-
公开(公告)号:US11818142B2
公开(公告)日:2023-11-14
申请号:US17410286
申请日:2021-08-24
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Luca Muscariello , Alberto Compagno , Giovanna Carofiglio
IPC: H04L9/40 , H04L9/30 , H04L9/32 , H04L61/4511 , H04L61/5007 , H04L9/00
CPC classification number: H04L63/126 , H04L9/30 , H04L9/3247 , H04L61/4511 , H04L61/5007 , H04L9/50
Abstract: An electronic device of a content producer generates a chunk of data, associates a location-independent name with the chunk of data, generates a signature for the chunk of data, attaches the signature to the chunk of data, and transmits the chunk of data, with the signature attached, to one or more user devices in response to respective requests. The signature is generated based on the data in the chunk, using a private key of the electronic device. The electronic device also stores information, including a specification of a public key associated with the private key, in a first ledger entry of a blockchain, to provide the one or more user devices with access to the public key. A user device may obtain the public key and use it to verify the chunk of data.
-
22.
公开(公告)号:US11722427B1
公开(公告)日:2023-08-08
申请号:US17686598
申请日:2022-03-04
Applicant: Cisco Technology, Inc.
Inventor: Luca Muscariello , Giovanna Carofiglio , Mauro Sardara , Michele Papalini
IPC: H04L47/283 , H04L47/12 , H04L1/08 , H04L1/00
CPC classification number: H04L47/283 , H04L1/004 , H04L1/08 , H04L47/12
Abstract: In one embodiment, a device that executes an application obtains a delay budget objective for traffic for the application to be sent by a Hybrid Information-Centric Networking source to the device. The device makes a determination as to whether the traffic for the application to be sent by the Hybrid Information-Centric Networking source to the device should use a forward error correction mechanism or a retransmission mechanism, in an attempt to optimize the delay budget objective. The device sends, to the Hybrid Information-Centric Networking source, a Hybrid Information-Centric Networking request for the traffic for the application, wherein the Hybrid Information-Centric Networking request is indicative of the determination. The device receives, from the Hybrid Information-Centric Networking source, one or more packets of the traffic for the application, after sending the Hybrid Information-Centric Networking request.
-
公开(公告)号:US20220360589A1
公开(公告)日:2022-11-10
申请号:US17314950
申请日:2021-05-07
Applicant: Cisco Technology, Inc.
Inventor: Luca Muscariello , Giulio Grassi , Jacques Samain , Olivier Roques
Abstract: This disclosure describes techniques for controlling group access to a collaboration technology. The techniques include generating a shared encryption key among authorized producers of content associated with a collaboration technology. The techniques include receiving, by the authorized producers and from authenticated consumers, requests to access the content. The requests may be received in a partitioned manner, such that individual producers are serving a particular subset of the authenticated consumers. In response to receiving the requests, the techniques include sending the shared encryption key from the individual producers to the corresponding subset of authenticated consumers. The techniques include using the shared encryption key to encrypt content by the authorized producers, which may then be decrypted by the authenticated consumers using the shared encryption key, achieving end-to-end encryption of event content.
-
公开(公告)号:US11095751B2
公开(公告)日:2021-08-17
申请号:US16044722
申请日:2018-07-25
Applicant: Cisco Technology, Inc.
Inventor: Luca Muscariello , Giovanna Carofiglio , Michele Papalini , Mauro Sardara
Abstract: A network device in a network edge receives content directed to a mobile device attached to the network edge from an upstream network device and forwards the content toward the mobile device. The network device makes a decision whether to cache the content based at least in part on a popularity of the content in a region covered by the network device and a prediction error for an estimated probability that the mobile device will transition from the region to another region. The popularity is directly correlated with a first bias toward caching the content. The prediction error is inversely correlated with a second bias toward caching the content. The decision is implemented: the network device either caches the content or foregoes caching the content, in accordance with the decision.
-
公开(公告)号:US11025589B1
公开(公告)日:2021-06-01
申请号:US16118738
申请日:2018-08-31
Applicant: Cisco Technology, Inc.
Inventor: Luca Muscariello , Warren Scott Wainner , Giovanna Carofiglio , Jordan Augé
IPC: H04L29/12 , H04L12/747 , H04L12/741 , H04L12/733
Abstract: A networked electronic device produces a data object comprising content and assigns a location-independent application-level name to the data object. The location-independent application-level name is independent of any network location at which the content is available. The networked electronic device maps the location-independent application-level name to an IP address, generates a DNS resource record specifying the mapping of the location-independent application-level name to the IP address, and provides the DNS resource record to a DNS network node.
-
公开(公告)号:US20210120038A1
公开(公告)日:2021-04-22
申请号:US16656621
申请日:2019-10-18
Applicant: Cisco Technology, Inc.
