-
公开(公告)号:US20250039729A1
公开(公告)日:2025-01-30
申请号:US18361321
申请日:2023-07-28
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Robert E. Barton , Jerome Henry , Pascal Thubert
Abstract: In one embodiment, a method includes receiving a request from an access point to transmit to a TSN data payload to a wireless TSN station, identifying resource units (RUs) in a downlink channel, each RU comprising a set of RU tones, identifying access category (AC) queues, multiplexing the RUs and AC queues to generate RU and AC queue pairs, generating timing boundaries of the pairs, wherein each timing boundary represents a combination of an average airtime of each RU and an average wait time of each AC queue for transmitting a size of the TSN data payload, iteratively validating the timing boundaries with a TSN lookahead time, and determining a first RU tone from a first RU associated with a first timing boundary less than the TSN lookahead time to transmit the TSN data payload in a first AC queue to the wireless TSN station.
-
公开(公告)号:US11696319B2
公开(公告)日:2023-07-04
申请号:US17379035
申请日:2021-07-19
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Santosh Ramrao Patil , Gangadharan Byju Pularikkal , Mark Grayson
IPC: H04W72/541 , H04W76/10 , H04W8/08 , H04W24/10 , H04W72/542 , H04W84/18 , H04W92/20
CPC classification number: H04W72/541 , H04W8/08 , H04W24/10 , H04W72/542 , H04W76/10 , H04W84/18 , H04W92/20
Abstract: Systems, methods, and computer-readable media for radio resource management in a Citizens Broadband Radio Service (CBRS) network include one or more CBRS devices (CBSDs) which can obtain a group type associated with the CBSDs and their associated Radio Environment Map (REM) reports of one or more frequency channels of the CBRS network. The group type and the REM reports may be provided to a Self-Organizing Network (SON) manager of the CBRS network, where the SON manager may determine and provide to the CBSDs, one or more of a channel utilization information, transmission power, or mobility load management information for the CBSD, based on the group type and the REM reports.
-
公开(公告)号:US12277210B2
公开(公告)日:2025-04-15
申请号:US18375149
申请日:2023-09-29
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Timothy David Keanini
Abstract: Runtime security threats are detected and analyzed for serverless functions developed for hybrid clouds or other cloud-based deployment environments. One or more serverless functions may be received and executed within a container instance executing in a controlled and monitored environment. The execution of the serverless functions is monitored, using a monitoring layer in the controlled environment to capture runtime data including container application context statistics, serverless function input and output data, and runtime parameter snapshots of the serverless functions. Execution data associated with the serverless functions may be analyzed and provided to various supervised and/or unsupervised machine-learning models configured to detect and analyze runtime security threats.
-
公开(公告)号:US12052176B2
公开(公告)日:2024-07-30
申请号:US17495479
申请日:2021-10-06
Applicant: Cisco Technology, Inc.
Inventor: Rajesh Indira Viswambharan , Nagendra Kumar Nainar , Akram Sheriff , Vinay Saini , David J. Zacks , Carlos M. Pignataro
CPC classification number: H04L47/20 , H04L1/0078 , H04L47/32
Abstract: Techniques for policy-based failure handling of data that is received for processing by failed edge services are described herein. The techniques may include receiving, at an edge node of a network, a data handling policy for a service hosted on the edge node. The service may be configured to process traffic on behalf of an application hosted by a cloud-based platform. In some examples, the data handling policy may be stored in a memory that is accessible to the edge node. The techniques may also include receiving traffic at the edge node that is to be processed at least partially by the service. At least partially responsive to detecting an error associated with the service, the edge node may cause the traffic to be handled according to the data handling policy while the service is experiencing the error.
-
公开(公告)号:US11979384B2
公开(公告)日:2024-05-07
申请号:US18197867
申请日:2023-05-16
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Nagendra Kumar Nainar , Arvind Tiwari , Rajiv Asati
CPC classification number: H04L63/0281 , H04L43/08 , H04L63/0263 , H04L63/10 , H04L63/1408 , H04L67/10 , H04L67/56 , G16Y10/75
Abstract: This disclosure describes using a dynamic proxy for securing communications between a source within a cloud environment and an application container. The techniques include intercepting traffic directed to an application container, analyzing the traffic and traffic patterns, and allowing or preventing the traffic from being delivered to the application container based on the analysis. A traffic analysis engine may determine whether the traffic is considered safe and is to be allowed to be delivered to the application container, or whether the traffic is considered unsafe and is to be prevented from being delivered to the application container, According to some configurations, the address(es) to the network interfaces (e.g., WIFI or Eth0) are abstracted to help ensure security of the application containers.
