Cisco Technology, Inc.

United States of America

Back to Profile

1-100 of 19,531 for Cisco Technology, Inc. Sort by
Query
Aggregations
IP Type
        Patent 18,885
        Trademark 646
Jurisdiction
        United States 15,980
        World 3,077
        Canada 308
        Europe 166
Date
New (last 4 weeks) 113
2025 April (MTD) 46
2025 March 131
2025 February 108
2025 January 165
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 2,564
H04L 12/24 - Arrangements for maintenance or administration 1,706
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 1,499
H04L 12/26 - Monitoring arrangements; Testing arrangements 1,472
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks] 1,296
See more
NICE Class
09 - Scientific and electric apparatus and instruments 448
42 - Scientific, technological and industrial services, research and design 385
38 - Telecommunications services 139
41 - Education, entertainment, sporting and cultural services 129
35 - Advertising and business services 102
See more
Status
Pending 1,724
Registered / In Force 17,807
  1     2     3     ...     100        Next Page

1.

TWO-DIMENSIONAL VIDEO PRESENTED IN THREE-DIMENSIONAL ENVIRONMENT

      
Application Number 18484866
Status Pending
Filing Date 2023-10-11
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Klasson, Sigurd
  • Oledal, Fredrik
  • Olsson, Sebastian André

Abstract

The present technology provides a three-dimensional video conference experience using readily available cameras and two-dimensional video displays by inserting the two-dimensional video of a remote video conference participant into a three-dimensional environment, and by using visual cues to create the perception of depth for the two-dimensional video of a remote video conference participant.

IPC Classes  ?

  • H04N 7/15 - Conference systems
  • G06T 7/194 - SegmentationEdge detection involving foreground-background segmentation
  • G06T 7/20 - Analysis of motion
  • G06T 19/20 - Editing of 3D images, e.g. changing shapes or colours, aligning objects or positioning parts

2.

MANAGEMENT OF AN ADAPTIVE RELAY METHOD FOR LOST-DEVICE BLUETOOTH LOW ENERGY SIGNALING

      
Application Number 18991260
Status Pending
Filing Date 2024-12-20
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Henry, Jerome
  • Barton, Robert E.
  • Sladden, Darryl E.
  • Szigeti, Thomas

Abstract

Techniques and apparatus for managing a message relaying system are described. One technique includes an access point (AP) detecting a first signal and a second signal from a computing device. A validation of the first signal is performed based on parameters of the first signal and the second signal. After the validation, information associated with the first signal is transmitted to a computing system. In another technique, the computing system may designate one of multiple APs reporting information regarding first signals as a primary reporting AP and designate the remaining APs as secondary reporting APs. The computing system may instruct the secondary reporting APs to refrain from reporting information regarding first signals to the computing system.

IPC Classes  ?

  • H04W 12/12 - Detection or prevention of fraud
  • H04W 4/02 - Services making use of location information
  • H04W 4/029 - Location-based management or tracking services
  • H04W 12/79 - Radio fingerprint
  • H04W 24/10 - Scheduling measurement reports
  • H04W 48/16 - DiscoveringProcessing access restriction or access information
  • H04W 48/20 - Selecting an access point
  • H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
  • H04W 88/04 - Terminal devices adapted for relaying to or from another terminal or user
  • H04W 88/08 - Access point devices
  • H04W 88/12 - Access point controller devices
  • H04W 92/10 - Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
  • H04W 92/12 - Interfaces between hierarchically different network devices between access points and access point controllers

3.

ENABLING ULTRA WIDE BAND OUT-OF-BAND OVER BLUETOOTH AND WI-FI

      
Application Number 18828949
Status Pending
Filing Date 2024-09-09
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Henry, Jerome
  • Silverman, Matthew A.
  • Barton, Robert E.
  • Amini, Peiman
  • Alizadeh, Ardalan

Abstract

Techniques and apparatus for configuring ultra-wideband (UWB) communications using out-of-band (OOB) mechanisms are described. An example technique performed by a wireless device includes obtaining, prior to association with an access point (AP), ultra-wideband (UWB) information from the AP via an out-of-band (OOB) communication link between the wireless device and the AP. A location server within a network including the wireless device and the AP is determined based on the UWB information. Configuration information associated with a UWB ranging session from the location server is obtained via the OOB communication link. The UWB ranging session is performed in accordance with the configuration information.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04B 1/7163 - Spread spectrum techniques using impulse radio
  • H04W 24/02 - Arrangements for optimising operational condition

4.

RESTRICTED TARGET WAIT TIME INTERFERENCE DETECTION AND MANAGEMENT

      
Application Number 19002336
Status Pending
Filing Date 2024-12-26
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Silverman, Matthew Aaron
  • Monajemi, Pooya
  • Alizadeh, Ardalan
  • Kalavakuru, Sivadeep Reddy

Abstract

Network traffic interference detection and management may be provided. An infringement event by an infringing Access Point (AP) on a Restricted Target Wake Time (rTWT) transmission opportunity (TxOp) associated with a victim AP may be detected, and information associated with the infringement event may be added to an infringement list, wherein the information includes a MAC address associated with the infringing AP. A controller, may receive the infringement list and notify the infringement event to the infringing AP. The infringing AP may determine whether a transmission associated with the infringement event is low latency and high priority. When the transmission is not low latency and high priority the infringing AP may modify future transmissions based on the notification. When the transmission is low latency and high priority the infringing AP may notify the controller that the transmission is low latency and high priority. The controller may then create a negotiation between the victim AP and the infringing AP, wherein the negotiation comprises managing future transmissions of the victim AP and the infringing AP.

IPC Classes  ?

  • H04W 52/02 - Power saving arrangements
  • H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
  • H04W 72/0446 - Resources in time domain, e.g. slots or frames
  • H04W 74/0816 - Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance

5.

OPTICAL ENGINE LID WITH OPTICAL FEEDTHROUGH

      
Application Number 18487623
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Schlepple, Norbert
  • Peternel, Joyce J.M.

Abstract

An optical engine and methods of assembly are disclosed. In one aspect, an optical engine has a lid defining an optical feedthrough configured to fully encircle an optical channel received therein. The optical feedthrough provides an access opening for the optical channel to be fed through so that the optical channel is coupled with a photonic integrated circuit of the optical engine.

IPC Classes  ?

  • G02B 6/42 - Coupling light guides with opto-electronic elements

6.

INCREASING BURST ERROR TOLERANCE ON OTN

      
Application Number 18485879
Status Pending
Filing Date 2023-10-12
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Loprieno, Gilberto
  • Giacometti, Emanuele Umberto
  • Codella, Davide

Abstract

Embodiments herein describe re-ordering bit-interleaved data to be byte-interleaved data before transmitting the data on an OTN. For example, a transmitter can receive interleaved bits for different symbols that are part of an error correction code to be transmitted in an optical transport network. The transmitter re-orders the interleaved bits into interleaved bytes where each of the interleaved bytes correspond to one of the different symbols. The interleaved bytes can then be transmitted on the OTN.

IPC Classes  ?

  • H04B 10/516 - Details of coding or modulation
  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received

7.

MULTI-HOMED LAYER-2 (L2) SERVICE INSERTION ENTERPRISE FABRIC NETWORKS

      
Application Number 18380457
Status Pending
Filing Date 2023-10-16
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Jain, Prakash C.
  • Hooda, Sanjay Kumar
  • Vadnere, Aaditya Nitin
  • Karmarkar, Kedar Sudhir

Abstract

Techniques and architecture are described for L2 service insertion in a network. More particularly, the techniques and architecture provide for monitoring a L2 service, e.g., firewall, MAC address (instead of learning the MAC address) and registering/de-registering the service node (e.g., fabric border or edge or LISP service_etr) to the service control plane (e.g., LISP MSMR) based on this. This not only load-balances the traffic (per L2 flow) but also tracks it for node's liveliness. The techniques and architecture also provide L2 service insertion connected to a service border to allow for dynamic SGT based service, e.g., firewall, insertion for both software defined access (SDA) fabric and non-fabric deployments.

IPC Classes  ?

  • H04L 45/00 - Routing or path finding of packets in data switching networks

8.

NAT ROUTE DISTRIBUTION BASED ON TAG INFORMATION IN AN SDWAN OVERLAY NETWORK

      
Application Number 18909072
Status Pending
Filing Date 2024-10-08
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Sundararajan, Balaji
  • Gill, Ajeet Pal Singh
  • Bhasham, Sampath Sthothra
  • Mahadevan, Satish Kumar
  • Gindi, Madhusudan V.
  • Ali, Tahir

Abstract

A process can include determining a plurality of Network Address Translation (NAT) routes associated with respective edge routers included in a same virtual private network (VPN) for communicating with a software-defined wide area network (SDWAN). A process can include identifying a first subset of the plurality of NAT routes as mapped to a first public NAT address included in a NAT pool associated with the VPN. A process can include tagging each NAT route of the first subset with a tag value indicative of a preferred router for receiving return traffic of the respective NAT route. A process can include routing traffic on a respective NAT route of the plurality of NAT routes based on applying, at an SDWAN controller, a corresponding control policy matching the tag value of the respective NAT route.

IPC Classes  ?

9.

SYMMETRIC NETWORKING TO CLOUD GATEWAY BASED ON DYNAMIC MAPPING OF ROUTE PREFERENCE INFORMATION

      
Application Number 18485110
Status Pending
Filing Date 2023-10-11
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Sundararajan, Balaji
  • Moskal, Michael
  • Mahadevan, Satish Kumar
  • Agarwal, Vivek
  • Subramanyasetty, Pradeep Kanavihalli
  • Radhakrishnan, Prabahar
  • Thoria, Samir
  • Baruah, Pritam
  • Misra, Samantha
  • Pardeshi, Shailendra Vinod

Abstract

A process can include determining affinity information indicative of route preferences between branch routers and gateway routers. A prefix can be determined for a subnet of branch routers located at a same branch location. An affinity position of a first gateway router can be determined based on affinity information of the branch routers in the subnet. A mapping can be determined between a local preference Border Gateway Protocol (BGP) community attribute and the affinity position of the first gateway router, wherein a mapped local preference BGP community attribute and the affinity position are indicative of a same routing preference. The mapped local preference BGP community attribute can be attached to routes from the first gateway router into a cloud service provider. Affinity-based route preferences are indicated to the cloud service provider by redistributing the routes from the first gateway router with the mapped local preference BGP community attribute attached.

IPC Classes  ?

  • H04L 45/02 - Topology update or discovery
  • H04L 45/122 - Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops

10.

DATA SOVEREIGNTY AND SERVICE INSERTION IN MULTISITE NETWORK FABRIC

      
Application Number 18984673
Status Pending
Filing Date 2024-12-17
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Jain, Prakash C.
  • Saini, Vinay
  • Hooda, Sanjay Kumar

Abstract

Techniques for a Software-Defined Networking (SDN) controller associated with a multisite network to implement jurisdictional data sovereignty polices in a multisite network, route network traffic flows between user sites and destination services over one or more provider sites, and/or perform a routing operation on the network traffic flow(s) based on the jurisdictional data sovereignty policies. The jurisdictional data sovereignty polices may be implemented using destination group tags (DGTs) and/or source group tags (SGTs). A secure access service edge (SASE) associated with the network controller may generate, store, and distribute the DGTs to provider sites and/or the SGTs to user sites. Based on the SGT and/or DGT associated with a network traffic flow, one or more services may be applied to the network traffic flow, and the network traffic flow may be routed through a particular region of a software-defined access (SDA) transit.

IPC Classes  ?

  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/12 - Shortest path evaluation

11.

FEATURE LEVEL POWER CALIBRATION

      
Application Number 18664101
Status Pending
Filing Date 2024-05-14
First Publication Date 2025-04-17
Owner Cisco Technology, Inc. (USA)
Inventor
  • Amador, Marisol Palmero
  • Mitrovic, Snezana
  • Engi, Derek W.
  • Salgueiro, Gonzalo A.
  • Goergen, Joel Richard

Abstract

Devices, systems, methods, and processes for feature level power calibration are described herein. Network devices include sensors that generate sensor readings indicative of various device parameters. A calibration logic utilizes the sensor readings and feature permutations associated with the sensor readings to predict a feature level power consumption for all features of the network device. The calibration logic then applies a calibration factor to the predicted feature level power consumption and obtains an actual feature level power consumption. Using the actual feature level power consumption, the calibration logic determines an actual power consumption for feature licenses of the network device. The feature and feature license level power consumption is utilized for determining which features or feature licenses can be deactivated when the device power consumption is outside a threshold limit. Such dynamic deactivation ensures that the network device accurately meets the sustainability goals.

