-
公开(公告)号:US11614990B2
公开(公告)日:2023-03-28
申请号:US17694562
申请日:2022-03-14
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White , Christopher Dreier
IPC: G06F11/07 , G06F16/17 , G06F16/22 , G06F16/2455 , G06F16/901 , G06F11/36 , G06F40/137 , H04L45/00 , H04L41/069 , H04L41/0631 , H04L41/22
Abstract: Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
-
公开(公告)号:US20240073192A1
公开(公告)日:2024-02-29
申请号:US17896066
申请日:2022-08-25
Applicant: Cisco Technology, Inc.
Inventor: Ana Andrijic , Srilatha Vemula , David C. White , Arati Shimikeri , Poorna Rajaraman
CPC classification number: H04L63/0435 , H04L45/38 , H04L63/107 , H04L63/20
Abstract: This disclosure describes techniques for data path monitoring and visibility in communications among network devices. The techniques include determining that personally identifiable information (PII) is included in a data traffic flow intended for delivery to a destination endpoint. A probe may be sent from a source endpoint to identify an intended data path of the data traffic flow to the destination endpoint. The techniques include validating the intended data path of the data traffic flow against a policy related to data routing. Based at least in part on a result of the validation, the techniques may include allowing or dropping the data traffic flow, or various other actions.
-
公开(公告)号:US20200074862A1
公开(公告)日:2020-03-05
申请号:US16118118
申请日:2018-08-30
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White , Magnus Mortensen
IPC: G08G1/16 , G06T7/73 , G06K9/00 , G06K9/62 , G05D1/00 , G05D1/02 , G08G1/00 , G08G1/04 , G06N99/00
Abstract: In one embodiment, a first vehicle makes, using a first machine learning-based model, a determination that raw image data captured by the first vehicle does not indicate the presence of a driving hazard. The first vehicle sends a hazard assessment request to a second vehicle in communication proximity of the first vehicle that includes the raw image data. The first vehicle receives a hazard detection response from the second vehicle that indicates a driving hazard identified by the second vehicle by applying a second machine learning-based model to the raw image data included in the hazard assessment request. The first vehicle adjusts a path of travel of the first vehicle to avoid the driving hazard identified by the second vehicle.
-
公开(公告)号:US20240357007A1
公开(公告)日:2024-10-24
申请号:US18136104
申请日:2023-04-18
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , Magnus Mortensen , David C. White
IPC: H04L67/1061 , G06F11/14
CPC classification number: H04L67/1065 , G06F11/1464
Abstract: Techniques for peer-to-peer backup in an administrative domain are described. The techniques may include identifying, by a first device, a second device as a trusted peer device. The techniques may also include receiving an advertisement that the second device supports a peer-to-peer backup system and transmitting an acknowledgement to the second device that the first device supports the peer-to-peer backup system. Additionally, techniques may include receiving a request to store backup data associated with the second device on the first device, the request may include an amount of memory needed. If the first device has the needed memory, the first device may transmit an indication that the memory is available. The indication may include a recovery key. The first device may then receive backup data associated with the second device, encrypted with the recovery key, and store the encrypted backup data in memory reserved for peer-to-peer backup data.
-
公开(公告)号:US20220206889A1
公开(公告)日:2022-06-30
申请号:US17694562
申请日:2022-03-14
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White , Christopher Dreier
IPC: G06F11/07 , G06F16/17 , G06F16/22 , G06F16/2455 , G06F16/901 , H04L41/069 , H04L41/0631 , G06F11/36 , G06F40/137 , H04L45/00
Abstract: Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
-
-
-
-