-
公开(公告)号:US12199969B2
公开(公告)日:2025-01-14
申请号:US18481765
申请日:2023-10-05
Applicant: Cisco Technology, Inc.
Inventor: David Delano Ward , Robert Stephen Rodgers , Andrew Phillips Thurber , Eric Voit , Thomas John Giuli
IPC: H04L9/40
Abstract: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.
-
公开(公告)号:US12199868B2
公开(公告)日:2025-01-14
申请号:US17804333
申请日:2022-05-27
Applicant: Cisco Technology, Inc.
Inventor: Samir Thoria , Ram Dular Singh , Laxmikantha Reddy Ponnuru
Abstract: According to some embodiments, a method is performed by a software defined wide area network (SD-WAN) edge router in a hierarchical SD-WAN network comprising a plurality of edge routers and a plurality of border routers. The method comprises: originating a SD-WAN system route for advertising reachability to the edge router, the system route comprising an encryption key associated with the edge router; and transmitting the system route to one or more SD-WAN border routers. The method may further comprise: receiving a packet destined for the edge router from one of the one or more SD-WAN border routers, wherein the packet is at least partially encrypted with the encryption key associated with the edge router; and decrypting the received packet.
-
公开(公告)号:US12199859B2
公开(公告)日:2025-01-14
申请号:US18100489
申请日:2023-01-23
Applicant: Cisco Technology, Inc.
Inventor: Ramamoorthi Chellamuthu , Roshinil Paul , Dipak Kumar Neog , Suvidh Mathur
Abstract: Techniques for detecting duplicate data flows. A data packet of a data flow is received by computer hardware the data packet having a first five tuple, an ingress interface and a VLAN tag. Data is sent to a central processing unit. The central processing unit installs policy tiles into a policy tile database of the computer hardware, the policy tiles including the first five tuple, the first ingress interface and the first VLAN tag. A second data packet is received and compared with the policy tiles in the policy tile database. If the second data packet has the same five tuple as the first data packet but has either a different ingress interface or a different VLAN tag, then the second data packet is determined to be a duplicate of the first data flow and is dropped.
-
公开(公告)号:US12197810B2
公开(公告)日:2025-01-14
申请号:US17902005
申请日:2022-09-02
Applicant: Cisco Technology, Inc.
Inventor: Keith Griffin , Samer Lutfi Hijazi
IPC: H04R3/02 , G06F3/16 , G10L19/018 , G10L25/78 , H04R3/00
Abstract: Presented herein are techniques in which a first device connects to a communication session in which a plurality of devices communicates. The plurality of devices includes the first device and a second device. The first device outputs first audio that includes a first audio watermark associated with the communication session and the second device outputs second audio that includes a second audio watermark associated with the communication session. The first device detects the second audio watermark in the second audio outputted by the second device and one or more actions are performed in response to detecting the second audio watermark.
-
165.
公开(公告)号:US12197396B2
公开(公告)日:2025-01-14
申请号:US17899097
申请日:2022-08-30
Applicant: Cisco Technology, Inc.
Inventor: Ralf Rantzau , Madhu S. Kumar , Johnu George , Amit Kumar Saha , Debojyoti Dutta
IPC: G06F16/18 , G06F11/14 , G06F16/23 , G06F16/27 , H04L43/00 , H04L67/10 , H04L67/1097 , G06F9/455 , H04L67/02
Abstract: Systems, methods, and computer-readable media for managing storing of data in a data storage system using a client tag. In some examples, a first portion of a data load as part of a transaction and a client identifier that uniquely identifies a client is received from the client at a data storage system. The transaction can be tagged with a client tag including the client identifier and the first portion of the data load can be stored in storage at the data storage system. A first log entry including the client tag is added to a data storage log in response to storing the first portion of the data load in the storage. The first log entry is then written from the data storage log to a persistent storage log in persistent memory which is used to track progress of storing the data load in the storage.
