-
公开(公告)号:US11824674B2
公开(公告)日:2023-11-21
申请号:US17509918
申请日:2021-10-25
Applicant: Cisco Technology, Inc.
Inventor: Rajesh Indira Viswambharan , Ram Mohan Ravindranath , Faisal Siyavudeen , Vinay Saini
CPC classification number: H04L12/189 , H04L12/185 , H04L12/1813 , H04W28/20
Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices. A method includes transmitting a request to a mobile network operator (MNO) for setup of a data connection with a device for a meeting provided by an application provider; receiving allowed network slices for the data connection that are generated by the MNO for the meeting; identifying a network slice from the allowed network slices for the meeting based on one or more characteristics specific to the meeting; and establishing the data connection with the mobile network operator based on the network slice.
-
12.
公开(公告)号:US20230300019A1
公开(公告)日:2023-09-21
申请号:US17695312
申请日:2022-03-15
Applicant: Cisco Technology, Inc.
Inventor: Rajesh Indira Viswambharan , Apoorva Sharma , Mamatha Jayanna , Ankur Gupta , Ankita Singh
IPC: H04L41/0654 , H04L43/0876 , H04L43/0823
CPC classification number: H04L41/0654 , H04L43/0876 , H04L43/0823
Abstract: Techniques for a network controller to manage its data path dynamically in a data network. The techniques include causing the network controller to enter a first state, wherein the first state is associated with first processing rules for processing usage data. The network controller receives first usage data from one or more network devices associated with the data network, processes the first usage data according to the first processing rules. Further, the network controller may detect an event associated with transitioning the network controller to a second state, which cause the network controller to transition from the first state into a second state, wherein the second state is associated with second processing rules for processing the usage data. Moreover, the network controller receives second usage data from the one or more network devices, and processes the second usage data according to the second processing rules.
-
公开(公告)号:US20230198964A1
公开(公告)日:2023-06-22
申请号:US17553375
申请日:2021-12-16
Applicant: Cisco Technology, Inc.
Inventor: Rajesh Indira Viswambharan , Ram Mohan Ravindranath
IPC: H04L9/40
CPC classification number: H04L63/0435 , H04L63/0428 , H04L63/0236 , H04L63/168 , H04L63/20
Abstract: A method of transmitting an encrypted data packet includes, with a processor, in response to receiving the encrypted data packet, executing an extended Berkeley packet filter (eBPF) application at an express data path (XDP) hook point located within a kernel space, determining whether the encrypted data packet is to be processed via a trusted application (TA) within a trusted execution environment (TEE) based on an analysis by the eBPF application, and identifying application intelligence data defining packet forwarding decisions based on a manner in which the encrypted data packet is processed.
-
公开(公告)号:US20230132233A1
公开(公告)日:2023-04-27
申请号:US17509918
申请日:2021-10-25
Applicant: Cisco Technology, Inc.
Inventor: Rajesh Indira Viswambharan , Ram Mohan Ravindranath , Faisal Siyavudeen , Vinay Saini
Abstract: Disclosed are systems, apparatuses, methods, and computer-readable media for participating in a meeting through an application provider using application-specific network slices. A method includes transmitting a request to a mobile network operator (MNO) for setup of a data connection with a device for a meeting provided by an application provider; receiving allowed network slices for the data connection that are generated by the MNO for the meeting; identifying a network slice from the allowed network slices for the meeting based on one or more characteristics specific to the meeting; and establishing the data connection with the mobile network operator based on the network slice.
-
公开(公告)号:US11463326B2
公开(公告)日:2022-10-04
申请号:US17183664
申请日:2021-02-24
Applicant: Cisco Technology, Inc.
Inventor: Vinay Saini , Nagendra Kumar Nainar , Hazim Hashim Dahir , Carlos M. Pignataro , Rajesh Indira Viswambharan
Abstract: According to one or more embodiments of the disclosure, a particular networking device located in a ring of networking devices of a network receives an indication from a supervisory service that the particular networking device has been designated a ring manager for the ring of networking devices. The particular networking device determines that the supervisory service is unreachable by the ring of networking devices. The particular networking device obtains telemetry data regarding a new device connected to the ring of networking devices. The particular networking device onboards, based on the telemetry data, the new device to the network, when the supervisory service is unreachable by the ring of networking devices.
