Cisco Technology, Inc. patent applications published on October 5th, 2023

From WikiPatents
Revision as of 09:01, 11 October 2023 by Wikipatents (talk | contribs)
Jump to navigation Jump to search

Summary of the patent applications from Cisco Technology, Inc. on October 5th, 2023

Cisco Technology, Inc. has recently filed several patents related to wireless network technologies and extensibility platforms. These patents cover methods for wireless stations to associate with access points using specific identifiers, coordinating frequencies for access points in a wireless network, generating network side beacon reports, creating wireless data networks with specific topologies, providing access to solution packages in a global repository, role-based access control on an extensibility platform, logging and securing communications based on universal references, optimizing load balancing for online applications across network paths, predicting application performance based on client data, and analyzing data flow in a network with network appliances.

Notable applications include:

  • A method for wireless stations to associate with an access point using a specific identifier (BSSID) and switch to a different BSSID while maintaining the association.
  • A method for coordinating frequencies for an access point in a wireless network by evaluating performance and selecting specific channels for each network.
  • A method for generating network side beacon reports in a wireless network based on probe signals received from client devices.
  • A method for creating a wireless data network with a specific topology using perimeter devices and a distance vector-protocol.
  • A method for providing access to different solution packages in a global repository based on tenants' subscriptions and preferences.
  • A method for role-based access control on an extensibility platform, determining appropriate access based on configuration within solution packages.
  • A method for logging, securing communications, and performing digital forensics tasks based on universal references for hardware and software configurations.
  • A device that collects metrics for different network paths used by an online application and generates a load balancing schedule to maximize application experience while minimizing uncertainty.
  • A device that collects data about clients accessing an online application through different network points and selects the best point of presence for each client based on a performance prediction model.
  • A system and method for analyzing data flow in a network with network appliances, combining appliance information with network flow data to understand performance.



Contents

Patent applications for Cisco Technology, Inc. on October 5th, 2023

SYSTEM AND METHOD FOR ELECTRIC VEHICLE CHARGING AND SECURITY (18331350)

Inventor Joel Richard Goergen

Brief explanation

The abstract describes an apparatus and method for charging an electric vehicle. The apparatus includes a power source and a moveable charging arm with a charging plate. The charging arm is connected to the power source and can make contact with the electric vehicle's contact plate. The charging arm is designed to transmit direct current (DC) pulse power, with testing performed between high voltage pulses, directly from the charging plate to the electric vehicle's contact plate. This allows for the charging of the electric vehicle's batteries. The abstract also mentions that a method for charging the electric vehicle is disclosed, although the details of the method are not provided.

Abstract

In one embodiment, an apparatus includes a power source and a moveable charging arm coupled to the power source and comprising a charging plate for contact with an electric vehicle contact plate. The charging arm is operable to transmit direct current (DC) pulse power with testing performed between high voltage pulses directly from the charging plate to the electric vehicle contact plate to charge one or more batteries at the electric vehicle. A method for charging the electric vehicle is also disclosed herein.

FLEXIBLE META MODEL (FMM) FOR AN EXTENSIBILITY PLATFORM (18129432)

Inventor Anna Igorevna Bokhan-Dilawari

Brief explanation

This abstract describes a method for providing an extensibility platform that allows entities to produce observability data. The platform includes flexible meta models that define the entities, their unique identifiers, types, relationships, and the types of observability data they produce. The observability data is processed within the platform using tenant-specific solution packages and the flexible meta models. The data is associated with the entities based on their unique identifiers and is sourced by sources that populate attribute fields and tenant-specified tag fields based on the observed entity.

Abstract

According to embodiments of the disclosure, an example method herein may comprise: providing an extensibility platform for observing entities to produce associated observability data; installing flexible meta models within the extensibility platform, wherein the plurality of flexible meta models define the entities, a globally unique identifier of each of the plurality of entities, a type of each of the entities, relationships between the entities, kinds of observability data, and dependencies among the flexible meta models; and processing the observability data obtained within the extensibility platform based on tenant-specific solution packages and the flexible meta models, wherein the observability data is associated to the entities based on external references to corresponding globally unique identifiers of the entities, and wherein the observability data is sourced by sources configured to populate, based on a corresponding observed entity, attribute fields and tenant-specified tag fields according to that corresponding observed entity.

