-
公开(公告)号:US20220070816A1
公开(公告)日:2022-03-03
申请号:US17098735
申请日:2020-11-16
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Matthew Aaron Silverman
Abstract: Presented herein are techniques for assigning Ultra-Wideband (UWB) anchors for client ranging. A location server can estimate a coarse location of a mobile device using a localization technique other than a UWB localization technique. The localization technique can involve multiple wireless access points or other radio devices. The location server can define an area around the coarse location to identify a set of candidate anchors for UWB ranging. The set of candidate anchors can be disposed within the area and include at least a subset of the radio devices. The location server can modify the set of candidate anchors to create a modified set of candidate anchors that includes only UWB-enabled devices. The location server can select a primary anchor from the modified set of candidate anchors and send a command to cause a UWB ranging procedure to be initiated between the primary anchor and the mobile device.
-
公开(公告)号:US20220066010A1
公开(公告)日:2022-03-03
申请号:US17123904
申请日:2020-12-16
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Matthew Aaron Silverman
Abstract: Presented herein are infrastructure triggering techniques for secure Ultra-Wideband (UWB) ranging. In one example, a method may include providing UWB ranging parameters to a mobile device via a first radio communication, wherein the first radio communication is a non-UWB radio communication; and triggering the mobile device to perform UWB ranging with a UWB anchor, wherein the triggering is performed using a second radio communication. In another example, a method may include, obtaining, by a mobile device, UWB ranging parameters for a geographic area; obtaining a UWB ranging instruction for the geographic area; and performing UWB ranging with a target UWB anchor based on the UWB ranging parameters and the UWB ranging instruction.
-
公开(公告)号:US20210329001A1
公开(公告)日:2021-10-21
申请号:US17362735
申请日:2021-06-29
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Matthew William Gillies
Abstract: Systems, methods, and computer-readable media for enforcing data sovereignty policies in a cloud environment are provided. An example method can include sending, by a cloud provider, to a government entity associated with a geographic area, a request for device certificates for nodes located within the geographic area; receiving device certificates for the nodes; creating a data sovereignty policy specifying that data associated with the government entity must be stored on nodes located within the geographic area; based on the device certificates, verifying those of the nodes that comply with the data sovereignty policy; and storing the data associated with the government entity on those of the nodes verified to comply with the data sovereignty policy.
-
公开(公告)号:US20210314811A1
公开(公告)日:2021-10-07
申请号:US16841526
申请日:2020-04-06
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Russell Paul Gyurek , Jerome Henry
IPC: H04W28/06 , H04W40/02 , H04L12/723
Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.
-
公开(公告)号:US20210287323A1
公开(公告)日:2021-09-16
申请号:US16817390
申请日:2020-03-12
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Russell Paul Gyurek , Frank Brockners
Abstract: A server that includes a graphics processing unit (GPU) may receive, from a first application that is remote from the server, a first request to reserve a first number of cores of the GPU for a first amount of time. The server may also receive, from a second application that is also remote from the server, a second request to reserve a second number of cores of the GPU for a second amount of time that at least partly overlaps the first amount of time. The server may determine that the first request is associated with a higher priority than the second request and, in response, may reserve the first number of cores for the first amount of time for the first application. The server may send, to the first application, an indication that the first number of cores have been reserved as requested by the first application.
-
公开(公告)号:US20210286650A1
公开(公告)日:2021-09-16
申请号:US16818955
申请日:2020-03-13
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton
Abstract: This disclosure describes techniques for improving allocation of computing resources to computation of machine learning tasks, including on massive computing systems hosting machine learning models. A method includes a computing system, based on a computational metric trend and/or a predicted computational metric of a past task model, allocating a computing resource for computing of a machine learning task by a current task model prior to runtime of the current task model; computing the machine learning task by executing a copy of the current task model; quantifying a computational metric of the copy of the current task model; determining a computational metric trend based on the computational metric; deriving a predicted computational metric of the copy of the current task model based on the computational metric; and, based on the computational metric trend, changing allocation of a computing resource for computing of the machine learning task by the current task model.
-
公开(公告)号:US20210264047A1
公开(公告)日:2021-08-26
申请号:US17236936
申请日:2021-04-21
Applicant: Cisco Technology, Inc.
Inventor: Maik Guenter Seewald , Robert Edgar Barton , Jerome Henry
Abstract: The disclosed technology provides solutions that enable scalable and secure data retrieval between microservices by using microservice attributes to encrypt container based data stores. A process of the technology can include steps for: instantiating a first microservice and a second microservice in a cloud environment, wherein the first microservice is associated with a first attribute label and the second microservice is associated with a second attribute label, generating a first key based on the first attribute label and a second key based on the second attribute label, associating a first data store with the first microservice, wherein the first data store is encrypted using the first key, and associating a second data store with the second microservice, wherein the second data store is encrypted using the second key. Systems and machine readable media are also provided.
-
公开(公告)号:US20210194815A1
公开(公告)日:2021-06-24
申请号:US16854616
申请日:2020-04-21
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Thomas Szigeti , Jerome Henry , Ruben Gerald Lobo , Laurent Jean Charles Hausermann , Maik Guenter Seewald , Daniel R. Behrens
IPC: H04L12/851 , H04L12/813 , H04L12/26 , H04L12/24
Abstract: According to one or more embodiments of the disclosure, a networking device receives a policy for an endpoint in a network. The policy specifies one or more component tags and one or more activity tags that were assigned to the endpoint based on deep packet inspection of traffic associated with the endpoint. The networking device identifies a set of tags for a particular traffic flow in the network associated with the endpoint. The set of tags comprises one or more component tags or activity tags associated with the particular traffic flow. The networking device makes a determination that the particular traffic flow violates the policy based on the set of tags comprising a tag that is not in the policy. The networking device initiates, based on the determination that the particular traffic flow violates the policy, a corrective measure with respect to the particular traffic flow.
-
公开(公告)号:US11019565B2
公开(公告)日:2021-05-25
申请号:US16548727
申请日:2019-08-22
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Shankar Ramanathan , Vinay Saini , Robert Edgar Barton
Abstract: The disclosed technology relates to a process for managing power consumption of Wi-Fi access points. The solution is composed of three parts. A first part creates power profiles for each of the switches having access points within a computer network that detail how power consumption for an access point can be modified based on changing one or more elements associated with the access point. The second part creates a time-based radio constraint profile that details power requirements for an access point based on client devices connected to the access point within a pre-defined area to ensure that each client device can connect and stay connected with the access point. The third part utilizes machine learning to generate a model that identifies optimal settings for the access point in order to achieve a specific level of power consumption for the access point.
-
公开(公告)号:US20210058859A1
公开(公告)日:2021-02-25
申请号:US16548727
申请日:2019-08-22
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Shankar Ramanathan , Vinay Saini , Robert Edgar Barton
Abstract: The disclosed technology relates to a process for managing power consumption of Wi-Fi access points. The solution is composed of three parts. A first part creates power profiles for each of the switches having access points within a computer network that detail how power consumption for an access point can be modified based on changing one or more elements associated with the access point. The second part creates a time-based radio constraint profile that details power requirements for an access point based on client devices connected to the access point within a pre-defined area to ensure that each client device can connect and stay connected with the access point. The third part utilizes machine learning to generate a model that identifies optimal settings for the access point in order to achieve a specific level of power consumption for the access point.
-
-
-
-
-
-
-
-
-