-
公开(公告)号:US20250130911A1
公开(公告)日:2025-04-24
申请号:US18415892
申请日:2024-01-18
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, JR.
IPC: G06F11/30
Abstract: In one implementation, a method is introduced herein that facilitates a hybrid agent strategy for full stack observability. The method can include observing, by a device executing an agent of a first observability platform, first observability information associated with the first observability platform and monitoring, by the device executing the agent, for a message containing second observability information on the device generated for a second observability platform. The method can further include generating a new observability information as a combination of the first observability information and the second observability information and providing the new observability information to a given observability backend service within a computer network via an observability pipeline associated with the given observability backend service.
-
公开(公告)号:US12284463B2
公开(公告)日:2025-04-22
申请号:US18203173
申请日:2023-05-30
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, Jr. , Magnus Mortensen
IPC: H04N7/15 , G06F3/0484 , G08B25/00 , H04L65/403
Abstract: This disclosure describes techniques for providing notifications about events that occur during an online meeting. For instance, a system may establish an online meeting, such as a video conferencing meeting, for users. While in the meeting, a first user may view video of a second user and determine that the second user is experiencing an emergency event. As such, a user device of the first user may receive an input indicating that the emergency event is occurring with the second user. The system may receive the indication from the user device and verify that the emergency event is occurring. Additionally, the system may then send a notification to emergency personnel that indicates at least that the emergency event is occurring and a location of the second user. Furthermore, the system may send notification(s) to contact(s) associated with the second user that indicate at least that the emergency event is occurring.
-
公开(公告)号:US12283996B1
公开(公告)日:2025-04-22
申请号:US18098764
申请日:2023-01-19
Applicant: Cisco Technology, Inc.
Inventor: Hongbin Zhang , Sheng Zhang , Tymon Barwicz
IPC: H04B10/588
Abstract: A method, system and apparatus for mapping a symbol from a N-QAM constellation into a binary bit set, where N is the number of symbols in the constellation, and reducing the length of the binary bit set according to at least one property of nonlinear distortion by generating a lookup table (LUT) address from a LUT address generator, and adding the LUT address to a LUT of size smaller than N{circumflex over ( )}(2M+1), where 2M is the number of neighboring symbols to be stored.
-
公开(公告)号:US20250126596A1
公开(公告)日:2025-04-17
申请号:US18828949
申请日:2024-09-09
Applicant: Cisco Technology, Inc.
Inventor: Jerome HENRY , Matthew A. SILVERMAN , Robert E. BARTON , Peiman AMINI , Ardalan ALIZADEH
IPC: H04W64/00 , H04B1/7163 , H04W24/02
Abstract: Techniques and apparatus for configuring ultra-wideband (UWB) communications using out-of-band (OOB) mechanisms are described. An example technique performed by a wireless device includes obtaining, prior to association with an access point (AP), ultra-wideband (UWB) information from the AP via an out-of-band (OOB) communication link between the wireless device and the AP. A location server within a network including the wireless device and the AP is determined based on the UWB information. Configuration information associated with a UWB ranging session from the location server is obtained via the OOB communication link. The UWB ranging session is performed in accordance with the configuration information.
-
公开(公告)号:US20250126557A1
公开(公告)日:2025-04-17
申请号:US19002336
申请日:2024-12-26
Applicant: Cisco Technology, Inc.
IPC: H04W52/02 , H04W52/28 , H04W72/0446 , H04W74/0816
Abstract: Network traffic interference detection and management may be provided. An infringement event by an infringing Access Point (AP) on a Restricted Target Wake Time (rTWT) transmission opportunity (TxOp) associated with a victim AP may be detected, and information associated with the infringement event may be added to an infringement list, wherein the information includes a MAC address associated with the infringing AP. A controller, may receive the infringement list and notify the infringement event to the infringing AP. The infringing AP may determine whether a transmission associated with the infringement event is low latency and high priority. When the transmission is not low latency and high priority the infringing AP may modify future transmissions based on the notification. When the transmission is low latency and high priority the infringing AP may notify the controller that the transmission is low latency and high priority. The controller may then create a negotiation between the victim AP and the infringing AP, wherein the negotiation comprises managing future transmissions of the victim AP and the infringing AP.
-
公开(公告)号:US20250126552A1
公开(公告)日:2025-04-17
申请号:US18664101
申请日:2024-05-14
Applicant: Cisco Technology, Inc.
Inventor: Marisol Palmero Amador , Snezana Mitrovic , Derek W. Engi , Gonzalo A. Salgueiro , Joel Richard Goergen
Abstract: Devices, systems, methods, and processes for feature level power calibration are described herein. Network devices include sensors that generate sensor readings indicative of various device parameters. A calibration logic utilizes the sensor readings and feature permutations associated with the sensor readings to predict a feature level power consumption for all features of the network device. The calibration logic then applies a calibration factor to the predicted feature level power consumption and obtains an actual feature level power consumption. Using the actual feature level power consumption, the calibration logic determines an actual power consumption for feature licenses of the network device. The feature and feature license level power consumption is utilized for determining which features or feature licenses can be deactivated when the device power consumption is outside a threshold limit. Such dynamic deactivation ensures that the network device accurately meets the sustainability goals.