EXTENSIBILITY PLATFORM (18127982)

Inventor Geoffrey R. Hendrey

Brief explanation

The abstract describes a method for managing an extensibility platform. The method involves providing a core technology stack for the platform and managing multiple solution packages that define data models and access to those models. The solution packages also have dependencies and can include globally shared core solution packages. The method also involves operating based on tenant-based solution packages, which allow for customized extension points for the platform. Finally, the method includes managing the observability data ingestion pipeline of the platform in a multi-tenant environment, taking into account the soft-coded customized extension points.

Abstract

According to one or more embodiments of the disclosure, an example method herein may comprise: providing a core technology stack for an extensibility platform; managing a plurality of solution packages within the extensibility platform that are separated from the core technology stack, each of the plurality of solution packages defining a data model, access to that data model, and dependencies for that data model, wherein the plurality of solution packages have one or more globally shared core solution packages; operating according to one or more tenant-based solution packages within the plurality of solution packages within the extensibility platform, the one or more tenant-based solution packages defining corresponding tenant-specified models and configurations for soft-coded customized extension points for the extensibility platform; and managing multi-tenancy of an observability data ingestion pipeline of the extensibility platform according to the plurality of solution packages including the soft-coded customized extension points for the extensibility platform.

CONFIGURATION-DRIVEN DATA PROCESSING PIPELINE FOR AN EXTENSIBILITY PLATFORM (18128028)

Inventor Geoffrey R. HENDREY

Brief explanation

The abstract describes a process that involves an extensibility platform and solution providers. The process includes determining solution bundles submitted by solution providers, which consist of custom-defined configurations of triggers, inputs, outputs, and sequential steps. The process listens to observability data from the platform and determines trigger conditions based on the workflow definitions. When a trigger condition occurs, the process initiates specific workflows.

Abstract

According to one or more embodiments of the disclosure, an example process herein may comprise: determining, by a process, one or more solution bundles of particular services in an extensibility platform, each solution bundle of the one or more solution bundles submitted by a respective solution provider, the one or more solution bundles having workflow definitions and corresponding container images, the workflow definitions being custom-defined configurations of one or more triggers, one or more inputs, one or more outputs, and one or more sequential steps; listening, by the process, to published observability data of the extensibility platform; determining, by the process and from the published observability data, occurrence of a trigger condition based on the one or more triggers of the workflow definitions of the one or more solution bundles; and initiating, by the process, one or more particular workflows corresponding to the trigger condition in response to occurrence of the trigger condition.

DISASTER RECOVERY IN A CELL MODEL FOR AN EXTENSIBILITY PLATFORM (18128502)

Inventor Geoffrey R. Hendrey

Brief explanation

This abstract describes a method for operating an extensibility platform in a multi-celled architecture. The method involves determining a backup schedule for multiple datastores within a particular cell, sending commands to backup controllers to create backups of the stored data to a local backup volume, and then sending these backups to a cloud storage service once they are completed.

Abstract

According to one or more embodiments of the disclosure, an example method herein may comprise: operating in a particular cell of a multi-celled architecture for an extensibility platform, the particular cell having a plurality of datastores with stored data; determining a backup schedule for the plurality of datastores; sending commands to individual datastore backup controllers based on the backup schedule to cause the individual datastore backup controllers to produce backups of the stored data to a respective local backup volume; and sending, in response to receiving an indication of completion of the backups, the backups of the respective local backup volume to a cloud storage service.

GRAPH-BASED QUERY ENGINE FOR AN EXTENSIBILITY PLATFORM (18126850)

Inventor Anna Igorevna BOKHAN-DILAWARI

Brief explanation

This abstract describes a method for accessing and querying information from a monitoring system for computer networks. The method involves accessing information from an extensibility platform that monitors data related to the network topology. A query is received in a unified query language for the platform, and the method determines which specific data to return based on the query. The query can also include bounding blocks that establish boundaries on the query, such as a topology boundary block that defines a specific network topology. The results of the query are then returned, limited to the specific network topology defined in the query.

Abstract

In one embodiment, a method comprises: accessing information from an extensibility platform configured to monitor observability data from a monitored computer network topology; receiving a query regarding the information, the query formatted according to a unified query language for the extensibility platform; determining which specific requested data from the information to return in response to the query based on a fetch block within the query; determining one or more bounding blocks within the query that establish one or more boundaries on the query, wherein one of the one or more bounding blocks comprises a topology boundary block to define a specific topology of the monitored computer network topology, wherein the specific topology identifies one or more entities within the monitored computer network topology to which the query is specifically directed; and returning results of the query as defined by the requested data to return and limited to the specific topology.

