SMART BSS-COLORING TO OVERCOME CO-CHANNEL-INTERFERENCE (CCI) FOR WI-FI6
Granted: April 3, 2025
Application Number:
20250113288
Scan reports are received by a Wi-Fi controller from a plurality of access points. Each scan report identifies neighboring BSSIDs with associated BSS-color within radio range and corresponding RSSI measurements. An OBSS can be detected by cross referencing scan reports. BSS color us modified to avoid a potential BSS collision. A station associated the potential BSS collision reports actual color collisions. An indication of the BSS color change is transmitted to one or more access points…
DYNAMICALLY MAXIMIZING SUB-CHANNEL BANDWIDTH UTILIZATION FOR OFDMA TRANSMISSIONS WITH ARTIFICIAL INTELLIGENCE (AI)
Granted: April 3, 2025
Application Number:
20250113254
Real-time statistics of station RU needs are received. Additionally, real-time statistics of access point RU allocation are received. Real-time statistics for stations and access point history are stored. An artificial intelligence (AI) predictive model is generated for each station based on historical traffic needs. AI model to allocate access point RUs for specific stations in real-time.
PREDICTIVE ARTIFICIAL INTELLIGENCE (AI)-BASED WIRELESS STATION LOAD BALANCING BASED ON ACCESS POINT UPLINK UTILIZATION
Granted: April 3, 2025
Application Number:
20250113251
An uplink utilization is monitored for each station connected to an access point over a wireless network, including jitter, latency, and dropped packets. Uplink utilization is monitored for access points that are neighbors to the access point, as determined from neighbor reports. An AI model is generated from monitoring data. When an uplink threshold of the access point has been exceeded at the access point. A new access point is selected from the AI model for at least one of the…
CROSS-PLATFORM NATIVE BROWSER ISOLATION
Granted: April 3, 2025
Application Number:
20250112954
Native Browser Isolation (NBI) distributes resource requirements over the network of clients that will be hosting a web browser. This works over the assumption that modern machines have the spare resources to run an isolated browser environment themselves, thus, not requiring a central mainframe to run the browser isolation (BI) system. The framework will provide means to run the browser in a separate environment from the host OS, provide graphic rendering for the isolated environment,…
ONLINE CODE SIMILARITY AND MALICIOUSNESS SEARCHING USING A VECTOR DATABASE
Granted: April 3, 2025
Application Number:
20250112936
Techniques relate generally to computer networks, and more specifically, for a web browser having a web browser extension for evaluating web requests using internal coordination to make asynchronous information synchronously available, prior to dispatching the web requests.
CRYPTOGRAPHIC PROOFS FOR SEAMLESS SINGLE SIGN-ON (SSO) TO CLOUD SERVICES BASED ON ON-PREMISES AUTHENTICATION
Granted: April 3, 2025
Application Number:
20250112905
A secure connection is established between an IAM server on a data communication network and an on-premises active directory using a zero trust tunnel based on TCP forwarding. An authentication request is received from a gateway device, for the user to access a service provider hosting applications, responsive to a user request for access to the service provider hosting applications. Responsive to recognizing the user of the authentication request being associated with the established…
SOFTWARE DEFINED NETWORK ACCESS FOR ENDPOINT
Granted: April 3, 2025
Application Number:
20250112856
Multiple types of lines are made simultaneously available, including a Wi-Fi link, a cell link and a wired link. A list of running cloud applications is identified by monitoring A quality of each available link for each running cloud application is periodically tested, including measurements of latency, jitter and packet loss. A first link is selected for a first application and a second link is selected for a second application. Data packets related to the first application are…
HARDWARE-ASSISTED PASSIVE APPLICATION MONITORING
Granted: April 3, 2025
Application Number:
20250112850
A processor has hardware acceleration enabled during passive link quality measurement. The processor comprises a forwarding engine to passively gather link quality details from existing network sessions concerning a plurality of links. The link quality details comprise latency, jitter and packet loss. An SD-WAN path selection module identifies a link from the plurality of links for data packets of a current session using the link quality details. A transmission module sends data packets…
DYNAMIC ENV SETTING SIGNATURE BY TWO-DIMENSIONAL RANDOM KEY
Granted: April 3, 2025
Application Number:
20250111055
During an initial bootup in a bootloader of an SOC, a random number that is unique to the device is stored in secured storage. During a first bootup, a two-dimensional random key is stored in secure storage for encoding the ENV parameters. During a second (subsequent) bootup, the ENV parameters that are current in unsecured storage are compared against the ENV parameters that previously existed in order to identify a mismatch. A remediation security action can be taken responsive to a…
COORDINATION OF PROBE RESPONSE RESTRICTIONS IN MULTIPLE WI-FI 7 ACCESS POINT ON A WLAN
Granted: March 27, 2025
Application Number:
20250106737
A Wi-Fi controller receives notification of a probe request of a station that was received from each at least two of the at least two of the two or more Wi-Fi 7 access points of a multiple access point coordination group. The probe requests are each sourced from the station while within the at least partially overlapped radio signal coverage area. The Wi-Fi controller selects one of the at least two of the two or more access points to respond to the probe request with a probe response…
VIRTUAL PRIVATE CLOUD USER INTERFACE
Granted: March 27, 2025
Application Number:
20250106307
A method is disclosed. The method comprises receiving data for a virtual private cloud (VPC), receiving, via a graphical user interface (GUI), a request to access the VPC data and displaying, at the GUI, a resource page providing a filter view of VPC resources including in the VPC data.
