Juniper Networks, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 3 737 pour Juniper Networks, Inc. Trier par
Recheche Texte
Excluant les filiales
Affiner par Reset Report
Type PI
        Brevet 3 644
        Marque 93
Juridiction
        États-Unis 3 637
        International 51
        Canada 26
        Europe 23
Date
Nouveautés (dernières 4 semaines) 12
2025 septembre (MACJ) 3
2025 août 11
2025 juillet 35
2025 juin 19
Voir plus
Classe IPC
H04L 12/24 - Dispositions pour la maintenance ou la gestion 474
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 458
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks] 365
H04L 12/26 - Dispositions de surveillance; Dispositions de test 356
H04L 12/46 - Interconnexion de réseaux 329
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 77
42 - Services scientifiques, technologiques et industriels, recherche et conception 55
41 - Éducation, divertissements, activités sportives et culturelles 37
37 - Services de construction; extraction minière; installation et réparation 32
38 - Services de télécommunications 17
Voir plus
Statut
En Instance 299
Enregistré / En vigueur 3 438
  1     2     3     ...     38        Prochaine page

1.

CONFIGURATION OF A FIXED WIRELESS ACCESS DEPLOYMENT

      
Numéro d'application 18926833
Statut En instance
Date de dépôt 2024-10-25
Date de la première publication 2025-09-11
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Padebettu, Venkatesh

Abrégé

A distribution point unit (DPU) is associated with an fixed wireless access (FWA) deployment. The DPU identifies configuration information that indicates respective correspondences between a plurality of ports of the DPU and address identifiers of a plurality of access point devices. The DPU determines that the plurality of ports of the DPU are connected to the plurality of access point devices and performs a verification operation to determine that the plurality of access point devices are connected to the plurality of ports in accordance with the configuration information. The DPU obtains, based on the configuration information, respective Internet protocol (IP) addresses associated with the plurality of access point devices. The DPU transmits, via respective connections between the plurality of ports of the DPU and the plurality of access point devices, the respective IP addresses to the plurality of access point devices.

Classes IPC  ?

  • H04W 76/11 - Attribution ou utilisation d'identifiants de connexion
  • H04W 80/04 - Protocoles de couche réseau, p. ex. protocole Internet mobile [IP Internet Protocol]

2.

DYNAMIC MULTIPATH LOAD BALANCING

      
Numéro d'application 18598326
Statut En instance
Date de dépôt 2024-03-07
Date de la première publication 2025-09-11
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kumar, Suraj
  • Palanisamy, Balaji
  • Punja, Samatha Madhusudan

Abrégé

In some implementations, a first network device may receive a first message generated by an originating network device that includes a route location identifier attribute associated with an address identifier. The first network device may determine, based on the route location identifier attribute, route information associated with the address identifier.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 45/24 - Routes multiples
  • H04L 45/302 - Détermination de la route basée sur la qualité de service [QoS] demandée

3.

Methods and apparatus for efficient use of link aggregation groups

      
Numéro d'application 18413690
Numéro de brevet 12407624
Statut Délivré - en vigueur
Date de dépôt 2024-01-16
Date de la première publication 2025-09-02
Date d'octroi 2025-09-02
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kamisetty, Jeevan Madhu
  • Mantha, Lakshmana Murthy
  • White, Joseph L.
  • Gordon, Simon Jonathan

Abrégé

A non-transitory processor-readable medium storing code representing instructions to be executed by a processor can cause the processor to receive an indication to load balance a group of sessions associated with a network node and a switch across a group of links between a gateway device and the switch at a first time. The code causes the processor to calculate at a second time, a load based on the group of sessions and associated with a first set of links in an active configuration before the first time. The code causes the processor to send a signal to cause a set of sessions from the group of sessions to re-establish themselves at a third time based on a threshold value calculated based on the load such that the set of sessions are load balanced across a second set of links in the active configuration at the third time.

Classes IPC  ?

  • H04L 47/76 - Contrôle d'admissionAllocation des ressources en utilisant l'allocation dynamique des ressources, p. ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau

4.

METHODS AND APPARATUS FOR PERFORMING ACCESS AND/OR FORWARDING CONTROL IN WIRELESS NETWORKS SUCH AS WLANS

      
Numéro d'application 19199111
Statut En instance
Date de dépôt 2025-05-05
Date de la première publication 2025-08-28
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Frei, Randall W.
  • Hajela, Sujai
  • Goldstone, Guy
  • Dade, Nicolas S.
  • Cheng, Linker

Abrégé

Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
  • H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]

5.

EVPN HOST ROUTED BRIDGING (HRB) AND EVPN CLOUD NATIVE DATA CENTER

      
Numéro d'application 19197232
Statut En instance
Date de dépôt 2025-05-02
Date de la première publication 2025-08-28
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Lin, Wen
  • Gupta, Manish
  • Channalli, Shivakumar
  • Nallamothu, Vinay K.

Abrégé

Techniques for EVPN Host Routed Bridging (HRB) and EVPN cloud-native data center with Host Routed Bridging (HRB) are described. A host computing device of a data center includes one or more containerized user-level applications. A cloud native virtual router is configured for dynamic deployment by the data center application orchestration engine and operable in a user space of the host computing device. Processing circuitry is configured for execution of the containerized user-level applications and the cloud native virtual router. The cloud native virtual router comprises a containerized routing protocol process configured to operate as a control plane, and a data plane for the containerized router. The data plane is configured to operate an ethernet virtual private network (EVPN) encapsulation/decapsulation data path of an overlay network for communicating layer two (L2) network traffic of the containerized user applications over a switch fabric of the data center.

Classes IPC  ?

  • H04L 45/745 - Recherche de table d'adressesFiltrage d'adresses
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 49/25 - Routage ou recherche de route dans une matrice de commutation

6.

NETWORK DEVICE TESTING WITH VIRTUAL CLIENT FUNCTIONS

      
Numéro d'application 18590136
Statut En instance
Date de dépôt 2024-02-28
Date de la première publication 2025-08-28
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Frei, Randall

Abrégé

The disclosure describes one or more techniques for performing roaming tests for sites. For example, a device comprises a memory and one or more processors in communication with the memory and configured to obtain instructions that cause a device of a site to operate as a synthetic client device and to simulate a roaming instance; and send data associated with the roaming instance to a network management system, wherein the data is indicative of a performance of the roaming instance.

Classes IPC  ?

  • H04W 24/06 - Réalisation de tests en trafic simulé
  • H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
  • H04W 12/08 - Sécurité d'accès

7.

LOCATION DETERMINATION OF A DEVICE BASED ON DIRECTIONAL INFORMATION OF SIGNALS

      
Numéro d'application 19040194
Statut En instance
Date de dépôt 2025-01-29
Date de la première publication 2025-08-21
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wright, Christopher Wesley
  • Zohoorian, Mohammad
  • Srinivasan, Nagarjun

Abrégé

Techniques describe a network management system comprising a memory and processing circuitry configured to obtain distance measurements between at least two devices at a site, wherein the at least two devices comprise at least one reference device positioned at a known location and a target device relative to the at least one reference device positioned at an unknown location. The processing circuitry may further be configured to obtain directional information specifying a direction of one or more signals communicated between the at least one reference device and the target device. The processing circuitry may further be configured to determine, based on the distance measurements and the directional information, a plurality of possible positions of the target device relative to the at least one reference device. The processing circuitry may further be configured to determine, based on the directional information, a candidate position from the plurality of possible positions.

Classes IPC  ?

  • H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité
  • G01S 13/76 - Systèmes utilisant la reradiation d'ondes radio, p. ex. du type radar secondaireSystèmes analogues dans lesquels des signaux de type pulsé sont transmis

8.

ETHERNET-TREE (E-TREE) INTEGRATED ROUTING AND BRIDGING (IRB) WITH EGRESS LINK PROTECTION

      
Numéro d'application 19044491
Statut En instance
Date de dépôt 2025-02-03
Date de la première publication 2025-08-21
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Sikand, Vrishabha
  • Lin, Wen
  • Gupta, Deepen

Abrégé

A first leaf provider edge device may determine that a customer edge device is multihomed behind the first leaf provider edge device and a second leaf provider edge device. The first leaf provider edge device may create, based on determining that the customer edge device is multihomed, a protection path for a network address of the customer edge device and via the second leaf provider edge device. The first leaf provider edge device may prevent traffic not received from a core network from being provided to the customer edge device via the protection path.

Classes IPC  ?

  • H04L 45/28 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données en utilisant la reprise sur incident de routes
  • H04L 45/03 - Mise à jour ou découverte de topologie en mettant à jour les protocoles d’état de lien

9.

SELF-LEARNING SERVICE SCHEDULER FOR SMART NICS

      
Numéro d'application 19189729
Statut En instance
Date de dépôt 2025-04-25
Date de la première publication 2025-08-21
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kommula, Raja
  • Sunkada, Ganesh Byagoti Matad
  • Sridhar, Thayumanavan
  • Krishnamoorthy, Rajasree
  • Yavatkar, Raj
  • Gupta, Jit
  • Kant, Krishna

Abrégé

An example method comprises determining, by an edge services controller, based on a respective predicted resource utilization value for each of a plurality of servers, a corresponding server weight for each of the plurality of servers; the plurality of servers comprising respective network interface cards (NICs), wherein each NIC of the plurality of NICs comprises an embedded switch and a processing unit coupled to the embedded switch; determining, by the edge services controller, based on a respective predicted resource utilization value for each of a plurality of services, a corresponding application weight for each of the plurality of services; and scheduling, by the edge services controller, based on the respective server weight for a server of the plurality of servers and the respective application weight for the service, a service of the plurality of services on the server.

Classes IPC  ?

  • H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p. ex. la mémoire disponible ou la charge de travail
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

10.

DETERMINING LOCATION BASED ON DYNAMIC PATH LOSS EXPONENT (PLE) AND INTERCEPT (INT) ESTIMATION

      
Numéro d'application 19191365
Statut En instance
Date de dépôt 2025-04-28
Date de la première publication 2025-08-14
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Zohoorian, Mohammad
  • Berry, Robert D.

Abrégé

Methods of deriving location information of a wireless device include deriving, in the continuous domain, a location of a wireless device and at least one time and location varying path loss function parameter. The coordinates and parameter are derived based on signal strength measurements made at the wireless device, with the measured signals originating from a plurality of wireless transmitters, such as access points. The derived path loss function parameter can include one or more of a path loss exponent parameter, an intercept parameter, a receiver antenna gain parameter, transmitter antenna gain parameter, or a transmit power parameter.

Classes IPC  ?

  • H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
  • G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de positionLocalisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
  • H04W 24/08 - Réalisation de tests en trafic réel

11.

LOCAL BREAKOUT FOR CUSTOMER PREMISE EQUIPMENT IN A 5G WIRELESS WIRELINE CONVERGENCE AT AN ACCESS GATEWAY FUNCTION

      
Numéro d'application 19195822
Statut En instance
Date de dépôt 2025-05-01
Date de la première publication 2025-08-14
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Padebettu, Venkatesh
  • V, Jamuna S.

Abrégé

A network device may enable local breakout for a subscriber device, and may create, for the subscriber device, a primary path to a data network via a user plane function. The network device may create, for the subscriber device, a secondary path direct to the data network and based on the local breakout being enabled, and may determine whether a connection with the user plane function is available. The network device may selectively provide traffic between the subscriber device and the data network via the primary path based on determining that the connection with the user plane function is available, or may provide the traffic between the subscriber device and the data network via the secondary path based on determining that the connection with the user plane function is unavailable.

Classes IPC  ?

  • H04W 76/15 - Établissement de connexions à liens multiples sans fil
  • H04W 36/00 - Dispositions pour le transfert ou la resélection
  • H04W 36/30 - La resélection étant déclenchée par des paramètres spécifiques par des données de mesure ou d’estimation de la qualité des liaisons
  • H04W 76/12 - Établissement de tunnels de transport

12.

PROVIDING BORDER GATEWAY PROTOCOL DETERMINISTIC PATH FORWARDING

      
Numéro d'application 19195889
Statut En instance
Date de dépôt 2025-05-01
Date de la première publication 2025-08-14
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wang, Kevin
  • Styszynski, Michal
  • Lin, Wen

Abrégé

A network device may originate a route, and may designate the route as a first colored route having a first color. The network device may advertise the first colored route to a first intermediate network device to cause the first intermediate network device to propagate the first colored route to an ingress network device over a first colored border gateway protocol session. The network device may designate the route as a second colored route having a second color, and may advertise the second colored route to a second intermediate network device to cause the second intermediate network device to propagate the second colored route to the ingress network device over a second colored border gateway protocol session.

