-
1.
公开(公告)号:US20230300751A1
公开(公告)日:2023-09-21
申请号:US17696343
申请日:2022-03-16
Applicant: Cisco Technology, Inc.
Inventor: Domenico Ficara , Amine Choukir , Roberto Muccifora , Vincent Cuissard , Thomas Vegas
IPC: H04W52/02
CPC classification number: H04W52/0235
Abstract: Presented herein are techniques for extending Target Wake Time (TWT) to provide for randomizing and changing media access control (MAC) address (RCM) signaling. According to certain embodiments, a client device operating in a wireless network determines a TWT for the client device. Next, the client device determines that it will change from using a first MAC address to a using second MAC address. Finally, the client device generates, for transmission to an access point device that serves wireless communication in the wireless network, a TWT signaling message. The TWT signaling message indicates the TWT for the client device and the second MAC address.
-
公开(公告)号:US20230262023A1
公开(公告)日:2023-08-17
申请号:US17673100
申请日:2022-02-16
Applicant: Cisco Technology, Inc.
Inventor: Thomas Vegas , Anirban Karmakar , Robert Barton , Jerome Henry
IPC: H04L61/2596 , H04W8/26
CPC classification number: H04L61/2596 , H04W8/26 , H04L61/6022
Abstract: A first access point of a wireless network minimizes Media Access Control (MAC) address collisions in the wireless network. The first access point receives an association request from a first wireless device. The association request identifies a first MAC address of the first wireless device. The first access point determines whether a second wireless device is associated with the wireless network using the first MAC address. Responsive to a determination that the second wireless device is associated with a second access point of the wireless network, the first access point obtains a virtual MAC address for the first wireless device. The first access point translates between the first MAC address and the virtual MAC address for network traffic of the first wireless device.
-
公开(公告)号:US12158873B2
公开(公告)日:2024-12-03
申请号:US17894369
申请日:2022-08-24
Applicant: Cisco Technology, Inc.
Inventor: Domenico Ficara , Pedro Miguel Esteves Ramalhete , Yann Poupet , Thomas Vegas
IPC: G06F16/00 , G06F16/215 , G06F16/22
Abstract: Techniques are provided for read-based storage of time-series records. In one example, a server obtains at least one indication of one or more records of a plurality of records written to a record database by a producer that have been read from the record database by at least one consumer. The server stores in a time-series database the one or more records that have been read by the at least one consumer. One or more records of the plurality of records that have not been read by the at least one consumer may be pruned from storage in the time-series database.
-
公开(公告)号:US20240320232A1
公开(公告)日:2024-09-26
申请号:US18124108
申请日:2023-03-21
Applicant: Cisco Technology, Inc.
Inventor: Thomas Vegas , Anirban Karmakar
IPC: G06F16/2458 , G06F16/22 , G06F16/28
CPC classification number: G06F16/2477 , G06F16/2255 , G06F16/287
Abstract: According to one or more embodiments of the disclosure, an example process herein may comprise: obtaining observability data for sequenced events in a computing network; normalizing each event of the sequenced events into a hashed event value; associating observability data corresponding to each event to a particular time range indicator of a plurality of time range indicators representative of respective event completion time ranges; and storing the observability data for the sequenced events as corresponding hashed event values and corresponding associated time range indicators.
-
公开(公告)号:US20230262464A1
公开(公告)日:2023-08-17
申请号:US17673464
申请日:2022-02-16
Applicant: Cisco Technology, Inc.
Inventor: Thomas Vegas , Anirban Karmakar , Robert E. Barton , Jerome Henry , Amine Choukir , Domenico Ficara
IPC: H04W12/122 , H04W12/0471 , H04W12/041 , H04W12/03
CPC classification number: H04W12/122 , H04W12/0471 , H04W12/041 , H04W12/03
Abstract: A method is performed at a mesh access point (MAP) of a mesh network in which MAPs are configured to communicate with each other over wireless backhaul links. The method includes: receiving, from a first wireless client having a first client address, client traffic destined for a second wireless client having a second client address, the client traffic including a first source address that represents the first client address, and a first destination address that represents the second client address; generating a first obfuscated source address that differs from the first client address; replacing the first source address in the client traffic with the first obfuscated source address; and transmitting the client traffic with the first obfuscated source address in place of the first source address to a next MAP of the MAPs over a wireless backhaul link for subsequent forwarding to the second wireless client.
