-
公开(公告)号:US20250150328A1
公开(公告)日:2025-05-08
申请号:US18386814
申请日:2023-11-03
Applicant: Cisco Technology, Inc.
Inventor: Jean-Philippe Vasseur , Eduard Schornig , Pierre-André Savalle , Grégory Mermoud
IPC: H04L41/0631 , H04L41/16
Abstract: In one implementation, a device makes a determination as to whether an issue identified in a network is eligible for self-healing. The device uses, based on the determination, a large language model-based agent to determine a root cause of the issue. The device identifies, using the large language model-based agent, a set of one or more self-healing actions to address the root cause of the issue. The device causes, using the large language model-based agent, performance of the set of one or more self-healing actions in the network.
-
公开(公告)号:US20250149226A1
公开(公告)日:2025-05-08
申请号:US18387888
申请日:2023-11-08
Applicant: Cisco Technology, Inc.
Inventor: Jianquan Lou , Alpesh U. Bhobe
Abstract: In one embodiment, an electronic device includes a generally toroidal magnetic core having a first extension portion coupled to a first location of the generally toroidal magnetic core and a second extension portion coupled to a second location of the generally toroidal magnetic core generally opposite the first location and a common mode choke comprising a first wire and a second wire wound around the first extension portion and the second extension portion in a same winding direction. The first wire winds around the generally toroidal magnetic core in a first direction, and the second wire winds around the generally toroidal magnetic core in a second direction to form a primary winding. The electronic device further includes a transformer comprising the primary winding and a secondary winding, wherein the secondary winding of the transformer comprises a third wire and a fourth wire wound around the generally toroidal magnetic core in opposite directions.
-
公开(公告)号:US20250148290A1
公开(公告)日:2025-05-08
申请号:US18386833
申请日:2023-11-03
Applicant: Cisco Technology, Inc.
Inventor: Jean-Philippe Vasseur , Pierre-André SAVALLE , Grégory MERMOUD , Eduard SCHORNIG
IPC: G06N3/09
Abstract: In one implementation, a device receives an input request for a large language model-based troubleshooting agent for a network. The device selects an optimization criterion for the large language model-based troubleshooting agent based on the input request. The device provides the optimization criterion to the large language model-based troubleshooting agent to cause the large language model-based troubleshooting agent to select a particular large language model to process the input request based on the optimization criterion. The device sends, to a user interface, an indication of a result of the particular large language model processing the input request.
-
公开(公告)号:US12294930B2
公开(公告)日:2025-05-06
申请号:US18332810
申请日:2023-06-12
Applicant: Cisco Technology, Inc.
Inventor: Gautam D. Bhanage , Vishal Satyendra Desai , Ardalan Alizadeh , Khashayar Mirfakhraei
Abstract: Optimal determination of wireless network pathway configurations may be provided. A computing device may detect, at a first network Access Point (AP), inference on a channel with a second AP. Then, the computing device can check availability of a redundant radio at the second AP. Based on the availability, the computing device can establish a new radio link with the redundant radio at the second AP and reroute data traffic over the new radio link to the second AP. After establishing the new radio link, the computing device can then sever the channel with the second AP.
-
公开(公告)号:US12294505B2
公开(公告)日:2025-05-06
申请号:US18671429
申请日:2024-05-22
Applicant: Cisco Technology, Inc.
Inventor: Sergey Sergeev , Anna Igorevna Bokhan-Dilawari , Geoffrey R. Hendrey
IPC: G06F16/20 , G06F16/25 , H04L41/5003
Abstract: According to one or more embodiments of the disclosure, an example method herein may comprise: managing a particular cell of a multi-celled architecture for an extensibility platform having one or more tenants served by datastores of the particular cell; connecting to a global cell manager for global cell management of all cells of the multi-celled architecture; identifying a consumption limit indicating a maximum amount of system resources that a particular tenant of the one or more tenants is allowed to consume of the particular cell; enforcing the consumption limit on the particular tenant; and ensuring that the particular tenant is provided system resources of the particular cell up to the consumption limit without limitation.
-
公开(公告)号:US20250142344A1
公开(公告)日:2025-05-01
申请号:US18495193
申请日:2023-10-26
Applicant: Cisco Technology, Inc.