Classes IPC  ?

  • H04L 45/02 - Mise à jour ou découverte de topologie

13.

User plane load balancing in a disaggregated broadband network gateway architecture

      
Numéro d'application 17453689
Numéro de brevet 12381825
Statut Délivré - en vigueur
Date de dépôt 2021-11-05
Date de la première publication 2025-08-05
Date d'octroi 2025-08-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Radulescu-Banu, Cristina
  • Mohammad, Nadeem
  • Pagliaro, Richard P.
  • Ziegler, John E.
  • Orozco, Adrian

Abrégé

A disaggregated broadband network gateway (DBNG) control plane system may be configured to receive a first initialization packet associated with a user device via a first user plane and a second initialization packet associated with the user device via a second user plane. The DBNG control plane system may be configured to determine, based on at least one of the first initialization packet or the second initialization packet, one or more load balancing parameters. The DBNG control plane system may be configured to cause, based on at least one of the one or more load balancing parameters, a communication session for the user device to be established via the first user plane and not via the second user plane.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 67/141 - Configuration des sessions d'application

14.

Network port characterization

      
Numéro d'application 18399890
Numéro de brevet 12381826
Statut Délivré - en vigueur
Date de dépôt 2023-12-29
Date de la première publication 2025-08-05
Date d'octroi 2025-08-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wang, Jisheng
  • Wu, Xiaoying
  • Kura, Swapnil Rajkumar

Abrégé

An example method includes receiving, from a network device, data indicating characterizations of network traffic on a plurality of ports of the network device; determining, by processing circuitry, for each port of the plurality of ports, an indicator of a port type for the port based on the data indicating the characterizations of network traffic on the plurality of ports, wherein the port type indicates a link type of network traffic exchanged by the port; and outputting, by the processing circuitry, the indicator of the port type to an output device.

Classes IPC  ?

  • H04L 47/2441 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS en s'appuyant sur la classification des flux, p. ex. en utilisant des services intégrés [IntServ]
  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
  • H04L 12/44 - Réseaux en étoile ou réseaux arborescents
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 43/0882 - Utilisation de la capacité de la liaison

15.

RESOURCE RESERVATION PROTOCOL RESOURCE NOTIFICATION MESSAGES

      
Numéro d'application 19182882
Statut En instance
Date de dépôt 2025-04-18
Date de la première publication 2025-07-31
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Beeram, Vishnu Pavan
  • Ramachandran, Chandrasekar

Abrégé

In some implementations, a non-ingress node of one or more label-switched paths (LSPs) may identify a resource issue event. The non-ingress node may identify, based on identifying the resource issue event, one or more notification-requester stacks included in a data structure. The non-ingress node may generate one or more resource notification messages that each include a respective notification-requester stack of the one or more notification-requester stacks. The non-ingress node may send the one or more resource notification messages based on the one or more notification-requester stacks.

Classes IPC  ?

  • H04L 47/72 - Contrôle d'admissionAllocation des ressources en utilisant des actions de réservation pendant l’établissement de la connexion
  • H04L 47/70 - Contrôle d'admissionAllocation des ressources

16.

Methods and apparatus relating to the supply of power to power over ethernet devices

      
Numéro d'application 17809782
Numéro de brevet 12373012
Statut Délivré - en vigueur
Date de dépôt 2022-06-29
Date de la première publication 2025-07-29
Date d'octroi 2025-07-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Rosenthal, Joshua
  • Musante, John James
  • Ernohazy, Oscar S.

Abrégé

An access point, which is a Power over Ethernet (PoE) Powered Device (PD) measures input voltage and input current. The access point determines a power requirement of the access point based on the measured current, measured voltage, and information about power requirements of access point components or devices coupled to the access point a power requirement of the access point. The access point communicates the determined power request to a power sourcing equipment (PSE), e.g., a network switch in some embodiments, the access point further communicates one of measured input current and measured input voltage to the PSE. The PSE uses the information received from the access point, e.g., power request and power measurements to determine an amount of power to be granted to the access point. If the access point does not receive the requested power level the access point selects internal components and/or external devices to de-power.

Classes IPC  ?

  • G06F 1/26 - Alimentation en énergie électrique, p. ex. régulation à cet effet
  • G06F 1/32 - Moyens destinés à économiser de l'énergie
  • G06F 1/3206 - Surveillance d’événements, de dispositifs ou de paramètres initiant un changement de mode d’alimentation
  • H04L 12/10 - Dispositions pour l'alimentation
  • H04L 12/40 - Réseaux à ligne bus

17.

Supporting out-of-band configuration changes in security policy management

      
Numéro d'application 18473461
Numéro de brevet 12375354
Statut Délivré - en vigueur
Date de dépôt 2023-09-25
Date de la première publication 2025-07-29
Date d'octroi 2025-07-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • A, Chandrasekhar
  • R, Jayanthi

Abrégé

A device may receive a configuration of a network device, where the configuration includes configuration blocks with references to high level objects. The device may receive an out-of-band configuration change from the network device, and may compare the out-of-band configuration change and the configuration to identify an impacted high level object. The device may determine an impacted reference and an impacted configuration block associated with the impacted high level object, and may determine whether to reject the out-of-band configuration change, accept the out-of-band configuration change, or merge the out-of-band configuration change with the configuration based on the impacted high level object, the impacted reference, and the impacted configuration block. The device may perform one or more actions based on determining whether to reject the out-of-band configuration change, accept the out-of-band configuration change, or merge the out-of-band configuration change with the configuration.

Classes IPC  ?

  • H04L 41/0866 - Vérification de la configuration
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres

18.

OPTIMIZING BORDER GATEWAY PROTOCOL GRACEFUL SHUTDOWN

      
Numéro d'application 18419797
Statut En instance
Date de dépôt 2024-01-23
Date de la première publication 2025-07-24
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Abdulla, Abdul Zubaidhar
  • Asthana, Abhishek
  • Sangli, Srihari Ramachandra

Abrégé

An initiator network device may determine that a graceful shutdown is required for the initiator network device, and may generate a route refresh packet indicating that the graceful shutdown is enabled. The initiator network device may provide the route refresh packet to a receiver network device, and may disable the graceful shutdown after providing the route refresh packet to the receiver network device. The initiator network device may generate another route refresh packet indicating that the graceful shutdown is disabled, and may provide the other route refresh packet to the receiver network device.

Classes IPC  ?

19.

BITMASK ROUTE TARGET IN TARGETED DISTRIBUTION OF INFORMATION USING A ROUTING PROTOCOL

      
Numéro d'application 19044207
Statut En instance
Date de dépôt 2025-02-03
Date de la première publication 2025-07-24
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Zhang, Zhaohui
  • Haas, Jeffrey
  • Sangli, Srihari Ramachandra
  • Hegde, Shraddha

Abrégé

Techniques are described by which a routing protocol, such as border gateway protocol (BGP), is extended to control propagation and importation of information using route targets (RTs) specified as bitmasks that encode link administrative group information. For example, a network control device (e.g., controller) is configured to allocate one or more subset of resources (e.g., nodes or links) of an underlay network to each of one or more virtual networks established over the underlay network. The controller generates a bitmask encoded with link administrative group information of the one or more links. The controller then outputs, to a plurality of provider edge (PE) routers that are participating in a respective virtual network, a routing protocol message to advertise the one or more subset of resources, wherein the routing protocol message includes a route target specified as the bitmask.

Classes IPC  ?

  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
  • H04L 41/12 - Découverte ou gestion des topologies de réseau
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/03 - Mise à jour ou découverte de topologie en mettant à jour les protocoles d’état de lien

20.

EFFICIENT UPDATING OF DEVICE-LEVEL SECURITY CONFIGURATION BASED ON CHANGES TO SECURITY INTENT POLICY MODEL

      
Numéro d'application 19082533
Statut En instance
Date de dépôt 2025-03-18
Date de la première publication 2025-07-24
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • A, Chandrasekhar
  • R, Jayanthi

Abrégé

A system may identify a security intent policy model associated with an initial time. The system may generate one or more delta snapshots that respectively indicate one or more incremental changes to the security intent policy model at times subsequent to the initial time. The system may determine that the system is to deploy an updated version of the security intent policy model to a device and may thereby determine a previous deployment time at which the system deployed a previous version of the security intent policy model to the device. The system may generate, based on the one or more delta snapshots and the previous deployment time, a cumulative delta snapshot, and may thereby update a low-level security intent policy model associated with the device. The system may generate, based on the low-level security intent policy model, device-level security configuration information for the device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

21.

Load balancing and ensuring availability for network subscriber groups

      
Numéro d'application 18490469
Numéro de brevet 12368635
Statut Délivré - en vigueur
Date de dépôt 2023-10-19
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Radulescu-Banu, Cristina
  • Ziegler, John E.

Abrégé

A network device may assign subscriber groups to logical ports of the network device, and may generate a load balanced group that includes the logical ports assigned to the subscriber groups. The network device may provide a backup logical port for the load balanced group, and may maintain the backup logical port in an oversubscribed state or a full state. The network device may identify a subscriber group failure for one of the subscriber groups, and may switch the one of the subscriber groups to the backup logical port based on the subscriber group failure.

Classes IPC  ?

  • H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
  • H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
  • H04L 67/1004 - Sélection du serveur pour la répartition de charge

22.

Allocating addresses from pools

      
Numéro d'application 18662424
Numéro de brevet 12368694
Statut Délivré - en vigueur
Date de dépôt 2024-05-13
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Gawade, Aniket J.
  • Vaidya, Sachchidanand
  • Mariappan, Yuvaraja

Abrégé

Techniques are described for creating isolated pools of external, failover, and/or floating IP addresses. In one example, this disclosure describes a method including creating a plurality of virtual networks, creating a plurality of pools of external IP addresses, detecting a request to instantiate an object that identifies a specific pool from the plurality of pools of external IP addresses; and instantiating the object and configuring the object with an external IP address drawn from the specific pool. The pools of external IP addresses may be created and isolated on a per-namespace, per-service, or per-ingress basis.

Classes IPC  ?

  • H04L 61/5084 - Allocation d'adresse en assurant la mobilité des appareils
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
  • H04L 61/5061 - Réservoir d'adresses

23.

Network management software-as-a-service system for allocating resources (also termed threads) of containers for performance of a job

      
Numéro d'application 17556130
Numéro de brevet 12367074
Statut Délivré - en vigueur
Date de dépôt 2021-12-20
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • A, Chandrasekhar
  • R, Jayanthi

Abrégé

A resource controller module of a network management system receives a request for an allocation of threads to perform a job associated with a job category for a tenant associated with the network management system. The resource controller module determines, based on the request, a number of available threads associated with the job category of the system at a particular time and causes, based on the request and the number of available threads associated with the job category at the particular time, a group of threads associated with the job category to be allocated to perform the job to be allocated to perform the job.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

24.

Avoiding traffic flooding for known unicast traffic when an EVPN is inter-connected to a data plane VXLAN in all-active mode

      
Numéro d'application 17893866
Numéro de brevet 12368613
Statut Délivré - en vigueur
Date de dépôt 2022-08-23
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Lin, Wen
  • Sikand, Vrishabha
  • Katam, Kranthi Kumar
  • Sivaraj, Selvakumar
  • Jeong, Moo Jin
  • Grandhi, Jagadish N.
  • Goel, Pratibha

Abrégé

A method for use in a system including an Ethernet Virtual Private Network (EVPN) core network and a VXLAN data plane, a first gateway device GW1 and a second gateway device GW2 operating in an all-active multihoming mode to interconnect the EVPN core network and VXLAN data plane, is described. The method includes establishing, by the second gateway device GW2, a VXLAN tunnel to a remote VTEP X before traffic is sent by the remote VTEP X and received by the second gateway device GW2, but after traffic is sent by the remote VTEP X and received by the first gateway device GW1. wherein the first and second gateway devices GW1 and GW2 use an anycast IP address as a source address for VTEP X.

Classes IPC  ?

25.

