-
171.
公开(公告)号:US20240236784A1
公开(公告)日:2024-07-11
申请号:US18150409
申请日:2023-01-05
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Indermeet Singh Gandhi
CPC classification number: H04W36/00837 , H04W36/30 , H04W36/32
Abstract: Provided herein are techniques through which coordinated steering of a Reconfigurable Intelligent Surface (RIS) device can be utilized according to prioritized time-slices determined for each of multiple wireless access points (APs) for a wireless local area network (WLAN). Coordinated steering of an RIS device by multiple wireless APs according to prioritized time-slices may facilitate seamless roaming for wireless clients between the wireless APs for the WLAN.
-
公开(公告)号:US11991144B2
公开(公告)日:2024-05-21
申请号:US17731335
申请日:2022-04-28
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Stephen Michael Orr , Malcolm Muir Smith
IPC: H04L61/2596 , H04L61/251 , H04L61/5069 , H04L69/14
CPC classification number: H04L61/2596 , H04L61/251 , H04L61/5069 , H04L69/14
Abstract: A method comprising: at a multi-link device (MLD) configured for multi-link operation: establishing a first Internet Protocol (IP) stack of a first IP type and configured with a first IP address of the first IP type, wherein the first IP stack is associated to a first MLD media access control (MAC) address of a first station of the MLD; establishing a second IP stack of a second IP type and configured with a second IP address of the second IP type, wherein the second IP stack exists concurrently with the first IP stack and is associated to a second MLD MAC address of a second station of the MLD; and exchanging, with a peer MLD, IP traffic using one or more of (i) the first IP stack and the first MLD MAC address, and (ii) the second IP stack and the second MLD MAC address.
-
173.
公开(公告)号:US11929984B2
公开(公告)日:2024-03-12
申请号:US17308375
申请日:2021-05-05
Applicant: Cisco Technology, Inc.
Inventor: David Hanes , Gonzalo Salgueiro , Sebastian Jeuk , Robert Edgar Barton
IPC: H04L9/40 , H04L65/102
CPC classification number: H04L63/0263 , H04L63/1416 , H04L63/1425 , H04L63/20 , H04L65/102
Abstract: Techniques for associating manufacturer usage description (MUD) security profiles for Internet-of-Things (IoT) device(s) with secure access service edge (SASE) solutions, providing for automated and scalable integration of IoT devices with SASE frameworks. A MUD controller may utilize a MUD uniform resource identifier (URI) emitted by an IoT device to fetch an associated MUD file from a MUD file server associated with a manufacturer of the IoT device. The MUD controller may determine that a security recommendation included in the MUD file is to be implemented by a cloud-based security service provided by the SASE service and cause the IoT device to establish a connection with a secure internet gateway associated with the cloud-based security service. Additionally, or alternatively, the MUD file may include SASE extensions indicating manufacturer recommended cloud-based security services. Further, cloud-based security services may be implemented if local services are unavailable.
-
公开(公告)号:US11838830B2
公开(公告)日:2023-12-05
申请号:US18075631
申请日:2022-12-06
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Matthew Aaron Silverman
IPC: H04W4/02 , H04B1/7163 , H04W72/56
CPC classification number: H04W4/023 , H04B1/7163 , H04W72/56
Abstract: Presented herein are techniques for scheduling Ultra-Wideband (UWB) anchors and mobile devices for client ranging. A control device can determine respective ranging priorities for a plurality of mobile devices, which are each assigned to at least one UWB anchor. The control device can obtain at least one collision mapping identifying, for a respective pair of the mobile devices, a collision probability that a UWB signal associated with a ranging procedure involving a first mobile device of the respective pair will collide with a UWB signal associated with a ranging procedure involving a second mobile device of the respective pair. The control device can establish a ranging schedule for the mobile devices and UWB anchors based on the respective UWB ranging priorities and the collision mapping(s). The control device can send at least one command to cause UWB ranging procedures to be performed according to the ranging schedule.
-
公开(公告)号:US20230344836A1
公开(公告)日:2023-10-26
申请号:US18344492
申请日:2023-06-29
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Matthew William Gillies
IPC: H04L9/40 , H04L67/1097
CPC classification number: H04L63/107 , H04L63/20 , H04L63/0823 , H04L67/1097
Abstract: Systems, methods, and computer-readable media for enforcing data sovereignty policies in a cloud environment are provided. An example method can include sending, by a cloud provider, to a government entity associated with a geographic area, a request for device certificates for nodes located within the geographic area; receiving device certificates for the nodes; creating a data sovereignty policy specifying that data associated with the government entity must be stored on nodes located within the geographic area; based on the device certificates, verifying those of the nodes that comply with the data sovereignty policy; and storing the data associated with the government entity on those of the nodes verified to comply with the data sovereignty policy.
