-
公开(公告)号:US20240380249A1
公开(公告)日:2024-11-14
申请号:US18487056
申请日:2023-10-14
Applicant: Cisco Technology, Inc.
Inventor: Matthew A. Silverman , Sivadeep Reddy Kalavakuru , Jerome Henry , Ardalan Alizadeh
Abstract: Coordinated customization of harvesting conditions to ambient power devices may be provided. receive Radio Frequency (RF) characteristics associated with a backscatter communication device may be received. Based on the RF characteristics and a Received Signal Strength Indicator (RSSI) from the backscatter communication device, it may be determined that the computing device has an ability to charge the backscatter communication device to at least meet a predetermined energy need of the backscatter communication device. Next, in response to determining that the computing device has the ability to charge the backscatter communication device, charging of the backscatter communication device to at least meet the predetermined energy need of the backscatter communication device may be scheduled.
-
242.
公开(公告)号:US20240378033A1
公开(公告)日:2024-11-14
申请号:US18196068
申请日:2023-05-11
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Vincent E. PARLA , Walter Theodore HULICK, JR. , David John ZACKS
IPC: G06F8/41
Abstract: In one embodiment, a device obtains telemetry regarding processor hardware of a compute node in a containerized system, whereby the telemetry has been converted into a common data format. The device associates the telemetry with a microservice of an application executed by the compute node. The device generates, based on the telemetry, a control flow graph for the microservice associated with the telemetry. The device provides an alert for display based on the control flow graph for the microservice.
-
公开(公告)号:US20240373333A1
公开(公告)日:2024-11-07
申请号:US18311062
申请日:2023-05-02
Applicant: Cisco Technology, Inc.
Inventor: Malcolm M. SMITH , Brian D. HART , Jerome HENRY , Pooya MONAJEMI
Abstract: Techniques for wireless device roaming are disclosed. These techniques include identifying a wireless client entity for roaming from a first infrastructure entity to a second infrastructure entity. The techniques further include agreeing, between the client entity and the first infrastructure entity, on one or more roaming conditions defined using transition parameters for transition of a first data flow for the client entity from the first infrastructure entity to the second infrastructure entity, the one or more transition parameters including a sequence number relating to the dataflow. The techniques further include determining that a first condition defined in terms of a transition parameter of the agreed one or more roaming conditions is met, and, based on the determining, transitioning from providing the first dataflow from the first infrastructure entity to the client entity to providing the first data flow from the second infrastructure entity to the client entity.
-
公开(公告)号:US20240370584A1
公开(公告)日:2024-11-07
申请号:US18361344
申请日:2023-07-28
Applicant: Cisco Technology, Inc.
Inventor: Prabhat K Singh , Jianxin Wang , Surya Santosh Kumar Allena , Ruchika Pandey
IPC: G06F21/62
Abstract: The disclosed technology addresses the need in the art for a data loss prevention policy that is adapted to new and evolving uses of artificial intelligence tools, such as generative large language models. The present technology can use techniques such as word embeddings, or classifications using artificial intelligence tools to identify leakage of sensitive information in the context of generative large language models. The present technology can also identify and track the use of content created by artificial intelligence tools for uses within an organization.
-
公开(公告)号:US12137409B2
公开(公告)日:2024-11-05
申请号:US17509802
申请日:2021-10-25
Applicant: Cisco Technology, Inc.
Inventor: Ravi Shekhar , Aditya Prakash , Amit Shivhare , Vimal Srivastava
Abstract: A control plane (CP) function for mobility management may receive, from a user equipment (UE), a message which indicates a registration request for registration to a network slice. The CP function may select, as an allowed slice ID, a first slice ID of a first network slice in which to register the UE. The first slice ID has a slice/service type (SST) value indicating an SST and a first slice differentiator (SD) value associated with a first level of service to be provided. The CP function may alternatively select, as the allowed slice ID, a second slice ID of a second network slice in which to register the UE based on unavailability of the slice type associated with the first level of service. The second slice ID has the SST value indicating the slice type and a second SD value associated with a second level of service to be provided.
-
公开(公告)号:US12136959B2
公开(公告)日:2024-11-05
申请号:US18191553
申请日:2023-03-28
Applicant: Cisco Technology, Inc.