High availability multi-tenant cloud based network access control system

      
Numéro d'application 17933010
Numéro de brevet 12368717
Statut Délivré - en vigueur
Date de dépôt 2022-09-16
Date de la première publication 2025-07-22
Date d'octroi 2025-07-22
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Cheethirala, Madhava Rao
  • Manthiramoorthy, Natarajan
  • Basetty, Pavan
  • Tadimeti, Raja Rao
  • Bharathapudi, Pavan Kumar Venkata Satish

Abrégé

A cloud-based architecture includes a cloud-based network management system (NMS) that provides the management plane and one or more cloud-based NAC systems that provide NAC services, including end-point device authentication. The cloud-based NAC system may have multiple groups of authentication server instances. Each group may have multiple authentication server instances to allow the authentication service provided by the group to serve more client devices than a single authentication server instance alone. Different Groups can be configured differently to serve different tenant sets.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]

26.

NETWORK POLICY APPLICATION BASED ON SESSION STATE

      
Numéro d'application 19096332
Statut En instance
Date de dépôt 2025-03-31
Date de la première publication 2025-07-17
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Timmons, Patrick

Abrégé

Techniques are disclosed for the detection of different states of a session comprising a bidirectional flow of network traffic between client devices so as to enable a network device to apply different network policies to different states of the session. In one example, a computing device identifies multiple states of a session and defines a plurality of network policies. Each network policy defines performance requirements for network traffic during each state of the session. A network device receives the plurality of network policies and determines a state of the session. The network device selects a path based on the performance requirements of the network policy associated with the determined state of the session. The network device forwards traffic associated with the session along the selected path while the session is in the determined state.

Classes IPC  ?

  • H04L 47/2475 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS pour la prise en charge des trafics caractérisés par le type d'applications
  • H04L 67/14 - Gestion de session

27.

COMMUNICATION SERVICES ORDERING AND PROVISIONING

      
Numéro d'application 19096348
Statut En instance
Date de dépôt 2025-03-31
Date de la première publication 2025-07-17
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Nesteroff, Lyubov
  • Kozlova, Yelena
  • Gupta, Ojas
  • Bordeleau, Marc-Andre
  • Polychronopoulos, Constantine Dimitrios
  • Choh, Edward Wai Hong
  • Oikonomou, Georgios
  • Tidemann, Jeremy Alan
  • Akman, Arda
  • Kidd, Robert Edward
  • Zhao, Mingjie

Abrégé

An example network provisioning system includes a provisioning portal that is configured to: receive, from a client device, a selection of a service template specifying network service attributes for a communication service, receive a selection of one or more tracking areas, receive a selection of one or more subscribers, and generate a service order based on the network service attributes for the communication service, the one or more tracking areas, and the one or more subscriber. The network provisioning system is configured to provision the communication service in accordance with the service order.

Classes IPC  ?

  • H04W 4/50 - Fourniture de services ou reconfiguration de services
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
  • H04L 41/5041 - Gestion des services réseau, p. ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par la relation temporelle entre la création et le déploiement d’un service
  • H04W 4/029 - Services de gestion ou de suivi basés sur la localisation

28.

X-OVER-Y TUNNEL SIGNALING AND CONFIGURATION, AND USE OF CONFIGURED X-OVER-Y TUNNEL(S)

      
Numéro d'application 19097791
Statut En instance
Date de dépôt 2025-04-01
Date de la première publication 2025-07-17
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Pasalapudi, Satya Praveen Kumar
  • Vairavakkalai, Kaliraj

Abrégé

Network operators can define port mappings for UDP destination ports and the encapsulated protocol/traffic type (X) in UDP. BGP may be used to notify the UDP destination port-to-traffic type mapping to an encapsulator. A generic UDP encapsulation mechanism (X-in-UDP), where UDP can be used to encapsulate packets of any user configured protocol/traffic type X (e.g., IPv4, IPv6, MPLS, etc.), is described. Primary benefits of using UDP for encapsulation are to leverage UDP port numbers for load-balancing. Generic UDP encapsulation of any protocol/traffic type using user defined port-maps provides flexibility to network operators in constructing different overlay networks. UDP encapsulation helps leverage fine-grade load balancing over Equal-Cost Multipath (ECMP).

Classes IPC  ?

29.

Access point health metrics

      
Numéro d'application 18502676
Numéro de brevet 12362987
Statut Délivré - en vigueur
Date de dépôt 2023-11-06
Date de la première publication 2025-07-15
Date d'octroi 2025-07-15
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Purvis, Wesley
  • Wang, Jisheng

Abrégé

A network management system (NMS) configured to attribute a health issue of an access point (AP) to a classifier or sub-classifier and remedy the health affecting a user's experience. The NMS obtains network data associated with an AP device of a site. The NMS also determines whether the network data satisfies one or more criteria corresponding to a classifier of a service level expectation (SLE) metric for determining a health issue of the AP device. In response to determining the network data does not satisfy the criteria associated with the classifier, NMS attributes the health issue of the AP device to the classifier. In response to attributing the health issue of the AP device to the classifier, NMS performs a remedy action based on the classifier.

Classes IPC  ?

  • H04L 41/0654 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/0677 - Localisation des défaillances

30.

METHOD AND SYSTEM FOR ESTIMATING COMMUNICATION LATENCY

      
Numéro d'application 19091223
Statut En instance
Date de dépôt 2025-03-26
Date de la première publication 2025-07-10
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Bergsten, Anders
  • Johansson, Andreas

Abrégé

A method is described for measuring a communication latency between a first device with a first local clock and a second device with a second local clock, the devices interconnected for digital communication to a network, comprising sending an upstream communication and a downstream communication between the devices, and measuring using said local clocks an upstream send time (τ1), an upstream receive time (τ2), a downstream send time (τ3) and a downstream receive time (τ4); calculating a first measured delay (y1) as τ2−τ1 and calculating a second measured delay (y2) as τ4−τ3; providing said measured delays (y1, y2) to a recursive filter function arranged to estimate a first latency (d1) and a second latency (d2) based on said measured delays (y1, y2) and on values for the first and second latencies (d1, d2) previously estimated by said recursive filter function, and iterating. A system and a computer software product are also described.

Classes IPC  ?

  • H04L 43/0864 - Retards de voyage aller-retour
  • H04L 43/106 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p. ex. en ajoutant des horodatages

31.

SEGMENT IDENTIFIERS THAT SUPPORT END-TO-END SEGMENT ROUTING WITH COLOR EXTENDED COMMUNITY AND BORDER GATEWAY PROTOCOL VIRTUAL PRIVATE NETWORK OPTION B

      
Numéro d'application 19095361
Statut En instance
Date de dépôt 2025-03-31
Date de la première publication 2025-07-10
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kushalad, Kiran
  • Bollam, Rajendra Prasad
  • Manur, Rajesh Shetty
  • K A, Salih
  • Hegde, Shraddha
  • Gadela, Sri Karthik Goud
  • Kananda, Swamy Sadashivaiah

Abrégé

A first network device may receive an advertisement that includes a prefix for a second network device, wherein the advertisement is destined for a third network device. The first network device may determine, based on a network topology, whether a next hop is one hop away or multiple hops away. The first network device may selectively modify the advertisement to include a first segment identifier, based on the next hop being one hop away and to generate a first modified advertisement, or may modify the advertisement to include a second segment identifier, based on the next hop being multiple hops away and to generate a second modified advertisement. The first network device may forward the first modified advertisement or the second modified advertisement toward the third network device.

Classes IPC  ?

  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/74 - Traitement d'adresse pour le routage

32.

DETECTION OF INSUFFICIENT RF COVERAGE AREAS IN A WIRELESS NETWORK

      
Numéro d'application 19093978
Statut En instance
Date de dépôt 2025-03-28
Date de la première publication 2025-07-10
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wang, Wenfeng
  • Thomas, Jacob

Abrégé

Techniques are described that detect areas with insufficient radio frequency (RF) coverage in a wireless network. A network management system (NMS) determines one or more service level expectation (SLE) metrics for each client device in a wireless network. The SLE metrics are aggregated to each access point (AP) in the wireless network, and each AP is assigned an AP score based on the aggregated SLE metrics. To identify potential coverage holes, the NMS groups APs having poor AP scores. If a root cause of the poor AP scores cannot be automatically resolved and if the poor AP scores persist for a predetermined period of time, the group of APs is determined to represent a true coverage hole. The NMS may generate a notification regarding recommended corrective actions to the customer and/or IT personnel.

Classes IPC  ?

  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04W 28/02 - Gestion du trafic, p. ex. régulation de flux ou d'encombrement

33.

AUTOMATIC UPGRADE PLANNING

      
Numéro d'application 19094619
Statut En instance
Date de dépôt 2025-03-28
Date de la première publication 2025-07-10
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Lin, May Zar
  • Luoh, Keh-Ming
  • Chanamolu, Yashwanth Venkata Krishna
  • Thomas, Jacob
  • Wang, Wenfeng
  • Purvis, Wesley

Abrégé

Techniques are described by which a network management system (NMS) receives, from a plurality of access points (APs) configured to provide a wireless network, received signal strength indicator (RSSI) values. The NMS generates, based on the RSSI values, a graph of the plurality of APs, wherein the graph of the plurality of APs includes a plurality of clusters, wherein each cluster comprises a subset of the plurality of APs that are grouped based on strength of connectivity between the subset of the plurality of APs. The NMS generates, based on the graph, an upgrade plan to upgrade the plurality of APs, wherein the upgrade plan comprises a plurality of batches, wherein each batch includes a selection of at least one AP from each of one or more of the plurality of clusters. The NMS sends the upgrade plan to an orchestrator to execute the upgrade plan.

Classes IPC  ?

  • H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
  • H04B 17/318 - Force du signal reçu
  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04W 88/08 - Dispositifs formant point d'accès

34.

Application assurance

      
Numéro d'application 18465780
Numéro de brevet 12355613
Statut Délivré - en vigueur
Date de dépôt 2023-09-12
Date de la première publication 2025-07-08
Date d'octroi 2025-07-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kalintsev, Dmitri
  • Gee, David

Abrégé

This disclosure describes techniques for providing application assurance by validating expected packet flows for an application against a model of a network that is to transport the expected packet flows. For example, a method includes obtaining, by an application assurance system, a flow definition that describes a packet flow for an application; determining, by the application assurance system by querying a network model of a network system that transports packet flows for applications, using the flow definition, a set of network nodes and links of the network system that are expected to transport or process the packet flow for the application; obtaining, by the application assurance system, an indication that a network node or link, from the set of network nodes and links, is in an operational state that could affect performance of the application; and in response to obtaining the indication, by the application assurance system, outputting an alert.

Classes IPC  ?

  • H04L 41/0663 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en réalisant des actions prédéfinies par la planification du basculement, p. ex. en passant à des éléments de réseau de secours
  • H04L 41/0659 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en isolant ou en reconfigurant les entités défectueuses
  • H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS

35.

ENCODING AN AUTHENTICATION COOKIE WITH METADATA

      
Numéro d'application 18397291
Statut En instance
Date de dépôt 2023-12-27
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Gupta, Peyush
  • Jones, Raqib Hesaam
  • Mangla, Umesh
  • Sanghavi, Dilip H.

Abrégé

In some implementations, an authenticator device may receive, from a browser, a request to connect to a secure service, wherein the request includes login credentials associated with a user of the browser. The authenticator device may determine that the user is an authorized user to access the secure service based on the login credentials. The authenticator device may generate an authentication cookie for the browser, wherein the authentication cookie encodes metadata information associated with the user, and wherein the metadata information includes at least an indication of user attributes of the user. The authenticator device may transmit, to the browser device, the authentication cookie.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

36.

AUDIT-LOG FOR MANAGING NETWORK DEVICES

      
Numéro d'application 18399862
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Chan, Chi Fung Michael
  • Tambolkar, Anirudha
  • Patil, Atul Bhaskarrao
  • Qu, Diheng

Abrégé

A system includes computer-readable media configured to store an event store associated with a network. Processing circuitry, in response to a determination that an event associated with the network device has occurred stores, at a time series store, configuration information for a network device in the network and stores, at the event store, event information comprising a pointer to the configuration information and an indication of a time that the event occurred. In response to receiving a request for data corresponding to the event, the processing circuitry determines, using the event information in the event store, the pointer to the network information for the event, obtains, from the time series store, the configuration information for the event using the pointer, generates a response to the request based on the configuration information obtained from the time series store, and outputs the response to the request.

Classes IPC  ?

  • H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
  • G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p. ex. interaction avec des règles ou des cadrans

37.