-
公开(公告)号:US20230281515A1
公开(公告)日:2023-09-07
申请号:US18315281
申请日:2023-05-10
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Abhishek Kumar
CPC classification number: G06N20/00 , G06F9/505 , G06F11/3006 , G06N5/043
Abstract: The disclosed technology relates to a process for metered training of fog nodes within the fog layer. The metered training allows the fog nodes to be continually trained within the fog layer without the need for the cloud. Furthermore, the metered training allows the fog node to operate normally as the training is performed only when spare resources are available at the fog node. The disclosed technology also relates to a process of sharing better trained machine learning models of a fog node with other similar fog nodes thereby speeding up the training process for other fog nodes within the fog layer.
-
公开(公告)号:US11681813B2
公开(公告)日:2023-06-20
申请号:US16743645
申请日:2020-01-15
Applicant: Cisco Technology, Inc.
Inventor: Marcelo Yannuzzi Sanchez , Carlos M. Pignataro , Robert Edgar Barton , Simon Dyke
CPC classification number: G06F21/602 , G06F3/064 , G06F3/0622 , G06F3/0637 , G06F3/0659 , G06F3/0673 , G06F21/6218 , H04L9/3271
Abstract: Systems, methods, and computer-readable media for context-based transfer and access of data include a producer which receives a request from a consumer to access a data block. The producer verifies whether a context associated with the consumer will allow access the data block, by providing a challenge to the consumer and obtaining a response, the response including a certification that the context associated with the consumer will allow the consumer to access the data block. Upon verifying that the context allows the consumer to access the data block, the producer transfers a data capsule, the data capsule including an encrypted version of the data block and a micro agent for monitoring access to the data block. The micro agent can interact with an operating system at the consumer to allow decryption and local access of the data block upon the data capsule being transferred.
-
178.
公开(公告)号:US20230171641A1
公开(公告)日:2023-06-01
申请号:US18153882
申请日:2023-01-12
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Russell Paul Gyurek , Jerome Henry
Abstract: Systems, methods, and computer-readable media for the secure creation of application containers for 5G slices. A MEC application in a MEC layer of a 5G network can be associated with a specific network slice of the 5G network. A backhaul routing policy for the MEC application can be defined based on the association of the MEC application with the specific network slice of the 5G network. Further, a SID for the MEC application that associates the MEC application with a segment routing tunnel through a backhaul of the 5G network can be generated. A MEC layer access policy for the MEC application can be defined based on the SID for the MEC application. As follows, access to the MEC application through the 5G network can be controlled based on both the backhaul routing policy for the MEC application and the MEC layer access policy for the application.
-
公开(公告)号:US20230155964A1
公开(公告)日:2023-05-18
申请号:US17530376
申请日:2021-11-18
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton
IPC: H04L12/861
CPC classification number: H04L49/9005
Abstract: Techniques and systems described herein relate to network system queue management and dynamic real-time re-allocation of resources to prevent oversubscription and packet loss due to oversubscription. The techniques and systems enable monitoring of traffic and initial identification of queues at risk for oversubscription based on a rate of change of traffic load on the queue in advance of oversubscription occurring. After identifying a queue at risk for oversubscription, an Extended Berkeley Packet Filter or other similar component performs a likelihood determination using predictive algorithm techniques to identify a likelihood of oversubscription in the near future and re-allocates to parallel queues for efficient and loss-free use of the queues.
-
公开(公告)号:US11617158B2
公开(公告)日:2023-03-28
申请号:US17097813
申请日:2020-11-13
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Vishal Satyendra Desai , Indermeet Singh Gandhi
Abstract: Presented herein are methodologies for managing radio resources in a venue that implements a high density wireless infrastructure. The methodology includes detecting, using wireless access points, neighbor awareness networking (NAN) communications broadcast by a mobile device, determining a wireless channel on which the mobile device is sending the NAN communications, predicting a destination of the mobile device based on a path, through a predetermined venue, being taken by the mobile device, the path being detected using the wireless access points; and implementing a radio resource management remediation technique to reduce radio interference that is expected to be caused by the NAN communications broadcast by the mobile device at the destination based on the wireless channel and the destination.
-
-
-
-
-
-
-
-
-