-
1.
公开(公告)号:US20240214913A1
公开(公告)日:2024-06-27
申请号:US18088980
申请日:2022-12-27
Applicant: Fortinet, Inc.
Inventor: Ruchir Mishra , Shrikant Gambheer Patil , Karthik Vasudevan
IPC: H04W48/16 , H04B17/318 , H04W12/06
CPC classification number: H04W48/16 , H04B17/318 , H04W12/06 , H04W84/12
Abstract: A dynamic radio signal strength indicator (RSSI) connection threshold is determined, with machine learning, based on previous Wi-Fi 6E connection data for the Wi-Fi 6E access point. An authentication request frame (or other type of frame) is received from a Wi-Fi 6E client that received a beacon. The authentication request or other management frame includes an RSSI measurement characterizing signal strength between the Wi-Fi 6E client and the Wi-Fi 6E access point. It is determining whether the RSSI measurement of the authentication request frame satisfies the machine learning RSSI threshold as a minimum signal strength for connections. Responsive to the RSSI measurement not satisfying the RSSI threshold, the connection with the Wi-Fi 6E client is refused.
-
公开(公告)号:US20250113288A1
公开(公告)日:2025-04-03
申请号:US18375500
申请日:2023-09-30
Applicant: Fortinet, Inc.
Inventor: Shrikant Gambheer Patil , Ruchir Mishra
Abstract: Scan reports are received by a Wi-Fi controller from a plurality of access points. Each scan report identifies neighboring BSSIDs with associated BSS-color within radio range and corresponding RSSI measurements. An OBSS can be detected by cross referencing scan reports. BSS color us modified to avoid a potential BSS collision. A station associated the potential BSS collision reports actual color collisions. An indication of the BSS color change is transmitted to one or more access points for local implementation.
-
公开(公告)号:US20250097711A1
公开(公告)日:2025-03-20
申请号:US18902728
申请日:2024-09-30
Applicant: Fortinet, Inc.
Inventor: Ruchir Mishra , Shrikant Gambheer Patil
IPC: H04W12/122 , H04W24/08
Abstract: A rogue Wi-Fi 6E access points are identified by on-wire data traffic of authorized Wi-Fi 6E access points. Data traffic is monitored across all access points for the rogue Wi-Fi 6E access points according to an SSID/BSSID scan table. In response, modified CSA values are sent from spoofed action frames that have a source BSSID of the rogue access points rather than the authenticated access point that transmits.
-
公开(公告)号:US20250113254A1
公开(公告)日:2025-04-03
申请号:US18375519
申请日:2023-09-30
Applicant: Fortinet, Inc.
Inventor: Shrikant Gambheer Patil , Ruchir Mishra
IPC: H04W28/08 , H04W28/086 , H04W72/52 , H04W84/12
Abstract: Real-time statistics of station RU needs are received. Additionally, real-time statistics of access point RU allocation are received. Real-time statistics for stations and access point history are stored. An artificial intelligence (AI) predictive model is generated for each station based on historical traffic needs. AI model to allocate access point RUs for specific stations in real-time.
-
5.
公开(公告)号:US20240214815A1
公开(公告)日:2024-06-27
申请号:US18217119
申请日:2023-06-30
Applicant: Fortinet, Inc.
Inventor: Ruchir Mishra , Shrikant Gambheer Patil
IPC: H04W12/122 , H04W12/037 , H04W48/16
CPC classification number: H04W12/122 , H04W12/037 , H04W48/16 , H04W84/12
Abstract: A list is received from the Wi-Fi controller of rogue Wi-Fi 6E access points identified by BSSID within a vicinity of the Wi-Fi 6E access points based on RSSI measurements sent to the Wi-Fi controller. A rogue Wi-Fi 6E access point of the Wi-Fi controller list from the periodic beacon scanning. In response, prior to connection of any station to the rogue Wi-Fi 6E access point, broadcasts spoofed beacons on behalf of the rogue Wi-Fi 6E access point, using SSID and BSSID over the current operating channel of the rogue Wi-Fi 6E access point. The beacons are spoofed by modifying the MFP field value to indicate no encryption capability and also to indicate no encryption requirement for management frames.
-
公开(公告)号:US20240214813A1
公开(公告)日:2024-06-27
申请号:US18092309
申请日:2022-12-31
Applicant: Fortinet, Inc.
Inventor: Ruchir Mishra , Shrikant Gambheer Patil
IPC: H04W12/122 , H04W24/08
CPC classification number: H04W12/122 , H04W24/08
Abstract: A rogue Wi-Fi 6E access points are identified by on-wire data traffic of authorized Wi-Fi 6E access points. Data traffic is monitored across all access points for the rogue Wi-Fi 6E access points according to an SSID/BSSID scan table. In response, modified CSA values are sent from spoofed action frames that have a source BSSID of the rogue access points rather than the authenticated access point that transmits.
-
-
-
-
-