TASK DISTRIBUTION BASED ON FEEDBACK

      
Numéro d'application 18400349
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Krishnamurthy, Pradeep H.
  • R, Manju
  • Eswaran, Thiraviya
  • Deshmukh, Raviraj Satish
  • Banik, Tanisha
  • Singh, Ishmeet

Abrégé

Job management solutions often involve a controller distributing tasks to worker nodes or worker nodes in an efficient manner. In one example, this disclosure describes a method that includes receiving, by a controller, a first set of tasks; assigning, by the controller, each of the tasks in the first set of tasks to worker nodes for processing by the worker nodes; receiving, by the controller and for at least some of the tasks in the first set of tasks, feedback information; determining, by the controller and based on the feedback information, an expected amount of processing associated with each task type in the plurality of task types; receiving, by the controller, a second set of tasks; and assigning, by the controller and based on the expected amount of processing associated with each task type, each of the tasks in the second set of tasks to the worker nodes for processing.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption

38.

DETERMINING A NETWORK SCOPE OF A ROOT CAUSE OF A NETWORK ANOMALY

      
Numéro d'application 18400613
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Cheng, Jing
  • Wu, Xiaoying
  • Jea, David
  • Frei, Randall
  • Wang, Wenfeng

Abrégé

A network management system includes a memory and processing circuitry in communication with the memory. The processing circuitry is configured to obtain connection event data. The connection event data indicates a plurality of disconnection events. The processing circuitry is also configured to generate, from the connection event data, aggregate data according to a plurality of network scope levels and detect, based on the aggregate data, one or more network anomalies. Additionally, the processing circuit is configured to determine, based on the aggregate data, whether a root cause of the one or more network anomalies is associated with each network scope level of the plurality of network scope levels and output an indication of the determined network scope level associated with the root cause or performing a remedial action to address the root cause at the determined network scope level.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

39.

GROUP BASED POLICY FOR NON-VIRTUAL EXTENSIBLE LOCAL AREA NETWORK DEPLOYMENTS

      
Numéro d'application 18401089
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Palanisamy, Balaji
  • Punja, Samatha Madhusudan
  • Kamana, Veera Srinivas

Abrégé

A network device may receive, from a server device, a first tag assigned to a first host device, and may generate a first filter based on the first tag. The network device may receive a second filter generated based on a second tag assigned to a second host device, and may generate a policy based on the first filter and the second filter. The network device may propagate the first filter and the second filter to one or more other network devices, and may receive a packet. The network device may derive a source tag and a destination tag associated with the packet, and may determine an action for the packet based on the policy, the source tag, and the destination tag. The network device may perform the action.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

40.

Bandwidth advertisement for floor reflector (FR) traffic engineering (TE) links

      
Numéro d'application 18401463
Numéro de brevet 12375398
Statut Délivré - en vigueur
Date de dépôt 2023-12-30
Date de la première publication 2025-07-03
Date d'octroi 2025-07-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Beeram, Vishnu Pavan Kumar
  • Ramachandran, Chandrasekar
  • Venkataraman, Sudharsana

Abrégé

The problem of bandwidth insufficiency within an Intermediate System-to-Intermediate System (IS-IS) flood reflection (FR) cluster, and its associated problem(s) of increased signaling failures (and increased crank-bank signaling attempts, also referred to as “signaling churn”) when traffic engineered (TE) paths are computed, is avoided by signaling a more realistic “available bandwidth” advertisement on the FR TE links.

Classes IPC  ?

  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 45/24 - Routes multiples

41.

GROUP-BASED POLICY ENCODING FOR NETWORK VIRTUALIZATION OVERLAYS

      
Numéro d'application 18427011
Statut En instance
Date de dépôt 2024-01-30
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Pandey, Harish
  • Gornal, Vinod Kumar Mahadev

Abrégé

A first network device of a first data center may encode a source tenant system interface (TSI) group identifier into a tag protocol identifier and a group-based policy identifier, and may encode the tag protocol identifier and the group-based policy identifier into a virtual extensible local area network (VXLAN) packet with the source TSI group identifier, where the source TSI group identifier is not included in a header of the VXLAN packet. The first network device may provide the VXLAN packet, with the source TSI group identifier, to a second network device of a second data center, via an Ethernet virtual private network (EVPN) multiprotocol label switching (MPLS) network.

Classes IPC  ?

  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]
  • H04L 45/745 - Recherche de table d'adressesFiltrage d'adresses

42.

ACCESS POINT, SWITCH AND SITE DETERMINED REDUNDANCY

      
Numéro d'application 18970751
Statut En instance
Date de dépôt 2024-12-05
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kumar, Gaurav
  • Lu, Yong
  • Chu, Daniel Wei Wei
  • Wang, Wenfeng
  • Thomas, Jacob
  • Belgal, Trishna Govind
  • Frei, Randall W.
  • Peris, Vinod

Abrégé

This disclosure describes a network management system configured to determine, for each AP of the plurality of APs and based on received signal strength indicators (RSSIs) of each AP of the plurality of APs, one or more strong neighbors of each AP. compute an AP redundancy score for each AP of the plurality of APs indicative of a redundancy of each AP; compute, based on the AP redundancy scores, at least one of: a switch redundancy score for each network switch associated with one or more of the plurality of APs, wherein the switch redundancy score is indicative of a redundancy of each network switch, or a site redundancy score, wherein the site redundancy score is indicative of an overall redundancy of the network site; and invoke, based on the AP redundancy scores, the switch redundancy score, or the site redundancy score, one or more actions.

Classes IPC  ?

  • H04W 48/20 - Sélection d'un point d'accès
  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès

43.

LOAD BALANCING OF ASSISTED REPLICATION NETWORK DEVICES

      
Numéro d'application 19082774
Statut En instance
Date de dépôt 2025-03-18
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Nagarajan, Vikram
  • Lin, Wen
  • Joarder, Soumyodeep
  • Suruttaiyan, Muniyappan
  • Elizabeth, Princy T.
  • J, Ragupathi
  • Sivaraj, Selvakumar

Abrégé

A controller device receives, from a plurality of assisted replication network devices, respective utilization information associated with the plurality of assisted replication network devices. The controller device generates, based on the respective utilization information associated with the plurality of assisted replication network devices, load balancing information for a network device associated with two or more assisted replication network devices of the plurality of assisted replication network devices, and sends, to the network device, the load balancing information. The network selects, based on the load balancing information, a particular assisted replication network device of the two or more assisted replication network devices. The network device receives a traffic flow that is to be multicast and sends the traffic flow to the particular assisted replication network device, wherein sending the traffic flow to the particular assisted replication network device permits the particular assisted replication network device to multicast the traffic flow.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 47/25 - Commande de fluxCommande de la congestion le débit étant modifié par la source lors de la détection d'un changement des conditions du réseau

44.

WIFI LOCATION ENHANCEMENT

      
Numéro d'application 19083543
Statut En instance
Date de dépôt 2025-03-19
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kozin, Vladimir Vladimirovich
  • Friday, Kevin
  • Jiang, Jie C.

Abrégé

Techniques are described by which a network management system (NMS) is configured determine a specific wireless channel assigned to a first AP device. The NMS is further configured to determine one or more neighboring AP devices that are within a certain proximity of the first AP device and generate a packetized scan command for each of the one or more neighboring AP devices. The NMS is further configured to send the packetized scan command to each of the one or more neighboring AP devices and receive, from the first AP device and each of the one or more neighboring AP devices, signal samples of a client device connected to the first AP device on the specific wireless channel assigned to the first AP device. The NMS is further configured to, based on the received signal samples, determine a location within the site of the client device.

Classes IPC  ?

  • H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité

45.

THIRD-PARTY SERVICE AND APPLICATION DATA FOR QUALITY OF SERVICE

      
Numéro d'application 19085948
Statut En instance
Date de dépôt 2025-03-20
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wu, Xiaoying
  • Wang, Jisheng
  • Kumar, Prashant
  • Gandhi, Pawan

Abrégé

Techniques are disclosed for a network management system (NMS) that performs quality of service (QoS) monitoring and troubleshooting of user experience issues occurring outside of a network managed by the NMS using data obtained from third-party sources. For example, an NMS obtains third-party data of a third-party application server or third-party service provider server from a third-party monitoring vendor. The NMS identifies a user experience issue indicated by the third-party data and stitches the third-party data to network data received from network devices. The NMS determines a root cause or a remedial action of the user experience issue based at least on the network data received from the one or more network devices. The NMS generates a notification for presentation to an administrator device which identifies the root cause or the remedial action of the user experience issue.

Classes IPC  ?

  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
  • H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises

46.

MACHINE LEARNING-BASED BAD CABLE DETECTION

      
Numéro d'application 18612830
Statut En instance
Date de dépôt 2024-03-21
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Venkata, Vamsidhar Reddy Devireddy
  • Ayanile, Pooja Sambhaji
  • Mishra, Sanjeev Kumar
  • Mukhopadhyay, Sabyasachi

Abrégé

Example systems, devices, and techniques are described for inferring a potential bad cable issue associated with a cable. An example system includes processing circuitry configured to determine a class of a cable associated with one of a plurality of network interfaces. The processing circuitry is configured to select, based on the class of the cable, a first machine learning model of a plurality of machine learning models. The processing circuitry is configured to determine, based on the class of the cable and the one of the plurality of network interfaces, a first feature set of the performance data. The processing circuitry is configured to execute the first machine learning model to infer, based on the first feature set, a potential bad cable issue associated with the cable and output an indication of the potential bad cable issue associated with the cable.

Classes IPC  ?

  • G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p. ex. essais de mise en route

47.

MACHINE LEARNING SYSTEM FOR PREDICTION OF RESOURCE USAGE BY 5G NETWORK SLICES OR CELLS

      
Numéro d'application 18400029
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Gaurav, Aman
  • Vora, Moksha Kuldipbhai
  • Patankar, Ajit Krishna

Abrégé

A machine learning system is trained to predict resource usage by cells or network slices of a mobile network. For example, a computing system obtains respective datasets for the cells or network slices. Each dataset comprises time steps and respective values for a performance metric of the corresponding one of the cells or network slices. The computing system groups, based on a clustering algorithm applied to (1) the datasets, or (2) the cells or network slices, the datasets into clusters of datasets. The computing system applies, to a subset of most-recent time steps and corresponding values of each dataset of a first cluster of the clusters, a transformation to obtain a set of time steps and corresponding standardized values with which a machine learning system is trained to generate predicted values at future time steps of the datasets of the first cluster.

Classes IPC  ?

  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04W 72/04 - Affectation de ressources sans fil

48.

DETERMINING CRITICAL LOGS FOR NETWORK APPLICATIONS

      
Numéro d'application 18400481
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Gupta, Rahul
  • Shan, Alexander Zhang
  • Sridhar, Thayumanavan
  • Banka, Tarun
  • Yavatkar, Raj
  • Singh, Rahul

Abrégé

Techniques are described for a computing system configured to obtain a plurality of candidate logs for a plurality of layers of a computing infrastructure. The computing system may, for each candidate log of the plurality of candidate logs, map the candidate log to a log template of a plurality of log templates, wherein each log template to which a candidate log is mapped is a mapped log template. The computing system may rank mapped log templates based on properties of the mapped log templates. The computing system may select, based on the ranking, one or more candidate logs as critical logs. The computing system may output at least one of (1) an indication of the critical logs to determine a potential root cause associated with a performance issue of a network application or (2) an indication of the potential root cause associated with the performance issue of the network application.

Classes IPC  ?

  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
  • H04L 43/065 - Génération de rapports liés aux appareils du réseau

49.

SEAMLESS HANDOVER OF A PROTOCOL DATA UNIT SESSION

      
Numéro d'application 18405978
Statut En instance
Date de dépôt 2024-01-05
Date de la première publication 2025-07-03
Propriétaire Juniper Networks , Inc. (USA)
Inventeur(s) Padebettu, Venkatesh

Abrégé

A device may receive a handover request to handover a protocol data unit (PDU) session of a network device from a radio access network (RAN) to the device, and may provide, to the RAN, a handover request acknowledgment message acknowledging receipt of the handover request. The device may receive, from the RAN, a sequence number status transfer indicating provision of a handover command by the RAN to the network device, and may receive, from the RAN, uplink data packets and downlink data packets associated with the PDU session. The device may receive, from the network device, a request to establish the PDU session, and may establish the PDU session of the network device based on the request to establish the PDU session.

Classes IPC  ?

  • H04W 36/18 - Exécution d'une resélection à des fins spécifiques pour permettre une resélection sans coupure, p. ex. une resélection en douceur
  • H04W 36/00 - Dispositions pour le transfert ou la resélection

50.