-
公开(公告)号:US20250126477A1
公开(公告)日:2025-04-17
申请号:US18991260
申请日:2024-12-20
Applicant: Cisco Technology, Inc.
Inventor: Jerome HENRY , Robert E. BARTON , Darryl E. SLADDEN , Thomas SZIGETI
IPC: H04W12/12 , H04W4/02 , H04W4/029 , H04W12/79 , H04W24/10 , H04W48/16 , H04W48/20 , H04W76/16 , H04W88/04 , H04W88/08 , H04W88/12 , H04W92/10 , H04W92/12
Abstract: Techniques and apparatus for managing a message relaying system are described. One technique includes an access point (AP) detecting a first signal and a second signal from a computing device. A validation of the first signal is performed based on parameters of the first signal and the second signal. After the validation, information associated with the first signal is transmitted to a computing system. In another technique, the computing system may designate one of multiple APs reporting information regarding first signals as a primary reporting AP and designate the remaining APs as secondary reporting APs. The computing system may instruct the secondary reporting APs to refrain from reporting information regarding first signals to the computing system.
-
公开(公告)号:US20250126060A1
公开(公告)日:2025-04-17
申请号:US18380457
申请日:2023-10-16
Applicant: Cisco Technology, Inc.
Inventor: Prakash C. Jain , Sanjay Kumar Hooda , Aaditya Nitin Vadnere , Kedar Sudhir Karmarkar
IPC: H04L45/00
Abstract: Techniques and architecture are described for L2 service insertion in a network. More particularly, the techniques and architecture provide for monitoring a L2 service, e.g., firewall, MAC address (instead of learning the MAC address) and registering/de-registering the service node (e.g., fabric border or edge or LISP service_etr) to the service control plane (e.g., LISP MSMR) based on this. This not only load-balances the traffic (per L2 flow) but also tracks it for node's liveliness. The techniques and architecture also provide L2 service insertion connected to a service border to allow for dynamic SGT based service, e.g., firewall, insertion for both software defined access (SDA) fabric and non-fabric deployments.
-
公开(公告)号:US12279201B2
公开(公告)日:2025-04-15
申请号:US18364346
申请日:2023-08-02
Applicant: Cisco Technology, Inc.
Inventor: Stephan Otto , Abhishek Mukherjee , Priyabrat Lahiri , Minde Sun , Blair Martin
Abstract: A system and method for provisioning devices on respective LTE or 5G network cores using a hierarchical provisioning connector. Maintained by a connectivity management platform, a hierarchical provisioning connector serving as an extension of a single provisioning connector of the customer account, such that the hierarchical provisioning connector may contain an array of single provisioning connectors. A rule processor that is utilized by the hierarchical provisioning connector to classify devices by access technology. Each configured rule may take one or more unique device identifiers as input and return a reference to exactly one configured single provisioning connector.
-
公开(公告)号:US20250119367A1
公开(公告)日:2025-04-10
申请号:US18981759
申请日:2024-12-16
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Ranjan Singh , Shih-Chun Chang , Varun Sagar Malhotra , Hai Trong Vu , Jackson Ngoc Ki Pang
IPC: H04L43/045 , G06F3/0482 , G06F3/04842 , G06F3/04847 , G06F9/455 , G06F16/11 , G06F16/13 , G06F16/16 , G06F16/17 , G06F16/174 , G06F16/23 , G06F16/2457 , G06F16/248 , G06F16/28 , G06F16/29 , G06F16/9535 , G06F21/53 , G06F21/55 , G06F21/56 , G06N20/00 , G06N99/00 , G06T11/20 , H04J3/06 , H04J3/14 , H04L1/24 , H04L7/10 , H04L9/08 , H04L9/32 , H04L9/40 , H04L41/046 , H04L41/0668 , H04L41/0803 , H04L41/0806 , H04L41/0816 , H04L41/0893 , H04L41/12 , H04L41/16 , H04L41/22 , H04L43/02 , H04L43/026 , H04L43/04 , H04L43/062 , H04L43/08 , H04L43/0805 , H04L43/0811 , H04L43/0829 , H04L43/0852 , H04L43/0864 , H04L43/0876 , H04L43/0882 , H04L43/0888 , H04L43/10 , H04L43/106 , H04L43/12 , H04L43/16 , H04L45/00 , H04L45/302 , H04L45/50 , H04L45/74 , H04L47/11 , H04L47/20 , H04L47/2441 , H04L47/2483 , H04L47/28 , H04L47/31 , H04L47/32 , H04L61/5007 , H04L67/01 , H04L67/10 , H04L67/1001 , H04L67/12 , H04L67/50 , H04L67/51 , H04L67/75 , H04L69/16 , H04L69/22 , H04W72/54 , H04W84/18
Abstract: Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
-
-
-
-
-
-
-
-
-