CONFIGURATION-DRIVEN QUERY COMPOSITION FOR GRAPH DATA STRUCTURES FOR AN EXTENSIBILITY PLATFORM (18128504)

Inventor Horst Werner

Brief explanation

This abstract describes a method for creating a customized user interface by determining specific configurations of building blocks, organizing them into a component tree, and consolidating the information requirements into a single query request. The query request is then submitted to a backend system to obtain a query result, which is translated into a data tree that is used to render the user interface.

Abstract

In one embodiment, an example method herein may comprise: determining, for a particular customized user interface instance, specific configurations of specific building blocks of a plurality of configurable atomic building blocks provided by a user interface platform, the specific configurations defining hierarchies between child component data and parent component data that result in a component tree; determining information requirements of the specific building blocks corresponding to components of the component tree; consolidating the information requirements into a single query request according to query language of a backend system, the single query request consisting of a single continuous subgraph; submitting the single query request to the backend system to obtain a query result; and rendering the particular customized user interface instance based on translating the query result into a data tree that recursively passes the query result from parent components to child components within the component tree.

SYSTEMS AND METHODS FOR GENERATING ATTACK TACTIC PROBABILITIES FOR HISTORICAL TEXT DOCUMENTS (17866182)

Inventor Michael Roytman

Brief explanation

The abstract describes a method that uses machine learning to analyze a historical text document related to a breach event. The method searches for a specific attack tactic within the document, calculates the probability of its presence, and compares it to a predetermined threshold. Based on this comparison, the document is categorized accordingly.

Abstract

In one embodiment, a method includes receiving a historical text document that is associated with a breach event. The method also includes searching for an attack tactic within the historical text document using a machine learning algorithm. The method further includes generating a probability that the attack tactic exists within the historical text document, comparing the probability to a predetermined probability threshold, and categorizing the historical text document based on the probability.

SYSTEMS AND METHODS FOR GENERATING RISK SCORES BASED ON ACTUAL LOSS EVENTS (17859730)

Inventor Michael Roytman

Brief explanation

The abstract describes a method that involves assessing the risk of different attack tactics based on a dataset of past loss events. This information is then used to determine the risk score of a specific incident. Additionally, the method involves assigning a priority value to an asset associated with the incident. Using this priority value and the incident risk score, an asset risk score is generated.

Abstract

In one embodiment, a method includes determining an attack tactic risk score for one or more attack tactics based on a dataset of actual loss events and determining an incident risk score for an incident based on the one or more attack tactic risk scores. The method also includes determining a priority value for an asset. The asset is associated with the incident. The method further includes generating an asset risk score for the asset based on the priority value of the asset and the incident risk score.

Systems and Methods for Providing SDWAN IP Multicast without a Rendezvous Point (17710071)

Inventor Manikandan Panchanathan

Brief explanation

The abstract describes a method used by a router in a software-defined wide-area network (SDWAN). The router determines certain replicators within the SDWAN and creates a multicast distribution tree that includes these replicators. When the router receives multicast traffic from a source, it creates a route for this traffic and replicates it using the multicast distribution tree.

Abstract

According to certain embodiments, a method by a router in a software-defined wide-area network (SDWAN) includes determining one or more replicators in the SDWAN and generating a multicast distribution tree that includes the determined one or more replicators. The method further includes receiving multicast traffic from a source and creating a (S,G) route for the received multicast traffic. The method further includes replicating the multicast traffic using the multicast distribution tree.

EMBEDDING CUSTOM CONTAINER IMAGES AND FAAS FOR AN EXTENSIBILITY PLATFORM (18128517)

Inventor Geoffrey R. Hendrey

Brief explanation

This abstract describes a process for managing extensions and data collectors for a specific tenant on an extensibility platform. The process involves configuring an extension, determining the functions needed for data transformations, providing shared egress assistant functions, and sending the data for further processing. The functions are executed as functions-as-a-service at runtime.

Abstract

According to one or more embodiments of the disclosure, an example process herein may comprise: receiving configuration of an extension to manage one or more particular endpoints and data collectors for a particular tenant of an extensibility platform; determining a specification of a container containing one or more particular functions configured to perform required data transformations for the extension; providing one or more shared egress assistant functions configured to receive data from the one or more particular functions; and sending the data from the one or more shared egress assistant functions onto a common ingest for further processing, wherein the one or more particular functions and the one or more shared egress assistant functions are executed as functions-as-a-service at runtime.