Apparatus, system, and method for achieving certain characteristics in stacked vias formed through multilaminate circuit boards

      
Numéro d'application 18300925
Numéro de brevet 12349267
Statut Délivré - en vigueur
Date de dépôt 2023-04-14
Date de la première publication 2025-07-01
Date d'octroi 2025-07-01
Propriétaire JUNIPER NETWORKS, INC. (USA)
Inventeur(s) Rust-Nguyen, Dylan G.

Abrégé

A disclosed apparatus may include (1) a multilaminate circuit board that includes multiple layers whose dielectric values differ from one another and (2) at least one stacked via formed through the multilaminate circuit board, wherein the stacked via comprises (A) a first sub-laminate via that spans a first layer included in the multiple layers and is characterized by at least one feature and (B) a second sub-laminate via that spans a second layer included in the multiple layers and is characterized by at least one other feature. Various other apparatuses, systems, and methods are also disclosed.

Classes IPC  ?

  • H05K 1/02 - Circuits imprimés Détails
  • H05K 1/11 - Éléments imprimés pour réaliser des connexions électriques avec ou entre des circuits imprimés
  • H05K 3/46 - Fabrication de circuits multi-couches

51.

INTELLIGENT FIREWALL POLICY PROCESSOR

      
Numéro d'application 19058977
Statut En instance
Date de dépôt 2025-02-20
Date de la première publication 2025-06-26
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kommula, Raja
  • Gupta, Rahul
  • Sunkada, Ganesh Byagoti Matad
  • Banka, Tarun
  • Sridhar, Thayumanavan
  • Yavatkar, Raj

Abrégé

An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which cause the system to obtain telemetry data, the telemetry data being associated with a plurality of applications running on a plurality of hosts. The instructions cause the system to, based on the telemetry data, determine a subset of applications of the plurality of applications that run on a first host of the plurality of hosts. The instructions cause the system to determine a subset of firewall policies of a plurality of firewall polices, each of the subset of firewall policies applying to at least one respective application of the subset of applications. The instructions cause the system to generate an indication of the subset of firewall policies and send the indication to a management plane of a distributed firewall.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
  • H04L 43/0811 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant la connectivité
  • H04L 43/0888 - Débit

52.

UTILIZING LOCATION-BASED REPOSITORY MIRRORS FOR DEVICE UPGRADES

      
Numéro d'application 18394130
Statut En instance
Date de dépôt 2023-12-22
Date de la première publication 2025-06-26
Propriétaire Juniper Networks, Inc (USA)
Inventeur(s)
  • Lakshmikanth, Harsha
  • Kumar, Khemendra
  • Pai, Raghuram Malpe
  • Wei, Yixiao

Abrégé

A device may receive edge data identifying locations of a plurality of edge devices and other criteria associated with the plurality of edge devices, and may identify an upgrade for an edge device, of the plurality of edge devices, based on the other criteria of the edge data. The device may identify a location of a repository mirror for the upgrade based on a location of the edge device identified in the edge data, and may instruct the edge device to utilize the location of the repository mirror to receive the upgrade.

Classes IPC  ?

  • G06F 8/65 - Mises à jour
  • H04W 4/02 - Services utilisant des informations de localisation

53.

PROACTIVE LOAD BALANCING OF NETWORK TRAFFIC PROCESSING FOR WORKLOADS

      
Numéro d'application 18394526
Statut En instance
Date de dépôt 2023-12-22
Date de la première publication 2025-06-26
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • K N, Kiran
  • Sikand, Vrishabha
  • Gadiraju, Krishna Karthik
  • Munukutla, Venkata Naga Chaitanya

Abrégé

In general, techniques are described for a computing system comprising processing circuitry having access to a storage device. The processing circuitry is configured to apply, by a reinforcement learning agent, a policy model to a forecasted network traffic load associated with a workload to assign the workload to a first processing core of a plurality of processing cores of a computing device. The processing circuitry is also configured to process, by a virtual router and based on the assignment of the workload to the first processing core, network traffic for the workload using the first processing core.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

54.

Staged sampling information for network traffic

      
Numéro d'application 18477237
Numéro de brevet 12341669
Statut Délivré - en vigueur
Date de dépôt 2023-09-28
Date de la première publication 2025-06-24
Date d'octroi 2025-06-24
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Poornachary, Manikandan Musuvathi
  • Sharma, Ramkrishna
  • Svv, Ranjith Kumar
  • Mukherjee, Atanu

Abrégé

In some implementations, a sampling aggregator device may obtain, from one or more packet forwarding devices, first-stage sampling information associated with a packet at a first stage of a packet forwarding path. The sampling aggregator device may obtain, from the one or more packet forwarding devices, second-stage sampling information associated with the packet at a second stage of the packet forwarding path. The sampling aggregator device may determine aggregate sampling information based on the first-stage sampling information and the second-stage sampling information. The sampling aggregator device may transmit the aggregate sampling information to a sampling analyzer device.

Classes IPC  ?

  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/0876 - Utilisation du réseau, p. ex. volume de charge ou niveau de congestion

55.

INTENT GRAPH MODEL GENERATION USING DIFFERENCE INFORMATION

      
Numéro d'application 19054408
Statut En instance
Date de dépôt 2025-02-14
Date de la première publication 2025-06-19
Propriétaire Juniper Networks, Inc (USA)
Inventeur(s)
  • Chan, Chi Fung Michael
  • Ray, Nathaniel Scott
  • Qu, Diheng
  • Patil, Atul Bhaskarrao
  • Mathukumilli, Manish Kumar

Abrégé

A system includes computer-readable media configured to store a plurality of objects representing intent graph models of a network, and processing circuitry coupled to the computer-readable media. The processing circuitry is configured to receive a request indicating a requested time, determine one or more first objects of the plurality of objects, the first objects storing an intent graph model associated with a first time, the first time different from the requested time, determine one or more second objects of the plurality of objects, the second objects storing difference information indicating one or more changes to the intent graph model associated with the first time that occurred after the first time, apply the changes to the intent graph model associated with the first time to generate an intent graph model associated with the requested time, and output an indication of the intent graph model associated with the requested time.

Classes IPC  ?

  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage

56.

ADAPTIVE LOCATION-BASED SD-WAN POLICIES

      
Numéro d'application 19068182
Statut En instance
Date de dépôt 2025-03-03
Date de la première publication 2025-06-19
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wang, Jisheng
  • Mehta, Ruchit Rajkumar
  • Agrawal, Kaushik Adesh
  • Timmons, Patrick
  • Melampy, Patrick J.
  • Baj, Michael

Abrégé

An example method includes receiving, by an SD-WAN system, WAN link characterization data for a plurality of WAN links of the SD-WAN system over a time period; and for each site of a plurality of sites of the SD-WAN system, generating, by the SD-WAN system, a local policy for the site, wherein generating the local policy is based on a machine learning model trained with the WAN link characterization data for the plurality of WAN links, and providing the local policy to an SD-WAN edge device of the site.

Classes IPC  ?

  • H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]

57.

BROADBAND NETWORK GATEWAY (BNG) AS DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) SERVER

      
Numéro d'application 19068477
Statut En instance
Date de dépôt 2025-03-03
Date de la première publication 2025-06-19
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • K, Kiran Kumar
  • Padebettu, Venkatesh

Abrégé

In some implementations, a broadband network gateway (BNG) may receive, from a customer premises equipment, a dynamic host configuration protocol (DHCP) discover request, wherein the BNG is connected to the customer premises equipment and a fixed mobile interworking function (FMIF). The BNG may communicate with, based on the DHCP discover request, the FMIF. The BNG may provide to the customer premises equipment, and based on communicating with the FMIF, a DHCP offer that offers utilization of the BNG as a DHCP server. The BNG may receive from the customer premises equipment, and based on providing the DHCP offer, a DHCP request to request utilization of the BNG as the DHCP server. The BNG may provide to the customer premises equipment, and based on the DHCP request, a DHCP acknowledgment that acknowledges utilization of the BNG as the DHCP server.

Classes IPC  ?

  • H04L 61/5014 - Adresses de protocole Internet [IP] en utilisant le protocole de configuration dynamique de l'hôte [DHCP] ou le protocole d'amorçage [BOOTP]
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 101/659 - Adresses IPv6 du protocole Internet version 6

58.

DYNAMIC LOAD-BALANCING

      
Numéro d'application 18929999
Statut En instance
Date de dépôt 2024-10-29
Date de la première publication 2025-06-19
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Zhang, Zhaohui

Abrégé

In some implementations, an ingress provider edge network device (PE) may obtain dynamic load information associated with respective links of a plurality of multi-homing (MH) PEs. The ingress PE may determine based on the dynamic load information, a dynamic load-balancing scheme associated with the plurality of MH PEs. The ingress PE may forward traffic using the dynamic load-balancing scheme.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 47/122 - Prévention de la congestionRécupération de la congestion en détournant le trafic des entités congestionnées

59.

POWER EFFICIENT AND SCALABLE CO-PACKAGED OPTICAL DEVICES

      
Numéro d'application 19069632
Statut En instance
Date de dépôt 2025-03-04
Date de la première publication 2025-06-19
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Di Mola, Domenico
  • Alleston, Steven B.
  • Qu, Zhen
  • Holmes, Ryan

Abrégé

A co-packaged optical-electrical chip can include an application-specific integrated circuit (ASIC) and a plurality of optical modules, such as optical transceivers. The ASIC and each of the optical modules can exchange electrical signaling via integrated electrical paths. The ASIC can include Ethernet switch, error correction, bit-to-symbol mapping/demapping, and digital signal processing circuits to pre-compensate and post-compensate channel impairments (e.g., inter-channel/intra-channel impairments) in electrical and optical domains. The co-packaged inter-chip interface can be scaled to handle different data rates using spectral efficient signaling formats (e.g., QAM-64, PAM-8) without adding additional data lines to a given design and without significantly increasing the power consumption of the design.

Classes IPC  ?

  • H04B 10/40 - Émetteurs-récepteurs
  • H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
  • H04L 27/34 - Systèmes à courant porteur à modulation de phase et d'amplitude, p. ex. en quadrature d'amplitude

60.

ADAPTABLE SOFTWARE DEFINED WIDE AREA NETWORK APPLICATION-SPECIFIC PROBING

      
Numéro d'application 18999833
Statut En instance
Date de dépôt 2024-12-23
Date de la première publication 2025-06-12
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wang, Jisheng
  • Matthee, Charl
  • Frei, Randall W.
  • Jiang, Jie C

Abrégé

Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.

Classes IPC  ?

  • H04L 43/12 - Sondes de surveillance de réseau
  • H04L 43/026 - Capture des données de surveillance en utilisant l’identification du flux
  • H04L 43/028 - Capture des données de surveillance en filtrant

61.

CONFLICT MANAGEMENT OF FUNCTIONS AND SERVICES IN A RADIO INTELLIGENT CONTROLLER USER INTERFACE

      
Numéro d'application 18529448
Statut En instance
Date de dépôt 2023-12-05
Date de la première publication 2025-06-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Nesteroff, Lyubov
  • Akman, Arda
  • Sahin, Burcu
  • Arici, Tugba

Abrégé

Conflict management of functions and services (e.g., RAN intelligent controller (RIC) may be performed by displaying a plurality of policies for an interface service of a radio access network (RAN); receiving an indication of selection of a conflict resolution strategy for a selected RAN interface policy type; determining whether the interface service of the RAN has a conflict based on the selected conflict resolution strategy for the selected RAN interface policy type; when the interface service does not have the conflict, accepting the selected conflict resolution strategy for the selected RAN interface policy type and displaying an indication of the selected conflict resolution strategy for the selected RAN interface policy type; and based on the selected conflict resolution strategy for the selected RAN interface policy type, modifying a configuration of the RAN.

Classes IPC  ?

  • H04L 47/2475 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS pour la prise en charge des trafics caractérisés par le type d'applications

62.

CONTAINERIZED ROUTING PROTOCOL PROCESS FOR VIRTUAL PRIVATE NETWORKS

      
Numéro d'application 19042546
Statut En instance
Date de dépôt 2025-01-31
Date de la première publication 2025-06-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Nallamothu, Vinay K
  • Paul, Arijit

Abrégé

In general, this disclosure describes techniques for leveraging a containerized routing protocol process to implement virtual private networks using routing protocols. In an example, a system comprises a container orchestration system for a cluster of computing devices, the cluster of computing devices including a computing device, wherein the container orchestration system is configured to: deploy a containerized application to a compute node; and in response to deploying the containerized application to the compute node, configure in the compute node a virtual routing and forwarding (VRF) instance to implement a virtual private network (VPN) for the containerized application.

Classes IPC  ?

