-
公开(公告)号:US12224874B2
公开(公告)日:2025-02-11
申请号:US18467946
申请日:2023-09-15
Applicant: Cisco Technology, Inc.
Inventor: Zhaoyi Jin , Hongling Cen , Bhargavkumar Ghanshyamlal Pandya , Yasi Xi , Sebastian Jeuk , Maria Soledad Palmero , Gonzalo Salgueiro
IPC: G06F3/048 , G06F3/04815 , G06F3/0482 , H04L12/18
Abstract: Methods are provided in which a collaboration server connects at least two participants via respective user devices to a collaboration session. The collaboration server further distributes, to the respective user devices, media stream data and one or more customized graphical items that are distinguishably displayed in the collaboration session. The one or more customized graphical items are displayed in a foreground or a background associated with a collaboration space of first participant of the at least two participants. The collaboration server further detects a selection, by one of the respective user devices, of a graphical item from the one or more customized graphical items displayed in the collaboration space and performs at least one action associated with the graphical item during the collaboration session based on detecting the selection of the graphical item.
-
公开(公告)号:US12223463B2
公开(公告)日:2025-02-11
申请号:US17524909
申请日:2021-11-12
Applicant: Cisco Technology, Inc.
Inventor: Marcelo Yannuzzi , Joel Abraham Obstfeld
IPC: G06Q10/0833 , G06F21/60
Abstract: In one embodiment, a control tower device obtains, first state information from sensing or reporting systems or devices at a particular location via a first communication channel. The control tower device makes, based on the first state information, an evaluation regarding the particular location using one or more digital twins representing one or more entities of the particular location. The control tower device obtains second state information from one or more trusted verifiers for the particular location via a second communication channel. The control tower device verifies, based on the second state information, the evaluation regarding the particular location.
-
63.
公开(公告)号:US12222830B2
公开(公告)日:2025-02-11
申请号:US18539996
申请日:2023-12-14
Applicant: Cisco Technology, Inc.
Inventor: Amit Chandra , Nivin Lawrence , Etienne Martineau
IPC: G06F11/22 , G06F9/30 , G06F9/38 , G06F9/4401 , G06F9/48
Abstract: According to certain embodiments, a system includes one or more processors and one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including executing a software process of a secondary instance, the secondary instance running in parallel with a primary instance and associated with a plurality of cores including a bootstrap core, registering a non-maskable interrupt for the bootstrap core in the secondary instance, determining whether the secondary instance is in a fault state, wherein, if the secondary instance is in the fault state, halting the plurality of cores associated with the secondary instance, without impact to the primary instance, and recovering the bootstrap core by switching a context of the bootstrap core from the secondary instance to the primary instance via the non-maskable interrupt.
-
公开(公告)号:US20250048177A1
公开(公告)日:2025-02-06
申请号:US18365451
申请日:2023-08-04
Applicant: Cisco Technology, Inc.
Inventor: Qiang Yang , Kathy Xia Ke , Yuping Wang , Jing Wang , Bin Yu
Abstract: In one embodiment, a method for achieving zero packet loss in wireless roaming is implemented by a processor of a wireless client device in a system. The wireless client device establishes a first data plane in association with a first radio connected to a first access point and a second data plane in association with a second radio. The first data plane is different from and operates concurrently with the second data plane. The wireless client device determines a second access point by scanning a plurality of operating channels using the second radio. The wireless client device synchronizes the second data plane with a network controller to connect the second radio with the second data plane to the second access point. The wireless client device switches traffic of the first data plane connected to the first access point to the second data plane connected to the second access point.
-
公开(公告)号:US20250048074A1
公开(公告)日:2025-02-06
申请号:US18363069
申请日:2023-08-01
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Timothy Peter Stammers , Vimal Srivastava
Abstract: A Radio Access Network (RAN) node configures a User Equipment (UE) to provide measurement results for private wireless networks in the neighborhood of the UE. The RAN node registers the UE with a computer network and provides location information about the UE to an Application Function (AF) connected to the computer network. The RAN node obtains a partial identifier that specifies a range of private wireless networks selected by the AF, and sends a request to the UE for measurements associated with the range of private wireless networks.