DETECTING APPLICATION PERFORMANCE BREAKING POINTS BASED ON UNCERTAINTY AND ACTIVE LEARNING (17708322)

Inventor Vinay Kumar Kolar

Brief explanation

This abstract describes a device that collects information about the performance of a network path used by an online application. The device then uses this information to predict the quality of the application experience. It also identifies a specific point in the network path where the predicted application experience is expected to change from acceptable to degraded. This breaking point is then displayed for further analysis.

Abstract

In one embodiment, a device obtains path metrics for a network path via which traffic for an online application is conveyed. The device models uncertainty of an application experience metric predicted for the online application based on the path metrics. The device identifies, based on the uncertainty of the application experience metric modeled by the device, a breaking point in the path metrics at which the application experience metric predicted for the online application is expected to switch from being acceptable to being degraded. The device provides the breaking point in the path metrics for display.

Network Embedded Framework for Distributed Network Analytics (18205815)

Inventor Ludwig Alexander Clemm

Brief explanation

The abstract describes the establishment of a network analytics controller in a network with multiple nodes. Each node has a network analytics agent. The controller receives network analytics configuration parameters and assigns tasks to the agents based on the specified scope. The agents perform their assigned tasks and report the results back to the controller, which then aggregates the results.

Abstract

A network analytics controller is established in a network. The network includes a plurality of nodes. A plurality of network analytics agents is established; each agent at a node of the network. Network analytics configuration parameters, including a network analytics scope, are received at the networks analytics controller. A task is assigned to each agent at a node determined to be within the network analytics scope, the task comprising that portion of the network analytics specified in the network analytics configuration parameters relevant to the corresponding node. The assigned task is performed at each agent assigned a task. The networks analytics controller receives the results of each performed task, and aggregates the received results.

DYNAMIC MULTI-CLOUD NETWORK TRAFFIC FLOW MONITORING (17690590)

Inventor Rajagopalan Janakiraman

Brief explanation

This disclosure explains a method for monitoring the flow of traffic along a path that includes different cloud service provider networks or private networks. The monitoring can be initiated based on various triggers, such as performance metrics of an application in a multi-cloud environment or current network conditions. Users can also specify when to perform flow monitoring for specific network paths.

Abstract

This disclosure describes dynamically monitoring the flow of traffic along a path that can include points across different cloud service provider networks/regions and/or different private networks. Flow monitoring may be started in response to different triggering events. For instance, flow monitoring of network traffic along one or more network paths may be started in response to performance metrics associate with an application within the multi-cloud environment, current/projected network conditions associated with one or more networks within the multi-cloud environment, and the like. In other examples, a user may specify when to perform flow monitoring for one or more network paths.

LOSS MEASUREMENT ON A LINK WITH REORDERING (17707630)

Inventor Darren Russell Dukes

Brief explanation

This abstract describes a method for determining the number of packets transmitted and received between two nodes over a link. The method calculates these values for different intervals and then calculates packet loss values for each interval. The variability of these packet loss values is then determined, and based on whether it exceeds a threshold, a value associated with reordering detection is configured.

Abstract

According to certain embodiments, a method determines a number of transmitted packets that a first node transmitted to a second node via a link and a number of received packets that the second node received from the first node via the link. The number of transmitted packets and the number of received packets are determined for each interval of a plurality of intervals. The method further comprises determining a plurality of packet loss values. Each packet loss value is associated with a respective interval and is determined based on the number of transmitted packets and the number of received packets associated with the respective interval. The method further comprises determining variability based on the plurality of packet loss values and configuring a value associated with reordering detection based on whether the variability exceeds a threshold.

END-TO-END FLOW VISIBILITY IN A DATA NETWORK INCLUDING SERVICE APPLIANCES (18119100)

Inventor Naoshad Mehta

Brief explanation

The abstract describes a system and method for analyzing data flow in a network that includes network appliances. The system receives information about the network appliances, analyzes it, and stores it. It also receives network flow data from different parts of the network and combines it with the enriched appliance information to provide a comprehensive view of the data flow. This can help understand the performance of the network flow.

Abstract

A system and method for providing end-to-end data flow analytics in a network flow that includes network appliances. Information regarding one or more network appliances is received by a flow collector and analyzed by an enrichment module. The network information regarding the one or more network appliances can be stored. Network flow data is received from various nodes within the network and stitched or aggregated in light of the enriched network appliance information to provide an end-to-end data flow that can be useful to understand one or more performance parameters of the unified network flow.

SASE POP SELECTION BASED ON CLIENT FEATURES (17712423)

Inventor Vinay Kumar Kolar

Brief explanation

This abstract describes a device that collects data about clients accessing an online application through different network points. It then creates a model to predict the application's performance based on the client data for each point of presence. Using this model, the device selects the best point of presence for a specific client and directs them to access the online application through that point.