  • H04L 45/42 - Routage centralisé
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/745 - Recherche de table d'adressesFiltrage d'adresses
  • H04L 45/76 - Routage dans des topologies définies par logiciel, p. ex. l’acheminement entre des machines virtuelles

63.

ASSOCIATING SETS OF DATA CORRESPONDING TO A CLIENT DEVICE

      
Numéro d'application 19042921
Statut En instance
Date de dépôt 2025-01-31
Date de la première publication 2025-06-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Crabbs, Robert

Abrégé

A network management system includes a memory storing a set of access point (AP) data, wherein the set of AP data corresponds to a communication between a client device and an AP device. Additionally, the network management system includes processing circuitry configured to: receive the set of AP data corresponding to the client device; and receive a set of remote server data, wherein the set of remote server data comprises information corresponding to a communication between the client device and a remote server separate from the network management system. Additionally, the processing circuitry is configured to: determine an association between the set of AP data and the set of remote server data based one or more matching criteria; store data indicative of the association between the set of AP data and the set of remote server data; and perform an action based on the association.

Classes IPC  ?

  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité
  • H04B 17/318 - Force du signal reçu
  • H04L 61/2514 - Traduction d'adresses de protocole Internet [IP] entre adresses IP locales et globales
  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04W 24/08 - Réalisation de tests en trafic réel
  • H04W 88/08 - Dispositifs formant point d'accès

64.

SELF-LEARNING EGRESS TRAFFIC CONTROLLER

      
Numéro d'application 19047161
Statut En instance
Date de dépôt 2025-02-06
Date de la première publication 2025-06-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kommula, Raja
  • Gupta, Rahul
  • Sunkada, Ganesh
  • Banka, Tarun
  • Sridhar, Thayumanavan
  • Yavatkar, Raj

Abrégé

An example network system includes processing circuitry and one or more memories coupled to the processing circuitry. The one or more memories are configured to store instructions which, when executed by the processing circuitry, cause the network system to receive connection data related to an egress connection of an application service of an application. The instructions cause the network system to analyze the connection data to determine that the egress connection is an anomalous connection. The instructions cause the network system to generate a notification indicative of the egress connection being an anomalous connection and send the notification to a computing device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
  • H04L 43/0811 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant la connectivité
  • H04L 43/0888 - Débit

65.

NETWORK GRAPH MODEL AND ROOT CAUSE ANALYSIS FOR A NETWORK MANAGEMENT SYSTEM

      
Numéro d'application 19052795
Statut En instance
Date de dépôt 2025-02-13
Date de la première publication 2025-06-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Chan, Chi Fung Michael
  • Ratkovic, Aleksandar Luka
  • Banthia, Raunak
  • Patil, Atul Bhaskarrao
  • Qu, Diheng
  • Kadekuzhi, Rajeev Menon
  • Bogorodskiy, Roman Andreevich
  • Gordeev, Aleksandr Dmitrievich
  • Goditskii, Aleksei Vladimirovich

Abrégé

A method for managing a plurality of network devices of a network includes determining, by one or more processors, a causality map for the plurality of network devices according to an intent. The method further includes receiving, by the one or more processors, an indication of a network service impact and determining, by the one or more processors, a relevant portion of the causality map based on the network service impact. The method further includes determining, by the one or more processors, one or more candidate root cause faults based on the relevant portion of the causality map and outputting, by the one or more processors, an indication of the one or more candidate root cause faults.

Classes IPC  ?

  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/0677 - Localisation des défaillances
  • H04L 41/12 - Découverte ou gestion des topologies de réseau

66.

MULTICAST HANDLING BASED ON MEDIA ACCESS CONTROL ADDRESS

      
Numéro d'application 18524744
Statut En instance
Date de dépôt 2023-11-30
Date de la première publication 2025-06-05
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Nagaraj, Vinod Kumar
  • Zhang, Zhaohui

Abrégé

In some implementations, a network device of a network may discover a media access control (MAC) address of a host device, associated with an attachment circuit, that has moved to the network device from another network device of the network. The network device may transmit, based on discovering the MAC address of the host device that has moved to the network device from the other network device, over the attachment circuit, a general membership query. In some implementations, another network device may receive a media access control (MAC) advertisement route message indicating that the network device has discovered the MAC address of the host device. The other network device may delete one or more multicast group memberships associated with the host device.

Classes IPC  ?

  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences

67.

Power management of a network device

      
Numéro d'application 18068183
Numéro de brevet 12321213
Statut Délivré - en vigueur
Date de dépôt 2022-12-19
Date de la première publication 2025-06-03
Date d'octroi 2025-06-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Ghosh, Sandip Kumar
  • Venkatakrishnan, Srinivasan
  • Kundanthodika, Jameesh
  • Satyanarayana, Vyasraj
  • Illur, Kishan
  • Henderson, James R.

Abrégé

In some implementations, a system may identify historical utilization data associated with a network device. The system may determine, based on the historical utilization data, a utilization forecast for the network device. The system may determine, based on the utilization forecast, a power management plan for the network device. The system may selectively control, based on the power management plan, enablement and disablement of one or more non-forwarding components of the network device.

Classes IPC  ?

  • G06F 1/32 - Moyens destinés à économiser de l'énergie
  • G06F 1/3209 - Surveillance d’une activité à distance, p. ex. au travers de lignes téléphoniques ou de connexions réseau
  • G06F 1/3287 - Économie d’énergie caractérisée par l'action entreprise par la mise hors tension d’une unité fonctionnelle individuelle dans un ordinateur

68.

Generating XML configuration sub-streams based on an XML configuration stream and a metadata tree associated with the XML configuration stream

      
Numéro d'application 18128643
Numéro de brevet 12321386
Statut Délivré - en vigueur
Date de dépôt 2023-03-30
Date de la première publication 2025-06-03
Date d'octroi 2025-06-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Nadeem, Fnu
  • Krishnamurthy, Pradeep H.
  • Deshmukh, Raviraj Satish

Abrégé

In some implementations, a system may receive an extensible markup language (XML) configuration stream that indicates one or more resource configurations. The system may maintain a data model that includes metadata that describes the XML configuration stream. The system may process the data model to generate a metadata tree. The system may generate, based on the XML configuration stream and the metadata tree, one or more XML configuration sub-streams that are respectively associated with a subset of the one or more resource configurations. The system may process, using respective resource processing modules of the system, the one or more XML configuration sub-streams to generate respective information associated with the subset of the one or more resource configurations.

Classes IPC  ?

  • G06F 16/81 - Indexation, p. ex. balises XMLStructures de données à cet effetStructures de stockage
  • G06F 16/84 - Mise en correspondanceConversion

69.

Detecting and removing inactive encryption keys during encryption key rollover events

      
Numéro d'application 18146638
Numéro de brevet 12323519
Statut Délivré - en vigueur
Date de dépôt 2022-12-27
Date de la première publication 2025-06-03
Date d'octroi 2025-06-03
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kawata, Jerry
  • Tahasildar, Manjunath Ramappa

Abrégé

A network device may install a new receive encryption key, and may start a timer associated with deleting an old receive encryption key. The network device may provide, to another network device, a message identifying the new receive encryption key, and may determine whether packet counts, successfully decrypted with the old receive encryption key, have changed. The first network device may determine whether the timer has expired, and may determine whether the new receive encryption key has successfully decrypted a packet. The first network device may delete the old receive encryption key from the first network device based on the new receive encryption key successfully decrypting a packet.

Classes IPC  ?

70.

REDUCING A MEMORY SIZE OF A SYSTEM GENERATED MESSAGE PRIOR TO TRANSMISSION

      
Numéro d'application 18519473
Statut En instance
Date de dépôt 2023-11-27
Date de la première publication 2025-05-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Narendra, Manjunath Subhas
  • Jonnadula, Pavan Lakshmi Kumar
  • J S, Sheeja
  • Vishwanathan, Suresh

Abrégé

A network device may receive traffic associated with a network, and may generate a system message based on the traffic. The network device may convert the system message into a binary message, and may compress the binary message to generate a compressed binary message. The network device may provide the compressed binary message to a server device, and the server device may process the compressed binary message, with a decoder, to generate the system message.

Classes IPC  ?

  • H03M 7/40 - Conversion en, ou à partir de codes de longueur variable, p. ex. code Shannon-Fano, code Huffman, code Morse
  • H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]

71.

KEY REQUEST MANAGEMENT

      
Numéro d'application 18522814
Statut En instance
Date de dépôt 2023-11-29
Date de la première publication 2025-05-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Aelmans, Melchior Dirk Frederik
  • Grammel, Gert
  • Mukhopadhyay, Sabyasachi

Abrégé

In some implementations, a network device may transmit a key request and a proposed key request rate associated with the key request. The network device may receive a response to the key request based on the proposed key request rate. In some implementations, a network device may transmit a key request. The network device may receive a response to the key request that includes a key-derived key or an indication of a time associated with another key request.

Classes IPC  ?

72.

COMMUNICATING NON-ACCESS STRATUM INFORMATION IN INTERNET PROTOCOL MESSAGES VIA A WIRELINE CONNECTION

      
Numéro d'application 18758695
Statut En instance
Date de dépôt 2024-06-28
Date de la première publication 2025-05-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Padebettu, Venkatesh

Abrégé

In some implementations, a client device may send to an access gateway function (AGF) device, and via a wireline connection, a first Internet protocol (IP) message that includes non-access stratum (NAS) information. The client device may receive from the AGF device, via the wireline connection, and based on sending the first IP message, a second IP message that includes acknowledgement information. The NAS information may be included in a service data unit (SDU) that is encapsulated in the first IP message. The wireline connection may be a user datagram protocol (UDP) wireline connection or a transmission control protocol (TCP) wireline connection.

Classes IPC  ?

  • H04L 69/18 - Gestionnaires multi-protocoles, p. ex. dispositifs uniques capables de gérer plusieurs protocoles
  • H04L 69/168 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP] spécialement adaptés aux protocoles de couche liaison, p. ex. en mode de transfert asynchrone [ATM], réseau optique synchrone [SONET] ou protocole point à point [PPP]

73.

ENCAPSULATED INTERNET PROTOCOL TRANSPORT DATA PACKETS COMMUNICATED IN CABLE NETWORKS

      
Numéro d'application 18796783
Statut En instance
Date de dépôt 2024-08-07
Date de la première publication 2025-05-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Padebettu, Venkatesh

Abrégé

In some implementations, a client device may send to an access gateway function (AGF) device, and via a wireline connection, one or more first encapsulated Internet protocol (IP) transport data packets. The client device may receive from the AGF device, and via the wireline connection, one or more second encapsulated IP transport data packets. In some implementations, the one or more first encapsulated IP transport data packets are sent via a general packet radio service (GPRS) tunneling protocol (GTP) for user data (GTP-U) tunnel over the wireline connection, and the one or more second encapsulated IP transport data packets are received via the GTP-U tunnel.

Classes IPC  ?

  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
  • H04L 47/43 - Assemblage ou désassemblage de paquets, p. ex. par segmentation et réassemblage [SAR]
  • H04W 28/06 - Optimisation, p. ex. compression de l'en-tête, calibrage des informations

74.

Dynamically programming class of service configurations for network devices

      
Numéro d'application 18343010
Numéro de brevet 12316546
Statut Délivré - en vigueur
Date de dépôt 2023-06-28
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Jacob, Sudhin

Abrégé

A device may provide a class of service configuration to a plurality of network devices of a network serving a plurality of user devices, and may identify a set of network devices, of the plurality of network devices, that are subject to a modified class of service. The device may receive telemetry data associated with the plurality of the network devices, and may determine whether the telemetry data satisfies a threshold. The device may selectively maintain the class of service configuration for the plurality of network devices based on the telemetry data failing to satisfy the threshold, or modify the class of service configuration to cause the set of network devices to provide the modified class of service for a set of user devices based on the telemetry data satisfying the threshold.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
  • H04L 47/2425 - Trafic caractérisé par des attributs spécifiques, p. ex. la priorité ou QoS pour la prise en charge de spécifications de services, p. ex. SLA

75.

Apparatus, system, and method for optimizing storage usage in connection with segment identifiers

      
Numéro d'application 18157442
Numéro de brevet 12316531
Statut Délivré - en vigueur
Date de dépôt 2023-01-20
Date de la première publication 2025-05-27
Date d'octroi 2025-05-27
Propriétaire JUNIPER NETWORKS, INC. (USA)
Inventeur(s) Nayyar, Anish

Abrégé

A network device may include (1) at least one storage device configured to store a plurality of SIDs and (2) at least one processing device configured to (A) insert, into the storage device, a single instance of a SID corresponding to a multihomed network segment and/or (B) advertise the SID to a remote network device for aliasing to enable the remote network device to load-balance traffic across the multihomed network segment. Various other apparatuses, systems, and methods are also disclosed.

