-
公开(公告)号:US20240381066A1
公开(公告)日:2024-11-14
申请号:US18451556
申请日:2023-08-17
Applicant: Cisco Technology, Inc.
Inventor: Robert Barton , Federico Lovison , Indermeet Gandhi , Jerome Henry , Sukrit Dasgupta
IPC: H04W8/02
Abstract: Described herein are devices, systems, methods, and processes for managing roaming actions in a wireless network. The embodiments utilize a machine learning model to generate roaming recommendations based on a plurality of roaming-related metrics. The metrics include data about the current network conditions, the station's previous roaming experiences, and the capabilities of potential roaming target candidates. The roaming recommendations can be provided to a station by an access point (AP). The station can then attempt to perform a roaming action based on the recommendations. After the attempt, the station transmits a roaming feedback to the AP, which includes data about the success or failure of the roaming action and any additional relevant data. In case the station rejects the roaming recommendations, the station may also provide a feedback indicating the rejection. The feedback is utilized to update the machine learning model, thereby improving the accuracy of future roaming recommendations.
-
公开(公告)号:US20240380482A1
公开(公告)日:2024-11-14
申请号:US18497126
申请日:2023-10-30
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert E. Barton , Juan Carlos Zuniga , Indermeet Gandhi
Abstract: Charging for Ambient Power (AMP) devices and, in particular, AMP Backscatter Devices (BKDs) may be provided. AMP device charging may include a transmitting device transmitting an initial charging frame, the initial charging frame comprising a payload for charging. The transmitting device may detect a BKD in response to transmitting the initial charging frame. The transmitting device may then determine a new payload for a new charging frame to charge the BKD and transmit the new charging frame to charge to the BKD.
-
公开(公告)号:US20240073248A1
公开(公告)日:2024-02-29
申请号:US17898162
申请日:2022-08-29
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Jerome Henry , Indermeet Gandhi
IPC: H04L9/40
CPC classification number: H04L63/20
Abstract: A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.
-
公开(公告)号:US11621957B2
公开(公告)日:2023-04-04
申请号:US17218602
申请日:2021-03-31
Applicant: Cisco Technology, Inc.
Inventor: Indermeet Gandhi , Srinath Gundavelli , Pradeep Kumar Kathail
Abstract: This disclosure describes techniques for authentication related to verification of identity for network access. The techniques may include sending a challenge associated with authentication to a network to a mobile device. In response to sending the challenge, the techniques may include receiving a challenge response from the mobile device. The challenge response may include biometric credential information associated with a user of the mobile device. The challenge response may also include an indication of an authorization assertion associated with the authentication to the network. In some examples, the techniques may include tailoring access to the network for the mobile device based on the biometric credential information.
-
公开(公告)号:US20220322198A1
公开(公告)日:2022-10-06
申请号:US17846482
申请日:2022-06-22
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Indermeet Gandhi , Shree Murthy , Malcolm Muir Smith , Jerome Henry
Abstract: This disclosure describes techniques for selecting network protocols using heatmaps. For instance, a system may receive radio frequency information from one or more sources located within an environment. The system may then generate heatmaps using the radio frequency information, where the heatmaps represent characteristics associated with different network protocols. The characteristics may include signal strengths, throughputs, data packet drop rates, data packet retry rates, and/or the like for various locations within the environment. A user device may then receive the heatmaps from the system. Using a location of the user device and the heatmaps, the user device may determine to communicate using a network protocol from the different network protocols. The user device may then establish a connection using the network protocol.
-
公开(公告)号:US20250036482A1
公开(公告)日:2025-01-30
申请号:US18358533
申请日:2023-07-25
Applicant: Cisco Technology, Inc.
Inventor: Robert Barton , Indermeet Gandhi
IPC: G06F9/50
Abstract: Described herein are devices, systems, methods, and processes for energy-efficient routing in a cloud environment. The system includes a load balancer that distributes incoming traffic across multiple application instances hosted within different availability zones (AZs) based on a preference for sustainable energy sources as communicated by a client device. The client device communicates its preference for sustainable energy sources through a sustainability flag included in a service request. The load balancer steers the service request to the suitable resource based on the sustainability flag. In subsequent interactions, the client device can send a service request with a configuration, such as a sticky cookie. The configuration may allow the load balancer to consistently direct requests from the same client device to the same resource. Accordingly, the embodiments enable energy-efficient routing, client preference for sustainable energy, and consistent service, and contribute to environmental protection.
