-
公开(公告)号:US20240232307A1
公开(公告)日:2024-07-11
申请号:US18151242
申请日:2023-01-06
Applicant: Cisco Technology, Inc.
Inventor: Pete Rai , Joel Abraham Obstfeld , Simon Peter James Dyke , James Geoffrey Walker
IPC: G06F21/32
CPC classification number: G06F21/32 , G06F2221/2133
Abstract: Methods that generate a proof-of-life indicator used by a metaverse platform to indicate whether an avatar is being controlled by or is representative of a human user or a software-based entity. In these methods, a plurality of data streams are obtained from a plurality of sensors that are configured to monitor activity of a user that is active within the metaverse environment. The plurality of data streams relate to behavioral and biometric characteristics of the user that is interacting within the metaverse environment. The methods involve determining whether the user is a human user or a software-based entity based on aggregating attribute information extracted from the plurality of data streams, generating a proof-of-life indicator that indicates whether the user is the human user or the software-based entity and a confidence level associated with the proof-of-life indicator, and providing the proof-of-life indicator in the metaverse environment.
-
公开(公告)号:US11829924B2
公开(公告)日:2023-11-28
申请号:US17147152
申请日:2021-01-12
Applicant: Cisco Technology, Inc.
Inventor: Marcelo Yannuzzi , Joel Abraham Obstfeld , Franciscus Johannes Marcellus van Lingen , Anuj Jain
IPC: G06Q10/083 , G06Q10/0637 , G06Q10/087
CPC classification number: G06Q10/083 , G06Q10/0637 , G06Q10/087
Abstract: According to one or more embodiments of the disclosure, a service deploys a first service connector to a first deployment network of a first organization and a second service connector to a second deployment network of a second organization. The service receives a selected visibility offering by the first organization and a selected visibility intent for the second organization. The service determines a data sharing policy by matching the selected visibility offering by the first organization to the selected visibility intent for the second organization. The service configures the first service connector to capture data specified by the data sharing policy from the first deployment network and provide that data to the second service connector.
-
公开(公告)号:US12223463B2
公开(公告)日:2025-02-11
申请号:US17524909
申请日:2021-11-12
Applicant: Cisco Technology, Inc.
Inventor: Marcelo Yannuzzi , Joel Abraham Obstfeld
IPC: G06Q10/0833 , G06F21/60
Abstract: In one embodiment, a control tower device obtains, first state information from sensing or reporting systems or devices at a particular location via a first communication channel. The control tower device makes, based on the first state information, an evaluation regarding the particular location using one or more digital twins representing one or more entities of the particular location. The control tower device obtains second state information from one or more trusted verifiers for the particular location via a second communication channel. The control tower device verifies, based on the second state information, the evaluation regarding the particular location.
-
公开(公告)号:US20230336466A1
公开(公告)日:2023-10-19
申请号:US17721679
申请日:2022-04-15
Applicant: Cisco Technology, Inc.
Inventor: Hemamalini Subash , David John Zacks , N Shalini Srinivasan , Rashmi Nikhil Patil , Joel Abraham Obstfeld
IPC: H04L45/00 , H04L45/03 , H04L45/28 , H04L43/065
CPC classification number: H04L45/38 , H04L45/22 , H04L45/03 , H04L45/28 , H04L43/065
Abstract: Systems, methods, and computer-readable media are disclosed for proactively and adaptively rerouting data to a healthier path through network, as part of flow provisioning, based on environmental variables associated with devices in the network. The present technology includes identifying a routing path for forwarding traffic flows in a network, receiving diagnostic data of a routing device on the routing path. The diagnostic data include one or more environmental parameters associated with internal state and surroundings of the routing device. Further, the present technology includes comparing the diagnostic data of the routing device with a predetermined threshold and modifying, prior to a failure of the routing device, the routing path to bypass the routing device for at least a portion of the traffic flows based on the comparison between the diagnostic data of the routing device and the predetermined threshold.
-
公开(公告)号:US20230065676A1
公开(公告)日:2023-03-02
申请号:US17462814
申请日:2021-08-31
Applicant: Cisco Technology, Inc.
Inventor: Joel Abraham Obstfeld , Pete Rai , Marcelo Yannuzzi
Abstract: In one embodiment, a code authentication service maintains a mapping of uniform resource locators and key information embedded into codes. The code authentication service receives, from a requesting device, a domain name system resolution request for a particular uniform resource locator. The code authentication service determines, based on the mapping, whether the domain name system resolution request is associated with valid key information for the particular uniform resource locator. The code authentication service provides, to the requesting device, a domain name system resolution response that indicates an address associated with the particular uniform resource locator, when the code authentication service determines that the domain name system resolution request includes valid key information for the particular uniform resource locator.