IPC Classes  ?

  • H04W 52/02 - Power saving arrangements
  • H04W 24/04 - Arrangements for maintaining operational condition

12.

CONCURRENCY-AWARE SESSION ESTABLISHMENT WITH A WEB-BASED AUTHENTICATION SERVICE

      
Application Number 18488725
Status Pending
Filing Date 2023-10-17
First Publication Date 2025-04-17
Owner Cisco Technology Inc. (USA)
Inventor
  • Campbell, Aaron P.
  • Adamson, Weston Andros
  • Kuykendall, Bradley A.
  • Brown, Michael G.
  • Hoffman, Tyler Charles
  • Wong, Brandon

Abstract

The present disclosure is directed to receiving multiple concurrent requests from multiple applications for session establishment from a user device, wherein the concurrent requests originated from a single browser instance, communicating a redirect response comprising a query parameter to each of the applications to the user device, receiving a browser-session synchronization cookie from each of the applications responsive to each corresponding redirect response from the user device, determining a browser-session identifier based on the browser-session synchronization cookies and by a negotiation algorithm, generating a browser-session cookie based on the browser-session identifier and by the negotiation algorithm, and establishing a session for the applications via the single browser instance based on the browser-session cookie.

IPC Classes  ?

  • H04L 67/146 - Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
  • H04L 9/40 - Network security protocols
  • H04L 67/141 - Setup of application sessions

13.

ENABLING ULTRA WIDE BAND OUT-OF-BAND OVER BLUETOOTH AND WI-FI

      
Application Number US2024048650
Publication Number 2025/080431
Status In Force
Filing Date 2024-09-26
Publication Date 2025-04-17
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Henry, Jerome
  • Silverman, Matthew, A.
  • Barton, Robert, E.
  • Amini, Peiman
  • Alizadeh, Ardalan

Abstract

Techniques and apparatus for configuring ultra-wideband (UWB) communications using out-of-band (OOB) mechanisms are described. An example technique performed by a wireless device includes obtaining, prior to association with an access point (AR), ultra-wideband (UWB) information from the AR via an out-of- band (OOB) communication link between the wireless device and the AR. A location server within a network including the wireless device and the AR is determined based on the UWB information. Configuration information associated with a UWB ranging session from the location server is obtained via the OOB communication link. The UWB ranging session is performed in accordance with the configuration information.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • H04W 4/02 - Services making use of location information
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04W 84/12 - WLAN [Wireless Local Area Networks]

14.

ACCESS NETWORK MONITORING IN A WIRELESS FEDERATION

      
Application Number US2024050751
Publication Number 2025/080817
Status In Force
Filing Date 2024-10-10
Publication Date 2025-04-17
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor Grayson, Mark

Abstract

Access network monitoring in a wireless federation may be provided. A plurality of access requests may be received from a probe device. Each of the plurality of access requests may comprise access request information. Next, an availability metric may be determined based on an amount of the plurality of access requests received and the access request information. The availability metric may then be reported.

IPC Classes  ?

  • H04W 48/14 - Access restriction or access information delivery, e.g. discovery data delivery using user query
  • H04W 48/16 - DiscoveringProcessing access restriction or access information

15.

SUSTAINABLE TRAINING OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING MODELS

      
Application Number 18481011
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Arur, Raghu Rajendra
  • Gandhi, Indermeet Singh

Abstract

Methods are provided for sustainably training artificial intelligent or machine learning models. Specifically, the methods involve obtaining power supply information about at least two computing resource groups. The power supply information relates to one or more power sources that supply power to the at least two computing resource groups. The methods further involve determining, while training an artificial intelligence or machine learning model using a current computing resource group of the at least two computing resource groups, an availability of power provided to the current computing resource group from one or more renewable energy sources, based on the power supply information and migrating the artificial intelligence or machine learning model for training using a different computing resource group than the current computing resource group, based on determining a lack of the availability of power provided to the current computing resource group from the one or more renewable energy sources.

IPC Classes  ?

16.

Zero Knowledge Attestations for Carbon Footprint Metrics

      
Application Number 18481136
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Yannuzzi, Marcelo
  • Pignataro, Carlos

Abstract

Devices, systems, methods, and processes for generating and sharing a verifiable Zero Knowledge (ZK) proof are described herein. A device may utilize one or more non-reversible aggregation techniques to receive, normalize, and aggregate one or more Carbon Footprint Metrics (CFMs) of the device corresponding to a timeframe. The device can generate a ZK attestation and the verifiable ZK proof based on an aggregated CFM or a sum of normalized CFMs, and a carbon footprint threshold for the timeframe. The device may further transmit the verifiable ZK proof to an auditing device. The auditing device can receive the verifiable ZK proof and verify, in a trustworthy manner, that the CFMs of the device corresponding to the timeframe are in compliance with the carbon footprint threshold. The device may hence prove the compliance with the carbon footprint threshold to the auditing device without actually sharing the CFMs with the auditing device.

IPC Classes  ?

17.

DISTRIBUTED INTELLIGENCE FOR PERFORMANCE AND RESOURCE OPTIMIZATION OF AN APPLICATION

      
Application Number 18484034
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Tan, Jieyu
  • Qiang, Zhou
  • Li, Soya
  • Wang, Wallice
  • Chen, Sijia
  • Ye, Deqiang

Abstract

The present technology pertains to a method to balance the performance of an application with the device health and the application runtime health statistics utilizing a hybrid approach. In the hybrid approach, the static performance control is a robust machine learning algorithm trained on data from many client devices and applications. The dynamic performance control is local to the client device and the application and reacts to the real-time device performance and application performance. Additionally, a user can provide their preferences for the performance and resource optimization of the application.

IPC Classes  ?

18.

RSSI-BASED RANGE ACCURACY AUGMENTATION METHOD WITH CSI MAGNITUDE

      
Application Number 18906804
Status Pending
Filing Date 2024-10-04
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Henry, Jerome
  • Pierrugues, Laurent
  • Shayesteh, Behrouz

Abstract

In one aspect, a system includes a station device configured to transmit a signal; multiple access point devices in connection with the station device, the multiple access point devices configured to receive the signal transmitted from the station device, wherein the multiple access point devices are configured to convert the signal into a measurable form; and a processing unit operably connected to the multiple access point devices. The processing unit is configured to, for each subcarrier within the signal received by the multiple access point devices, determine a measurement of channel state information including an overall shape of the signal; determine a magnitude distance for each subcarrier; and determine a location of the station device based on a fit of the magnitude distance to a model, wherein the model is based on an environment with one or more obstacles causing an obscuration of the signal.

IPC Classes  ?

19.

UNIQUE ID GENERATION FOR SENSORS

      
Application Number 18981759
Status Pending
Filing Date 2024-12-16
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Singh, Abhishek Ranjan
  • Chang, Shih-Chun
  • Malhotra, Varun Sagar
  • Vu, Hai Trong
  • Pang, Jackson Ngoc Ki

Abstract

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

IPC Classes  ?

  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/17 - Details of further file system functions
  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/23 - Updating
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/248 - Presentation of query results
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/29 - Geographical information databases
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles
  • H04J 3/06 - Synchronising arrangements
  • H04J 3/14 - Monitoring arrangements
  • H04L 1/24 - Testing correct operation
  • H04L 7/10 - Arrangements for initial synchronisation
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 41/0668 - Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
  • H04L 41/0803 - Configuration setting
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/02 - Capturing of monitoring data
  • H04L 43/026 - Capturing of monitoring data using flow identification
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
  • H04L 43/0805 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
  • H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
  • H04L 43/0829 - Packet loss
  • H04L 43/0852 - Delays
  • H04L 43/0864 - Round trip delays
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 43/0882 - Utilisation of link capacity
  • H04L 43/0888 - Throughput
  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
  • H04L 43/106 - Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
  • H04L 43/12 - Network monitoring probes
  • H04L 43/16 - Threshold monitoring
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/302 - Route determination based on requested QoS
  • H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
  • H04L 45/74 - Address processing for routing
  • H04L 47/11 - Identifying congestion
  • H04L 47/20 - Traffic policing
  • H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
  • H04L 47/2483 - Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
  • H04L 47/28 - Flow controlCongestion control in relation to timing considerations
  • H04L 47/31 - Flow controlCongestion control by tagging of packets, e.g. using discard eligibility [DE] bits
  • H04L 47/32 - Flow controlCongestion control by discarding or delaying data units, e.g. packets or frames
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/01 - Protocols
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/50 - Network services
  • H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
  • H04L 67/75 - Indicating network or usage conditions on the user display
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
  • H04L 69/22 - Parsing or analysis of headers
  • H04W 72/54 - Allocation or scheduling criteria for wireless resources based on quality criteria
  • H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks

20.

PIM PROXY OVER EVPN FABRIC

      
Application Number 18985763
Status Pending
Filing Date 2024-12-18
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Mishra, Mankamana Prasad
  • Kumar, Nitin
  • Sajassi, Ali
  • Agrawal, Swadesh

Abstract

A system and associated methods provide solutions for reducing a volume of traffic through a multicast network attributed to repeated maintenance messages, which are required in order to maintain a multicast connection. The system configures provider edge devices to generate and send maintenance messages on behalf of members of a multicast group to establish and maintain the multicast connection and provides options for determining unknown locations of sources and/or subscribers, thereby reducing the overall volume of traffic transmitted over the multicast network.

IPC Classes  ?

  • H04L 45/16 - Multipoint routing
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

21.

IP-BASED FORWARDING OF BRIDGED AND ROUTED IP PACKETS AND UNICAST ARP

      
Application Number 18986237
Status Pending
Filing Date 2024-12-18
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Merchant, Sameer
  • Edsall, Thomas James
  • Yadav, Navindra

Abstract

Disclosed herein are methods of forwarding data over an IP network. The methods may include receiving a packet from a source host connected to the IP network, identifying the IP address of a destination host designated in the packet, determining the location on the IP network where the destination host designated by the packet is connected, without reference to the MAC address specified in the packet, by using location-identification information stored on the IP network, and forwarding the packet to the location on the IP network where the destination host is connected without reference to the MAC address specified in the packet. Also disclosed herein are related network devices implementing such techniques and operations, as well as IP networks which include such network devices.

IPC Classes  ?

  • H04L 45/745 - Address table lookupAddress filtering
  • H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management

22.

GENERATIVE MODELS TO CREATE NETWORK CONFIGURATIONS THROUGH NATURAL LANGUAGE PROMPTS

      
Application Number 18376625
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Vasseur, Jean-Philippe
  • Yelahanka Raghuprasad, Mukund
  • Mermoud, Grégory

Abstract

In one implementation, a device obtains a natural language-based description of a network via a user interface. The device generates, based on the natural language-based description, network configuration parameters for the network using a generative model. The device conducts a simulation of traffic in the network using the network configuration parameters, to obtain telemetry data. The device uses the telemetry data to train a machine learning model to perform network analytics.

IPC Classes  ?

  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
  • H04L 41/14 - Network analysis or design
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/149 - Network analysis or design for prediction of maintenance

23.

USING CLIENT-HELLO FOR INTELLIGENT ROUTING AND FIREWALLING IN MULTIPATH SECURE ACCESS SYSTEMS

      
Application Number 18376676
Status Pending
Filing Date 2023-10-04
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Parla, Vincent E.
  • Tollet, Jerome
  • Augustin, Aloys Christophe
  • Hawari, Mohammed

Abstract

Techniques for utilizing a portion of a communication session identifier (e.g., a Session-ID, an SPI, a CID, a DCID, and/or the like) to indicate a target routing device (e.g., a VPN and/or ZTNA termination device) for establishing control plane session(s) and/or data plane session(s) at wire-speed in a networked computing environment. The routing device(s) of a networked computing environment may generate a communication session identifier and send the communication session identifier to the client device, such that subsequent packets send from the client device may be forwarded to the proper routing device indicated by the communication session identifier for establishment of one or more data plane sessions. Additionally, data plane sessions may be established using a Resumed Handshake rather than a full handshake that is typically required, as Session Resumption utilizes the assigned communication session identifier for mapping.

IPC Classes  ?

24.