-
公开(公告)号:US12184631B2
公开(公告)日:2024-12-31
申请号:US17875105
申请日:2022-07-27
Applicant: Cisco Technology, Inc.
Inventor: Indermeet Gandhi , Srinath Gundavelli
Abstract: This disclosure describes techniques for performing multi-factor authentication (MFA) by utilizing user generated authenticating gestures. The techniques may include establishing and monitoring peer-to-peer communication links between user devices. The techniques may include monitoring channel properties for fluctuations in the channel properties associated with the user generated authenticating gesture passing through signals of the communication links. The techniques may further include comparing a gesture performed by a user to a predefined authenticating gesture. The techniques may include determining a pattern of fluctuations in the channel properties associated with the predefined authenticating gesture. The techniques may include determining a confidence score associated with comparing the gesture performed and the predefined authenticating gesture. The techniques may further include determining a proximity of the user and/or the gesture to the user device. The techniques may further include granting or denying the user based at least in part on the proximity and/or the comparison.
-
公开(公告)号:US20240388996A1
公开(公告)日:2024-11-21
申请号:US18198635
申请日:2023-05-17
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Indermeet Gandhi
IPC: H04W40/24
Abstract: A network function orchestrator (NFO) of a local area network (LAN) controller can configure multiple different tunnel endpoints in the LAN based on network traffic observed within the LAN. The NFO can monitor network traffic communicated from client devices and through access points in the LAN. The network traffic can be associated with multiple different destinations. The NFO can determine, based on the network traffic and using network topology data, network devices to serve as tunnel endpoints within the LAN. Different tunnel endpoints can be configured for use in connection with different traffic destinations. The NFO can communicate with the network devices and the access points to configure the LAN to use the different tunnel endpoints.
-
公开(公告)号:US20240236182A9
公开(公告)日:2024-07-11
申请号:US18047828
申请日:2022-10-19
Applicant: Cisco Technology, Inc.
Inventor: Indermeet Gandhi , Mark Grayson , Shailender Potharaju
IPC: H04L67/1097 , H04W72/04
CPC classification number: H04L67/1097 , H04W72/04
Abstract: Dynamic Open Radio Access Network Radio Unit (O-RU) sharing between multiple tenant Open RAN Distributed Units (O-DU) may be provided. A Near Real Time RAN Intelligent Controller (nRT-RIC) may receive tenant policies for a first tenant and a second tenant. The nRT-RIC may then determine initial sharing templates for the first tenant and the second tenant based on the tenant policies. The nRT-RIC may send the initial sharing templates to a first tenant Distributed Unit (DU) and a second tenant DU. The nRT-RIC may receive operating metrics from the first tenant DU and the second tenant DU. The nRT-RIC may then determine operational factors based on the operating metrics. The nRT-RIC may alter an allocation of resources between the first tenant and the second tenant based on the operational factors. Finally, the nRT-RIC may send the altered allocation of resources to the first tenant DU and the second tenant DU.
-
公开(公告)号:US12015669B2
公开(公告)日:2024-06-18
申请号:US18047828
申请日:2022-10-19
Applicant: Cisco Technology, Inc.
Inventor: Indermeet Gandhi , Mark Grayson , Shailender Potharaju
IPC: H04L67/1097 , H04W72/04
CPC classification number: H04L67/1097 , H04W72/04
Abstract: Dynamic Open Radio Access Network Radio Unit (O-RU) sharing between multiple tenant Open RAN Distributed Units (O-DU) may be provided. A Near Real Time RAN Intelligent Controller (nRT-RIC) may receive tenant policies for a first tenant and a second tenant. The nRT-RIC may then determine initial sharing templates for the first tenant and the second tenant based on the tenant policies. The nRT-RIC may send the initial sharing templates to a first tenant Distributed Unit (DU) and a second tenant DU. The nRT-RIC may receive operating metrics from the first tenant DU and the second tenant DU. The nRT-RIC may then determine operational factors based on the operating metrics. The nRT-RIC may alter an allocation of resources between the first tenant and the second tenant based on the operational factors. Finally, the nRT-RIC may send the altered allocation of resources to the first tenant DU and the second tenant DU.
-
-
-
-
-
-
-
-
-