Inventor: Alberto Compagno , Luca Muscariello
Abstract: Presented herein is a solution in which a Producer that provides Transport Layer Security (TLS) over a hybrid Information Centric Network (hICN) announces two different hICN prefixes or namespaces. One hICN prefix is for performing a TLS handshake (also called a handshake prefix or handshake namespace) and another hICN prefix (also called a secure prefix or secure namespace) is to publish content in a secure, and confidential manner with a Consumer that correctly performs a TLS handshake. While the handshake prefix is public and shared by multiple Consumers, a secure prefix is uniquely assigned to a Consumer after the TLS handshake successfully terminates. Content published under the secure prefix is encrypted with the encryption key established during the TLS handshake. Names used in the secure namespace are private, meaning only the Consumer and Producer that perform the handshake can infer any information about a content by looking on the name.
-
公开(公告)号:US10911207B1
公开(公告)日:2021-02-02
申请号:US16721717
申请日:2019-12-19
Applicant: Cisco Technology, Inc.
Inventor: Alberto Compagno , Michele Papalini , Luca Muscariello , Giovanna Carofiglio
IPC: G06F15/173 , H04L5/00 , H04L1/18 , H04L1/16 , H04L12/807 , H04L29/06
Abstract: This disclosure describes techniques for employing a reusable acknowledgment in communications among network devices. The techniques include generating a reusable negative acknowledgment (NACK) in response to a request for data that are unavailable. The reusable NACK may be sent as a response for at least some additional requests for unavailable data, rather than generating a new NACK for each request. As such, the reusable NACK may help decrease the computational load for a network device. In some cases, the use of a reusable NACK may help lessen the impacts of denial-of-service type attacks across a network.
-
公开(公告)号:US20190306233A1
公开(公告)日:2019-10-03
申请号:US15943775
申请日:2018-04-03
Applicant: Cisco Technology, Inc.
Inventor: Alberto Compagno , Luca Muscariello , Giovanna Carofiglio , Marcel Paul Enguehard
Abstract: In one embodiment, a device in a network receives an interest request for one or more pieces of content data available in the network. The interest request specifies the one or more pieces of content data via one or more bits sets in a content request bitmap of the interest request, each bit of the content request bitmap being associated with a different piece of content data. The device compares the content request bitmap to a content availability bitmap in a forwarding information base (FIB) of the device that is associated with a particular interface of the device and each bit of the content availability bitmap indicates whether a particular piece of content data is available via the particular interface. The device forwards the interest request via the particular interface, based on the comparison between the content request bitmap and the content availability bitmap in the FIB of the device.
-
公开(公告)号:US20190297063A1
公开(公告)日:2019-09-26
申请号:US15928265
申请日:2018-03-22
Applicant: Cisco Technology, Inc.
Inventor: Fabio De Gaspari , Alberto Compagno , Luca Muscariello , Giovanna Carofiglio
Abstract: A producer communicates over a network with a user application in an infrastructure-as-a-service (IaaS) and an IaaS node. The producer encrypts content with first encryption using a first key and second encryption using a second key, to produce twice encrypted content. The producer encrypts the second key with attribute-based encryption and symmetric encryption using an IaaS key, to produce a twice encrypted second key. The producer provides to the user application the twice encrypted content, the twice encrypted second key, and key information configured to remove the first encryption from the twice encrypted content. The producer provides to the IaaS node the IaaS key to enable the IaaS node to remove the symmetric encryption from the twice encrypted second key, such that the user application and the IaaS node are constrained to exchange with each other key-related information and intermediate decryption results in order to recover the content.
-
30.
公开(公告)号:US20180242186A1
公开(公告)日:2018-08-23
申请号:US15658638
申请日:2017-07-25
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Luca Muscariello , Giovanna Carofiglio
IPC: H04W28/02 , H04W72/12 , H04N21/238
CPC classification number: H04W28/0252 , H04L67/2842 , H04L67/327 , H04N21/238 , H04W72/1252 , H04W72/1273 , H04W84/12
Abstract: A method is provided in one example embodiment and may include determining each station of a plurality of stations connected to a WiFi access point that are to receive downlink video transmissions from the WiFi access point, wherein the WiFi access point is connected to an Information-Centric Networking-based (ICN-based) network; associating each station of the plurality of stations to each of a corresponding ICN face of a plurality of ICN faces maintained by the WiFi access point; and managing a downlink transmission buffer for each station of the plurality of stations based, at least in part, a modulation and coding scheme (MCS) associated with downlink video transmissions for each station of the plurality of stations, wherein each downlink transmission buffer is associated with the corresponding ICN face associated with each station.
-
-
-
-
-
-
-
-
-