USING CLIENT-HELLO FOR INTELLIGENT ROUTING AND FIREWALLING IN MULTIPATH SECURE ACCESS SYSTEMS

      
Application Number US2024048354
Publication Number 2025/075846
Status In Force
Filing Date 2024-09-25
Publication Date 2025-04-10
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Parla, Vincent, E.
  • Tollet, Jerome
  • Augustin, Aloys
  • Hawari, Mohammed

Abstract

Techniques for utilizing a portion of a communication session identifier (e.g., a Session-ID, an SPI, a CID, a DCID, and/or the like) to indicate a target routing device (e.g., a VPN and/or ZTNA termination device) for establishing control plane session(s) and/or data plane session(s) at wire-speed in a networked computing environment. The routing device(s) of a networked computing environment may generate a communication session identifier and send the communication session identifier to the client device, such that subsequent packets send from the client device may be forwarded to the proper routing device indicated by the communication session identifier for establishment of one or more data plane sessions. Additionally, data plane sessions may be established using a Resumed Handshake rather than a full handshake that is typically required, as Session Resumption utilizes the assigned communication session identifier for mapping.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/141 - Setup of application sessions
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
  • H04L 67/1027 - Persistence of sessions during load balancing
  • H04W 40/00 - Communication routing or communication path finding
  • H04L 45/24 - Multipath

25.

AN RSSI-BASED RANGE ACCURACY AUGMENTATION METHOD WITH CSI MAGNITUDE

      
Application Number US2024050061
Publication Number 2025/076423
Status In Force
Filing Date 2024-10-04
Publication Date 2025-04-10
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Henry, Jerome
  • Pierrugues, Laurent
  • Shayesteh, Behrouz

Abstract

In one aspect, a system includes a station device configured to transmit a signal; multiple access point devices in connection with the station device, the multiple access point devices configured to receive the signal transmitted from the station device, wherein the multiple access point devices are configured to convert the signal into a measurable form; and a processing unit operably connected to the multiple access point devices. The processing unit is configured to, for each subcarrier within the signal received by the multiple access point devices, determine a measurement of channel state information including an overall shape of the signal; determine a magnitude distance for each subcarrier; and determine a location of the station device based on a fit of the magnitude distance to a model, wherein the model is based on an environment with one or more obstacles causing an obscuration of the signal.

26.

SYSTEM AND METHOD OF PROVIDING UNIVERSAL MOBILE INTERNET PROXY PRINTING

      
Application Number 18986095
Status Pending
Filing Date 2024-12-18
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Kachalia, Rahul
  • Mishra, Kali Prasanna

Abstract

Disclosed is a method to enable printing on legacy devices. The method includes discovering a legacy device that does not have a universal record that enables the legacy device to provide services to a mobile device through a network, appending the universal record for the legacy device, transmitting the universal record for the legacy device to a controller, receiving, at the controller and from the mobile device, a request for services which can be provided by the legacy device, transmitting, from the controller and based on the universal record for the legacy device, data associated with the legacy device to the mobile device to yield transmitted data and transmitting, based on an acceptance of the transmitted data by the mobile device, a service request from the mobile device to the legacy device for providing a service to the mobile device.

IPC Classes  ?

  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
  • G06F 3/12 - Digital output to print unit
  • H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

27.

SYSTEMS AND METHODS FOR IDENTIFYING WEAKNESS IN A NETWORK SYSTEM USING CHAOS ENGINEERING

      
Application Number 18481730
Status Pending
Filing Date 2023-10-05
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor Metwally, Ahmed

Abstract

A method for identifying one or more weakness in a network system through simulations includes configuring a plurality of chaos events to be run on the network system, running the plurality of chaos events on the network system, receiving alert messages from a monitoring system, determining differences if the alert messages match with a set of expected alert messages and/or delay in receiving the alert messages, and reporting the determined differences to a control plane of the network system for display on a user terminal.

IPC Classes  ?

  • H04L 41/14 - Network analysis or design
  • H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time

28.

TRUST-BASED MODEL FOR DEPLOYING ISSUE IDENTIFICATION AND REMEDIATION CODE

      
Application Number 18482138
Status Pending
Filing Date 2023-10-06
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Goloubew, Dmitry
  • Allen, Donald M.

Abstract

A method, computer system, and computer program product are provided for selectively deploying code modules for issue identification and remediation tasks. A plurality of code modules is obtained, wherein each code module includes instructions for issue identification and remediation. A trust score for each code module of the plurality of code modules is determined, wherein the trust score includes a first trust score component for issue identification and a second trust score component for issue remediation, and wherein the trust score is based on a source of each code module selected from a group of a human-generated source and an artificial intelligence model-generated source. A particular code module of the plurality of code modules is deployed based on the trust score of the particular code module satisfying a threshold value. The trust score for the particular code module is updated based on results of deploying the particular code module.

IPC Classes  ?

  • G06F 8/60 - Software deployment
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

29.

MULTI-ACCESS POINT COORDINATION CONFIGURATION PROTOCOL

      
Application Number 18483601
Status Pending
Filing Date 2023-10-10
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Zuniga, Juan Carlos
  • Smith, Malcolm M.
  • Hart, Brian D.
  • Henry, Jerome

Abstract

Multi-AP Coordination (MAPC) configuration protocol may be provided. MAPC modes supported by a plurality of Access Points (APs) may be discovered. A MAPC group of a sub-set of APs of the plurality of APs may be formed. Each AP of the sub-set of APs of the MAPC group may support at least one common MAPC mode. Roles including a leader and followers of the MAPC group may be advertised. A first AP of the MAPC group may be assigned as the leader and remaining APs of the MAPC group may be assigned as the followers.

IPC Classes  ?

  • H04W 48/16 - DiscoveringProcessing access restriction or access information
  • H04W 88/10 - Access point devices adapted for operation in multiple networks, e.g. multi-mode access points

30.

TRANSITIVELY AUTHENTICATED REVERSE PROXY

      
Application Number 18631353
Status Pending
Filing Date 2024-04-10
First Publication Date 2025-04-10
Owner Cisco Technology, Inc. (USA)
Inventor
  • Slenders, Jonathan Maria Jan
  • Detienne, Frédéric René Philippe
  • Honoré, Alexandre
  • Jaradat, Haitham Sufian Fayyad

Abstract

Methods are provided for a proxy infrastructure that serves as a bridge between an enterprise network and a computing machine of a user ensuring a chain of trust. The methods involve obtaining, from a client device, a request to navigate to one or more target devices of a remote enterprise network and locally authenticating the client device based on at least one of an identity of the client device and user credentials. The methods further involve generating a connection request for the client device to navigate to the one or more target devices based on the client device being locally authenticated and providing the connection request to a proxy service executing in the remote enterprise network. The proxy service authenticates an access to the one or more target devices based on device credentials while hiding the device credentials from the client device.

IPC Classes  ?

31.

Conferencing device

      
Application Number 29878777
Grant Number D1069756
Status In Force
Filing Date 2023-06-27
First Publication Date 2025-04-08
Grant Date 2025-04-08
Owner Cisco Technology, Inc. (USA)
Inventor
  • Provo Kluit, Robert
  • Aytekin, Naci Cenk

32.

HIDDEN-LAYER ROUTING FOR DISAGGREGATED ARTIFICIAL NEURAL NETWORKS

      
Application Number 18477476
Status Pending
Filing Date 2023-09-28
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Barton, Robert Edgar
  • Brockners, Frank
  • Henry, Jerome
  • Falkner, Matthias
  • Gandhi, Indermeet Singh
  • Feltin, Thomas Michel-Ange

Abstract

Novel techniques and mechanisms enable processing of heavy deep learning workloads on standard edge network devices to optimize the overall inference throughput of the network while meeting Service Level Agreement(s) (SLAs). The techniques can include receiving a deep learning model, determining a graph structure of the deep learning model including neurons organized in layers (the layers including an input layer, a plurality of hidden layers, and an output layer), assigning to a first IP subnet, at least a part of a first hidden layer of the plurality of hidden layers, assigning to a second IP subnet, at least a part of a second hidden layer of the plurality of hidden layers, and deploying the parts of the first and second hidden layers to edge devices as containerized applications with assigned IP addresses, which may be hidden from the user and/or third party application.

IPC Classes  ?

  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 45/74 - Address processing for routing
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload

33.

Anti-Greenwashing Carbon Data Aggregation and Disaggregation

      
Application Number 18478435
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Doan, Quynhnhu
  • Bennett, Anna
  • Pacifico, Davide
  • Adams, Chris

Abstract

Described herein are devices, systems, methods, and processes for assessing and managing the carbon footprint of information technology (IT) infrastructures. The system can utilize distributed public key infrastructure (PKI) to ensure data security, trustworthiness, and anonymity. It may provide real-time, accurate, and comprehensive data on the carbon footprint of the entire infrastructure, enabling administrators to make informed decisions based on live, aggregated, and anonymized power consumption data and carbon footprint metrics. The system can also support the management of carbon-related metrics during processes such as device migration or infrastructure renewal. Furthermore, it can enable various stakeholders, including IT infrastructure owners, auditors, and generic users, to access and analyze the data based on their specific roles and permissions. This approach can enhance the transparency and accountability of IT operations, contributing to environmental sustainability efforts in the IT industry.

IPC Classes  ?

34.

MULTI-CLOUD SITE-SITE SECURE CONNECTIVITY AS A SERVICE

      
Application Number 18625150
Status Pending
Filing Date 2024-04-02
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Chander, Vijay
  • Duddumpudi, Raghu Ram
  • Narayanaswamy, Ganesh
  • Kumar, Sunil
  • Chan, Michael
  • Patnala, Praveen Kumar

Abstract

The present technology provides intercloud connectivity as a service by discovering components of the organization's deployment in various sites, irrespective of the cloud provider, such that two sites can merely be selected along with a few standard options, and the controller can handle the complexity of instantiating a tunnel between the cloud sites automatically. Further, the controller can monitor the health of one or more tunnels between the cloud sites to automatically scale bandwidth up or down.

IPC Classes  ?

  • H04L 45/02 - Topology update or discovery
  • H04L 9/40 - Network security protocols
  • H04L 45/00 - Routing or path finding of packets in data switching networks

35.

RENDERING A SERVICE GRAPH TO ILLUSTRATE PAGE PROVIDER DEPENDENCIES AT AN AGGREGATE LEVEL

      
Application Number 18978988
Status Pending
Filing Date 2024-12-12
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Agarwal, Mayank
  • Bley, John
  • Colberg, Angel
  • Dillman, Jonathan
  • Sehgal, Shashwat
  • Smith, Justin

Abstract

A method of rendering a service graph illustrating dependencies between a frontend and a backend of an application comprises generating a plurality of frontend traces from a plurality of frontend spans and generating a plurality of backend traces from a plurality of backend spans ingested from the application. The method also comprises aggregating frontend metrics data using the plurality of frontend traces and backend metrics data using the plurality of backend traces. The method further comprises determining connection information between one or more frontend traces of the plurality of frontend traces and corresponding backend traces of the plurality of backend traces. The method also comprises rendering the service graph using the connection information and the aggregated frontend and backend metrics data.

IPC Classes  ?

  • G06F 16/242 - Query formulation
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

36.

SECURITY PROFILE SELECTION AND CONFIGURATION OF NETWORK DEVICES VIA OWNERSHIP VOUCHER EXTENSION

      
Application Number 18979272
Status Pending
Filing Date 2024-12-12
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Mohammed, Jabir Hamediya
  • Haddad, Reda
  • Raghavan, Srihari
  • Rao, Sandesh K.

Abstract

Techniques and architecture are described for providing a configurable security posture for a network device using an extended ownership artifact, e.g., an ownership voucher, an ownership certificate, etc., and a security profile mechanism that scales to user needs and desires for security profiles on network devices, i.e., easily and securely customizable on thousands of nodes of a network. The configurable security posture may be achieved using the manufacturer authorized signing authority (MASA) to issue an ownership voucher with a security bit extension to support security profile additions. Using the MASA service, a user may explicitly decide on various security postures of a given network device and may apply that profile across the fixed or modular chassis of a network of network devices.

IPC Classes  ?

37.

SYSTEM AND METHOD FOR USER OPTIMIZED APPLICATION DEPENDENCY MAPPING

      
Application Number 18980374
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Madani, Omid
  • Parandehgheibi, Ali
  • Yadav, Navindra
  • Jeyakumar, Vimalkumar
  • Scheib, Ellen Christine
  • Attar, Mohammadreza Alizadeh

Abstract

This disclosure generally relates to a method and system for mapping application dependency information. The present technology relates techniques that enable user-adjustable application dependency mapping of a network system. By collecting internal network data using various sensors in conjunction with external user inputs, the present technology can provide optimized application dependency mapping using user inputs.

IPC Classes  ?

