-
公开(公告)号:US12026561B2
公开(公告)日:2024-07-02
申请号:US17004203
申请日:2020-08-27
Applicant: Cisco Technology, Inc.
Inventor: Xiaochun Lu , Yiwen Zhang , Alphonse Hansel Anthony Selvanayagam , Ajeet Pal Singh Gill , Ravinandan Govinda Rao Arakali
CPC classification number: G06F9/545 , G06F9/485 , H04L9/0825 , H04L9/3236 , H04L9/3247
Abstract: The present technology addresses a need in the art for an automated and scalable mechanism to authorize a containerized process. An aspect of the present technology deals with authorizing an unprivileged process by a privileged process without embedding credentials or network access at the time of validation. The present technology provides the possibility for the privileged process to continuously (dynamically) validate the authenticity of the unprivileged process by performing a plurality of operations to ensure the unprivileged process has maintained its authenticity while having access to sensitive information.
-
公开(公告)号:US11880224B2
公开(公告)日:2024-01-23
申请号:US17183554
申请日:2021-02-24
Applicant: Cisco Technology, Inc.
Inventor: Avaneesh Anandrao Kadam , Pratap Pereira , Ravinandan Govinda Rao Arakali , Harshavardhan Parandekar , Vikram Guleria
CPC classification number: G06F8/658 , G06F11/362
Abstract: A recommendation system can be configured to provide tailored software update relevance information for deployed software. The recommendation engine can obtain running state information for a current version of software running on a device, as well as build data for each of the current version of the software and a new version of the software. The recommendation engine can obtain software version difference information based on the build data and determine, based on at least the software version difference information and the running state information, a number of functions in the current version of software that are directly impacted by the new version. The recommendation engine can cause relevance information derived from this determination to be displayed on a computing device, and/or the recommendation engine can automatically cause an update to the new version of the software to be applied or rejected based on the determination.
-
公开(公告)号:US20220269499A1
公开(公告)日:2022-08-25
申请号:US17183554
申请日:2021-02-24
Applicant: Cisco Technology, Inc.
Inventor: Avaneesh Anandrao Kadam , Pratap Pereira , Ravinandan Govinda Rao Arakali , Harshavardhan Parandekar , Vikram Guleria
IPC: G06F8/658
Abstract: A recommendation system can be configured to provide tailored software update relevance information for deployed software. The recommendation engine can obtain running state information for a current version of software running on a device, as well as build data for each of the current version of the software and a new version of the software. The recommendation engine can obtain software version difference information based on the build data and determine, based on at least the software version difference information and the running state information, a number of functions in the current version of software that are directly impacted by the new version. The recommendation engine can cause relevance information derived from this determination to be displayed on a computing device, and/or the recommendation engine can automatically cause an update to the new version of the software to be applied or rejected based on the determination.
-
公开(公告)号:US20220066845A1
公开(公告)日:2022-03-03
申请号:US17004203
申请日:2020-08-27
Applicant: Cisco Technology, Inc.
Inventor: Xiaochun Lu , Yiwen Zhang , Alphonse Hansel Anthony Selvanayagam , Ajeet Pal Singh Gill , Ravinandan Govinda Rao Arakali
Abstract: The present technology addresses a need in the art for an automated and scalable mechanism to authorize a containerized process. An aspect of the present technology deals with authorizing an unprivileged process by a privileged process without embedding credentials or network access at the time of validation. The present technology provides the possibility for the privileged process to continuously (dynamically) validate the authenticity of the unprivileged process by performing a plurality of operations to ensure the unprivileged process has maintained its authenticity while having access to sensitive information.
-
-
-