-
公开(公告)号:US12113663B1
公开(公告)日:2024-10-08
申请号:US18446272
申请日:2023-08-08
Applicant: Cisco Technology, Inc.
Inventor: Frank Brockners , Trevor George Smith , Sándor Szilárd Magyari , Marco Trinelli , Tal Maoz
IPC: H04L41/0659 , H04L41/0654 , H04L43/0811 , H04L67/10
CPC classification number: H04L41/0654 , H04L43/0811 , H04L67/10
Abstract: A method for unjoining and rejoining clusters of computing nodes in edge site computing networks to reduce the impact of interruption to connectivity between computing nodes is presented. The method includes accessing a cluster of computing nodes executing on an edge site computing network. The cluster of computing nodes includes a plurality of follower computing nodes and a leader computing node. The method further includes detecting an interruption to connectivity established between the leader computing node and one or more of the plurality of follower computing nodes. In response to detecting the interruption to connectivity, the method includes bifurcating the cluster of computing nodes into a first subcluster of computing nodes and a second subcluster of computing nodes. In response to detecting a restoration of connectivity, the method includes recombining the first subcluster of computing nodes and the second subcluster of computing nodes.
-
公开(公告)号:US20250055751A1
公开(公告)日:2025-02-13
申请号:US18883589
申请日:2024-09-12
Applicant: Cisco Technology, Inc.
Inventor: Frank Brockners , Trevor George Smith , Sándor Szilárd Magyari , Marco Trinelli , Tal Maoz
IPC: H04L41/0654 , H04L43/0811 , H04L67/10
Abstract: A method for unjoining and rejoining clusters of computing nodes in edge site computing networks to reduce the impact of interruption to connectivity between computing nodes is presented. The method includes accessing a cluster of computing nodes executing on an edge site computing network. The cluster of computing nodes includes a plurality of follower computing nodes and a leader computing node. The method further includes detecting an interruption to connectivity established between the leader computing node and one or more of the plurality of follower computing nodes. In response to detecting the interruption to connectivity, the method includes bifurcating the cluster of computing nodes into a first subcluster of computing nodes and a second subcluster of computing nodes. In response to detecting a restoration of connectivity, the method includes recombining the first subcluster of computing nodes and the second subcluster of computing nodes.
-
公开(公告)号:US20250080530A1
公开(公告)日:2025-03-06
申请号:US18459093
申请日:2023-08-31
Applicant: Cisco Technology, Inc.
Inventor: Marco Trinelli , Mohamed Tahar Kedjour , Jean Diaconu , Márk Sági-Kazár , Sándor Szilárd Magyari
IPC: H04L9/40
Abstract: In one embodiment, a method comprises accessing information associated with a user that is trying to login to an application, generating a first session identifier corresponding to the information, sending a first notification to an authentication client that the user is trying to login using an authentication service, receiving a first request from an authentication provider for authenticating a second session identifier, determining that the second session identifier is identical to the first session identifier by comparing the second session identifier with stored first session identifier, and causing the authentication provider to patch one or more authentication tokens with the information regarding the tenant, where the one or more authentication tokens are used for accessing the application.
-
公开(公告)号:US11689919B2
公开(公告)日:2023-06-27
申请号:US17248366
申请日:2021-01-21
Applicant: Cisco Technology, Inc.
Inventor: Marcelo Yannuzzi , Herve Muyal , Benjamin W. Ryder , Marco Trinelli , Bart A. Brinckman
Abstract: A method includes receiving, at an access node, a connection request from a device and in response to the connection request, establishing a connection with an identity provider. The device, the access node, the local network, and the identity provider are members of an identity federation. The method also includes, after the device is authenticated with the identity provider, sending or receiving, to or from the identity provider and by the access node, data linking the device to an item and an owner of the device.
-
-
-