-
公开(公告)号:US11070575B2
公开(公告)日:2021-07-20
申请号:US16293937
申请日:2019-03-06
Applicant: Cisco Technology, Inc.
Inventor: Ram Mohan Ravindranath , Prashanth Patil , Rajesh Indira Viswambharan
IPC: H04L12/00 , H04L29/06 , G06N20/00 , H04L12/741 , G06F16/28
Abstract: Systems, methods, computer-readable media, and devices are disclosed for verifying traffic classification. At a first node, a classification to a received packet is designated according to a local model. The classification of the packet by the first node is verified by sending packet information describing the packet to a distributed network comprising multiple nodes, where the packet information includes attributes of the packet. The classification of the packet is verified from receiving results from a second node that, based on the attributes, independently classifies the packet. Based on the verified classification, decentralized information for classifying packets is updated.
-
公开(公告)号:US20210185529A1
公开(公告)日:2021-06-17
申请号:US16716786
申请日:2019-12-17
Applicant: Cisco Technology, Inc.
Inventor: Prashanth Patil , Ram Mohan Ravindranath , Rajesh Indira Viswambharan
Abstract: In one example, a home network associated with a user equipment obtains an authentication request to authenticate the user equipment to a serving network. The home network generates an authentication vector of a mobile security protocol. The authentication vector includes an indication that the user equipment is to be authenticated using a multi-factor authentication process. The home network provides the authentication vector to the serving network to prompt a response from the user equipment that is in accordance with the multi-factor authentication process. The home network authenticates the user equipment to the serving network based on the response.
-
18.
公开(公告)号:US10999312B2
公开(公告)日:2021-05-04
申请号:US16406585
申请日:2019-05-08
Applicant: Cisco Technology, Inc.
Inventor: Rajesh Indira Viswambharan , Prashanth Patil , Ram Mohan Ravindranath
Abstract: Systems and method handling software vulnerabilities in service meshes can include receiving information on software vulnerabilities from external feeds. From a services catalog which maintains data associated with service instances supported by a service mesh, one or more vulnerable service instances supported by the service mesh are identified. Notifications are provided to sidecar proxies associated with vulnerable service instances. The notifications include criteria such as criticality levels and categories associated with the software vulnerabilities. Based on destination policies for the vulnerable service instances, instructions are provided to the sidecar proxies to trip circuit breakers associated with the vulnerable service instances and thus prevent further access and cascading impact of the software vulnerabilities. The software vulnerabilities are reported to an orchestration system for the service mesh and a fix or different version of the vulnerable service instance is installed where possible.
-
公开(公告)号:US10785652B1
公开(公告)日:2020-09-22
申请号:US16567175
申请日:2019-09-11
Applicant: Cisco Technology, Inc.
Inventor: Rammohan Ravindranath , Rajesh Indira Viswambharan , Prashanth Patil
IPC: H04L29/06 , H04W12/08 , H04L12/911 , H04W12/06 , H04W28/02
Abstract: In one illustrative example, a network node may receive, from a user equipment (UE), a message indicating a token authorization request for access to a custom, enterprise private network slice of a 5G network. The message may include a token provided to the UE by an enterprise server of an enterprise private network of the enterprise. The network node may perform a token validation procedure and, based on a successful token validation, send a message for causing a provisioning of one or more rules in a forwarding entity of the 5G network, for causing enterprise user plane (UP) traffic of the UE to be forwarded to an anchor UPF of the private network slice. The enterprise UP traffic communication may be used for the remote control and/or monitoring of elements in a private 5G network of the enterprise.
-
公开(公告)号:US20200287919A1
公开(公告)日:2020-09-10
申请号:US16293937
申请日:2019-03-06
Applicant: Cisco Technology, Inc.
Inventor: Ram Mohan Ravindranath , Prashanth Patil , Rajesh Indira Viswambharan
IPC: H04L29/06 , G06N20/00 , G06F16/28 , H04L12/741
Abstract: Systems, methods, computer-readable media, and devices are disclosed for verifying traffic classification. At a first node, a classification to a received packet is designated according to a local model. The classification of the packet by the first node is verified by sending packet information describing the packet to a distributed network comprising multiple nodes, where the packet information includes attributes of the packet. The classification of the packet is verified from receiving results from a second node that, based on the attributes, independently classifies the packet. Based on the verified classification, decentralized information for classifying packets is updated.
-
-
-
-
-
-
-
-
-