Classes IPC  ?

  • H04L 45/24 - Routes multiples
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic

76.

DEFAULT TRANSMIT POWER FOR 400ZR OPTICAL TRANSMITTER

      
Numéro d'application 18388628
Statut En instance
Date de dépôt 2023-11-10
Date de la première publication 2025-05-15
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Kansal, Monika
  • Srivastava, Nilay
  • Rastogi, Rohan

Abrégé

An optical communication device includes an optical transmitter configured to transmit data over an optical link. The optical communication device also includes a memory having a configuration location of one or more bytes, and one or more registers storing a default transmit power value. The optical communication device also includes a controller configured to access the configuration location. In response to determining that no valid transmit power value is indicated by information stored in the configuration location, the controller accesses the one or more registers to read the default transmit power value, and sets a transmit power level of the optical transmitter to the default transmit power value.

Classes IPC  ?

77.

WIDE AREA NETWORK ISSUE PREDICTION BASED ON DETECTION OF SERVICE PROVIDER CONNECTION SWAPPING

      
Numéro d'application 18943614
Statut En instance
Date de dépôt 2024-11-11
Date de la première publication 2025-05-15
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Wu, Xiaoying
  • Nagarkar, Amruta Subhash

Abrégé

Techniques are described for predicting a wide area network (WAN) issue based on detection of service provider connection swapping. A cloud-based network management system (NMS) obtains connection event data for one or more network access server (NAS) devices at a site, where each event included in the connection event data comprises a connection or disconnection event of a connection session provided by a service provider. The NMS detects a number of connection swaps in the connection event data over a time window, where a connection swap includes a change from a first connection session provided by a first service provider to a second connection session provided by a second service provider. Based on the detected number of connection swaps satisfying a threshold, the NMS predicts a root cause of the connection swaps as a WAN issue and generates a notification of the predicted root cause of the connection swaps.

Classes IPC  ?

  • H04L 41/147 - Analyse ou conception de réseau pour prédire le comportement du réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

78.

CLOUD-BASED MANAGEMENT OF HARDWARE COMPLIANCE DATA FOR ACCESS POINT DEVICES

      
Numéro d'application 19020849
Statut En instance
Date de dépôt 2025-01-14
Date de la première publication 2025-05-15
Propriétaire JUNIPER NETWORKS, INC. (USA)
Inventeur(s)
  • Rosenthal, Joshua
  • Friedmann, James Jay
  • Musante, John James
  • Singh, Gurpreet

Abrégé

A plurality of access point (AP) devices configured to provide a wireless network at a site within a geographic region and a management system (NMS) configured to manage the plurality of APs are described. An AP device sends, to the NMS, a message including version information of hardware compliance data currently stored at the AP device. The NMS determines, based on the version information, whether the first version of the hardware compliance data stored at the AP device is in compliance with applicable regulations of the geographic region. When the first version is not in compliance, the AP device receives, from the NMS, a second version of the hardware compliance data that is in compliance with the applicable regulations of the geographic region. The AP device enables operation of one or more hardware components of the AP device in accordance with the second version of the hardware compliance data.

Classes IPC  ?

  • H04W 28/02 - Gestion du trafic, p. ex. régulation de flux ou d'encombrement
  • H04B 17/11 - SurveillanceTests d’émetteurs pour l’étalonnage
  • H04B 17/21 - SurveillanceTests de récepteurs pour l’étalonnageSurveillanceTests de récepteurs pour la correction des mesures
  • H04L 5/00 - Dispositions destinées à permettre l'usage multiple de la voie de transmission
  • H04W 48/04 - Restriction d'accès effectuée dans des conditions spécifiques sur la base des données de localisation ou de mobilité de l'utilisateur ou du terminal, p. ex. du sens ou de la vitesse de déplacement

79.

PREDICTING NETWORK ISSUES BASED ON HISTORICAL DATA

      
Numéro d'application 19024158
Statut En instance
Date de dépôt 2025-01-16
Date de la première publication 2025-05-15
Propriétaire JUNIPER NETWORKS, INC. (USA)
Inventeur(s)
  • Kumar, Prashant
  • Wang, Jisheng
  • Kathare, Gorakhanath
  • B G, Yogesh
  • Agrawal, Kaushik Adesh
  • Jiang, Jie C
  • Mcculley, Scott A.
  • Schrock, Greg

Abrégé

Techniques are described for monitoring application performance in a computer network. For example, a network management system (NMS) includes a memory storing path data received from a plurality of network devices, the path data reported by each network device of the plurality of network devices for one or more logical paths of a physical interface from the given network device over a wide area network (WAN). Additionally, the NMS may include processing circuitry in communication with the memory and configured to: determine, based on the path data, one or more application health assessments for one or more applications, wherein the one or more application health assessments are associated with one or more application time periods for a site, and in response to determining at least one failure state, output a notification including identification of a root cause of the at least one failure state.

Classes IPC  ?

  • H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
  • H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 43/067 - Génération de rapports en utilisant des rapports de délai

80.

RESOURCE RESERVATION PROTOCOL (RSVP) U-TURN DETOUR LABEL SWITCHED PATH (LSP)

      
Numéro d'application 18401459
Statut En instance
Date de dépôt 2023-12-30
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Rajagopalan, Balaji
  • Ramachandran, Chandrasekar
  • Sunesara, Vali Mohammed

Abrégé

U-Turn detour paths, though the head-end router of a primary label switched path (LSP), are configured and used to enable fast failover to a secondary LSP, while avoiding reserving bandwidth (e.g., on links unused by primary and secondary paths) unnecessarily.

Classes IPC  ?

  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/28 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données en utilisant la reprise sur incident de routes
  • H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]

81.

WIRELESS SIGNAL STRENGTH-BASED DETECTION OF POOR NETWORK LINK PERFORMANCE

      
Numéro d'application 19016556
Statut En instance
Date de dépôt 2025-01-10
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Mehta, Ruchit Rajkumar
  • Agrawal, Kaushik Adesh

Abrégé

A cloud-based network management system (NMS) stores path data from network devices operating as network gateways for an enterprise network, the path data collected by each network device of the plurality of network devices. The NMS determines, for a logical path within a specified time window, a wireless signal quality and a link quality based at least in part on the path data. The NMS, in response to determining that the logical path is of a poor link quality, determine a correlation between a poor wireless quality and the poor link quality. The NMS may output a notification that indicates the correlation between the poor wireless quality and the poor link quality of the logical path.

Classes IPC  ?

  • H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04W 24/08 - Réalisation de tests en trafic réel

82.

APPLICATION-AWARE ACTIVE MEASUREMENT FOR MONITORING NETWORK HEALTH

      
Numéro d'application 19018663
Statut En instance
Date de dépôt 2025-01-13
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Banka, Tarun
  • Gupta, Rahul
  • Jones, Ciante Jordon
  • Lnu, Prashant
  • Sridhar, Thayumanavan
  • Yavatkar, Raj

Abrégé

In general, this disclosure describes techniques that enable a network system to perform application-aware active measurement for monitoring network health. The network system includes memory that stores a topology graph for a network. The network system includes processing circuitry that may receive an identifier associated with an application utilizing the network for communications, and determine, based on the topology graph and the identifier, a subgraph of the topology graph based on a location, in the topology graph, of a node representing a compute node that is a host of the application. The processing circuitry may next determine, based on the subgraph, a probe module to measure performance metrics associated with the application, and for the probe module, generate configuration data corresponding to the probe module. The processing circuitry may output, to the probe module, the configuration data.

Classes IPC  ?

  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

83.

EDGE DEVICE FOR TELEMETRY FLOW DATA COLLECTION

      
Numéro d'application 19011937
Statut En instance
Date de dépôt 2025-01-07
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Pai, Raghuram Malpe
  • Simaria, Nilesh Kantilal
  • Lakshmikanth, Harsha
  • Sankar, Sri Ram

Abrégé

A device comprises processing circuitry configured to configure an edge device to collect telemetry flow data output by a plurality of network devices and to generate processed telemetry flow data based on the collected telemetry flow data. The processing circuitry is further configured to receive the processed telemetry flow data from the edge device and store an indication of the processed telemetry flow data.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
  • H04L 43/0864 - Retards de voyage aller-retour

84.

STANDBY ACCESS GATEWAY FUNCTION SIGNALING FOR A DYNAMIC HOST CONFIGURATION PROTOCOL

      
Numéro d'application 19012065
Statut En instance
Date de dépôt 2025-01-07
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Padebettu, Venkatesh
  • K., Kiran Kumar

Abrégé

In some implementations, a first access gateway function (AGF) may receive, from a second AGF, a communication indicating at least one of a subscriber identity, session information, subscriber context, or session transport information associated with an active session between the second AGF and a client device. The first AGF device may detect that the second AGF device is associated with a failure. The first AGF device may transmit, to a first core network device, a request to switch a first path associated with the active session from the second AGF device to the first AGF device, wherein the request indicates at least one of the subscriber identity, the session information, the subscriber context, or the session transport information. The first AGF device may forward one or more data communications between a second core network device and the DHCP client device associated with the active session via a second path.

Classes IPC  ?

  • H04L 45/42 - Routage centralisé
  • H04L 45/24 - Routes multiples
  • H04L 45/247 - Routes multiples en utilisant M: N routes actives ou de secours
  • H04L 45/586 - Association de routeurs de routeurs virtuels
  • H04L 61/5014 - Adresses de protocole Internet [IP] en utilisant le protocole de configuration dynamique de l'hôte [DHCP] ou le protocole d'amorçage [BOOTP]

85.

GRAPH ANALYTICS ENGINE FOR APPLICATION-TO-NETWORK TROUBLESHOOTING

      
Numéro d'application 19018627
Statut En instance
Date de dépôt 2025-01-13
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Banka, Tarun
  • Gupta, Rahul
  • Xia, Yuyun
  • Sridhar, Thayumanavan
  • Yavatkar, Raj

Abrégé

A computing device may implement the techniques described in this disclosure. The computing device may include processing circuitry configured to execute an analysis framework system, and memory configured to store time series data. The analysis framework system may create, based on the time series data, a knowledge graph comprising a plurality of first nodes in the network system referenced in the time series data interconnected by edges. The analysis framework system may cause a graph analytics service of the analysis framework system to receive a graph analysis request comprising a request to determine a fault propagation path, a request to determine changes in the knowledge graph, a request to determine an impact of an emulated fault, or a request to determine an application-to-network path. The analysis framework system may also cause the graph analytics service to determine a response to the graph analysis request, and output the response.

Classes IPC  ?

  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

86.

UPDATING AN INGRESS FILTER OF AN INGRESS NODE THAT PROVIDES A LOAD BALANCING FUNCTIONALITY ACROSS SECURITY NODES

      
Numéro d'application 18502571
Statut En instance
Date de dépôt 2023-11-06
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc (USA)
Inventeur(s)
  • Mangla, Umesh
  • Singh, Avinash Kumar
  • Sanghavi, Dilip H.
  • Ramamurthy, Sai Sundar

Abrégé

In some implementations, an ingress node may receive first traffic from a host device. The ingress node may determine and based on an ingress filter of the ingress node, that traffic from the host device is allowed. The ingress node may select, using a load balancing functionality, and based on determining that traffic from the host device is allowed, a security node, of a plurality of security nodes, to which the ingress node is to forward the first traffic. The ingress node may forward the first traffic to the selected security node. The ingress node may receive, based on forwarding the first traffic, a message that indicates that traffic from the host device is to be blocked. The ingress node may update, using the message, the ingress filter of the ingress node to indicate that traffic from the host device is to be blocked.

Classes IPC  ?

  • H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
  • H04L 9/40 - Protocoles réseaux de sécurité

87.

CONTINUITY INFORMATION INCLUDED IN METRIC DATA ELEMENT OF A NON-TRANSITIVE ATTRIBUTE

      
Numéro d'application 18400434
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-05-08
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Hegde, Shraddha
  • Sangli, Srihari Ramachandra

Abrégé

In some implementations, a border gateway protocol (BGP) network device may receive from an originator BGP network device via a first other BGP network device, a first message, wherein the first message includes first attribute data associated with a non-transitive attribute, wherein the first attribute data comprises a first metric data element that is associated with a metric data element format and that indicates a metric type, a metric value, and continuity information. The BGP may process the first message to determine first path information associated with a first path from the BGP network device to the originator BGP network device via the first other BGP network device.