Abstract

In one embodiment, a device obtains client attribute data for clients of an online application that access the online application via a plurality of points of presence in a network. The device forms a performance model that models an application experience metric for the online application as a function of the client attribute data for each of the plurality of points of presence. The device selects, using the performance model, a particular point of presence from among the plurality of points of presence to be used by a particular client to access the online application, based on its client attribute data. The device causes the particular client to access the online application via the particular point of presence selected by the device using the performance model.

PREDICTIVE APPLICATION-AWARE LOAD-BALANCING BASED ON FAILURE UNCERTAINTY (17712412)

Inventor Vinay Kumar Kolar

Brief explanation

This abstract describes a device that collects metrics for different network paths used by an online application. The device then models the uncertainty of the application experience metric for each network path based on the collected metrics. Using this information, the device generates a load balancing schedule that maximizes the application experience metric across all network paths while minimizing uncertainty. Finally, the device distributes the traffic for the online application across the network paths according to the load balancing schedule.

Abstract

In one embodiment, a device obtains metrics for a plurality of network paths via which traffic for an online application may be conveyed. The device models, for each of the plurality of network paths, uncertainty of an application experience metric predicted for the online application across different values of one or more metrics for that path, based on its obtained metrics. The device generates, based on the uncertainty of the application experience metric modeled for each of the plurality of network paths, a load balancing schedule for the plurality of network paths, to maximize the application experience metric for the online application across the plurality of network paths and with a minimal amount of uncertainty. The device causes traffic for the online application to be load balanced across the plurality of network paths in accordance with the load balancing schedule.

LOGGING AND CONTROLLING COMMUNICATIONS USING UNIVERSAL REFERENCES FOR HARDWARE AND/OR SOFTWARE CONFIGURATIONS (17860582)

Inventor Edward A. Warnicke

Brief explanation

This abstract describes a method, computer system, and computer program that allow for logging, securing communications, and performing digital forensics tasks based on universal references for hardware and software configurations. The first entity obtains a universal reference, which is then included in a request made by the second entity. The universal reference identifies the components of the second entity using additional universal references assigned to each component. The system determines if the first entity is authorized to receive data from the second entity based on the universal reference. If authorized, the data is received from the second entity.

Abstract

A method, computer system, and computer program product are provided for performing logging, securing communications, and performing digital forensics tasks based on universal references for hardware and/or software configurations. A universal reference, obtained by a first entity, is included in a request of a second entity, wherein the universal reference identifies one or more components of the second entity using additional universal references assigned to each of the one or more components. It is determined whether the first entity is authorized to receive data from the second entity based on the universal reference. Based on the determining, data is received from the second entity.

CUSTOM REST ENDPOINTS AND EXTENSIBLE ROLE-BASED ACCESS CONTROL (RBAC) FOR AN EXTENSIBILITY PLATFORM (18128508)

Inventor Geoffrey R. Hendrey

Brief explanation

The abstract describes a process that involves an extensibility platform receiving a request from an entity. The platform is configured with solution packages. The process involves determining the type of the request and the corresponding solution package. Role-based access control is then performed on the request based on the configuration within the solution package. If the entity has appropriate access based on role-based access control, the request is forwarded to a specific endpoint for processing.

Abstract

According to one or more embodiments of the disclosure, an example process herein may comprise: receiving a request into an extensibility platform from an entity, the extensibility platform configured in part by one or more solution packages; determining a type of the request and a particular corresponding solution package of the one or more solution packages; performing role-based access control on the request based on a corresponding role-based access control configuration for the type of the request as configured within the particular corresponding solution package; and forwarding, in response to appropriate access of the entity based on role-based access control, the request to a particular representational state transfer endpoint for the type of request as defined by the particular corresponding solution package, wherein the particular representational state transfer endpoint processes the request.

TENANT-SPECIFIC SOLUTION SUBSCRIPTIONS FOR AN EXTENSIBILITY PLATFORM (18129442)

Inventor Geoffrey R. Hendrey

Brief explanation

This abstract describes a method for providing access to different solution packages in a global repository associated with an extensibility platform. The extensibility platform is a multi-celled architecture, and the solution packages have specific configurations for the platform. The method involves determining the tenants of a specific cell in the architecture and synchronizing the relevant solution packages from the global repository to that cell based on the tenants' subscriptions and preferences.

