-
公开(公告)号:US12278879B2
公开(公告)日:2025-04-15
申请号:US17975199
申请日:2022-10-27
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, Jr. , Jeffrey Dominick Jackson , Magnus Mortensen , Matthew R. Engle , Ryan Alan MacLennan
IPC: H04L67/60 , G06F9/50 , H04L67/306 , H04L67/75
Abstract: A network management system tests the availability of a network resource before a user performs a task with the network resource. The system measures network activity of a user performing one or more tasks. The network activity includes communication between a user device of the user and each network resource associated with a corresponding task performed by the user. The system also generates a digital model persona of the user based on the tasks performed by the user, and determines a schedule of the tasks performed the user. Each particular task is associated with a corresponding execution time for the user. The system further configures the digital model persona to test the network resource associated with each corresponding task at a testing time that is a predetermined length of time prior to the execution time for the user.
-
公开(公告)号:US11928650B2
公开(公告)日:2024-03-12
申请号:US18193142
申请日:2023-03-30
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, Jr. , Magnus Mortensen
IPC: G06Q10/1093 , G06F16/9035 , G06F16/9038
CPC classification number: G06Q10/1095 , G06F16/9035 , G06F16/9038
Abstract: A meeting system facilitates spontaneous social encounter between users with a meeting server. The meeting server obtains calendar data, user preferences, and an organization chart associated with each user of a plurality of users. The meeting server selects a first user and a second user for a social encounter based on the calendar data, user preferences, and roles in the organization chart. The meeting server prompts a first user device associated with the first user, and a second user device associated with the second user, for a social encounter. Responsive to obtaining acceptances from the first user and the second user, the meeting server facilitates the social encounter between the first user and the second user.
-
公开(公告)号:US11907670B1
公开(公告)日:2024-02-20
申请号:US17034585
申请日:2020-09-28
Applicant: Cisco Technology, Inc.
Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid process software,” can be configured to participate in multi-party conversations. The humanoid can monitor electronic communications in a conversation involving the humanoid and at least one other party. The humanoid can model the electronic communications by uniquely identifying each of the electronic communications as a stream of data. For example, the data can be labeled and sorted in a database and/or arranged in a nodal graph representation. The humanoid can participate in the conversation based on the modeling.
-
公开(公告)号:US11558306B2
公开(公告)日:2023-01-17
申请号:US17132675
申请日:2020-12-23
Applicant: Cisco Technology, Inc.
Inventor: Magnus Mortensen , Jay Kemper Johnston , David C. White, Jr.
IPC: H04L12/825 , H04L47/25 , H04L43/0888
Abstract: A computer executed process can be configured to identify a network traffic flow of a source network device. The process can select a traffic fidelity rate from a plurality of traffic fidelity rates for sending information regarding the network traffic flow to a digital twin device corresponding to the source network device. The process can transmit the information regarding the network traffic flow to the digital twin device according to the traffic fidelity rate. The digital twin device can be configured to replicate at least one operation of the source network device with respect to the network traffic flow.
-
公开(公告)号:US11016836B2
公开(公告)日:2021-05-25
申请号:US16514340
申请日:2019-07-17
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , Magnus Mortensen , David C. White, Jr. , Joseph Michael Clarke
Abstract: Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.
-
公开(公告)号:US10958681B2
公开(公告)日:2021-03-23
申请号:US15933923
申请日:2018-03-23
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, Jr. , Magnus Mortensen
Abstract: In one embodiment, a service classifies a device in a network as human-controlled or self-controlled. The service also classifies an online resource as designed for access by human-controlled devices or by self-controlled devices. The service obtains traffic data regarding an attempt by the device to access the online resource via the network. The service determines that the attempt by the device to access the online resource is a security violation, based on the classifications of the device and the online resource. The service initiates a mitigation action in the network for the security violation.
-
公开(公告)号:US10819571B2
公开(公告)日:2020-10-27
申请号:US16024100
申请日:2018-06-29
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, Jr. , Magnus Mortensen , Michael Robertson
Abstract: Aspects of the disclosed technology address the problems of manually identifying and optimizing service function chaining (SFC) performance in response to changes in traffic profiles. In one aspect of the present disclosure, a method includes monitoring, by a first network component, incoming data packets; detecting, by the first network component, a change in a traffic profile of the incoming data packets; generating, by the first network component, in-band information on changes in the traffic profile; and transmitting, by the first network component, the in-band information with one or more data packets of the incoming data packets, the in-band information being used by a second network component to adjust one or more corresponding settings for servicing the incoming data packets.
-
公开(公告)号:US10680915B2
公开(公告)日:2020-06-09
申请号:US15472849
申请日:2017-03-29
Applicant: Cisco Technology, Inc.
Abstract: Consumption-based licensing of network features based on blockchained transactions includes receiving, at a server having connectivity to a network including a plurality of network devices, a request from a particular network device of the plurality of network devices for a feature that is licensed in the network on a per-use basis. Feature-specific key blockchain elements and a feature-specific template are generated for the feature and at least one message that includes the feature-specific key blockchain elements and the feature-specific template is sent to the particular network device. The message enables the plurality of network devices to generate one or more blockchain transactions related to consumption of the feature when a usage interval associated with the feature expires.
-
公开(公告)号:US10278047B2
公开(公告)日:2019-04-30
申请号:US15798434
申请日:2017-10-31
Applicant: Cisco Technology, Inc.
Inventor: David C. White, Jr. , Magnus Mortensen , Jay Kemper Johnston , Rama Darbha
Abstract: In one embodiment a method for providing presence information in a smart environment is implemented on a personal computing device associated with a user and includes: broadcasting a presence indicator signal in the smart environment, where the presence indicator signal indicates presence of the user in the smart environment, and the personal computing device is not provided by an operator of the smart environment.
-
公开(公告)号:US10158605B2
公开(公告)日:2018-12-18
申请号:US14950418
申请日:2015-11-24
Applicant: Cisco Technology, Inc.
Inventor: David C. White, Jr. , Jay K. Johnston , Rama Darbha , Magnus Mortensen , Carlos M. Pignataro
Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
-
-
-
-
-
-
-
-
-