SYSTEMS AND METHODS FOR TRAINING AN INSIDER ATTACK MODEL USING IMAGES HAVING BOTH REGION SPECIFICITY AND SPATIAL RELATIONSHIPS
Granted: March 27, 2025
Application Number:
20250103703
Systems, devices, and methods are disclosed that may be used for identifying potential insider attacks on a computer network.
MITIGATION OF ROGUE WI-FI 6E COMPATIBLE ACCESS POINTS
Granted: March 20, 2025
Application Number:
20250097711
A rogue Wi-Fi 6E access points are identified by on-wire data traffic of authorized Wi-Fi 6E access points. Data traffic is monitored across all access points for the rogue Wi-Fi 6E access points according to an SSID/BSSID scan table. In response, modified CSA values are sent from spoofed action frames that have a source BSSID of the rogue access points rather than the authenticated access point that transmits.
SINGLE SIGN-ON (SSO) IDENTIFICATION ACROSS NETWORKS
Granted: March 20, 2025
Application Number:
20250097210
The DHCP requests can be sent by endpoints to get first IP addresses. SSO data concerning the endpoints is collected using an identity service. A DHCP fingerprint is generated for of the each endpoints, including the first IP addresses. DHCP fingerprints are stored to an SSO unification database along with corresponding SSO data for the endpoints at the first IP addresses, including a specific endpoint at a first IP address on the wired network. While tracking, the specific endpoint is…
EMBEDDING AN ARTIFICIALLY INTELLIGENT NEURON CAPABLE OF PACKET INSPECTION AND SYSTEM OPTIMIZATION IN IPV6 ENABLED WLAN NETWORKS
Granted: March 20, 2025
Application Number:
20250097155
Responsive to matching a site prefix to IPV6 network traffic from clients, the traffic as intended, and responsive to not matching the site prefix, classifying the corresponding traffic as unintended. An initial rate of packet occurrence and predict load caused by intended traffic and predicting load caused by unintended traffic is calculated, based on an initial rate of packet occurrence. The predicted traffic loads are fed back by configuring behavior of network modules according to…
SYSTEMS AND METHODS FOR USING VECTOR MODEL NORMAL EXCLUSION IN NATURAL LANGUAGE PROCESSING TO CHARACTERIZE A CATEGORY OF MESSAGES
Granted: March 20, 2025
Application Number:
20250094570
Systems, devices, and methods are disclosed in relation to a vector space model that may be used to characterize a category of messages. In one of many possible implementations, the frequency of words found within a piece of text is determined. These frequencies are compared against the frequencies of words within a given corpus like the Oxford English Corpus by first converting the frequencies to probabilities via the inverse cumulative distribution function assuming a normal…
DETECTING PHISHING WEBPAGES VIA TEXTUAL ANALYSIS FROM SCREENSHOTS
Granted: March 13, 2025
Application Number:
20250088535
To check for phishing, text from a screenshot of the web page and a feature vector describing the text are generated and recognized with OCR. If OCR text is on keyword list, it is determined if web page is suspicious for phishing by inputting features of the web page text in a keyword feature model trained from keyword features of known phishing web pages and/or known legitimate web pages. Responsive to a suspicious web page, web search results are generated from the keywords. Responsive…
PREEMPTIVE NETWORK REMEDIATION OF WIRELESS NETWORK ISSUES WITH ARTIFICIAL INTELLIGENCE TO PREVENT USER SWITCHES TO WIRED NETWORKS
Granted: March 13, 2025
Application Number:
20250088413
A change of a user device from a wireless connection to the enterprise network to a wired connection to the enterprise network (or a cellular network) is detected. In response, a snapshot of network conditions relevant to the user device are detected. A health check on the network conditions can identify specific network issues negatively affecting the user device and the issues are remediated. A remediation model is generated with AI that a different user change will occur based on a…
SYSTEMS AND METHODS FOR EFFICIENTLY PROCESSING COMMUNICATIONS FOR MALICIOUS HYPERLINKS
Granted: March 6, 2025
Application Number:
20250080576
Systems, devices, and methods are discussed for mitigating security threats due to web-domain characteristic changes.
SYSTEMS AND METHODS FOR DEPLOYING AGENTLESS COUNTERMEASURES IN A NETWORK ENVIRONMENT
Granted: February 27, 2025
Application Number:
20250071138
Various approaches for providing network maintenance and health monitoring are discussed. In some cases, some approaches include systems, methods, and/or devices that provide for detecting problematic network behavior and deploying countermeasures in relation to the detected behavior without an agent operating on the device where the countermeasures are implemented.