  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/17 - Details of further file system functions
  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/23 - Updating
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/248 - Presentation of query results
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/29 - Geographical information databases
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles
  • H04J 3/06 - Synchronising arrangements
  • H04J 3/14 - Monitoring arrangements
  • H04L 1/24 - Testing correct operation
  • H04L 7/10 - Arrangements for initial synchronisation
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 41/0668 - Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
  • H04L 41/0803 - Configuration setting
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/02 - Capturing of monitoring data
  • H04L 43/026 - Capturing of monitoring data using flow identification
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
  • H04L 43/0805 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
  • H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
  • H04L 43/0829 - Packet loss
  • H04L 43/0852 - Delays
  • H04L 43/0864 - Round trip delays
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 43/0882 - Utilisation of link capacity
  • H04L 43/0888 - Throughput
  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
  • H04L 43/106 - Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
  • H04L 43/12 - Network monitoring probes
  • H04L 43/16 - Threshold monitoring
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/302 - Route determination based on requested QoS
  • H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
  • H04L 45/74 - Address processing for routing
  • H04L 47/11 - Identifying congestion
  • H04L 47/20 - Traffic policing
  • H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
  • H04L 47/2483 - Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
  • H04L 47/28 - Flow controlCongestion control in relation to timing considerations
  • H04L 47/31 - Flow controlCongestion control by tagging of packets, e.g. using discard eligibility [DE] bits
  • H04L 47/32 - Flow controlCongestion control by discarding or delaying data units, e.g. packets or frames
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/01 - Protocols
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/50 - Network services
  • H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
  • H04L 67/75 - Indicating network or usage conditions on the user display
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
  • H04L 69/22 - Parsing or analysis of headers
  • H04W 72/54 - Allocation or scheduling criteria for wireless resources based on quality criteria
  • H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks

38.

LOW POWER INDOOR (LPI) ACCESS POINT (AP) THAT PUNCTURES ITS CHANNEL WHILE RESPECTING INCUMBENTS

      
Application Number 18902408
Status Pending
Filing Date 2024-09-30
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Hart, Brian D.
  • Davenport, William H.
  • Blue, Scott Ross
  • Mohamed Hassan Salem, Nedime Pelin

Abstract

A Low Power Indoor (LPI) Access Point (AP) that punctures its channel while respecting incumbents may be provided. First, a computing device may determine a relaxation value. Then an energy detection Clear Channel Assessment (CCA) threshold may be changed by the relaxation value for a punctured subchannel. Next, the punctured subchannel may be reported as busy when energy is detected in the punctured subchannel above the changed energy detection CCA threshold.

IPC Classes  ?

  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received
  • H04W 74/0833 - Random access procedures, e.g. with 4-step access
  • H04W 88/08 - Access point devices

39.

TECHNIQUES FOR VISUALIZING BROWER TEST METRICS

      
Application Number 18977873
Status Pending
Filing Date 2024-12-11
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Bhandari, Aditya
  • Deen, Khawar
  • Hoffman, William Matthew
  • Pierson, Nicholas Owen
  • Sidhu, Seerut
  • Singh, Harnit

Abstract

Techniques, which may be embodied herein as systems, computing devices, methods, algorithms, software, code, computer readable media, or the like, are described herein for comparing a set of metrics generated during a simulated user interaction with a website to metrics generated by observing real user interactions with the website. Simulated user interactions with a website can be used to diagnose a website's performance issues, but it can be difficult to determine whether the simulated interactions reflect the experience of real users. In addition, the simulated user interactions can be challenging to contextualize because the number of observed real user interactions may significantly outnumber the simulated interactions. A graphical user interface can help with the interpretation of these website interactions by using the real user interactions to properly contextualize the simulated results.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

40.

QUERY SCHEDULING BASED ON A QUERY-RESOURCE ALLOCATION AND RESOURCE AVAILABILITY

      
Application Number 18978410
Status Pending
Filing Date 2024-12-12
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Pal, Sourav
  • Bhattacharjee, Arindam
  • Roy, Nikhil

Abstract

Systems and methods are described for scheduling a query for execution. The system receives and parses a query to identify one or more portions of the query. The system determines a resource allocation for each portion of the query, and determines an availability of compute resources for the different portions of the query. Based on the resource allocation and the availability of compute resources, the system schedules the query.

IPC Classes  ?

  • G06F 16/2453 - Query optimisation
  • G06F 16/17 - Details of further file system functions
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/242 - Query formulation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

41.

DATA SEARCH AND ANALYSIS FOR DATA SYSTEMS

      
Application Number 18979191
Status Pending
Filing Date 2024-12-12
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Pal, Sourav
  • Pride, Christopher
  • Bhattacharjee, Arindam
  • Wang, Xiaowei
  • Hodge, James Alasdair Robert
  • Ahamed, Mustafa

Abstract

Disclosed is a data fabric service system that can be implemented in a distributed computer network, such as a data intake and query system. The data index and query system can receive a search query and define a search scheme for applying the search query on distributed data storage systems including internal data storage and external data storage. The data index and query system may provide a portion of the search scheme to a search service of the data fabric service system, which can cause worker nodes of the data fabric service system to perform various functions-including applying the search query to the external data storage based on the portion of the search scheme in order to obtain search results.

IPC Classes  ?

  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/2455 - Query execution
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/248 - Presentation of query results
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06F 16/903 - Querying
  • G06F 16/9038 - Presentation of query results
  • G06F 16/904 - BrowsingVisualisation therefor

42.

PATH SIGNATURES FOR DATA FLOWS

      
Application Number 18981218
Status Pending
Filing Date 2024-12-13
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Indiresan, Atri
  • Brockners, Frank
  • Bhandari, Shwetha Subray

Abstract

This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first signature. The method further includes generating a second signature by inputting the first signature and one or more node details into a hash function. The method includes replacing the first signature with the second signature in the packet. The packet including the second value is forwarded by the node.

IPC Classes  ?

  • H04L 45/7453 - Address table lookupAddress filtering using hashing
  • H04L 41/0695 - Management of faults, events, alarms or notifications the faulty arrangement being the maintenance, administration or management system
  • H04L 47/2483 - Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
  • H04L 61/5007 - Internet protocol [IP] addresses

43.

AUTHENTICATION SERVICE WITH SHARED SESSION TOKENS FOR SHARING AUTHENTICATION

      
Application Number 18534497
Status Pending
Filing Date 2023-12-08
First Publication Date 2025-04-03
Owner Cisco Technology, Inc. (USA)
Inventor
  • Mahan, Kyle William
  • Stempeck, Glenn Joseph
  • Weglarz, Zach
  • Green-Husted, Sebastian
  • Dunnum, Ethan
  • Long, Denzil Eugene
  • Cassell, Chris
  • Lowman, Philip Darin

Abstract

Disclosed are systems, apparatuses, methods, computer readable medium, and circuits for sharing multifactor authentication with shared session tokens using an authentication service. According to at least one example, a method includes: in response to receiving a request to check an authentication status from a first application, transmitting a first message to an authentication service including shared information; providing first authentication credentials related to a first authentication to the authentication service; and receiving a message related to a second authentication to bypass the second authentication.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

44.

Receiver Performance Measurement System and Method Thereof

      
Application Number 18539172
Status Pending
Filing Date 2023-12-13
First Publication Date 2025-04-03
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Ran, Adee
  • Kareti, Upen Reddy

Abstract

Devices, networks, systems, methods, and processes for determining receiver performance metric of a network device are described herein. A device may utilize one or more error patterns associated with the network device to retrieve one or more symbol errors from the one or more error patterns. The device can determine an error threshold for a segment based on a predefined Bit Error Rate (BER) level for the segment. The device may generate a performance metric for the segment based on the error threshold and the retrieved symbol errors. The device can generate a receiver performance metric based on performance metrics of segments. The device may determine a Code Error Ratio (CER) and can predict a Frame Loss ratio (FLR) associated with the network device based on the CER.

IPC Classes  ?

  • H04B 3/46 - MonitoringTesting
  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received
  • H04L 1/20 - Arrangements for detecting or preventing errors in the information received using signal-quality detector

45.

HIDDEN-LAYER ROUTING FOR DISAGGREGATED ARTIFICIAL NEURAL NETWORKS

      
Application Number US2024048686
Publication Number 2025/072541
Status In Force
Filing Date 2024-09-26
Publication Date 2025-04-03
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Barton, Robert
  • Brockners, Frank
  • Henry, Jerome
  • Falkner, Matthias
  • Gandhi, Indermeet
  • Feltin, Thomas

Abstract

This disclosure describes techniques and mechanisms enabling processing of heavy deep learning workloads on standard edge network devices to optimize the overall inference throughput of the network while meeting Service Level Agreement(s) (SLAs). The techniques can include receiving a deep learning model, determining a graph structure of the deep learning model including neurons organized in layers (the layers including an input layer, a plurality of hidden layers, and an output layer), assigning to a first IP subnet, at least a part of a first hidden layer of the plurality of hidden layers, assigning to a second IP subnet, at least a part of a second hidden layer of the plurality of hidden layers, and deploying the parts of the first and second hidden layers to edge devices as containerized applications with assigned IP addresses, which may be hidden from the user and/or third party application.

IPC Classes  ?

46.

A LOW POWER INDOOR (LPI) ACCESS POINT (AP) THAT PUNCTURES ITS CHANNEL WHILE RESPECTING INCUMBENTS

      
Application Number US2024049253
Publication Number 2025/072935
Status In Force
Filing Date 2024-09-30
Publication Date 2025-04-03
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Hart, Brian D.
  • Davenport, William H.
  • Hassan Salem, Nedime Pelin Mohamed

Abstract

A Low Power Indoor (LPI) Access Point (AP) that punctures its channel while respecting incumbents may be provided. First, a computing device may determine a relaxation value. Then an energy detection Clear Channel Assessment (CCA) threshold may be changed by the relaxation value for a punctured subchannel. Next, the punctured subchannel may be reported as busy when energy is detected in the punctured subchannel above the changed energy detection CCA threshold.

IPC Classes  ?

  • H04W 74/0808 - Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]

47.

Methods To Locate Multiple Access Points Equipped with Sparse Positioning Sensors

      
Application Number 18429229
Status Pending
Filing Date 2024-01-31
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Maluf, David
  • Amini, Peiman
  • Henry, Jerome
  • Kathail, Pradeep K.
  • Macpherson, Matthew S.
  • Pierrugues, Laurent Alexandre

Abstract

Described herein are devices, systems, methods, and processes for determining the geo-positions of access points (APs) in a wireless network. The techniques involve utilizing geo-positioning data including global navigation satellite system (GNSS) measurements, wireless local area network (WLAN) signal measurements, air pressure measurements, preexisting knowledge, or any combination thereof. The GNSS measurements may include pseudo range measurements. The WLAN signal measurements can include time of arrival (ToA), channel state information (CSI), and/or received signal strength indicator (RSSI) measurements. The geo-position of each AP is calculated by applying Bayes' theorem to all available geo-positioning data and selecting the geo-position hypothesis with the highest probability. The geo-positions of the APs can be updated when a new measurement is obtained. The techniques can handle diverse AP deployments including heterogeneous APs with varying sensor capabilities.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • G01S 19/42 - Determining position
  • H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
  • H04B 17/318 - Received signal strength
  • H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/08 - Access point devices

48.

SHARING SERVICE CHAINS ACROSS USER VPNS BY SEGMENT PRESERVATION

      
Application Number 18471931
Status Pending
Filing Date 2023-09-21
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Shah, Avinash
  • Baruah, Pritam
  • Inamdar, Amjad
  • Ponnuru, Laxmikantha Reddy
  • Ahuja, Latika
  • Agrawal, Jai Prakash

Abstract

A system facilitates communication between branches of an SD-WAN and a service chain element. A hub node receives a data packet of a flow from a source branch over a VPN segment to be transmitted to a destination branch, extracts flow information from the data packet including VPN segment information to be stored in a flow table before transmitting the data packet to the service chain element over a service chain VPN. Upon return of the data packet from the service chain element, the hub node uses packet tuple information to retrieve the flow information with VPN segment information from the flow table. The hub node can then forward the data packet to the destination branch over the VPN segment. The hub node can generate and store an Auto Service Chaining Key that connects bidirectional flows so that the hub node can apply service-chaining to bidirectional traffic.

IPC Classes  ?

  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 9/40 - Network security protocols
  • H04L 45/745 - Address table lookupAddress filtering

49.

