-
公开(公告)号:US12273787B2
公开(公告)日:2025-04-08
申请号:US18502421
申请日:2023-11-06
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Matthew Aaron Silverman
IPC: H04W4/02 , H04B1/7163 , H04W72/56
Abstract: Presented herein are techniques for scheduling Ultra-Wideband (UWB) anchors and mobile devices for client ranging. A control device can determine respective ranging priorities for a plurality of mobile devices, which are each assigned to at least one UWB anchor. The control device can obtain at least one collision mapping identifying, for a respective pair of the mobile devices, a collision probability that a UWB signal associated with a ranging procedure involving a first mobile device of the respective pair will collide with a UWB signal associated with a ranging procedure involving a second mobile device of the respective pair. The control device can establish a ranging schedule for the mobile devices and UWB anchors based on the respective UWB ranging priorities and the collision mapping(s). The control device can send at least one command to cause UWB ranging procedures to be performed according to the ranging schedule.
-
公开(公告)号:US20250097739A1
公开(公告)日:2025-03-20
申请号:US18470653
申请日:2023-09-20
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Robert Edgar Barton , Jeff Apcar
Abstract: Techniques for a proxy to replicate traffic being communicated between a client device and a destination device based on determining an outage or impairment in a LEO satellite network. The proxy may be communicating a traffic stream between a source device and a destination device using a primary WAN that includes the LEO satellite network. However, the proxy may determine that the primary WAN has experienced or will experience an outage or other impairment. In such examples, the proxy may then replicate the traffic stream and send the replicated traffic stream over a backup communication link. The backup communication link may a different path through the primary WAN, and/or may be a communication path through a secondary WAN. Once the outage or impairment has cleared, the proxy may stop replicating the traffic and again use the primary WAN to communicate traffic.
-
公开(公告)号:US12218912B2
公开(公告)日:2025-02-04
申请号:US16854616
申请日:2020-04-21
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Thomas Szigeti , Jerome Henry , Ruben Gerald Lobo , Laurent Jean Charles Hausermann , Maik Guenter Seewald , Daniel R. Behrens
IPC: H04L43/026 , G05B19/05 , G06Q10/0875 , H04L9/40 , H04L12/46 , H04L41/0803 , H04L41/0893 , H04L47/20 , H04L47/2441 , H04L47/32
Abstract: According to one or more embodiments of the disclosure, a networking device receives a policy for an endpoint in a network. The policy specifies one or more component tags and one or more activity tags that were assigned to the endpoint based on deep packet inspection of traffic associated with the endpoint. The networking device identifies a set of tags for a particular traffic flow in the network associated with the endpoint. The set of tags comprises one or more component tags or activity tags associated with the particular traffic flow. The networking device makes a determination that the particular traffic flow violates the policy based on the set of tags comprising a tag that is not in the policy. The networking device initiates, based on the determination that the particular traffic flow violates the policy, a corrective measure with respect to the particular traffic flow.
-
公开(公告)号:US20240396829A1
公开(公告)日:2024-11-28
申请号:US18323134
申请日:2023-05-24
Applicant: Cisco Technology, Inc.
Abstract: Provided herein are techniques to facilitate multi-level performance tracing for a mobile network environment. In one instance, a method may include obtaining, by a mobile network, a trigger from an enterprise to initiate an underlay-level trace for a wireless device of the enterprise, wherein the trigger includes a correlation identifier that correlates the underlay-level trace with an enterprise-level trace for the wireless device and providing the underlay-level trace for a session of the wireless device by including a first trace flag for IP packets for the session and including a second trace flag for encapsulations of the IP packets for the session in which the first and second trace flag are unique to the session of the wireless device and enable elements of the mobile network to provide underlay trace information for the underlay-level trace for the session of the wireless device to a trace.
-
公开(公告)号:US20240333734A1
公开(公告)日:2024-10-03
申请号:US18128978
申请日:2023-03-30
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Bhavik Pradeep Shah , Thomas Szigeti , Nancy Patricia Cam-Winget , Edward Albert Warnicke
IPC: H04L9/40 , H04L41/0631
CPC classification number: H04L63/1425 , H04L41/065
Abstract: This disclosure describes techniques for escalating a security policy based on anomalous behavior. An example method includes identifying first behaviors associated with a first user and identifying a cluster comprising the first behaviors and second behaviors associated with at least one second user. The first user and the at least one second user are within a predetermined group within an organization. The example method further includes determining that a third behavior of a device associated with the first user is greater than a threshold distance from the cluster and outputting an alert.
