-
公开(公告)号:US20210058478A1
公开(公告)日:2021-02-25
申请号:US16545225
申请日:2019-08-20
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Robert Edgar Barton , Jerome Henry , Eric Levy-Abegnoli
Abstract: Presented herein are techniques that aggregate messages using a subroot node. A plurality of messages is received from a corresponding plurality of nodes by a subroot node acting as a proxy in a wireless mesh sub-network. The plurality of messages is aggregated into a single message according to a template. The single message is wireless transmitted to a root node, wherein the root node has a wired connection to a network.
-
公开(公告)号:US10897320B1
公开(公告)日:2021-01-19
申请号:US16846182
申请日:2020-04-10
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Indermeet Singh Gandhi , Robert Edgar Barton , Vishal Satyendra Desai
IPC: H04W64/00 , H04B17/27 , H04B17/318 , H04B17/21
Abstract: The present technology pertain to a continuous calibration performed by real-time location system controller to continuously calibrate itself to handle data received from network infrastructure devices more accurately, and to use this continuous calibration to accurately predict a location of a portable computing device.
-
公开(公告)号:US10856181B2
公开(公告)日:2020-12-01
申请号:US16130904
申请日:2018-09-13
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Indermeet Singh Gandhi
IPC: H04W28/10 , H04W28/02 , H04L12/24 , H04L12/801 , H04W84/12
Abstract: A method comprising obtaining, from a first wireless network characterized by a first radio access technology (RAT), a first set of wireless network policies. The first set of wireless network policies characterizes a first wireless channel provided to a client device by the first wireless network. The method includes obtaining, from a second wireless network characterized by a second RAT different from the first RAT, a second set of wireless network policies. The second set of wireless network policies characterizes a second wireless channel provided to the client device by the second wireless network. The method includes generating a set of aggregated policies by aggregating the first and second sets of wireless network policies based on one or more aggregation criteria. The method includes providing the set of aggregated policies. The set of aggregated policies directs the client device to steer traffic to the first and second wireless networks.
-
公开(公告)号:US20200008169A1
公开(公告)日:2020-01-02
申请号:US16024377
申请日:2018-06-29
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Timothy Daniel Spiglanin , Rajesh S. Pazhyannur
Abstract: In one embodiment, a process determines how often client devices roam from a given access point (AP) to each particular neighbor AP of a plurality of neighbor APs of the given AP, and correspondingly determines a roaming distance from the given AP to each particular neighbor AP, the roaming distance being shorter for neighbor APs roamed to more often, and longer for neighbor APs roamed to less often, within a given interval. Successful but temporary roams to the plurality of neighbor APs may also be detected and removed from consideration in the roaming distance to that particular neighbor AP. The process then generates a proximity list of one or more of the neighboring APs having the shortest roaming distances, and feeds the proximity list to the given AP to cause the given AP to provide the proximity list to client devices for optimized client roaming.
-
公开(公告)号:US20190132206A1
公开(公告)日:2019-05-02
申请号:US15795723
申请日:2017-10-27
Applicant: Cisco Technology, Inc.
Inventor: M. David Hanes , Charles Calvin Byers , Joseph Michael Clarke , Gonzalo Salgueiro , Jerome Henry , Robert Edgar Barton
Abstract: A method includes obtaining performance characterization values from endpoints managed by a first fog node at a first hierarchical level in a hierarchy of fog nodes. The method includes changing a first operating characteristic of the wireless network based on the performance characterization values. The first operating characteristic affects the operation of one or more of the endpoints. The method includes transmitting a portion of the performance characterization values to a second fog node at a second hierarchical level in the hierarchy of fog nodes. The method includes changing a second operating characteristic of the wireless network based on an instruction from the second fog node. The second operating characteristic affects the operation of the first fog node and/or other fog nodes at the first hierarchical level. Changing one or more of the first operating characteristic and the second operating characteristic satisfies an operating threshold for the wireless network.
-
116.
公开(公告)号:US20180191669A1
公开(公告)日:2018-07-05
申请号:US15398601
申请日:2017-01-04
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Robert Edgar Barton , Patrick Grossetete , Laurent Aubert , Frederic Detienne , Graham Bartlett , Amjad Inamdar
IPC: H04L29/12 , H04L12/751
CPC classification number: H04L45/02 , H04L61/251 , H04L61/6068
Abstract: A method is described and in one embodiment includes identifying at an initiator element a list of Internet protocol (“IP”) prefixes corresponding to routes designated as interesting routes, wherein the IP prefixes are included in a Routing Information Base (“RIB”) of the initiator; monitoring the RIB for a change in the list of IP prefixes; and, responsive to detection of a change in the list of IP prefixes, injecting at least a portion of the changed list of IP prefixes into a payload of an IKEv2 NOTIFY message and sending the IKEv2 NOTIFY message to a responder element peered with the initiator element, wherein the responder element updates an RIB of the responder element using the IP prefixes included in the received IKEv2 NOTIFY message.
-
公开(公告)号:US12278801B2
公开(公告)日:2025-04-15
申请号:US18507349
申请日:2023-11-13
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Stephen Michael Orr
IPC: H04L61/5076 , H04L61/5007 , H04L61/5061
Abstract: A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.
-
公开(公告)号:US12225053B2
公开(公告)日:2025-02-11
申请号:US17898162
申请日:2022-08-29
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Indermeet Gandhi
IPC: H04L9/40
Abstract: A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.
-
119.
公开(公告)号:US12206646B2
公开(公告)日:2025-01-21
申请号:US18537156
申请日:2023-12-12
Applicant: Cisco Technology, Inc.
Inventor: David Hanes , Gonzalo Salgueiro , Sebastian Jeuk , Robert Edgar Barton
IPC: H04L9/40 , H04L65/102
Abstract: Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine that a security recommendation included in the MUD file is to be implemented by a cloud-based security service provided by the SASE service and cause the IoT device to establish a connection with a secure internet gateway associated with the cloud-based security service. Additionally, or alternatively, the MUD file may include SASE extensions indicating manufacturer recommended cloud-based security services. Further, cloud-based security services may be implemented if local services are unavailable.
-
公开(公告)号:US12192175B2
公开(公告)日:2025-01-07
申请号:US16838822
申请日:2020-04-02
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Thomas Szigeti , Jerome Henry , Ruben Gerald Lobo , Laurent Jean Charles Hausermann , Maik Guenter Seewald , Daniel R. Behrens
IPC: H04L9/40 , G05B19/05 , G06Q10/0875 , H04L12/46 , H04L41/0803 , H04L41/0893 , H04L43/026 , H04L47/20 , H04L47/2441 , H04L47/32
Abstract: According to one or more embodiments of the disclosure, a device in a network identifies a packet sent via the network towards an endpoint as being a control packet for the endpoint. The device extracts one or more control parameter values from the control packet. The device compares the one or more control parameter values to a policy associated with the endpoint. The device initiates a corrective measure, based on a determination that the one or more control parameter values violate the policy associated with the endpoint.
-
-
-
-
-
-
-
-
-