Classes IPC  ?

  • H04L 45/02 - Mise à jour ou découverte de topologie

88.

NETWORK TRAFFIC TRANSMISSION BASED ON NEXT-NEXT-HOP INDICATION

      
Numéro d'application 18533352
Statut En instance
Date de dépôt 2023-12-08
Date de la première publication 2025-05-01
Propriétaire Juniper Networks, Inc (USA)
Inventeur(s)
  • Wang, Kevin
  • Gupta, Manish

Abrégé

In some implementations, a network device may receive an indication of a next-next-hop of the network device and link quality information of the next-next-hop. The network device may transmit network traffic based on the indication of the next-next-hop and the link quality information of the next-next-hop.

Classes IPC  ?

  • H04L 45/12 - Évaluation de la route la plus courte
  • H04L 45/02 - Mise à jour ou découverte de topologie

89.

PROVIDING A MULTIPLE DWELLING UNIT FIXED WIRELESS ACCESS MECHANISM

      
Numéro d'application 18744943
Statut En instance
Date de dépôt 2024-06-17
Date de la première publication 2025-05-01
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Padebettu, Venkatesh

Abrégé

A device may configure, in the device, a network address of an access gateway function, and may receive upstream packets from one or more routing gateways. The device may encapsulate the upstream packets with an identifier of a layer 2 tunnel, based on the network address, and to generate encapsulated upstream packets, and may provide the encapsulated upstream packets to the access gateway function via the layer 2 tunnel and based on the network address and the identifier. The device may receive encapsulated downstream packets from the access gateway function, and may decapsulate the encapsulated downstream packets to generate downstream packets. The device may provide the downstream packets to the one or more routing gateways.

Classes IPC  ?

  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données

90.

PORT MISCONFIGURATION DETECTION

      
Numéro d'application 18930642
Statut En instance
Date de dépôt 2024-10-29
Date de la première publication 2025-05-01
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Shamsundar, Abhiram Madhugiri
  • Wang, Wenfeng
  • Pallavi, Priti
  • Mehta, Ruchit Rajkumar
  • Shil, Rajdeep

Abrégé

Techniques are described for determining port misconfiguration between network devices. For example, a network management system comprises a memory and one or more processors in communication with the memory and configured to: obtain information associated with one or more ports of a plurality of network devices; determine, based on information associated with a port of a first network device of the plurality of network devices and information associated with a port of a second network device of the plurality of network devices that is connected to the port of the first network device, whether there is a port misconfiguration of the first network device or the second network device; and perform, based on the determination that there is a port misconfiguration of the first network device or the second network device, an action to remedy the port misconfiguration of the first network device or the second network device.

Classes IPC  ?

  • H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
  • H04L 12/46 - Interconnexion de réseaux

91.

AUTOTUNING A VIRTUAL FIREWALL

      
Numéro d'application 18999137
Statut En instance
Date de dépôt 2024-12-23
Date de la première publication 2025-05-01
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Alexis, Antony Ruban
  • Ramanathan, Sai Prashanth
  • Ganesan, Ramasubramaniam

Abrégé

A device may receive an input associated with deploying a virtual firewall on a computing device. The device may determine a first set of characteristics associated with the virtual firewall and a second set of characteristics associated with a hypervisor associated with the computing device. The device may automatically tune the virtual firewall based on the first set of characteristics and the second set of characteristics. The device may deploy the virtual firewall after tuning the virtual firewall.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
  • H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité
  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p. ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow

92.

NETWORK ACCESS CONTROL INTENT-BASED POLICY CONFIGURATION

      
Numéro d'application 19003918
Statut En instance
Date de dépôt 2024-12-27
Date de la première publication 2025-05-01
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Dementyev, Viacheslav
  • Mannar, Kesavan Kazhiyur
  • Cheethirala, Madhava Rao
  • Manthiramoorthy, Natarajan
  • Tadimeti, Raja Rao

Abrégé

Techniques are described for configuration and application of intent-based network access control (NAC) policies for authentication and authorization of multi-tenant, network access server (NAS) devices to access enterprise networks of organizations. A network management system configures intent-based NAC policies for an organization. A cloud-based NAC system may apply an appropriate intent-based NAC policy in response to an authentication request from a NAS device. The NAC system identifies a vendor of the NAS device, matches incoming attributes in the authentication request to a set of normalized match rules of the intent-based NAC policy, and translates a set of abstracted policy results corresponding to the set of normalized match rules into a vendor-specific set of return attributes based on the vendor of the NAS device. The NAC system sends the vendor-specific set of return attributes to the NAS device to enable the NAS device to access the enterprise network of the organization.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

93.

Controlling downlink interface configuration based on uplink interface network and protocol state

      
Numéro d'application 17515505
Numéro de brevet 12289203
Statut Délivré - en vigueur
Date de dépôt 2021-10-31
Date de la première publication 2025-04-29
Date d'octroi 2025-04-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Panda, Pravas Kumar
  • Panda, Manas Ranjan
  • Venkatagiri, Madhusudhana Malur
  • Vardhan, Anand
  • Duggirala, Venkata

Abrégé

A customer edge device is connected, in a multi-homed configuration, to a device via a downlink of the device and to another device via another downlink of the other device. The device may determine that each of one or more uplinks of the device has an inactive interface status and may thereby cause the downlink of the device to be down. This may cause the customer edge device to communicate network traffic via the other downlink of the other device. The device may determine that at least one uplink, of the one or more uplinks, has an active interface status and may thereby cause the downlink to be up. This may cause the customer edge device to communicate network traffic via the downlink of the device.

Classes IPC  ?

  • H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
  • H04L 12/46 - Interconnexion de réseaux
  • H04L 45/24 - Routes multiples

94.

Logical path down scope analysis

      
Numéro d'application 18063591
Numéro de brevet 12289220
Statut Délivré - en vigueur
Date de dépôt 2022-12-08
Date de la première publication 2025-04-29
Date d'octroi 2025-04-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Pillay, Amit
  • Wu, Xiaoying
  • Timmons, Patrick

Abrégé

A network management system (NMS) generates a hierarchical attribution graph representing different scopes at different hierarchical levels of a wide area network (WAN); obtains logical path down data indicative of operational behavior including failure events associated with logical paths of network devices over the WAN; obtains total path data indicative of a historical number of active logical paths between the network devices; and determines a scope of a logical path down issue by, for a time period of the logical path down issue, determining a score for each scope of the different scopes based on the logical path down data aggregated across the respective scope and the total path data, and determining the scope of the logical path down issue as a particular scope of the different scopes having a highest score. The NMS may identify the particular scope as a root cause of the logical path down issue.

Classes IPC  ?

  • H04L 43/062 - Génération de rapports liés au trafic du réseau
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente

95.

Virtualized cell site routers with layer 2 forwarding

      
Numéro d'application 18432150
Numéro de brevet 12289233
Statut Délivré - en vigueur
Date de dépôt 2024-02-05
Date de la première publication 2025-04-29
Date d'octroi 2025-04-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Arham, Muhammad Qasim
  • Nair, Vinod
  • Nallamothu, Vinay K
  • K N, Kiran
  • Bansal, Shelesh
  • Sharma, Shailender
  • Varimalla, Rakesh Kumar Reddy

Abrégé

In general, techniques are described for deploying virtualized cell site routers (vCSRs). In an example, a method comprises receiving, at a forwarding plane of a virtualized cell site router (vCSR) of a first Distributed Unit (DU) of a plurality of DU servers of a cell site for a 5G radio access network, the vCSR having a containerized routing protocol process and a forwarding plane configured to perform Layer 2 (L2) switching, L2 packets on a second interface for a second physical link connecting the first DU server to an L2 switch; and switching, by the forwarding plane of the vCSR of the first DU, the L2 packets on a first interface for a first physical link connecting the first DU server to a second DU server of the plurality of DU servers.

Classes IPC  ?

  • H04L 45/42 - Routage centralisé
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/28 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données en utilisant la reprise sur incident de routes

96.

Logical fabric overlays

      
Numéro d'application 18491543
Numéro de brevet 12289234
Statut Délivré - en vigueur
Date de dépôt 2023-10-20
Date de la première publication 2025-04-29
Date d'octroi 2025-04-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Styszynski, Michal
  • Vinod, Subramaniam
  • Subramaniam, Mahesh Kumar

Abrégé

Techniques are disclosed for overlaying logical switch fabrics upon a physical switch fabric comprising multiple physical switch devices. In one example, a network device determines an overlay network associated with a received packet. The network device determines a logical identifier that is associated with the overlay network. In some examples, the logical identifier corresponds to a color. The network device selects a logical switch fabric that is associated with the logical identifier from a plurality of other logical switch fabrics that are overlaid upon a physical switch fabric comprising a plurality of network switch devices. The network device forwards the received packet to the selected logical switch fabric for transport across the physical switch fabric.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/42 - Routage centralisé
  • H04L 45/50 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données utilisant l'échange d'étiquettes, p. ex. des commutateurs d'étiquette multi protocole [MPLS]

97.

Proactive tunnel configuration computation for on-demand SD-WAN tunnels

      
Numéro d'application 18148387
Numéro de brevet 12289182
Statut Délivré - en vigueur
Date de dépôt 2022-12-29
Date de la première publication 2025-04-29
Date d'octroi 2025-04-29
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • K S, Nithyananda Vishnu
  • Athreyapurapu, Venkata Rajasekharu

Abrégé

This disclosure describes techniques are described for proactively computing configuration information for policy-driven on-demand tunnel creation and deletion between sites in a software-defined networking in wide area network (SD-WAN) environment. In some examples, a controller device is configured to precompute configuration data for an overlay tunnel through the wide area network to connect a first site and a second site of a plurality of sites in the SD-WAN environment. The controller device is further configured to obtain, after precomputing the configuration data, an indication to configure the overlay tunnel. The controller device is also configured to send, in response to receiving the indication to configure the overlay tunnel, at least some of the configuration data to the first site to configure the first site with the overlay tunnel.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
  • H04L 43/0882 - Utilisation de la capacité de la liaison
  • H04L 47/20 - Commande de fluxCommande de la congestion en assurant le maintien du trafic

98.

VIRTUAL INTERNET PROTOCOL ADDRESS ASSOCIATED WITH SUBSCRIBER GROUP

      
Numéro d'application 18493617
Statut En instance
Date de dépôt 2023-10-24
Date de la première publication 2025-04-24
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s) Padebettu, Venkatesh

Abrégé

In some implementations, a network device may transmit an indication that a first access gateway function user plane (AGF-UP) device is associated with an active state for a subscriber group, an indication that a second AGF-UP device is associated with a backup state for the subscriber group, and an indication of a virtual internet protocol (IP) address associated with the subscriber group. The network device may transmit a failover indication that the second AGF-UP device is associated with the active state for the subscriber group.

Classes IPC  ?

  • H04L 41/0659 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en isolant ou en reconfigurant les entités défectueuses
  • H04L 12/46 - Interconnexion de réseaux

99.

Display screen with animated graphical user interface

      
Numéro d'application 29652760
Numéro de brevet D1071972
Statut Délivré - en vigueur
Date de dépôt 2020-11-13
Date de la première publication 2025-04-22
Date d'octroi 2025-04-22
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Chitalia, Harshit Naresh
  • Patel, Avi K.
  • Newhouse, Travis Gregory
  • Patki, Neeren Shripad
  • Singh, Sumeet

100.

DETECTING DEGRADATION IN CLIENT CONNECTIVITY AND TRAFFIC IN A WIRELESS ACCESS POINT

      
Numéro d'application 18486606
Statut En instance
Date de dépôt 2023-10-13
Date de la première publication 2025-04-17
Propriétaire Juniper Networks, Inc. (USA)
Inventeur(s)
  • Lin, May Zar
  • Thomas, Jacob
  • Wang, Wenfeng
  • Shmakova V., Marina

Abrégé

Example network management systems, techniques, and computer-readable media are set forth herein. An example network management system is configured to obtain client activity data of one or more access point (AP) devices. The example network management system is configured to determine, based on the client activity data, an anomaly in a behavior of an AP device of the one or more AP devices based on at least one of a comparison to forecasted client activity data of the AP device or a comparison to client activity data of at least one peer AP device. The network management system is configured to perform, based on the determined anomaly in the behavior of the AP device, an action.

Classes IPC  ?

  • H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
  1     2     3     ...     38        Prochaine page