Abstract

According to one or more embodiments of the disclosure, an example method herein may comprise: providing access to a plurality of solution packages in a global repository associated with an extensibility platform, wherein the extensibility platform is a multi-celled architecture, the plurality of solution packages having specific configurations for execution of the extensibility platform; determining one or more tenants of a particular cell of the multi-celled architecture; and synchronizing one or more particular solution packages of the plurality of solution packages from the global repository to the particular cell based on one or more tenants of the particular cell and subscriptions of the one or more tenants to the one or more particular solution packages.

PERIMETER FORMATION AND MOBILE DEVICE DETECTION IN A RPL NETWORK (17712381)

Inventor PASCAL THUBERT

Brief explanation

The abstract describes a method for creating a wireless data network with a specific topology. The network is divided into two groups of devices called perimeter devices. The root network device creates two paths for these perimeter devices using a distance vector-protocol. The perimeter devices are instructed to connect to only one parent device from either the first or second path. A junction device is placed at the ends of both paths. The junction device forwards data packets from the first path to the root network device through the second path.

Abstract

In one embodiment, a method comprises: creating, by a root network device in a wireless data network, a perimeter topology comprising a first distance vector-protocol path of a first group of perimeter devices and a second distance vector-protocol path of a second group of the perimeter devices, the creating comprising outputting first and second advertisement messages causing the perimeter devices to attach to only one parent of only one of the first or second distance vector-protocol paths and a junction device to attach at respective ends of the first and second distance vector-protocol paths; and causing the junction device to forward, from the first distance vector-protocol path, a data packet toward the root network device via the second distance vector-protocol path.

ADAPTIVE BEACON REPORT FOR CLIENT DEVICES (18328420)

Inventor Ta Chien LIN

Brief explanation

The abstract describes a method of generating network side beacon reports (NSBRs) in a wireless network. These reports are generated based on probe signals received from client devices (CDs). The NSBR mode can be enabled remotely from a CD, and when in this mode, NSBRs are generated using compiled probe signal parameters from the CD.

Abstract

Network side beacon reports (NSBRs) may be generated based on probe signals received from one or more client devices (CDs) in a wireless network. Once enabled, an NSBR mode is configured to generate NSBRs remotely from a CD. When in the NSBR mode, an NSBR may be generated based on compiled probe signal parameters associated with one or more probe signals received from the CD.

DYNAMIC FREQUENCY COORDINATION IN SHARED WIRELESS COMMUNICATION ENVIRONMENTS (18329285)

Inventor Matthew A. SILVERMAN

Brief explanation

This abstract describes a method for coordinating frequencies for an access point (AP) in a wireless network. The method involves evaluating the performance of the AP, which includes analyzing the performance of two separate networks generated by two different radios within the AP. Based on this evaluation, the method selects specific channels for each network, taking into account the transmission power levels and spectral regrowth profiles of the radios. The method then enables communication between devices on the selected channels for each network.

Abstract

Various embodiments herein disclose coordinating frequencies for an access point (AP). A corresponding method comprises evaluating a performance profile for the AP, the performance profile comprising a first part related to a first network generated by a first radio of the AP and a second part related to a second network generated by a second radio of the AP. The method also comprises selecting first channels on which the AP generates the first network based on the performance profile and spectral regrowth profiles for transmission power levels of the first radio. The method additionally comprises selecting second channels on which the AP generates the second network based at least in part on the performance profile and the spectral regrowth profiles. Furthermore, the method comprises enabling communications between a first set of devices on the first channels and enabling communications between a second set of devices on the second channels.

STATION ASSOCIATION CONTINUITY ACROSS ACCESS POINT MAC ADDRESS ROTATIONS (17711488)

Inventor Robert E. Barton

Brief explanation

This abstract describes a method for wireless stations to associate with an access point using a specific identifier (BSSID). The access point can then send a protected management frame to indicate that it will switch to a different BSSID. The access point can rotate to the new BSSID while maintaining the association with the wireless stations. After the rotation, the access point can communicate with the wireless stations using the new BSSID.

Abstract

A method comprising: at an access point configured with a first basic service set identifier (BSSID): performing an association process by which one or more wireless stations wirelessly associate to the access point using the first BSSID; and while the one or more wireless stations remain associated to the access point: sending, to the one or more wireless stations, a protected management frame configured to indicate that the access point will rotate from the first BSSID to a second BSSID; after sending, rotating from the first BSSID to the second BSSID while maintaining continuity of association to the one or more wireless stations; and after rotating, communicating with the one or more wireless stations using the second BSSID.