AUTOMATED ORDERING OF SERVICE IN SERVICE CHAIN FOR SOFTWARE-DEFINED WIDE AREA NETWORKS

      
Application Number 18472052
Status Pending
Filing Date 2023-09-21
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Shah, Avinash
  • Baruah, Pritam
  • Agrawal, Jai Prakash
  • Inamdar, Amjad

Abstract

Disclosed are systems, apparatuses, methods, computer readable medium, and circuits for ordering services in a service chain comprising: receiving, at an edge router, one or more data packets; determining, at the edge router, a sequence order of service chain elements for the one or more data packets based upon an established sequence, the sequence order modifies the established sequence to performing an altering service that alters a payload of the one or more packets prior to one or more remaining services that inspect the one or more packets; transmitting and receiving, by the edge router in the sequence order, the one or more data packets to and from the service chain elements; transmitting, by the edge router, the one more data packets to a destination after a last of the service chain elements has been performed.

IPC Classes  ?

  • H04L 47/34 - Flow controlCongestion control ensuring sequence integrity, e.g. using sequence numbers
  • H04L 41/14 - Network analysis or design

50.

COMMUNICATION ROUTING FOR CONTACT CENTER

      
Application Number 18473864
Status Pending
Filing Date 2023-09-25
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Sakalkar, Saurabh Vinayak
  • Asthana, Aseem B.
  • Gaikwad, Sachin
  • Bhattacharjee, Arunabh

Abstract

In an example embodiment, a method includes determining an attitudinal negativity score associated with a contact center agent, among a plurality of contact center agents, based on an interaction between the contact center agent and a user during a communication session, receiving data associated with an incoming user communication, determining a user ease score associated with the incoming user communication based on the data, and blocking routing of the incoming user communication to the contact center agent based on the attitudinal negativity score being above a first threshold score and the user ease score being below a second threshold score.

IPC Classes  ?

  • H04M 3/523 - Centralised call answering arrangements requiring operator intervention with call distribution or queuing

51.

TECHNIQUES FOR DETECTING AND MITIGATING SPOOFED EMAIL COMMUNICATIONS

      
Application Number 18474555
Status Pending
Filing Date 2023-09-26
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Singh, Abhishek
  • Kapoor, Shray

Abstract

Techniques are described herein for detecting an invalid (e.g., spoof) email before it is received by an intended recipient. In some embodiments, the techniques may involve, upon receiving an electronic communication directed to an intended recipient, determining, based on information included in the electronic communication, a claimed source entity, and determining a domain associated with the email communication. The techniques may further involve determining an owner entity associated with the domain and then determining that the electronic communication is valid based on a comparison between the owner entity and the claimed source entity. Upon determining that the electronic communication is not valid, the techniques may further comprise performing one or more mitigation techniques.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

52.

Clock Calibrator for Network Devices

      
Application Number 18475839
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Henry, Jerome
  • Amini, Peiman
  • Alizadeh, Ardalan

Abstract

Devices, systems, methods, and processes for calibrating clock signals of network devices are described herein. A device can initiate a ranging procedure with a reference device for synchronizing a clock signal of the device. The ranging procedure may utilize Fine Time Measurement (FTM), Ultra-Wide band (UWB), or similar protocols. The device can also synchronize the clock signal based on detection of ambient interference events. The device may also receive Global Navigation Satellite System (GNSS) data from a satellite and determine a pseudo range for the corresponding satellite based on the synchronized clock signal. The device may further transmit the GNSS data to a location engine. The location engine may aggregate the GNSS data received from a plurality of devices and determine a geolocation of the plurality of devices based on the aggregated GNSS data.

IPC Classes  ?

  • G01S 19/39 - Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
  • G01S 19/21 - Interference related issues

53.

TECHNOLOGIES FOR MANAGING COMPRISED SENSORS IN VIRTUALIZED ENVIRONMENTS

      
Application Number 18972110
Status Pending
Filing Date 2024-12-06
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Yadav, Navindra
  • Singh, Abhishek Ranjan
  • Gupta, Anubhav
  • Gandham, Shashidhar
  • Pang, Jackson Ngoc Ki
  • Chang, Shih-Chun
  • Vu, Hai Trong

Abstract

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

IPC Classes  ?

  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/17 - Details of further file system functions
  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/23 - Updating
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 16/248 - Presentation of query results
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/29 - Geographical information databases
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles
  • H04J 3/06 - Synchronising arrangements
  • H04J 3/14 - Monitoring arrangements
  • H04L 1/24 - Testing correct operation
  • H04L 7/10 - Arrangements for initial synchronisation
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
  • H04L 41/0668 - Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
  • H04L 41/0803 - Configuration setting
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 43/02 - Capturing of monitoring data
  • H04L 43/026 - Capturing of monitoring data using flow identification
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
  • H04L 43/0805 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
  • H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
  • H04L 43/0829 - Packet loss
  • H04L 43/0852 - Delays
  • H04L 43/0864 - Round trip delays
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 43/0882 - Utilisation of link capacity
  • H04L 43/0888 - Throughput
  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
  • H04L 43/106 - Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
  • H04L 43/12 - Network monitoring probes
  • H04L 43/16 - Threshold monitoring
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/302 - Route determination based on requested QoS
  • H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
  • H04L 45/74 - Address processing for routing
  • H04L 47/11 - Identifying congestion
  • H04L 47/20 - Traffic policing
  • H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
  • H04L 47/2483 - Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
  • H04L 47/28 - Flow controlCongestion control in relation to timing considerations
  • H04L 47/31 - Flow controlCongestion control by tagging of packets, e.g. using discard eligibility [DE] bits
  • H04L 47/32 - Flow controlCongestion control by discarding or delaying data units, e.g. packets or frames
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/01 - Protocols
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/50 - Network services
  • H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
  • H04L 67/75 - Indicating network or usage conditions on the user display
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
  • H04L 69/22 - Parsing or analysis of headers
  • H04W 72/54 - Allocation or scheduling criteria for wireless resources based on quality criteria
  • H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks

54.

DETECTING PROGRAMMABLE LOGIC CONTROLLER CONFIGURATION CHANGES USING SPECTRAL ANALYSIS

      
Application Number 18373745
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Moukam, Yohann Hako
  • Calvet, Olivier Cédric Guilhem
  • Koucham, Oualid

Abstract

In one embodiment, a process observes a communication network with automated systems for packet relative arrival times between a pair of devices having stable or periodic communications within the communication network. The process performs a spectral analysis on the packet relative arrival times between the pair of devices to determine a periodicity of communications between the pair of devices. When a change in the periodicity of communications between the pair of devices is detected based on continued inference observing, the process may then mitigate the change in the periodicity of communications between the pair of devices.

IPC Classes  ?

  • H04L 43/0852 - Delays
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events

55.

ABSORBER FOR PRINTED CIRCUIT BOARD ASSEMBLY

      
Application Number 18390757
Status Pending
Filing Date 2023-12-20
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Ma, Wenbin
  • He, Shiqing
  • Wu, Yong
  • Goergen, Joel Richard
  • Sapozhnikov, Mike
  • Tang, Xinghai
  • Xu, Dewen
  • Zhu, Haiying

Abstract

Presented herein is a printed circuit board (PCB) assembly with an absorber having a perforated structure. The absorber is positioned between a trace of a PCB and a connector that couples the PCB to an enclosure. The absorber includes a perforated structure to maintain an integrity of a signal propagated along the trace, while improving electromagnetic interference and/or electromagnetic compatibility properties.

IPC Classes  ?

  • H05K 9/00 - Screening of apparatus or components against electric or magnetic fields
  • H05K 1/02 - Printed circuits Details

56.

AUTOMATED ORDERING OF SERVICE IN SERVICE CHAIN FOR SOFTWARE-DEFINED WIDE AREA NETWORKS

      
Application Number US2024046945
Publication Number 2025/064355
Status In Force
Filing Date 2024-09-16
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Shah, Avinash
  • Baruah, Pritam
  • Agrawal, Jai Prakash
  • Inamdar, Amjad

Abstract

Disclosed are systems, apparatuses, methods, computer readable medium, and circuits for ordering services in a service chain comprising: receiving, at an edge router, one or more data packets; determining, at the edge router, a sequence order of service chain elements for the one or more data packets based upon an established sequence, the sequence order modifies the established sequence to performing an altering service that alters a payload of the one or more packets prior to one or more remaining services that inspect the one or more packets; transmitting and receiving, by the edge router in the sequence order, the one or more data packets to and from the service chain elements; transmitting, by the edge router, the one more data packets to a destination after a last of the service chain elements has been performed.

IPC Classes  ?

  • H04L 45/302 - Route determination based on requested QoS
  • H04L 47/34 - Flow controlCongestion control ensuring sequence integrity, e.g. using sequence numbers
  • H04L 45/0377 - Routes obligatorily traversing service-related nodes for service chaining
  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer

57.

INTEROPERABLE TRANSMIT POWER ENVELOP (TPE) SIGNALING WITH AUTOMATED FREQUENCY COORDINATION (AFC) FREQUENCY RESPONSE

      
Application Number US2024047928
Publication Number 2025/064971
Status In Force
Filing Date 2024-09-23
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Hart, Brian D.
  • Wakudkar, Sachin D.
  • Hassan Salem, Nedime Pelin Mohamed

Abstract

Interoperable Transmit Power Envelop (TPE) signaling with Automated Frequency Coordination (AFC) frequency response may be provided. First, AFC information may be received. Next a mask may be determined for a punctured channel indicated in the AFC information. Then a first amount may be determined that the mask needs to be altered to reach an AFC response for the punctured channel indicated in the AFC information. A Transmit Power Envelop (TPE) value may then be reported for the punctured channel comprising the first amount plus a second amount.

IPC Classes  ?

  • H04W 52/14 - Separate analysis of uplink or downlink
  • H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 16/14 - Spectrum sharing arrangements
  • H04W 24/02 - Arrangements for optimising operational condition

58.

EPOCH SCHEME FOR STATION PRIVACY

      
Application Number 18893074
Status Pending
Filing Date 2024-09-23
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Henry, Jerome
  • Ficara, Domenico
  • Campiglio, Ugo M.
  • Contreras, Javier
  • Zuniga, Juan Carlos
  • Orr, Stephen M.

Abstract

An epoch scheme for Station (STA) privacy and, specifically, a structured Media Access Control (MAC) address rotation schedule for STAs may be provided. Providing an epoch scheme for STA privacy can include determining epoch parameters for a STA, the epoch parameters comprising a minimum epoch period duration and a maximum epoch period duration. The epoch parameters are sent to the STA, wherein the STA is operable to rotate a MAC address each epoch period at a time between the minimum epoch period duration and the maximum epoch period duration. A mapping of the STA and the MAC address can be updated each epoch period.

IPC Classes  ?

59.

INTEROPERABLE TRANSMIT POWER ENVELOP (TPE) SIGNALING WITH AUTOMATED FREQUENCY COORDINATION (AFC) FREQUENCY RESPONSE

      
Application Number 18893094
Status Pending
Filing Date 2024-09-23
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Hart, Brian D.
  • Wakudkar, Sachin D.
  • Mohamed Hassan Salem, Nedime Pelin

Abstract

Interoperable Transmit Power Envelop (TPE) signaling with Automated Frequency Coordination (AFC) frequency response may be provided. First, AFC information may be received. Next a mask may be determined for a punctured channel indicated in the AFC information. Then a first amount may be determined that the mask needs to be altered to reach an AFC response for the punctured channel indicated in the AFC information. A Transmit Power Envelop (TPE) value may then be reported for the punctured channel comprising the first amount plus a second amount.

IPC Classes  ?

  • H03F 3/24 - Power amplifiers, e.g. Class B amplifiers, Class C amplifiers of transmitter output stages
  • H04W 16/14 - Spectrum sharing arrangements

60.

PERFORMANCE MEASUREMENT ANALYTICS PLATFORM BASED ON TOPOLOGY STABILITY

      
Application Number 18372782
Status Pending
Filing Date 2023-09-26
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Filsfils, Clarence
  • Camarillo Garvía, Pablo
  • Gandhi, Rakesh
  • Abdelsalam, Ahmed Mohamed Ahmed
  • Ben Ayed, Sonia

Abstract

In one implementation, a method herein comprises: determining a given time during which a computer network is unstable in response to a topology event within the computer network; causing, in response to the computer network being unstable, a measurement analysis process to perform network performance analysis on the computer network based on the computer network being unstable during the given time; and causing, in response to determining that the computer network is otherwise in a stable state, the measurement analysis process to perform network performance analysis on the computer network based on the computer network being stable.

IPC Classes  ?

  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
  • H04L 41/12 - Discovery or management of network topologies

61.