-
公开(公告)号:US20240056488A1
公开(公告)日:2024-02-15
申请号:US17886030
申请日:2022-08-11
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Vinay Saini , Akram Sheriff , Rajesh Indira Viswambharan , David John Zacks
IPC: H04L9/40
CPC classification number: H04L63/205 , H04L63/0478
Abstract: Techniques are described for classification-based data security management. The classification-based data security management can include utilizing device and/or data attributes to identify security modes for communication of data stored in a source device. The security modes can be identified based on a hybrid-encryption negotiation. The attributes can include a device resource availability value, an access trust score, a data confidentiality score, a geo-coordinates value, and/or a date/time value. The security modes can include a hybrid-encryption mode. The source device can utilize the hybrid-encryption mode to transmit the data, via one or more network nodes, such as an edge node, to one or more service nodes.
-
公开(公告)号:US11089602B2
公开(公告)日:2021-08-10
申请号:US16569416
申请日:2019-09-12
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Santosh Ramrao Patil , Gangadharan Byju Pularikkal , Mark Grayson
Abstract: Systems, methods, and computer-readable media for radio resource management in a Citizens Broadband Radio Service (CBRS) network include one or more CBRS devices (CBSDs) which can obtain a group type associated with the CBSDs and their associated Radio Environment Map (REM) reports of one or more frequency channels of the CBRS network. The group type and the REM reports may be provided to a Self-Organizing Network (SON) manager of the CBRS network, where the SON manager may determine and provide to the CBSDs, one or more of a channel utilization information, transmission power, or mobility load management information for the CBSD, based on the group type and the REM reports.
-
公开(公告)号:US20250097774A1
公开(公告)日:2025-03-20
申请号:US18470106
申请日:2023-09-19
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Akram Sheriff , Robert Edgar Barton
Abstract: A system and method are provided for timing measurement in a wireless network to determine a location of a station (STA). A channel stability is determined for a channel between an initiating station (ISTA) and a first responding station (RSTA). A request for a first timing-measurement exchange is sent from the ISTA and the first RSTA. Parameters are negotiated for the first timing-measurement exchange based on the determined channel stability, and then the timing-measurement exchange is performed to generate a first set of times. This process is then repeated for another timing-measurement exchange between the ISTA and a second RSTA to generate a second set of times. A location of the ISTA is determined based on the first and the second sets of times.
-
公开(公告)号:US20250097142A1
公开(公告)日:2025-03-20
申请号:US18369076
申请日:2023-09-15
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Jaganbabu Rajamanickam , Madhan Sankaranarayanan , Carlos M. Pignataro , Akram Sheriff
IPC: H04L45/00 , H04L43/0823
Abstract: Techniques are described for quickly rerouting traffic to an application hosted on a first Virtual Private Cloud (VPC) location. In the event of an error in routing traffic to the first VPC portion traffic can be rerouted to a second VPC portion. The first and second VPC portions can be different portions of the same VPC or could be different VPSs. The techniques include steps for calculating a predetermined route to the second private virtual cloud location. The techniques further include steps for monitoring data for detecting an error in the first cloud location. The steps further include detecting a potential error based on the monitored data, and also verifying that the potential error is in fact a valid error. In response to verifying that the error is a valid error, further steps include performing a fast reroute of traffic to the second cloud locations along the predetermined route.
-
公开(公告)号:US20240028704A1
公开(公告)日:2024-01-25
申请号:US18375149
申请日:2023-09-29
Applicant: Cisco Technology, Inc.
Inventor: Akram Sheriff , Timothy David Keanini
CPC classification number: G06F21/52 , G06N20/00 , G06F21/566 , G06F2221/033
Abstract: Runtime security threats are detected and analyzed for serverless functions developed for hybrid clouds or other cloud-based deployment environments. One or more serverless functions may be received and executed within a container instance executing in a controlled and monitored environment. The execution of the serverless functions is monitored, using a monitoring layer in the controlled environment to capture runtime data including container application context statistics, serverless function input and output data, and runtime parameter snapshots of the serverless functions. Execution data associated with the serverless functions may be analyzed and provided to various supervised and/or unsupervised machine-learning models configured to detect and analyze runtime security threats.
-
-
-
-
-
-
-
-
-