-
公开(公告)号:US12108243B2
公开(公告)日:2024-10-01
申请号:US17244114
申请日:2021-04-29
Applicant: Cisco Technology, Inc.
Inventor: William Sterling Alexander , Joshua Austin Knestaut , Jerome Henry , Maik Guenter Seewald , Robert Edgar Barton
CPC classification number: H04W12/02 , G06T5/70 , G06T11/20 , G06V40/166
Abstract: Methods are provided in which a user device connects a participant to a collaboration session in which the participant communicates with at least one other participant using audio and/or video, which is distributed in a media stream to the at least one other participant via a respective user device. In these methods, the user device detects at least one of an object within a space that is included in the video and an audio signal and selectively filters the media stream to exclude the object or a portion of the audio signal based on at least one of participant list information, learned background information, or learned voices of participants of the collaboration session.
-
公开(公告)号:US20240080297A1
公开(公告)日:2024-03-07
申请号:US18507349
申请日:2023-11-13
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Stephen Michael Orr
IPC: H04L61/5076 , H04L61/5007 , H04L61/5061
CPC classification number: H04L61/5076 , H04L61/5007 , H04L61/5061
Abstract: A method is provided that is performed for a wireless network that includes one or more wireless client devices that may rotate their media access control (MAC) address used for wireless communication with one or more wireless access point devices in the wireless network. The method includes determining an impact of MAC address rotation by the one or more wireless client devices on operational resources of one or more networking devices or networking processes in a network infrastructure associated with the wireless network. The method further includes scheduling MAC address rotation by the one or more wireless client devices according to the impact on operational resources of the one or more networking devices or networking processes in the network infrastructure.
-
公开(公告)号:US11909739B2
公开(公告)日:2024-02-20
申请号:US17395766
申请日:2021-08-06
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Elango Ganesan , Flemming Stig Andreasen
CPC classification number: H04L63/102 , H04L63/0236 , H04L63/0272 , H04L63/1425 , H04L63/20
Abstract: A method includes determining a corresponding level of a security model associated with each device of a plurality of devices connected to a network, each level of the security model having a corresponding tag; applying, to each of the plurality of devices, the corresponding tag based on the corresponding level of the security model with which each of the plurality of devices are associated; receiving, over a network connection, network traffic from at least one of the plurality of devices and the corresponding tag; analyzing the corresponding tag associated with the network traffic; determining a destination for the network traffic; applying one or more security measures to the network traffic based on the corresponding tag for the at least one device and a corresponding tag of the destination for the network traffic; and sending the network traffic to the destination with the corresponding tag of the destination.
-
公开(公告)号:US11832208B2
公开(公告)日:2023-11-28
申请号:US17885987
申请日:2022-08-11
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Matthew Aaron Silverman
Abstract: Presented herein are techniques for assigning Ultra-Wideband (UWB) anchors for client ranging. A location server can estimate a coarse location of a mobile device using a localization technique other than a UWB localization technique. The localization technique can involve multiple wireless access points or other radio devices. The location server can define an area around the coarse location to identify a set of candidate anchors for UWB ranging. The set of candidate anchors can be disposed within the area and include at least a subset of the radio devices. The location server can modify the set of candidate anchors to create a modified set of candidate anchors that includes only UWB-enabled devices. The location server can select a primary anchor from the modified set of candidate anchors and send a command to cause a UWB ranging procedure to be initiated between the primary anchor and the mobile device.
-
公开(公告)号:US11799948B2
公开(公告)日:2023-10-24
申请号:US16950132
申请日:2020-11-17
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Maik Guenter Seewald
IPC: H04L67/1004
CPC classification number: H04L67/1004
Abstract: Cloud services are provided by a distributed network including a number of geographically distributed datacenters, to client devices in accordance with data sovereignty requirements. A server within the distributed network may receive a service request and determine whether it complies with the data sovereignty requirements of the client. When the geographic location of the server does not comply with the client's data sovereignty requirements, the server may determine and transmit back to the client device a set of alternative datacenters within the distributed network that comply with the client's data sovereignty requirements. The client device may use network probes to select an alternative datacenter, and the cloud service request of the client device may be migrated from the server to the selected datacenter.
-
-
-
-
-
-
-
-
-