CROSS-DOMAIN PROBING ARCHITECTURE FOR COMPUTER NETWORK MONITORING

      
Application Number 18372791
Status Pending
Filing Date 2023-09-26
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Backman, Jesse Daniel
  • Pillay, Kervin
  • Doctor, Murtaza
  • Gandhi, Indermeet Singh
  • Ashlock, Hans
  • Rayes, Mark Ammar
  • Arur, Raghu Rajendra
  • Campbell, Ian M.

Abstract

In one implementation, a “probe controller orchestrator” provides access to cross-domain probing via the probe controller orchestrator for a plurality of probe controllers across a plurality of different network domains with a respective different probing protocol and associated probing capability. The probe controller orchestrator, in particular, obtains domain-specific probe test results from each of the plurality of probe controllers, and correlates the domain-specific probe test results into cross-domain data formatted in a common data format understandable by each of the plurality of probe controllers. As such, the probe controller orchestrator may then respond to requests received from the plurality of probe controllers with the cross-domain data in order to cause respective domain-specific processing.

IPC Classes  ?

  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
  • H04L 43/55 - Testing of service level quality, e.g. simulating service usage
  • H04L 69/18 - Multiprotocol handlers, e.g. single devices capable of handling multiple protocols

62.

COMPUTATION OF SATELLITE COMMUNICATION STRATEGIES

      
Application Number 18373513
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Holme, Daniel Claude
  • Obstfeld, Joel Abraham
  • Samuel, Louis Gwyn

Abstract

According to one or more implementations of the disclosure, a device may determine a path of travel of the vehicle. The device may obtain telemetry data associated with the path of travel. The device may compute, based on the telemetry data, a communication strategy whereby the vehicle switches from using a first transceiver to communicate with a primary satellite network and a second transceiver to communicate with a secondary satellite network. The device may cause the vehicle to communicate according to the communication strategy.

IPC Classes  ?

63.

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

      
Application Number 18971699
Status Pending
Filing Date 2024-12-06
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Sundararajan, Balaji
  • Mokashi, Gaurang Rajeev
  • Mordani, Preety
  • Agarwal, Vivek

Abstract

Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
  • H04L 47/20 - Traffic policing
  • H04L 49/25 - Routing or path finding in a switch fabric

64.

POWER AND OPTICAL CONNECTOR SYSTEM

      
Application Number 18416338
Status Pending
Filing Date 2024-01-18
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Goergen, Joel Richard
  • Jones, Chad M.
  • Potterf, Jason Dewayne
  • Krishnan, Mala

Abstract

The present embodiments are directed to a system with a first power assembly having a first power enclosure configured to attach to an optical plug and a first power connector disposed in the first power enclosure, as well as a second power assembly having a second power enclosure configured to attach to an optical enclosure that is configured to receive the optical plug and a second power connector disposed in the second power enclosure. The first power connector and the second power connector are configured to couple to each other.

IPC Classes  ?

  • H01R 13/506 - BasesCases composed of different pieces assembled by snap action of the parts

65.

AUTOMATIC SERVICE CHAINING OF BI-DIRECTIONAL TRANSIT TRAFFIC

      
Application Number 18472011
Status Pending
Filing Date 2023-09-21
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Shah, Avinash
  • Baruah, Pritam
  • Inamdar, Amjad
  • Ponnuru, Laxmikantha Reddy
  • Ahuja, Latika
  • Agrawal, Jai Prakash

Abstract

A system facilitates communication between branches of an SD-WAN and a service chain element. A hub node receives a data packet of a flow from a source branch over a VPN segment to be transmitted to a destination branch, extracts flow information from the data packet including VPN segment information to be stored in a flow table before transmitting the data packet to the service chain element over a service chain VPN. Upon return of the data packet from the service chain element, the hub node uses packet tuple information to retrieve the flow information with VPN segment information from the flow table. The hub node can then forward the data packet to the destination branch over the VPN segment. The hub node can generate and store an Auto Service Chaining Key that connects bidirectional flows so that the hub node can apply service-chaining to bidirectional traffic.

IPC Classes  ?

  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 9/40 - Network security protocols

66.

ACCESS TRAFFIC STEERING, SWITCHING & SPLITTING (ATSSS) EXTENSIONS FOR MULTIPLE ACCESS TYPES AND RATS

      
Application Number 18475571
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Srivastava, Vimal
  • Gundavelli, Sri
  • Guntupalli, Ravi Kiran

Abstract

In one aspect, a method of supporting enhanced UE policies that control which access technologies and the number of access technologies a user equipment can access beyond a single 3GPP connection and a single non-3GPP connection, the method including registering, by a user equipment, to a 3GPP network, wherein the registering includes an indication that the user equipment supports multi-access packet data unit (MA-PDU) sessions; receiving, by the user equipment, a UE policy for a first application permitting the user equipment to access at least three access technologies for communications while accessing the first application, wherein the UE policy is received from an access mobility function (AMF) of the 3GPP network; and determining, by the user equipment, one or more of the access technologies permitted in the UE policy for the first application to use to establish protocol data unit (PDU) session with the first application.

IPC Classes  ?

  • H04W 28/086 - Load balancing or load distribution among access entities
  • H04W 48/16 - DiscoveringProcessing access restriction or access information
  • H04W 48/20 - Selecting an access point
  • H04W 60/00 - Affiliation to network, e.g. registrationTerminating affiliation with the network, e.g. de-registration
  • H04W 76/10 - Connection setup

67.

SYSTEM AND METHODS FOR MESH TREE WIDE TRAFFIC METERING AND SHAPING

      
Application Number 18475913
Status Pending
Filing Date 2023-09-27
First Publication Date 2025-03-27
Owner Cisco Technology, Inc. (USA)
Inventor
  • Karmakar, Anirban
  • Vegas, Thomas
  • Cuissard, Vincent

Abstract

A system and method are provided for allocating bandwidth and metering data flows within a wireless mesh-tree network. The network includes a wireless LAN controller (WLC), a root access point (RAP), and mesh access points (MAPs), which are arranged in respective hop levels corresponding to the number of links a given MAP is removed from the RAP. The WLC allocates available data rates (ADRs) to the respective MAPs, and each MAP then apportions its ADR among various origination types of data flowing through the given MAP (e.g., backhaul, ethernet-bridged, and client data types). The MAPs can use a token bucket filter (TBF)-like mechanism to enforce this apportionment. WiFi multi-media (WMM) based access classes can be used to shape the data flows (e.g., an NC access class assigned to topology maintenance traffic ensures it is fed directly into a WMM queue).

IPC Classes  ?

  • H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
  • H04L 47/215 - Flow controlCongestion control using token-bucket

68.

AUTOMATIC SERVICE CHAINING OF BI-DIRECTIONAL TRANSIT TRAFFIC

      
Application Number US2024046948
Publication Number 2025/064357
Status In Force
Filing Date 2024-09-16
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Shah, Avinash
  • Baruah, Pritam
  • Inamdar, Amjad
  • Ponnuru, Laxmikantha Reddy
  • Ahuja, Latika
  • Agrawal, Jai Prakash

Abstract

A system facilitates communication between branches of an SD-WAN and a service chain element. A hub node receives a data packet of a flow from a source branch over a VPN segment to be transmitted to a destination branch, extracts flow information from the data packet including VPN segment information to be stored in a flow table before transmitting the data packet to the service chain element over a service chain VPN. Upon return of the data packet from the service chain element, the hub node uses packet tuple information to retrieve the flow information with VPN segment information from the flow table. The hub node can then forward the data packet to the destination branch over the VPN segment. The hub node can generate and store an Auto Service Chaining Key that connects bidirectional flows so that the hub node can apply service-chaining to bidirectional traffic.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 12/46 - Interconnection of networks
  • H04L 45/00 - Routing or path finding of packets in data switching networks

69.

NETWORK DEVICE MOVEMENT DETECTION

      
Application Number US2024047115
Publication Number 2025/064439
Status In Force
Filing Date 2024-09-17
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Henry, Jerome
  • Kanak, Ather
  • Alizadeh, Ardalan
  • Aller, Joel
  • Amini, Peiman

Abstract

Devices, systems, methods, and processes for detecting anomalous movements within network devices are described herein. Certain movements within networks devices are predictable and negligible. However, other movements may indicate a larger problem with the network, or network devices, especially when the network devices (e.g., access points) are within a stationary deployment. For example, a sudden movement of a network device may indicate that it has fallen, been moved, or is under threat of a physical attack. Many network devices are being deployed with various environmental sensors. These sensors can be utilized to detect movement of the network device. This can be done by evaluating the received signal strength indicator levels as well as the output of the environmental sensor. If an anomalous movement is detected, preventative actions can be taken such as rebooting or limiting access. This can be done on the network device or by a centralized management system.

IPC Classes  ?

  • H04W 12/122 - Counter-measures against attacksProtection against rogue devices
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management

70.

METHODS TO LOCATE MULTIPLE ACCESS POINTS EQUIPPED WITH SPARSE POSITIONING SENSORS

      
Application Number US2024047120
Publication Number 2025/064444
Status In Force
Filing Date 2024-09-17
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Maluf, David
  • Amini, Peiman
  • Henry, Jerome
  • Kathail, Pradeep, K.
  • Macpherson, Matthew, S.
  • Pierrugues, Laurent, Alexandre

Abstract

Described herein are devices, systems, methods, and processes for determining the geo-positions of access points (APs) in a wireless network. The techniques involve utilizing geo-positioning data including global navigation satellite system (GNSS) measurements, wireless local area network (WLAN) signal measurements, air pressure measurements, preexisting knowledge, or any combination thereof. The GNSS measurements may include pseudo range measurements. The WLAN signal measurements can include time of arrival (ToA), channel state information (CSI), and/or received signal strength indicator (RSSI) measurements. The geo-position of each AP is calculated by applying Bayes' theorem to all available geo-positioning data and selecting the geo-position hypothesis with the highest probability. The geo-positions of the APs can be updated when a new measurement is obtained. The techniques can handle diverse AP deployments including heterogeneous APs with varying sensor capabilities.

IPC Classes  ?

  • G01S 19/09 - Cooperating elementsInteraction or communication between different cooperating elements or between cooperating elements and receivers providing processing capability normally carried out by the receiver
  • G01S 19/14 - Receivers specially adapted for specific applications
  • G01S 19/39 - Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
  • G01S 19/46 - Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement the supplementary measurement being of a radio-wave signal type
  • G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • G01S 19/45 - Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement
  • G01S 19/51 - Relative positioning
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • G06N 3/02 - Neural networks
  • G06N 20/00 - Machine learning

71.

REPLICATING TRAFFIC COMMUNICATED OVER SATELLITE NETWORKS

      
Application Number US2024047786
Publication Number 2025/064888
Status In Force
Filing Date 2024-09-20
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Szigeti, Thomas
  • Zacks, David, John
  • Barton, Robert, Edgar
  • Apcar, Jeff

Abstract

Techniques for a proxy to replicate traffic being communicated between a client device and a destination device based on determining an outage or impairment in a LEO satellite network. The prow may be communicating a traffic stream between a source device and a destination device using a primary WAN that includes the LEO satellite network. However, the prow may determine that the primary WAN has experienced or will experience an outage or other impairment. In such examples, the proxy may then replicate the traffic stream and send the replicated traffic stream over a backup communication link. The backup communication link may a different path through the primary WAN, and/or may be a communication path through a secondary WAN. Once the outage or impairment has cleared, the proxy may stop replicating the traffic and again use the primary WAN to communicate traffic.

IPC Classes  ?

  • H04B 7/00 - Radio transmission systems, i.e. using radiation field
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04W 40/00 - Communication routing or communication path finding

72.

EPOCH SCHEME FOR STATION PRIVACY

      
Application Number US2024047973
Publication Number 2025/064992
Status In Force
Filing Date 2024-09-23
Publication Date 2025-03-27
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Henry, Jerome
  • Ficara, Domenico
  • Campiglio, Ugo M.
  • Contreras, Javier
  • Zuniga, Juan Carlos
  • Orr, Stephen M.

Abstract

An epoch scheme for Station (STA) privacy and, specifically, a structured Media Access Control (MAC) address rotation schedule for STAs may be provided. Providing an epoch scheme for STA privacy can include determining epoch parameters for a STA, the epoch parameters comprising a minimum epoch period duration and a maximum epoch period duration. The epoch parameters are sent to the STA, wherein the STA is operable to rotate a MAC address each epoch period at a time between the minimum epoch period duration and the maximum epoch period duration. A mapping of the STA and the MAC address can be updated each epoch period.

