-
公开(公告)号:US10826771B2
公开(公告)日:2020-11-03
申请号:US16145584
申请日:2018-09-28
Applicant: Cisco Technology, Inc.
Inventor: John W. Garrett, Jr. , Brett Dunstan , Jeffrey Owen Apcar
Abstract: Techniques for system self-assessment using a state identity vector are described. In one embodiment, a method includes obtaining a policy that includes a combination of a plurality of features and a set of desired values for the features. The method also includes comparing the policy to a device fingerprint for a network device and determining compliance with the policy based on the comparison between the device fingerprint and the combination of features. The device fingerprint comprises a multi-bit word having a plurality of positions, with each position representing a feature associated with the network device. Upon determining that the network device is not in compliance with one or more features included in the combination of features of the policy, the method includes implementing a responsive action by the network device according to a schema that defines instructions for each feature represented by the plurality of positions in the device fingerprint.
-
公开(公告)号:US11729149B2
公开(公告)日:2023-08-15
申请号:US17165208
申请日:2021-02-02
Applicant: Cisco Technology, Inc.
Inventor: Michael Shane Mooney , Maheshwari Dixith , Jeffrey Owen Apcar
CPC classification number: H04L63/0421 , H04L9/0643 , H04L2209/16
Abstract: Techniques are provided herein for coordinated data obfuscation. In one example, a first network device in a network obtains, from a controller in or having communication to the network, an obfuscation parameter that is further obtained by one or more second network devices in the network. Personally Identifiable Information (PII) of the first network device has a given logical relationship to PII of the one or more second network devices. Based on the obfuscation parameter, the first network device obfuscates the PII of the first network device to generate obfuscated PII of the first network device. The obfuscated PII of the first network device has the given logical relationship to obfuscated PII of the one or more second network devices. The first network device provides the obfuscated PII of the first network device to a server configured to collect the obfuscated PII of the one or more second network devices.
-
公开(公告)号:US20200106673A1
公开(公告)日:2020-04-02
申请号:US16145584
申请日:2018-09-28
Applicant: Cisco Technology, Inc.
Inventor: John W. Garrett, JR. , Brett Dunstan , Jeffrey Owen Apcar
IPC: H04L12/24
Abstract: Techniques for system self-assessment using a state identity vector are described. In one embodiment, a method includes obtaining a policy that includes a combination of a plurality of features and a set of desired values for the features. The method also includes comparing the policy to a device fingerprint for a network device and determining compliance with the policy based on the comparison between the device fingerprint and the combination of features. The device fingerprint comprises a multi-bit word having a plurality of positions, with each position representing a feature associated with the network device. Upon determining that the network device is not in compliance with one or more features included in the combination of features of the policy, the method includes implementing a responsive action by the network device according to a schema that defines instructions for each feature represented by the plurality of positions in the device fingerprint.
-
公开(公告)号:US20230419070A1
公开(公告)日:2023-12-28
申请号:US17850281
申请日:2022-06-27
Applicant: Cisco Technology, Inc.
Inventor: Jeffrey Owen Apcar , Gonzalo Salgueiro , Andrew Malcolm Stanley , Maria Soledad Palmero Amador , Esther Roure Vila
CPC classification number: G06K19/0723 , G06K17/0022 , G06Q10/08 , H04W4/029 , G01S5/0242
Abstract: Presented herein are techniques to geographically track and monitor an unpowered device. A method includes during a powered off state of the device, and upon detecting a predetermined event, enabling a radio frequency monitoring tag affixed to the device to collect, via radio frequency reception, information indicative of a geographical location of the radio frequency monitoring tag, storing the information indicative of the geographical location of the radio frequency monitoring tag in memory of the radio frequency monitoring tag, and upon powering up of the device, sending by the device, to a remote server, the information indicative of the detected geographical location of the radio frequency monitoring tag.
-
公开(公告)号:US20220247726A1
公开(公告)日:2022-08-04
申请号:US17165208
申请日:2021-02-02
Applicant: Cisco Technology, Inc.
Inventor: Michael Shane Mooney , Maheshwari Dixith , Jeffrey Owen Apcar
Abstract: Techniques are provided herein for coordinated data obfuscation. In one example, a first network device in a network obtains, from a controller in or having communication to the network, an obfuscation parameter that is further obtained by one or more second network devices in the network. Personally Identifiable Information (PII) of the first network device has a given logical relationship to PII of the one or more second network devices. Based on the obfuscation parameter, the first network device obfuscates the PII of the first network device to generate obfuscated PII of the first network device. The obfuscated PII of the first network device has the given logical relationship to obfuscated PII of the one or more second network devices. The first network device provides the obfuscated PII of the first network device to a server configured to collect the obfuscated PII of the one or more second network devices.
-
-
-
-