-
公开(公告)号:US10235516B2
公开(公告)日:2019-03-19
申请号:US15150851
申请日:2016-05-10
Applicant: Cisco Technology, Inc.
Inventor: John Parello , Padmanabhan Ramanujam , Sarat Pollakattu
Abstract: Various systems and methods for using power challenges to authenticate network devices are disclosed herein. For example, one method involves initiating a power challenge to authenticate an endpoint device, which involves, at least in part, requesting the endpoint device to perform a specific power signature; receiving data indicating whether the endpoint device performed the requested power signature within a given time interval, wherein the data can be received from, e.g., a power interface or other device capable of observing the endpoint device; processing the received data to determine if the endpoint device correctly performed the requested power signature; and if the endpoint correctly performed the power signature, authenticating the endpoint.
-
公开(公告)号:US20230379256A1
公开(公告)日:2023-11-23
申请号:US17747562
申请日:2022-05-18
Applicant: Cisco Technology, Inc.
Inventor: Cody Hartsook , John Parello , Tirthankar Ghose , Giles Douglas Yorke Heron , Felix Sebastian Kaechele
IPC: H04L47/127 , H04L67/52 , H04L45/00 , H04L41/0895 , H04L43/12
CPC classification number: H04L47/127 , H04L67/52 , H04L45/14 , H04L41/0895 , H04L43/12
Abstract: In one embodiment, a device obtains path probing data for paths between a set of network nodes wherein a first subset of the set of network nodes are operated by a provider of an online application or service and a second subset of the set of network nodes operated by affiliates. The device generates, based on the path probing data, a performance model of path performances between clients in different geolocations and the online application or service via each of the set of network nodes. The device determines, based on the performance model, a particular node in the second subset should be used as a point of presence for clients located in a particular one of the different geolocations to access the online application or service. The device configures a network overlay including the first subset and the particular node as points of presence for the online application or service.
-
公开(公告)号:US20170331803A1
公开(公告)日:2017-11-16
申请号:US15150851
申请日:2016-05-10
Applicant: Cisco Technology, Inc.
Inventor: John Parello , Padmanabhan Ramanujam , Sarat Pollakattu
IPC: H04L29/06
CPC classification number: G06F21/44 , H04L9/3221 , H04L25/02 , H04L63/0876
Abstract: Various systems and methods for using power challenges to authenticate network devices are disclosed herein. For example, one method involves initiating a power challenge to authenticate an endpoint device, which involves, at least in part, requesting the endpoint device to perform a specific power signature; receiving data indicating whether the endpoint device performed the requested power signature within a given time interval, wherein the data can be received from, e.g., a power interface or other device capable of observing the endpoint device; processing the received data to determine if the endpoint device correctly performed the requested power signature; and if the endpoint correctly performed the power signature, authenticating the endpoint.
-
公开(公告)号:US10826762B2
公开(公告)日:2020-11-03
申请号:US16056012
申请日:2018-08-06
Applicant: Cisco Technology, Inc.
Inventor: Charles Calvin Byers , Anoop Nannra , Ramanathan Jagadeesan , John Parello , Biren Gandhi
IPC: H04L12/24 , H04L29/06 , G06F16/182 , H04L12/911 , H04L29/08
Abstract: A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.
-
公开(公告)号:US20190036719A1
公开(公告)日:2019-01-31
申请号:US15660386
申请日:2017-07-26
Applicant: Cisco Technology, Inc.
Inventor: Amitesh Shukla , John Parello
Abstract: In one example, a collaboration application presents a map of a geographic area that includes a network connected device. The map includes a graphical representation of the network connected device. The graphical representation has a location on the map that corresponds to a current physical location of the network connected device in the geographic area. The collaboration application receives an indication of a user selection of the graphical representation, and, in response to receiving the indication, determines that the user selection of the graphical representation corresponds to a user selection of the network connected device. The collaboration application sends, to the network connected device, an invitation to join a collaboration meeting as a peer member of the collaboration meeting.
-
-
-
-