-
公开(公告)号:US20250016821A1
公开(公告)日:2025-01-09
申请号:US18477233
申请日:2023-09-28
Applicant: Cisco Technology, Inc.
Inventor: Domenico FICARA , Pascal THUBERT , Amine CHOUKIR
IPC: H04W72/566 , H04W28/06
Abstract: Techniques for coordinating traffic and performing preemption in multi-link operations are provided. At least a first portion of a first element of data is transmitted by the first network device via a first link. A second element of data is identified by the first network device. The transmission of the first element of data is interrupted by the first network device to transmit the second element of data via the first link. A remaining portion of the first element of data is transmitted by the first network device via a second link.
-
公开(公告)号:US20250016646A1
公开(公告)日:2025-01-09
申请号:US18347783
申请日:2023-07-06
Applicant: Cisco Technology, Inc.
Inventor: Irfan Ali , Vimal Srivastava , Ravi Shekhar
Abstract: The present technology involves system, methods, and computer-readable media for establishing mobility of user equipment (UEs) or mobile from congested new radio (NR) cells to un-congested Long-Term Evolution (LTE) cells. For operators that deploy both LTE cells and NR cells, the UEs can move from congested NR cells to un-congested LTE cells but can also be handed back into un-congested NR cells.
-
168.
公开(公告)号:US20250016147A1
公开(公告)日:2025-01-09
申请号:US18803058
申请日:2024-08-13
Applicant: Cisco Technology, Inc.
Inventor: Domenico FICARA , Roberto MUCCIFORA , Amine CHOUKIR , Shree N. MURTHY , Bart A. BRINCKMAN , Mirko RACA
IPC: H04L9/40
Abstract: Aspects described herein include a method of automated grouping of client devices for a user-defined network (UDN). The method includes receiving, from a first client device, an authentication request to join an access provider network. The authentication request includes a unique identifier of the first client device. The method also includes transmitting the unique identifier to a UDN cloud and receiving a first list from the UDN cloud. The first list indicates that the UDN is associated with the unique identifier. The method further includes joining the first client device with a second client device present on the access provider network based on a second list from the UDN cloud. The second list indicates that the UDN is associated with the second device.
-
公开(公告)号:US20250016092A1
公开(公告)日:2025-01-09
申请号:US18372443
申请日:2023-09-25
Applicant: Cisco Technology, Inc.
Inventor: Mankamana Prasad Mishra , Lukas Krattiger , Frank Brockners , Nitin Kumar
IPC: H04L45/64 , H04L43/0817 , H04L43/10
Abstract: Techniques for generating and utilizing overlay-based Border Gateway Protocol (BGP) Operations, Administration, and Maintenance (OAM) packets to detect issues with an underlay network. The techniques may include receiving, from a BGP peer device via a control plane path, an OAM probe indicating a forwarding path to be used for sending the traffic to a destination associated with a prefix. The techniques may also include determining, based at least in part on the OAM probe, that a next-hop device is incapable of being utilized to forward the traffic to the destination, the next-hop device determined based on an origination of the prefix. The techniques may further include performing a policy-based action based at least in part on determining that the next-hop device is incapable of being utilized to forward the traffic to the destination.
-
公开(公告)号:US20250016084A1
公开(公告)日:2025-01-09
申请号:US18218785
申请日:2023-07-06
Applicant: Cisco Technology, Inc.
Inventor: Hans Ashlock , Indermeet Singh Gandhi
IPC: H04L43/12
Abstract: In one embodiment, a device identifies a port associated with a backend probing agent for a cloud-hosted application. The device performs external probing of a path to the cloud-hosted application by sending a probe along the path to the port, to generate external probing results. The device triggers the backend probing agent to generate backend probing results by performing backend probing of a backend service used by the cloud-hosted application. The device causes formation of unified probing results that correlate the external probing results and the backend probing results.
-
-
-
-
-
-
-
-
-