-
公开(公告)号:US20250047740A1
公开(公告)日:2025-02-06
申请号:US18794211
申请日:2024-08-05
Applicant: Cisco Technology, Inc.
Inventor: Jordan Augé , Mauro Sardara , Michele Papalini
IPC: H04L67/1021 , H04L67/1008
Abstract: The present disclosure describes systems and methods for associating a client device with an edge server. The method includes receiving by each of a plurality of cloud servers a signal from a client device requesting a resource provided by the plurality of cloud servers. Each of the cloud servers then calculates a distance between each cloud server and the client device, and an approximate location of the client device may be determined based on the calculated distance and the known location of the cloud servers. Using the approximate location of the client device, at least one of a plurality of edge servers that are located within a predetermined distance of the client device is identified by the cloud server, and the cloud server or client device may choose one of the identified edge servers through which the client device may be associated to communicate with the cloud server.
-
公开(公告)号:US20250047682A1
公开(公告)日:2025-02-06
申请号:US18364600
申请日:2023-08-03
Applicant: Cisco Technology, Inc.
Inventor: Navdeep Sood , Praveen Kumar
Abstract: In one embodiment, a method may access a plurality of Industrial Internet of Things (IIoT) devices within a network. The method may determine a shared risk model associated with the plurality of IIoT devices within the network. The method may determine, using the shared risk model, a shared risk value for each of the plurality of IIoT devices within the network. The method may determine, using the shared risk model, a plurality of associated clusters of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network. The method may determine an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network.
-
公开(公告)号:US20250047620A1
公开(公告)日:2025-02-06
申请号:US18365640
申请日:2023-08-04
Applicant: Cisco Technology, Inc.
Inventor: Madheswaran Dhanabalan , Deepak Behera
IPC: H04L49/253 , H04L49/1515
Abstract: A method includes identifying a switching path for source ports and destination ports of a crosspoint based switch including a two-tiered spine-and-leaf architecture. The method includes determining whether a switching path for a connection between a source port and a destination port is available, and identifying whether the source port and the destination port are associated with a same leaf. In response to determining that the switching path is available, the method includes executing a connection between the source port and the destination port utilizing a switching path on the same leaf. In response to determining that the switching path is unavailable, the method includes identifying whether free connections are available between a source leaf and a spine and a destination leaf and the spine. When the free connections are unavailable, the switching path for the connection between the source port and the destination port is executable by rewiring.
-
公开(公告)号:US20250045769A1
公开(公告)日:2025-02-06
申请号:US18362102
申请日:2023-07-31
Applicant: Cisco Technology, Inc.
IPC: G06Q30/018
Abstract: A method comprises: storing vendor device information that maps vendor devices to replacement devices and replacement energies; storing energy provider information that maps unit energy costs to geolocations; obtaining, from a deployed number of units of a device, telemetry records that indicate an energy consumed by, and a geolocation of, the deployed number of units, and information defining an operational configuration of the device; identifying, in the vendor device information, a replacement device and a replacement energy consumed by the replacement device; computing sustainability gains using a replacement number of units of the replacement device in place of the deployed number of units of the device based on the energy consumed, the replacement energy consumed, and the geolocation; determining a change to the operational configuration, and commanding the device to implement the change; and reporting the sustainability gains and the change to the operational configuration.
-
70.
公开(公告)号:US20250045422A1
公开(公告)日:2025-02-06
申请号:US18365358
申请日:2023-08-04
Applicant: Cisco Technology, Inc.
Inventor: Ashish Kundu , Ramana Rao V R Kompella
Abstract: A method to identify and remediate unsafe cipher suite deployments. The method includes identifying a target to be analyzed, determining a collection of cipher suites used by the target, generating and displaying a cipher suite dependency graph for the target based on the collection of cipher suites, and classifying the target as being one of post-quantum computing safe and post-quantum computing unsafe based on the cipher suite dependency graph and based on a predetermined rule for each cipher suite in the collection of cipher suites. A cipher suite hosted by a target can be remediated to convert the target to a post-quantum computing safe state.
-
-
-
-
-
-
-
-
-