-
公开(公告)号:US11246009B1
公开(公告)日:2022-02-08
申请号:US16989470
申请日:2020-08-10
Applicant: Cisco Technology, Inc.
Inventor: Giacomo Trifilo , Jerome Henry , Thomas Vegas , Anirban Karmakar
Abstract: Location tracking consent management may be provided. A zone in a network may be configured with a corresponding tracking type. Next a computing device associated with the zone may be enabled to transmit an information element indicating the tracking type configured for the zone. A client device may then be allowed to disallow tracking of the client device based on the tracking type.
-
公开(公告)号:US20240275758A1
公开(公告)日:2024-08-15
申请号:US18630378
申请日:2024-04-09
Applicant: Cisco Technology, Inc.
Inventor: Thomas Vegas , Anirban Karmakar , Robert Barton , Jerome Henry
IPC: H04L61/2596 , H04L101/622 , H04W8/26 , H04W80/02
CPC classification number: H04L61/2596 , H04W8/26 , H04L2101/622 , H04W80/02
Abstract: A first access point of a wireless network minimizes Media Access Control (MAC) address collisions in the wireless network. The first access point receives an association request from a first wireless device. The association request identifies a first MAC address of the first wireless device. The first access point determines whether a second wireless device is associated with the wireless network using the first MAC address. Responsive to a determination that the second wireless device is associated with a second access point of the wireless network, the first access point obtains a virtual MAC address for the first wireless device. The first access point translates between the first MAC address and the virtual MAC address for network traffic of the first wireless device.
-
公开(公告)号:US20240070137A1
公开(公告)日:2024-02-29
申请号:US17894369
申请日:2022-08-24
Applicant: Cisco Technology, Inc.
Inventor: Domenico Ficara , Pedro Miguel Esteves Ramalhete , Yann Poupet , Thomas Vegas
IPC: G06F16/22 , G06F16/215
CPC classification number: G06F16/2282 , G06F16/215 , G06F16/2228
Abstract: Techniques are provided for read-based storage of time-series records. In one example, a server obtains at least one indication of one or more records of a plurality of records written to a record database by a producer that have been read from the record database by at least one consumer. The server stores in a time-series database the one or more records that have been read by the at least one consumer. One or more records of the plurality of records that have not been read by the at least one consumer may be pruned from storage in the time-series database.
-
公开(公告)号:US20230221961A1
公开(公告)日:2023-07-13
申请号:US17571906
申请日:2022-01-10
Applicant: Cisco Technology, Inc.
Inventor: Thomas Vegas , Domenico Ficara , Anirban Karmakar , Giacomo Trifilo , Amine Choukir
IPC: G06F9/38
CPC classification number: G06F9/3861 , G06F9/3867
Abstract: This disclosure describes techniques for performing a remote front-drop of data for recovery after a pipeline stall. The techniques include using a receiver-side dropping strategy that is driven from the sender-side. Components of a pipeline determine whether a pipeline is operating within specified latency constraints (e.g., experiencing a pipeline stall). Upon detecting a pipeline stall, the sending device is notified of the stall. Once the sending device is notified of the pipeline stall, the sending device can determine what action(s) to perform to address the pipeline stall. For example, the sending device may instruct one or more components of the pipeline to discard already sent data that has not been processed. This allows the older data to be dropped on the stalled pipeline while keeping the more recently sent data.
-
公开(公告)号:US11489875B2
公开(公告)日:2022-11-01
申请号:US16774950
申请日:2020-01-28
Applicant: Cisco Technology, Inc.
Inventor: Antonio Trifilo , Maria Carpen Amarie , Thomas Vegas , Anirban Karmakar , Shree N. Murthy
IPC: G06F13/00 , H04L9/40 , H04L47/70 , H04L61/4511
Abstract: The use of device context in applying security policies is provided by receiving a Domain Name Service (DNS) query for a network resource from a user device (UD) at a DNS analysis server, the DNS query including a functional label describing a context of the UD; analyzing the DNS query to determine whether the UD is permitted to access the network resource based on the functional label; and in response to the functional label indicating that the UD is not permitted to access the network resource, transmitting a block page to the UD. The functional label can be added to the DNS query by a Mobile Device Management application on the UD, a router associated with the UD, or an enterprise server. Contexts for previously blocked DNS queries can be aggregated to identify UDs sharing at least one value with the previously blocked DNS queries as security compromised devices.
-
-
-
-
-
-
-
-
-