Inventor: Sivadeep Kalavakuru , Fred Anderson , Xiangxiang Fang , Ardalan Alizadeh
Abstract: Real-time radio self-calibration may be provided. The self-calibration may begin by sampling a Transmission (TX) signal. An achievable Error Vector Magnitude (EVM) for one or more frames may be determined based on the TX signal. Link budgets for clients may be determined using a TX power and a supported Modulation and Coding Scheme (MCS). A per packet TX power is adjusted based on the achievable EVM and a TX retry rate. The PA linearity of the radio may also be adjusted based on the achievable EVM and the link budget. The client may be regrouped into a new MCS based on the link budget.
-
247.
公开(公告)号:US20240364748A1
公开(公告)日:2024-10-31
申请号:US18764557
申请日:2024-07-05
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Walter T. Hulick, JR. , Tal Maoz
CPC classification number: H04L63/20 , G06F9/4552 , G06F9/547
Abstract: The present technology includes applying a security policy by an application security system to a transaction within an application that is monitored by the application security system. The present technology includes monitoring transaction occurring between a client device an application over a network. The present technology also includes identifying a first transaction from the transactions as a sensitive transaction. The sensitive transaction is associated with an authentication policy requiring an authentication. The present technology also includes interrupting the application. The present technology also includes prompting the client device for the authentication.
-
公开(公告)号:US20240364687A1
公开(公告)日:2024-10-31
申请号:US18306700
申请日:2023-04-25
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , David John Zacks , Thomas Szigeti , Flemming S. Andreasen
IPC: H04L9/40
CPC classification number: H04L63/0876
Abstract: This disclosure describes techniques for validating a network device based on an operational context of the network device. The techniques may include receiving, via an intercepting node, a DNS query from a querying device. The techniques may include extracting the metadata from the DNS query. Based at least in part on verifying a signature of the metadata, the techniques may include extracting a location code from the metadata. Based at least in part on comparing the location code to an expected location of the intercepting node, the techniques may include sending a response to the querying device indicating a contextual validation of the querying device.
-
公开(公告)号:US20240364589A1
公开(公告)日:2024-10-31
申请号:US18307777
申请日:2023-04-26
Applicant: Cisco Technology, Inc.
Inventor: Vishal S Desai , Young Il Choi , Abhishek Datta
IPC: H04L41/082 , H04L41/0823 , H04L41/149
CPC classification number: H04L41/082 , H04L41/0836 , H04L41/149
Abstract: The disclosed technology relates to determining a period in which a non-urgent RRM update should be deferred. The method may comprise applying a first update to an existing configuration of the plurality of wireless access points in the network based on an analysis of telemetry received from the plurality of wireless access points received over a period spanning at least two busy periods. The method may further comprise applying a second update that modifies the first preferred network configuration based on an analysis of telemetry received during the first busy period. The method may further comprise applying a maintenance update to the tweaked network configuration based on telemetry received during the next busy period.
-
公开(公告)号:US20240364561A1
公开(公告)日:2024-10-31
申请号:US18641898
申请日:2024-04-22
Applicant: Cisco Technology, Inc.
Inventor: Neeraj Malhotra , Balaji Pitta Venkatachalapathy , Krishnaswamy Muddenahally Ananthamurthy , Ali Sajassi , Dhananjaya Kasargod Rao
IPC: H04L12/46 , H04L45/00 , H04L45/02 , H04L45/50 , H04L45/741 , H04L101/622
CPC classification number: H04L12/4641 , H04L45/02 , H04L45/50 , H04L45/66 , H04L45/741 , H04L2101/622
Abstract: In one embodiment, a method includes receiving, by a route reflector, a subscription request from a first provider edge node in a network and generating a subscription policy for the first provider edge node. The method also includes receiving a first Ethernet Virtual Private Network (EVPN) Type 2 Route from a second provider edge node, assigning a sequence number to the first EVPN Type 2 Route, and communicating the first EVPN Type 2 Route with the sequence number to the first provider edge node. The method further includes receiving a second EVPN Type 2 Route from a third provider edge node, generating an updated sequence number in response to receiving the second EVPN Type 2 Route from the third provider edge node, and communicating the second EVPN Type 2 Route with the updated sequence number to the first provider edge node and the second provider node.
-
-
-
-
-
-
-
-
-