IPC Classes  ?

  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
  • H04W 12/61 - Time-dependent
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04L 101/622 - Layer-2 addresses, e.g. medium access control [MAC] addresses

73.

CHANNEL CODING OVER QUANTUM CHANNELS

      
Application Number 18466889
Status Pending
Filing Date 2023-09-14
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Diadamo, Stephen Magno
  • Rathi, Lakshika
  • Shabani, Alireza

Abstract

A method of managing communication over a quantum channel. The method includes generating a first set of quantum channel codes configured to encode a message to obtain a quantum encoded message, supplying the first set of quantum channel codes to an encoder, generating a second set of quantum channel codes configured to decode the quantum encoded message, and supplying the second set of quantum channel codes to a decoder that is configured to operate with encoder across a channel, wherein the first set of quantum channel codes and the second set of quantum channel codes are derived using a machine learning model.

IPC Classes  ?

  • H04B 10/70 - Photonic quantum communication
  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms

74.

OPTICAL AMPLIFIER GAIN SELF-PROVISIONING

      
Application Number 18466901
Status Pending
Filing Date 2023-09-14
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Tanzi, Alberto Arnaldo
  • Osnago, Giovanni
  • Gazzola, Maurizio

Abstract

An optical network element detects an input optical signal at a preamplifier input and sets an output power level of the preamplifier at a predetermined Automatic Power Reduction (APR) power level. The optical network element starts an APR timer that expires after a first predetermined time period. While the APR timer is running, the optical network element measures an input power level of the input optical signal and calculates a span loss as a function of the difference between the predetermined APR power level and the measured input power level. After the expiration of the APR timer, the optical network element adjusts the output power level of the preamplifier output based on the calculated span loss.

IPC Classes  ?

  • H04B 10/079 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal

75.

GNSS Driven Dynamic Partitioning of APs

      
Application Number 18467040
Status Pending
Filing Date 2023-09-14
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Alizadeh, Ardalan
  • Reyhanian, Navid
  • Yazdanparast, Audrey
  • Amini, Peiman
  • Henry, Jerome

Abstract

Described herein are devices, systems, methods, and processes for managing the computational complexity in geolocating a large number of network devices (e.g., access points (APs)) in indoor environments. A number of network devices may be partitioned into smaller groups or batches based on neighbor knowledge about the network devices. Each batch of network devices can include just devices located on a same floor, or may include devices located across different floors. Every batch may include at least one anchor network device. The geolocation of the network devices can be determined, batch-by-batch, based on fusing global navigation satellite system (GNSS) pseudorange measurements and inter-network device ranging measurements. The geolocation accuracy for each partition can be evaluated utilizing such metrics as the average residual error. If the error for a batch is greater than a threshold, remedial measures may be taken to reduce the error and improve the geolocation accuracy.

IPC Classes  ?

  • G01S 19/48 - Determining position by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system

76.

Network Device Movement Detection

      
Application Number 18469761
Status Pending
Filing Date 2023-09-19
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Henry, Jerome
  • Kanak, Ather
  • Alizadeh, Ardalan
  • Aller, Joel
  • Amini, Peiman

Abstract

Devices, systems, methods, and processes for detecting anomalous movements within network devices are described herein. Certain movements within networks devices are predictable and negligible. However, other movements may indicate a larger problem with the network, or network devices, especially when the network devices (e.g., access points) are within a stationary deployment. For example, a sudden movement of a network device may indicate that it has fallen, been moved, or is under threat of a physical attack. Many network devices are being deployed with various environmental sensors. These sensors can be utilized to detect movement of the network device. This can be done by evaluating the received signal strength indicator levels as well as the output of the environmental sensor. If an anomalous movement is detected, preventative actions can be taken such as rebooting or limiting access. This can be done on the network device or by a centralized management system.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04B 17/318 - Received signal strength
  • H04W 24/08 - Testing using real traffic

77.

SERVICE-SPECIFIC CARBON EMISSION MONITORING AND MITIGATION

      
Application Number 18469809
Status Pending
Filing Date 2023-09-19
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Barth, Steven
  • Ladhuie, Guillaume

Abstract

A method, computer system, and computer program product are provided for mitigating carbon emissions. Data is obtained indicating an overall amount of power consumption for a plurality of nodes in a service provider network, wherein each node of the plurality of nodes is located in a different geographical location, and wherein the service provider network provides service to a plurality of service provider network users. A fraction of network traffic is determined that is handled by the plurality of nodes in the service provider network for serving a particular service provider network user. A service provider network user power consumption is determined for the particular service provider network user based on the fraction of network traffic and the overall amount of power consumption. An amount of emissions is determined resulting from generating electrical power to support the service provider network user power consumption for the particular service provider network user.

IPC Classes  ?

  • H04L 41/0833 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network energy consumption
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 45/00 - Routing or path finding of packets in data switching networks

78.

GRACEFUL REMOVAL OF LACP MEMBER INTERFACES

      
Application Number 18470055
Status Pending
Filing Date 2023-09-19
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Sadayan Abdul Hutha, Ahamed Maideen
  • Kandhasamy, Dhanaseker
  • Pitta, Srinivas
  • Ghosh, Sudeshna

Abstract

Methods and systems are described herein for graceful insertion and removal of at a data link layer of an open systems interconnection model (OSI Model). In one aspect, the method comprises: establishing connections to at least two ports on a first side of a link to create a link aggregation group managed using link aggregation control protocol (LACP), wherein the link aggregation group constitutes a transmit path from the first side of the link to the second side of the link. A partner device may receive, from a first port of the at least two ports, a first message, wherein the first message indicates that the first port will become unavailable to receive traffic.

IPC Classes  ?

79.

SERVICE ROUTING USING IP ENCAPSULATION

      
Application Number 18470136
Status Pending
Filing Date 2023-09-19
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor Dukes, Darren Russell

Abstract

Described herein are techniques directed to utilizing IP encapsulation to route data packets to different instances of a service in a network. In one aspect, a method includes generating a first request, which includes a first data packet and a first IP encapsulation; transmitting the first request to a service aware router, wherein the service aware router generates a second request that includes the first data packet and a second IP encapsulation, and transmits the service request to the instance of the service; receiving, from the service instance, a response including a second data packet and a third IP encapsulation, which includes an identifier of the service instance of the service; and recording the identifier of the service instance, wherein subsequent requests for applying the service to data packets originating at the device are directly transmitted by the device to the service instance.

IPC Classes  ?

  • H04L 45/42 - Centralised routing
  • H04L 9/40 - Network security protocols
  • H04L 45/741 - Routing in networks with a plurality of addressing schemes, e.g. with both IPv4 and IPv6

80.

REPLICATING TRAFFIC COMMUNICATED OVER SATELLITE NETWORKS

      
Application Number 18470653
Status Pending
Filing Date 2023-09-20
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Szigeti, Thomas
  • Zacks, David John
  • Barton, Robert Edgar
  • Apcar, Jeff

Abstract

Techniques for a proxy to replicate traffic being communicated between a client device and a destination device based on determining an outage or impairment in a LEO satellite network. The proxy may be communicating a traffic stream between a source device and a destination device using a primary WAN that includes the LEO satellite network. However, the proxy may determine that the primary WAN has experienced or will experience an outage or other impairment. In such examples, the proxy may then replicate the traffic stream and send the replicated traffic stream over a backup communication link. The backup communication link may a different path through the primary WAN, and/or may be a communication path through a secondary WAN. Once the outage or impairment has cleared, the proxy may stop replicating the traffic and again use the primary WAN to communicate traffic.

IPC Classes  ?

81.

DYNAMIC PRIORITIZATION OF ATTACK PATHS IN CLOUD NATIVE APPLICATION

      
Application Number 18470884
Status Pending
Filing Date 2023-09-20
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Salarian, Arash
  • Yannuzzi, Marcelo
  • Bosch, Hendrikus G.P.
  • Napper, Jeffrey Michael

Abstract

Techniques for using real-time metrics and telemetry information to dynamically prioritize attack paths identified during a static analysis of a cloud native application, and using top priority attack paths identified during the static analysis to steer the dynamic analysis. The techniques may include identifying components of the cloud native application and connections between the components. The components and connections are analyzed to identify a set of attack paths. Network communications are monitored between the connections and metrics representing signals in the communications collected. A first subset of the attack paths based on a first portion of the metric indicating a real-time security vulnerability are identified. Finally, the first subset of the attack paths is prioritized over a second subset of the attack paths based at least in part on the first subset having the first portion of the metrics indicating real-time security vulnerabilities.

IPC Classes  ?

82.

ALERT AND SUPPRESSION UPDATING IN A CLUSTER COMPUTING SYSTEM

      
Application Number 18966022
Status Pending
Filing Date 2024-12-02
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Singh, Jagmohan
  • Liu, Hongxun
  • Kurnool, Saketh

Abstract

A computer-implemented method includes a processing node sending a request that includes an identified alert record from a shared alert data store that is shared amongst a cluster of processing nodes including the processing node. The processing node receives, responsive to the request, a delete alert record uniquely identifying the identified alert record and including an annotation identifying a new delete alert record as being a delete alert record type. The processing node matches, responsive to the annotation, the delete alert record to a local copy of the identified alert record based on the delete alert record uniquely identifying the identified alert record. The processing node deletes, based on the annotation, the local copy of the identified alert record according to the delete alert record.

IPC Classes  ?

83.

WIRELESS LAN (WLAN) PUBLIC IDENTITY FEDERATION TRUST ARCHITECTURE

      
Application Number 18966765
Status Pending
Filing Date 2024-12-03
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Smith, Malcolm Muir
  • Brinckman, Bart
  • Grayson, Mark
  • Henry, Jerome
  • Macpherson, Matthew Stephen

Abstract

The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.

IPC Classes  ?

84.

INTER-NETWORK SHORT MESSAGE SERVICE AMONG PRIVATE AND PUBLIC 5G NETWORKS

      
Application Number 18967844
Status Pending
Filing Date 2024-12-04
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Gundavelli, Sri
  • Gandhi, Indermeet Singh
  • Kathail, Pradeep Kumar
  • Samuel, Louis Gwyn

Abstract

Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.

IPC Classes  ?

  • H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
  • H04W 84/04 - Large scale networksDeep hierarchical networks

85.

DETECTION OF OVERLAPPING SUBNETS IN A NETWORK

      
Application Number 18967854
Status Pending
Filing Date 2024-12-04
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Harneja, Sanchay
  • Sundaresan, Sanjay
  • Jagannati, Harsha

Abstract

Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations

IPC Classes  ?

  • H04L 41/0866 - Checking the configuration
  • H04L 41/06 - Management of faults, events, alarms or notifications
  • H04L 41/0873 - Checking configuration conflicts between network elements
  • H04L 41/14 - Network analysis or design

86.

LINEAGE CERTIFICATION FOR DIGITAL ASSETS

      
Application Number 18368776
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Obstfeld, Joel Abraham
  • Dan, Ronnie I.
  • Bull, Oliver James

Abstract

In one implementation, a device provides, to a user interface, proof-of-creation information that certifies that data presented by the user interface was created by one or more sensors capturing the data from a real person. The device receives, via the user interface, an edit to the data, to form edited data. The device associates one or more keys with the edited data that are based on the proof-of-creation information and on the edit to the data. The device provides, based on the one or more keys, lineage information to the user interface in conjunction with the edited data that indicates the edit to the data and the proof-of-creation information.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference

87.

COMMUNICATION-AWARE INFERENCE SERVING FOR PARTITIONED NEURAL NETWORKS

      
Application Number 18368790
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Lee, Myungjin
  • Baumgart, Gustav Adrian
  • Shin, Jaemin
  • Kompella, Ramana Rao V.R.

Abstract

In one implementation, a device generates outputs of nodes in a upstream layer of a partitioned neural network. The device assigns priorities to each of the outputs of the nodes. The device selects, based on the priorities, a subset of the outputs to send to a remote device. The device sends, via a computer network, the subset of the outputs to the remote device for input to a downstream layer of the partitioned neural network.

IPC Classes  ?

  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
  • G06V 10/771 - Feature selection, e.g. selecting representative features from a multi-dimensional feature space

88.

