-
公开(公告)号:US20250086493A1
公开(公告)日:2025-03-13
申请号:US18243259
申请日:2023-09-07
Applicant: Cisco Technology, Inc.
Inventor: Yuguang Yao , Yuzhang SHANG , Gaowen LIU , Ramana Rao V. R. KOMPELLA , Charles FLEMING
IPC: G06N20/00
Abstract: In one implementation, a device receives, via a user interface, one or more constraint parameters for each of a plurality of machine learning models that perform different analytics tasks. The device computes, based on the one or more constraint parameters, a set of weights for the plurality of machine learning models. The device generates a unified model by performing knowledge distillation on the plurality of machine learning models using the set of weights. The device deploys the unified model for execution by a particular node in a network.
-
公开(公告)号:US20250085442A1
公开(公告)日:2025-03-13
申请号:US18466716
申请日:2023-09-13
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Peiman Amini , Ardalan Alizadeh , Niloo Bahadori
Abstract: Devices, systems, methods, and processes for accurately determining a location of a device are described herein. The device may receive Global Navigation Satellite System (GNSS) data from two satellites in two time periods. The device can determine two pseudo range differences corresponding to the two satellites. The device may further determine two contours based on the two pseudo range differences. An overlap between the two contours may be utilized by the device to determine the location. The device can also determine the location of the device based on a contour and an estimated location. The device may utilize a Global Positioning System (GPS) database, an Access Points (AP) database, or one or more servers to retrieve the estimated location. The device can further configure an operating frequency and an output power based on the location in real-time.
-
公开(公告)号:US20250080577A1
公开(公告)日:2025-03-06
申请号:US18475896
申请日:2023-09-27
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Omid Mirzaei
IPC: H04L9/40
Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.
-
公开(公告)号:US20250080564A1
公开(公告)日:2025-03-06
申请号:US18460786
申请日:2023-09-05
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Bhavik Pradeep Shah , Indermeet Singh Gandhi , Jerome Henry
IPC: H04L9/40
Abstract: Provided herein are techniques to facilitate vulnerability management for one or more endpoint devices of a network based on network infrastructure security context. In one example, a computer-implemented method may include determining a base vulnerability score for a particular vulnerability that is detected for an endpoint device of an enterprise network; determining topology information for the endpoint device within the enterprise network; translating the particular vulnerability to triggering information; performing a comparison between the security policies for the one or more network security mechanisms of network security infrastructure and the triggering information to determine whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device; and generating an updated vulnerability score for the particular vulnerability by adjusting the base vulnerability score based on whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device.
-
25.
公开(公告)号:US20250080454A1
公开(公告)日:2025-03-06
申请号:US18951757
申请日:2024-11-19
Applicant: Cisco Technology, Inc.
Inventor: Sri Gundavelli , Indermeet Singh Gandhi , Arun G. Khanna
IPC: H04L45/302 , H04W40/12
Abstract: The present disclosure is directed to a comprehensive Route Selection Policy (URSP) based on Wi-Fi multi-link operation. In one aspect, a method includes identifying a user device connected to an enterprise network that provides network connectivity to user devices over multiple radio access technologies; receiving network capability information indicating that the user device is capable of a multi-link operation over a Wi-Fi network, the Wi-Fi network being one of the multiple radio access technologies; determining a URSP for the user device, wherein the URSP is a singular route selection policy for the user device to send and receive data over the multiple radio access technologies and defines, in part, a per-application traffic routing rule for routing a portion of traffic for an application used on the user device, over one of multiple links available on the Wi-Fi network; and transmitting the URSP to the user device.
-
公开(公告)号:US20250080393A1
公开(公告)日:2025-03-06
申请号:US18461267
申请日:2023-09-05
Applicant: Cisco Technology, Inc.
Inventor: Swapna Anandan , Elango Ganesan , Flemming S Andreasen
Abstract: Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
-
公开(公告)号:US20250080216A1
公开(公告)日:2025-03-06
申请号:US18242849
申请日:2023-09-06
Applicant: Cisco Technology, Inc.
Inventor: David A. Maluf , Pradeep K. Kathail , Ashok Krishnaji Moghe
IPC: H04B7/22 , H04L5/00 , H04W72/0453
Abstract: In one embodiment, a gateway device communicates on a first digital computer network. The gateway device also communicates on a near vertical incident skywave area network using digital data encapsulated in analog ionospheric refracted signals. The gateway device further modulates signals between the first digital computer network and the near vertical incident skywave area network based on dynamic channel selection and multi-domain multiplexing.
-
公开(公告)号:US20250077691A1
公开(公告)日:2025-03-06
申请号:US18456613
申请日:2023-08-28
Applicant: Cisco Technology, Inc.
Inventor: Robert Armstrong Hanton
Abstract: A method of controlling the dissemination of sensitive information appearing in an image to be sent via electronic communication. The method includes determining a probability that an image selected to be sent with an electronic message includes sensitive information, and in response to the probability exceeding a predetermined threshold, applying a control measure to the image.
-
29.
公开(公告)号:US20250077337A1
公开(公告)日:2025-03-06
申请号:US18457001
申请日:2023-08-28
Applicant: Cisco Technology, Inc.
Inventor: Donald M. Allen , Dmitry Goloubew
IPC: G06F11/07
Abstract: Methods are provided for determining decay rates and/or shelf-lives of intellectual capital (IC) detected issues for only performing actions for expired or about to expire IC detected issues. Specifically, the methods involve performing one or more data collections that include data relating to one or more of a configuration of a computing system or an operation of the computing system and detecting an issue in the computing system based on the data. The issue relates to an anomaly in one or more of the configuration of the computing system or the operation of the computing system. The methods further involve determining a shelf-life for the issue, where the shelf-life indicates an estimated duration of the issue existing in the computing system before redetecting whether the issue is still present and adjusting a next data collection of the one or more data collections based on the shelf-life of the issue.
-
公开(公告)号:US12244562B2
公开(公告)日:2025-03-04
申请号:US17867464
申请日:2022-07-18
Applicant: Cisco Technology, Inc.
Inventor: Durgamadhav Behera , Abhishek Singh , Muhammad Sachedina
IPC: H04L9/40
Abstract: Techniques for an email-security system to screen emails, extract information from the emails, analyze the information, assign probability scores to the emails, and classify the emails as likely fraudulent or not. The system may analyze emails for users and identify fraudulent emails by analyzing the contents of the emails. The system may evaluate the contents of the emails to determine probability score(s) which may further determine an overall probability score. The system may then classify the email as fraudulent, or not, and may perform actions including blocking the email, allowing the email, flagging the email, etc. In some instances, the screened emails may include legitimate brand domain addresses, names, images, URL(s), and the like. However, the screened emails may contain a reply-to domain address that matches a free email service provider domain. In such instances, the email-security system may assign a probability score indicative that the screened email is fraudulent.
-
-
-
-
-
-
-
-
-