flows
Granted: January 21, 2025
Patent Number:
12206581
This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first signature. The method further includes generating a second signature by inputting the first signature and one or more node details into a hash function. The method includes replacing the first signature with the second signature in the packet. The packet including the second value is…
Network path detection and monitoring
Granted: January 21, 2025
Patent Number:
12206573
This disclosure describes techniques for detecting and monitoring paths in a network. The techniques include causing a source node to generate probe packets to traverse a multi-protocol label switching (MPLS) network, for instance. In some examples, the probe packets include entropy values that correspond to individual equal-cost multi-path (ECMP) paths of the network. The probe packets may be received at an SDN controller from a sink node after traversing the network. Analysis of the…
Performance measurement, telemetry, and OAM in MPLS networks using entropy labels
Granted: January 21, 2025
Patent Number:
12206572
Techniques for utilizing entropy labels of a Multiprotocol Label Switching (MPLS) label stack for performing monitoring operations (e.g., telemetry, performance measurement, OAM, etc.) without altering the MPLS label stack and/or packet path (e.g., ECMP path). The techniques may include determining, by a node of a network, to perform a monitoring operation associated with traffic that is to be sent along a path through the network. In some examples, the node may receive a packet that is…
Natural language markup for meetings
Granted: January 21, 2025
Patent Number:
12204810
A natural language markup for meetings is introduced that facilitates planning and facilitation of online meetings. Shared content is obtained during an online meeting. The shared content is shared by a first participant in the online meeting for display on devices of one or more second participants in the online meeting. A visual object is detected in the shared content and additional content is obtained based on detecting the visual object. The additional content is transmitted with…
Dynamic security policy for sharing content in collaborative applications
Granted: January 21, 2025
Patent Number:
12204659
A method, computer system, and computer program product are provided for applying a dynamic security policy to shared content in collaborative applications. A selection of one or more content items is received for sharing in a communication session. A security policy is queried using a key that is associated with each of the one or more content items to determine a security policy for each of the one or more content items. A plurality of users participating in the communication session…
Multiple input neural networks for detecting fraud
Granted: January 21, 2025
Patent Number:
12204619
Embodiments of the present invention set forth a technique for predicting fraud based on multiple inputs including user behavior biometric data along with one or more other parameters associated with the user. The technique includes receiving cursor movement data generated via a client device. The technique further includes generating a image based on the cursor movement data. The technique further includes receiving client parameters generated via the client device. The technique…
Automatic generation of data analysis queries
Granted: January 14, 2025
Patent Number:
12198021
Disclosed herein is a computer-implemented tool that facilitates data analysis by use of machine learning (ML) techniques. The tool cooperates with a data intake and query system and provides a graphical user interface (GUI) that enables a user to train and apply a variety of different ML models on user-selected datasets of stored machine data. The tool can provide active guidance to the user, to help the user choose data analysis paths that are likely to produce useful results and to…