OPPORTUNISTIC RELAY AMONG MOBILE COMMUNICATION DEVICES

      
Application Number 18368997
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Choukir, Amine
  • Thubert, Pascal
  • Ficara, Domenico
  • Vasseur, Jean-Philippe

Abstract

In one embodiment, a method is disclosed comprising monitoring dynamic locations of a plurality of mobile communication devices within a physical area covered by a wireless communication network, wherein keys are distributed to the mobile communication devices at association time; determining that a particular mobile communication device should have a relay for communication with the network based on a first location of the particular mobile communication device and inadequate wireless communication characteristics at the first location; selecting an opportunistic relay device from the mobile communication devices based on a second location of the opportunistic relay device and adequate wireless communication characteristics of the opportunistic relay device within the network and to the first location from the second location; and directing the opportunistic relay device to relay communications for the particular mobile communication device at the first location, wherein the communications are encrypted based on the keys.

IPC Classes  ?

  • H04W 12/0431 - Key distribution or pre-distributionKey agreement
  • H04W 76/15 - Setup of multiple wireless link connections
  • H04W 88/04 - Terminal devices adapted for relaying to or from another terminal or user

89.

AP LOCALIZATION BASED ON CLIENT ANCHORING

      
Application Number US2024046231
Publication Number 2025/059201
Status In Force
Filing Date 2024-09-11
Publication Date 2025-03-20
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Henry, Jerome
  • Amini, Peiman
  • Alizadeh, Ardalan

Abstract

Described herein are devices, systems, methods, and processes for improving the accuracy of access point (AP) location in a Wi-Fi network using client device data and AP ranging measurements. APs may be deployed across a specific area. The APs can range to one another and form a matrix of measurements. Techniques such as semidefinite programming or multidimensional scaling (MDS) can be employed to transform these AP-to-AP ranges into a set of coordinates. Client devices in the area may also range to the APs. The client devices may provide their location measurement report (LMR) feedback and geo-position estimation to the network. The client devices-provided data, along with the AP-to-AP matrices, may be returned to a location server. The location server can use the data to refine the accuracy of the AP-to-AP graph and ascertain the most probable geo-position of the APs.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • G01S 11/02 - Systems for determining distance or velocity not using reflection or reradiation using radio waves

90.

HYBRID NON-LINE-OF-SIGHT DETECTION IN WIRELESS NETWORKS

      
Application Number US2024046234
Publication Number 2025/059203
Status In Force
Filing Date 2024-09-11
Publication Date 2025-03-20
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Amini, Peiman
  • Alizadeh, Ardalan
  • Henry, Jerome
  • Arshad, Rabe

Abstract

Devices, systems, methods, and processes for hybrid line-of-sight (LOS) / non-line of sight (NLOS) detection are described herein. To facilitate co-existence and co-operation of a fixed network and a wireless network sharing a same frequency band without interference, a device in the wireless network can be configured to perform automatic frequency coordination (AFC). The device can accurately determine a geolocation of the device by utilizing global navigation satellite system (GNSS) data and light detection and ranging (LiDAR) data. The device can also determine whether the fixed station is in the LOS by utilizing the GNSS data and the LiDAR data. The device can further correct the geolocation and improve an accuracy of the LOS / NLOS detection by using both: the GNSS data and the LiDAR data simultaneously. The device can further control an output power when the fixed station is in the LOS, thereby avoiding the interference.

IPC Classes  ?

91.

JOINT GNSS-TERRESTRIAL AP GEOLOCATING

      
Application Number US2024046487
Publication Number 2025/059376
Status In Force
Filing Date 2024-09-12
Publication Date 2025-03-20
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Amini, Peiman
  • Alizadeh, Ardalan
  • Henry, Jerome
  • Fallahi, Arya
  • Reyhanian, Navid

Abstract

Described herein are devices, systems, methods, and processes for estimating the geolocation of network devices by jointly utilizing pseudorange measurements from global navigation satellite system (GNSS) satellites and terrestrial -based ranging measurements between network devices. Each network device is equipped with a GNSS receiver that collects pseudorange data from each satellite link at time intervals. Terrestrial-based ranging measurements between network devices can also be collected. The receiver clock error can be accounted for at least in part by over-the-air time synchronization of network devices. To mitigate the impact of multipath and improve accuracy, pseudorange measurements with less than satisfactory quality metrics can be filtered out. In some embodiments, the geolocation of anchor network devices can be estimated with high accuracy first, and then the rest of the non-anchor network devices may be localized in a second-stage localization process.

IPC Classes  ?

  • G01S 19/09 - Cooperating elementsInteraction or communication between different cooperating elements or between cooperating elements and receivers providing processing capability normally carried out by the receiver
  • G01S 19/14 - Receivers specially adapted for specific applications
  • G01S 19/46 - Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement the supplementary measurement being of a radio-wave signal type
  • G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • G01S 19/24 - Acquisition or tracking of signals transmitted by the system
  • G01S 19/51 - Relative positioning
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management

92.

HYBRID NON-LINE-OF-SIGHT DETECTION IN WIRELESS NETWORKS

      
Application Number US2024046676
Publication Number 2025/059506
Status In Force
Filing Date 2024-09-13
Publication Date 2025-03-20
Owner CISCO TECHNOLOGY, INC. (USA)
Inventor
  • Shahzad, Muhammad
  • Brinckman, Bart

Abstract

Devices, systems, methods, and processes for hybrid line-of-sight (LOS) / non-line of sight (NLOS) detection are described herein. To facilitate co-existence and co-operation of a fixed network and a wireless network sharing a same frequency band without interference, a device in the wireless network can be configured to perform automatic frequency coordination (AFC). The device can accurately determine a geolocation of the device by utilizing global navigation satellite system (GNSS) data and light detection and ranging (LiDAR) data. The device can also determine whether the fixed station is in the LOS by utilizing the GNSS data and the LiDAR data. The device can further correct the geolocation and improve an accuracy of the LOS / NLOS detection by using both: the GNSS data and the LiDAR data simultaneously. The device can further control an output power when the fixed station is in the LOS, thereby avoiding the interference.

IPC Classes  ?

93.

TRANSMISSION OF PULSE POWER AND DATA IN A COMMUNICATIONS NETWORK

      
Application Number 18961781
Status Pending
Filing Date 2024-11-27
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Jones, Chad M.
  • Goergen, Joel Richard
  • Zimmerman, George Allan
  • O'Brien, Richard Anthony
  • Arduini, Douglas Paul
  • Potterf, Jason Dewayne
  • Baek, Sung Kee

Abstract

In one embodiment, a method includes transmitting pulse power on two wire pairs, the pulse power comprising a plurality of high voltage pulses with the high voltage pulses on the wire pairs offset between the wire pairs to provide continuous power, performing low voltage fault detection on each of the wire pairs between the high voltage pulses, and transmitting data on at least one of the wire pairs during transmittal of the high voltage pulses. Data transmittal is suspended during the low voltage fault detection.

IPC Classes  ?

  • H04L 12/10 - Current supply arrangements
  • H03M 13/03 - Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
  • H03M 13/15 - Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes
  • H03M 13/37 - Decoding methods or techniques, not specific to the particular type of coding provided for in groups
  • H04B 3/54 - Systems for transmission via power distribution lines
  • H04L 41/12 - Discovery or management of network topologies
  • H04W 80/02 - Data link layer protocols

94.

QUERY BASED DYNAMIC PARTITION ALLOCATION

      
Application Number 18942065
Status Pending
Filing Date 2024-11-08
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Pal, Sourav
  • Bhattacharjee, Arindam
  • Ramasayam, Kishore Reddy
  • James, Alexander Douglas

Abstract

Systems and methods are disclosed for processing and executing queries against one or more dataset sources, where the queries identify a set of data to be processed and a manner of processing the set of data. To query the dataset sources, a query coordinator generates a query processing scheme that includes a dynamic allocation of multiple layers of partitions. The query is then executed based on the query processing scheme.

IPC Classes  ?

  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles
  • G06F 16/2453 - Query optimisation
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06F 16/31 - IndexingData structures thereforStorage structures

95.

SECURING DATA COMMUNICATIONS WITH GENERATIVE PROTOCOLS

      
Application Number 18368743
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Obstfeld, Joel Abraham
  • Dan, Ronnie I.
  • Samuel, Louis Gwyn

Abstract

In one implementation, a device receives a request to generate a new communication protocol. The device generates, based on the request, the new communication protocol using a generative model. The device configures software to use the new communication protocol. The device causes an endpoint in a network to communicate using the new communication protocol via the software.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 69/08 - Protocols for interworkingProtocol conversion

96.

EFFICIENT SCALING OF PARTITIONED NEURAL NETWORK INFERENCE

      
Application Number 18368801
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Lee, Myungjin
  • Srinivasa, Jayanth
  • Payani, Ali
  • Kompella, Ramana Rao V.R.

Abstract

In one implementation, a controller determines performance of a partitioned neural network. The controller identifies, based on the performance, a particular partition of the partitioned neural network as a bottleneck. The controller configures a first device to execute a replica of the particular partition. The controller configures a multiplexer that provides an output of the particular partition or the replica of the particular partition as input to a downstream partition of the partitioned neural network.

IPC Classes  ?

  • G06N 3/098 - Distributed learning, e.g. federated learning

97.

DETECTING DATA EXFILTRATION VIA API CALLS USING LANGUAGE MODEL EMBEDDINGS

      
Application Number 18368873
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Fleming, Charles
  • Srinivasa, Jayanth
  • Kompella, Ramana Rao V.R.

Abstract

In one implementation, a device intercepts return data for an application programming interface call to be sent to a requester via a network. The device converts the return data into an embedding. The device determines a similarity between the embedding and one or more embeddings in a database that were generated from one or more documents deemed sensitive. The device blocks, based on the similarity, the return data from being sent via the network to the requester.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/54 - Interprogram communication
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

98.

VIRTUALIZING SECURE VAULT OF DATA PROCESSING UNIT FOR SECURE HARDWARE SECURITY MODULE FOR HOSTS

      
Application Number 18369070
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Kar, Chakradhar
  • Goli, Sri

Abstract

A system and method of securing and virtualizing firmware trusted platform modules (TPMs) for virtualizing a hardware security module (HSM) for a host within a network fabric is provided. The system and method include operably coupling a set of components associated with a host comprising a data processing unit (DPU) secure vault and a firmware trusted platform module (TPM). The firmware TPM is configured as a virtual firmware TPM. The DPU secure vault secures the virtual firmware TPM into one or more virtual firmware TPMs based on one or more partitions configured with the DPU secure vault. A virtual TPM manager communicatively coupled to the DPU secure vault manages one or more virtual TPMs for hosting a set of Virtual Machines (VMs) or Containers.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

99.

TRAFFIC PROTECTION WITH PREDETERMINED REROUTE AND ADAPTIVE FAILURE DETECTION FOR USE OF APPLICATIONS HOSTED ON VIRTUAL PRIVATE CLOUDS

      
Application Number 18369076
Status Pending
Filing Date 2023-09-15
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Nainar, Nagendra Kumar
  • Rajamanickam, Jaganbabu
  • Sankaranarayanan, Madhan
  • Pignataro, Carlos M.
  • Sheriff, Akram

Abstract

Techniques are described for quickly rerouting traffic to an application hosted on a first Virtual Private Cloud (VPC) location. In the event of an error in routing traffic to the first VPC portion traffic can be rerouted to a second VPC portion. The first and second VPC portions can be different portions of the same VPC or could be different VPSs. The techniques include steps for calculating a predetermined route to the second private virtual cloud location. The techniques further include steps for monitoring data for detecting an error in the first cloud location. The steps further include detecting a potential error based on the monitored data, and also verifying that the potential error is in fact a valid error. In response to verifying that the error is a valid error, further steps include performing a fast reroute of traffic to the second cloud locations along the predetermined route.

IPC Classes  ?

  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 43/0823 - Errors, e.g. transmission errors

100.

INGEST PREVIEW IN A NETWORK COMPUTING ENVIRONMENT

      
Application Number 18967614
Status Pending
Filing Date 2024-12-03
First Publication Date 2025-03-20
Owner Cisco Technology, Inc. (USA)
Inventor
  • Bath, Amritpal Singh
  • Jain, Samat
  • Park, Isabelle
  • Patel, Vishal
  • Puchbauer, Siegfried
  • Xu, Tingjin

Abstract

A computing device receives an ingest preview request to preview events to be stored by at least one indexer. Responsive to the ingest preview request, the computing device sends a subscription request to the forwarders. The forwarders receive the subscription request and intercept the events that are being sent to at least one of the indexers. The forwarders then clone matching events to the subscription request and responds to the computing device with the matching events. When the computing device receives the matching events, the computing device adds the matching events to a dispatch directory. The user interface is then populated with events in the dispatch directory.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  1     2     3     ...     100        Next Page