-
公开(公告)号:US20240281265A1
公开(公告)日:2024-08-22
申请号:US18650798
申请日:2024-04-30
Applicant: Cisco Technology, Inc.
Inventor: Jaganbabu Rajamanickam , Nagendra Kumar Nainar , Madhan Sankaranarayanan , David John Zacks
CPC classification number: G06F9/44505 , G06F8/65 , H04L45/02
Abstract: A network controller deploys a first component and a second component to run concurrently on a network device. The second component is an upgraded version of the first component. The first component receives a first instance of a packet routed to the network device and has a timestamp and a first ID, and the second component receives a second instance of the packet routed to the network device and has the timestamp and a second ID. The network controller receives first functionality data for the first component and second functionality data for the second component from the network device. Based on the first functionality data and the second functionality data, the network controller determines whether to continue operating the first component or the second component on the network device.
-
公开(公告)号:US20230409662A1
公开(公告)日:2023-12-21
申请号:US17845116
申请日:2022-06-21
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, JR. , David John Zacks , Thomas Szigeti
IPC: G06F16/958 , H04L67/02
CPC classification number: G06F16/972 , H04L67/02
Abstract: In one embodiment, an agent executed by a device intercepts webpage code for a website sent from an application server to a client of the website. The agent identifies a portion of the webpage code as being used for webpage analytics. The agent forms modified webpage code by disabling the portion of the webpage code, based on one or more performance metrics associated with the website. The agent sends the modified webpage code to the client of the website.
-
公开(公告)号:US20230401072A1
公开(公告)日:2023-12-14
申请号:US17898924
申请日:2022-08-30
Applicant: Cisco Technology, Inc.
Inventor: Jaganbabu Rajamanickam , Nagendra Kumar Nainar , Madhan Sankaranarayanan , David John Zacks
CPC classification number: G06F9/44505 , G06F8/65 , H04L45/02
Abstract: A network device has a first OS component, a second OS component is added to run concurrently with the first. The first OS component transmits routing information to the second OS component where it is stored in memory. The second OS component registers with a routing infrastructure to receive packets that are routed to the first OS component. A timestamp and a first ID are added to a first instance of a packet and transmitted to the first OS component. The timestamp and a second ID are added to a second instance of the packet and transmitted to the second OS component. First functionality data for the first OS component is transmitted to a controller. Second functionality data for the second OS component is transmitted to the controller. The first and second functionality data are compared to determine whether to replace the first OS component with the second OS component.
-
公开(公告)号:US11843515B2
公开(公告)日:2023-12-12
申请号:US18067068
申请日:2022-12-16
Applicant: Cisco Technology, Inc.
Inventor: Qihong Shao , David John Zacks , Xinjun Zhang
IPC: G06F15/173 , H04L41/14 , H04L41/12 , H04L41/147 , H04L41/5067 , H04L43/045 , H04L43/06 , H04L43/0817 , H04L43/55
CPC classification number: H04L41/145 , H04L41/12 , H04L41/147 , H04L41/5067 , H04L43/045 , H04L43/06 , H04L43/0817 , H04L43/55
Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
-
公开(公告)号:US20230379258A1
公开(公告)日:2023-11-23
申请号:US17747359
申请日:2022-05-18
Applicant: Cisco Technology, Inc.
Inventor: David John Zacks , Jeff Apcar , Oliver Boehmer , Thomas Szigeti
IPC: H04L47/193 , H04B7/185 , H04L69/16
CPC classification number: H04L47/193 , H04B7/18502 , H04L69/16
Abstract: Techniques for a TCP proxy to communicate over a LEO satellite network on behalf of a client device by selecting a TCP congestion-control algorithm that is optimal for the LEO satellite network based on the time of day and/or location of the TCP proxy. Based on the locations of satellites during the day as they traverse predefined and patterned orbital paths, different TCP congestion-control algorithms may be more optimized to communicate data through the LEO satellite network. However, client devices generally use a single TCP congestion-control algorithm to communicate over WAN networks. Accordingly, a TCP proxy may be inserted on, for example, a router to communicate with the client device using a TCP congestion-control algorithm that the client device is configured to use, but then communicate over the LEO satellite network using a different TCP congestion-control algorithm that is optimal based on the time of day and/or other factors.
-
公开(公告)号:US11824866B2
公开(公告)日:2023-11-21
申请号:US17168353
申请日:2021-02-05
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Frank Michaud , Carlos M. Pignataro
IPC: H04L9/40
CPC classification number: H04L63/102 , H04L63/0853 , H04L63/0884 , H04L63/107 , H04L2463/082 , H04L2463/121
Abstract: Disclosed are methods, systems, and non-transitory computer-readable media for determining a trust score associated with a user, comprising detecting entities near a user device operated by the user; calculating the trust score for the user based on a policy that incorporates data about the entities near the user device, the trust score being a score that is indicative of a trust worthiness of data received from the user device, wherein trusted entities near the user device result in an increased trust score, and untrusted entities near the user device result in a decreased trust score; and permitting access to a resource when the trust score is above a threshold.
-
67.
公开(公告)号:US20230344830A1
公开(公告)日:2023-10-26
申请号:US18344527
申请日:2023-06-29
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Alan Robert Lynn , David John Zacks , Frank Michaud
CPC classification number: H04L63/0861 , H04L63/107 , H04L63/20 , H04L67/55 , H04L2463/082
Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
-
公开(公告)号:US20230300037A1
公开(公告)日:2023-09-21
申请号:US17695085
申请日:2022-03-15
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Paul Brian Giralt , Gonzalo Salgueiro , David John Zacks
IPC: H04L41/5009 , H04L41/5041
CPC classification number: H04L41/5009 , H04L41/5045
Abstract: A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.
-
公开(公告)号:US20230118857A1
公开(公告)日:2023-04-20
申请号:US18067068
申请日:2022-12-16
Applicant: Cisco Technology, Inc.
Inventor: Qihong Shao , David John Zacks , Xinjun Zhang
IPC: H04L41/14 , H04L41/12 , H04L41/147 , H04L41/5067 , H04L43/045 , H04L43/06 , H04L43/0817 , H04L43/55
Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
-
70.
公开(公告)号:US20230112101A1
公开(公告)日:2023-04-13
申请号:US17497079
申请日:2021-10-08
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Rahul Rammanohar , Kondaveeti Lakshmi Ganesh , David John Zacks
IPC: H04L29/06
Abstract: In one embodiment, an access policy enforcement service receives a user authentication request from an end-user device. The access policy enforcement service identifies a telemetry collection intent from the user authentication request. The access policy enforcement service determines a monitoring policy based on the telemetry collection intent identified from the user authentication request. The access policy enforcement service configures, according to the monitoring policy, one or more telemetry collection agents to collect telemetry for traffic associated with the end-user device.
-
-
-
-
-
-
-
-
-