Inventor: Malcolm M. Smith , Jerome Henry , Scott Ross Blue , Brian D. Hart
IPC: H04W12/71 , H04W12/062 , H04W12/63
Abstract: Secure device location sharing may be provided. Over a secured link, an indication that a peer-to-peer device desires Automated Frequency Coordination (AFC) based location sharing may be received. Then, from the peer-to-peer device over the secured link, an identity provider (IdP) may be received for the peer-to-peer device. Next, validation of the peer-to-peer device may be requested from the IdP. From the IdP in response to requesting validation of the peer-to-peer device from the IdP, authentication for the peer-to-peer device and an indication that the peer-to-peer device needs AFC based location sharing may be received. An indication that the peer-to-peer device is approved for AFC based location sharing may then be sent to the peer-to-peer device over the secured link.
-
公开(公告)号:US20250141893A1
公开(公告)日:2025-05-01
申请号:US18385591
申请日:2023-10-31
Applicant: Cisco Technology, Inc.
Inventor: Michael Adam Polak , Martin Kopp , Vojtech Outrata
Abstract: Techniques described herein can perform obfuscation detection on command lines used at computing devices in a network. In response to detecting obfuscation in a command line, the disclosed techniques can output a notification for use in connection with network security analysis. The command line obfuscation detection techniques include pre-processing command line input data and converting command lines into token groups. The token groups are then provided as an input to a natural language processor or other machine learned model, which is trained to identify obfuscation probabilities associated with token groups can corresponding command lines. A notification is generated to trigger further analysis in response to an obfuscation probability exceeding a threshold obfuscation probability.
-
公开(公告)号:US20250141862A1
公开(公告)日:2025-05-01
申请号:US18495939
申请日:2023-10-27
Applicant: Cisco Technology, Inc.
IPC: H04L9/40
Abstract: A method comprises: at a control entity configured to communicate with a network: linking a user identifier of a user having an account for call-related information to a hardware identifier of a device to be sent to the user, to produce linked identifiers; loading on the device a limited use token associated with the user that enables only basic call functions on the device, and prevents the device from accessing the account; determining whether the user possesses the device based on the linked identifiers and proximity pairing of the device with a pairing device; and based on determining, either provisioning the device with a full access token that enables full calling functions on the device and grants full access to the account by the device, or not provisioning the device with the full access token to prevent access to the account.
-
29.
公开(公告)号:US20250141802A1
公开(公告)日:2025-05-01
申请号:US19007885
申请日:2025-01-02
Applicant: Cisco Technology, Inc.
Inventor: Putu H. SUBAGIO , Ravikanth NASIKA , Saikat BHATTACHARYA , Chih-Tsung HUANG
IPC: H04L45/7453 , G06F16/90 , H04L12/46 , H04L47/125 , H04L49/00
Abstract: Embodiments for handling multidestination traffic in a network are described. It is determined that a destination of a packet, received at a network device, is a multihomed destination. In response to determining that the destination of the packet is a multihomed destination, a hash value is determined from one or more header values of the packet using a hash function. The device refrains from forwarding the packet to the destination using a shadow hash forwarding table and the has value based on determining that the network device is not a designated forwarder for the packet, where the shadow hash forwarding table is used rather than a hash forward table based at least in part on determining that an updated forwarding table has not converged in the network.
-
公开(公告)号:US20250141788A1
公开(公告)日:2025-05-01
申请号:US18494586
申请日:2023-10-25
Applicant: Cisco Technology, Inc.
Inventor: Mankamana Prasad Mishra , Anil Kumar , Sridhar Santhanam
Abstract: In one aspect, a computer-implemented method for redundant multicast groups, includes receiving a request for an element of content from a device, where the element of content is associated with a first source address and a redundant source group identifying multiple servers in a network including the element of content, determining a second source address within the redundant source group has a shorter distance to a location of the device, and routing packets associated with the element of content from the second source address to the device. The method further includes determining the connection has failed, and routing, automatically upon determining the connection has failed, the device to a third source address of the multiple servers, where the third source address is selected according to a server selection policy.
-
-
-
-
-
-
-
-
-