-
公开(公告)号:US20200059498A1
公开(公告)日:2020-02-20
申请号:US16665162
申请日:2019-10-28
Applicant: Cisco Technology, Inc.
Inventor: Rama Darbha , Magnus Mortensen , Jay Kemper Johnston , David C. White, Jr.
Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.
-
公开(公告)号:US20190068552A1
公开(公告)日:2019-02-28
申请号:US16173383
申请日:2018-10-29
Applicant: Cisco Technology, Inc.
Inventor: David C White, JR. , Jay K. Johnston , Rama Darbha , Magnus Mortensen , Carlos M. Pignataro
IPC: H04L29/06
CPC classification number: H04L63/0209 , H04L63/0815 , H04L63/102
Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
-
公开(公告)号:US20190026460A1
公开(公告)日:2019-01-24
申请号:US15654169
申请日:2017-07-19
Applicant: Cisco Technology, Inc.
Inventor: Michael J. Robertson , Magnus Mortensen , Jay K. Johnston , David C. White, JR.
Abstract: An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.
-
54.
公开(公告)号:US20180143868A1
公开(公告)日:2018-05-24
申请号:US15358426
申请日:2016-11-22
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , Magnus Mortensen , David C. White, Jr. , Joseph Michael Clarke
IPC: G06F11/07
CPC classification number: G06F11/0769 , G06F11/0721 , H04L41/069 , H04L41/22
Abstract: Disclosed are systems, methods and non-transitory computer-readable mediums for dynamically presenting and updating a directed time graph displayed in a graphical user interface. In some examples, the method can include displaying a suggested path within a graphical user interface on a computer screen, the suggested path can include outstanding issues of elements of a network. The displaying the suggested path can include determining based on one or more factors an efficient ordering of the outstanding issues and ordering the outstanding issues based on the one or more factors. The method can also include monitoring, at regular intervals, updates to the one or more outstanding issues and automatically updating the suggested path, by a processor, based on the updates to the one or more outstanding issues.
-
公开(公告)号:US20170149784A1
公开(公告)日:2017-05-25
申请号:US14950418
申请日:2015-11-24
Applicant: Cisco Technology, Inc.
Inventor: David C. White, Jr. , Jay K. Johnston , Rama Darbha , Magnus Mortensen , Carlos M. Pignataro
IPC: H04L29/06
CPC classification number: H04L63/0209 , H04L63/0815 , H04L63/102
Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
-
公开(公告)号:US12278879B2
公开(公告)日:2025-04-15
申请号:US17975199
申请日:2022-10-27
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, Jr. , Jeffrey Dominick Jackson , Magnus Mortensen , Matthew R. Engle , Ryan Alan MacLennan
IPC: H04L67/60 , G06F9/50 , H04L67/306 , H04L67/75
Abstract: A network management system tests the availability of a network resource before a user performs a task with the network resource. The system measures network activity of a user performing one or more tasks. The network activity includes communication between a user device of the user and each network resource associated with a corresponding task performed by the user. The system also generates a digital model persona of the user based on the tasks performed by the user, and determines a schedule of the tasks performed the user. Each particular task is associated with a corresponding execution time for the user. The system further configures the digital model persona to test the network resource associated with each corresponding task at a testing time that is a predetermined length of time prior to the execution time for the user.
-
公开(公告)号:US20240232906A9
公开(公告)日:2024-07-11
申请号:US18497103
申请日:2023-10-30
Applicant: Cisco Technology, Inc.
Inventor: David C. White, JR. , Jay K. Johnston , Magnus Mortensen , Christopher Shaun Roberts , Kevin D. McCabe
IPC: G06Q30/016 , G06Q10/0639 , H04L51/02
CPC classification number: G06Q30/016 , G06Q10/06395 , H04L51/02 , G06Q10/103
Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.
-
公开(公告)号:US20240195676A1
公开(公告)日:2024-06-13
申请号:US18402963
申请日:2024-01-03
Applicant: Cisco Technology, Inc.
Inventor: Chidambaram Arunachalam , David C. White, JR. , Magnus Mortensen
IPC: H04L41/0631 , H04L65/1046 , H04L65/1104
CPC classification number: H04L41/0631 , H04L65/1046 , H04L65/1104
Abstract: Presented herein are techniques to perform call failure diagnostics. A method includes receiving, at a network device, an indication of calls-of-interest, detecting, at the network device, a failure of one of the calls-of-interest, triggering, in response to the detecting, at the network device, diagnostics data analysis of data associated with the failure of one of the calls-of-interest, determining, based on the diagnostics data analysis, a cause of the failure of the one of the calls-of-interest, and notifying, by the network device, a management system of the cause of the failure of the one of the calls-of-interest and of recent configuration changes on the network device that are related to the cause of the failure of the one of the calls-of-interest.
-
公开(公告)号:US20240144150A1
公开(公告)日:2024-05-02
申请号:US17975192
申请日:2022-10-27
Applicant: Cisco Technology, Inc.
Inventor: Jay Kemper Johnston , David C. White, JR. , Jeffrey Dominick Jackson , Magnus Mortensen , Matthew R. Engle , Ryan Alan MacLennan
IPC: G06Q10/0639 , G06F16/28
CPC classification number: G06Q10/06398 , G06F16/285
Abstract: A management server measures network activity of user devices to determine activities of the users associated with each user device. The management server generates digital model personas corresponding to the users based on one or more activities of the user. The management server clusters the digital model personas to generate user groups based on similar activities, and compares a first digital model persona from a first user with at least one second digital model persona.
-
60.
公开(公告)号:US20240095461A1
公开(公告)日:2024-03-21
申请号:US18522734
申请日:2023-11-29
Applicant: Cisco Technology, Inc.
Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid process software,” can be configured to participate in multi-parry conversations. The humanoid can monitor electronic communications in a conversation involving the humanoid and at least one other party. The humanoid can model the electronic communications by uniquely identifying each of the electronic communications as a stream of data. For example, the data can be labeled and sorted in a database and/or arranged in a nodal graph representation. The humanoid can participate in the conversation based on the modeling.
-
-
-
-
-
-
-
-
-