-
公开(公告)号:US20250097204A1
公开(公告)日:2025-03-20
申请号:US18368743
申请日:2023-09-15
Applicant: Cisco Technology, Inc.
Inventor: Joel Abraham Obstfeld , Ronnie I. Dan , Louis Gwyn Samuel
Abstract: In one implementation, a device receives a request to generate a new communication protocol. The device generates, based on the request, the new communication protocol using a generative model. The device configures software to use the new communication protocol. The device causes an endpoint in a network to communicate using the new communication protocol via the software.
-
公开(公告)号:US20240257101A1
公开(公告)日:2024-08-01
申请号:US18161999
申请日:2023-01-31
Applicant: Cisco Technology, Inc.
Inventor: Pete Rai , Joel Abraham Obstfeld , Simon Peter James Dyke , James Geoffrey Walker , Oliver James Bull
CPC classification number: G06Q20/36 , G06T13/40 , G06Q2220/00
Abstract: Methods that control use, trace ownership and authenticity of digital assets and/or brandmarks in a metaverse environment. The methods involve obtaining a first set of control properties associated with a digital asset and a second set of control properties associated with a brandmark. The first set of control properties define first usage rules for rendering the digital asset in the metaverse environment in which a user is immersed into a virtual environment and the second set of control properties define second usage rules for rendering the brandmark in the metaverse environment. The methods further involve determining whether the digital asset is compatible with the brandmark based on the first set of control properties and the second set of control properties and rendering the digital asset with the brandmark in the metaverse environment based on determining that the digital asset is compatible with the brandmark.
-
公开(公告)号:US20240244109A1
公开(公告)日:2024-07-18
申请号:US18153501
申请日:2023-01-12
Applicant: Cisco Technology, Inc.
Inventor: Pete Rai , Joel Abraham Obstfeld , Simon Peter James Dyke , James Geoffrey Walker
IPC: H04L67/131 , G06F3/01
CPC classification number: H04L67/131 , G06F3/011
Abstract: Methods that determine whether real-world conditions are satisfied for a metaverse application and/or a feature of the metaverse application. The methods involve obtaining information about a real-world environment of a user that is interacting within a metaverse environment. The information includes at least one of one or more attributes of the user in the real-world environment or one or more characteristics of a physical space of the user in the real-world environment. The methods further involve determining whether the information about the real-world environment satisfies a policy associated with a metaverse application, where the policy defines one or more real-world conditions for the metaverse application and configuring the metaverse environment based on determining whether the information about the real-world environment satisfies the policy.
-
公开(公告)号:US20250094641A1
公开(公告)日:2025-03-20
申请号:US18368776
申请日:2023-09-15
Applicant: Cisco Technology, Inc.
Inventor: Joel Abraham Obstfeld , Ronnie I. DAN , Oliver James BULL
Abstract: In one implementation, a device provides, to a user interface, proof-of-creation information that certifies that data presented by the user interface was created by one or more sensors capturing the data from a real person. The device receives, via the user interface, an edit to the data, to form edited data. The device associates one or more keys with the edited data that are based on the proof-of-creation information and on the edit to the data. The device provides, based on the one or more keys, lineage information to the user interface in conjunction with the edited data that indicates the edit to the data and the proof-of-creation information.
-
公开(公告)号:US20240146659A1
公开(公告)日:2024-05-02
申请号:US17977740
申请日:2022-10-31
Applicant: Cisco Technology, Inc.
Inventor: Xinping Xu , David C. White, JR. , John W. Garrett, JR. , Mark Ammar Rayes , Joel Abraham Obstfeld
IPC: H04L47/10 , H04L41/06 , H04L41/16 , H04L43/0876
CPC classification number: H04L47/16 , H04L41/06 , H04L41/16 , H04L43/0876
Abstract: Methods are provided for a collaborative, decentralized insight engineering based on exchanging telemetry vectors with peer network devices. Each network device independently detects a deviation in its functioning using machine learning of generated feature vectors. Specifically, the methods involve obtaining, from at least one peer network device, at least a first feature vector that represents at least one insight generated from telemetry data of a respective peer network device. The intermediate network device and the at least one peer network device are configured to forward packets of a traffic flow. The methods further involve determining whether a deviation related to one or more of the network devices, exists based at least on the first feature vector and performing the at least one predefined action based on determining that the deviation exists.
-
-
-
-
-
-
-
-
-