-
61.
公开(公告)号:US20250089121A1
公开(公告)日:2025-03-13
申请号:US18828930
申请日:2024-09-09
Applicant: Cisco Technology, Inc.
Inventor: Binita Gupta , Brian D. Hart
Abstract: A multi-link procedure to identify link disablement in Basic Service Set (BSS) transition management frames may be provided. First, a Basic Service Set (BSS) Transition Management (BTM) request may be created. The BTM request may indicate a link disablement that will happen in the future. Then the BTM request may be sent.
-
公开(公告)号:US20250088952A1
公开(公告)日:2025-03-13
申请号:US18463057
申请日:2023-09-07
Applicant: Cisco Technology, Inc.
Inventor: Vimal Srivastava , Sri Gundavelli , Ravi Kiran Guntupalli
Abstract: Systems and methods are provide to bring network capability awareness to steering of roaming (SoR). A home network includes a capabilities list of visited networks and their associated with the network capabilities. For SoR, he user equipment (UE) maintains a roaming partners list (RPL). The RPL provides a list of visited networks arranged in order of priority/preference (e.g., the first visited network in the RPL has first priority). The first visited network receives a registration request from the UE and relays a corresponding authentication request to the home network. The visited network in the RPL can be reordered when the UE requires a network capability not supported by the first visited network in the RPL, as indicated by the capabilities list. Depending on the implementation, the UE or the home network can make this decision to reorder the RPL.
-
公开(公告)号:US20250088448A1
公开(公告)日:2025-03-13
申请号:US18244597
申请日:2023-09-11
Applicant: Cisco Technology, Inc.
Inventor: Raghu Rajendra Arur , Indermeet Singh GANDHI
IPC: H04L43/50 , H04L43/065 , H04L43/0852
Abstract: In one implementation, a device determines a plurality of routes from one or more sources in a localized network domain to external addresses via a plurality of border leaf nodes of the localized network domain. The device selects, based on a specific performance test from a particular source of the one or more sources to a particular endpoint with a corresponding external address, a particular border leaf node of the plurality of border leaf nodes that is along a utilized route from the particular source to the particular endpoint based on the corresponding external address and the plurality of routes. The device causes the specific performance test to be executed from a particular testing agent installed on the particular border leaf node to the particular endpoint.
-
公开(公告)号:US20250088382A1
公开(公告)日:2025-03-13
申请号:US18955311
申请日:2024-11-21
Applicant: Cisco Technology, Inc.
IPC: H04L12/18 , H04L12/44 , H04L45/122
Abstract: According to certain embodiments, a method by a router in a software-defined wide- area network (SDWAN) includes determining one or more replicators in the SDWAN and generating a multicast distribution tree that includes the determined one or more replicators. The method further includes receiving multicast traffic from a source and creating a (S,G) route for the received multicast traffic. The method further includes replicating the multicast traffic using the multicast distribution tree.
-
65.
公开(公告)号:US20250088294A1
公开(公告)日:2025-03-13
申请号:US18466612
申请日:2023-09-13
Applicant: Cisco Technology, Inc.
Inventor: Sachin D. WAKUDKAR , Evgeny YANKEVICH , Ardalan ALIZADEH , Peiman AMINI , Arya FALLAHI
IPC: H04B17/345 , H04B17/309
Abstract: Systems and techniques for mitigating interference to incumbent users in a wireless network are described. An example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. A source of the interference is determined using key performance indicator(s), in response to the indication. A set of actions is determined and performed to mitigate the interference. Another example technique includes receiving an indication of interference on a channel that an incumbent user within a wireless network is operating on. Interference information is obtained from a controller associated with the wireless network and includes KPI(s) associated with a set of access points (APs) operating on the channel. A source of the interference is determined based on the interference information. A set of actions to mitigate the interference are determined and performed on one or more of the set of APs.
-
公开(公告)号:US20250087215A1
公开(公告)日:2025-03-13
申请号:US18960064
申请日:2024-11-26
Applicant: Cisco Technology, Inc.
Inventor: Ali Mouline , Christopher Rowen , David Guoqing Zhang , Francis Anthony Kurupacheril
IPC: G10L15/22 , G10L15/08 , G10L15/30 , H04L65/401
Abstract: Presented herein are techniques in which a device detecting a phrase spoken in an online collaboration session between a plurality of users, the phrase being spoken by a first user to one or more second users. The device determines that the phrase indicates an issue with a quality of user experience of the online collaboration session, labels a log of metrics associated with the online collaboration session with a time stamp corresponding to a time when the phrase was spoken; and performs one or more actions to improve the user experience based on detecting the phrase.
-
公开(公告)号:US20250086493A1
公开(公告)日:2025-03-13
申请号:US18243259
申请日:2023-09-07
Applicant: Cisco Technology, Inc.
Inventor: Yuguang Yao , Yuzhang SHANG , Gaowen LIU , Ramana Rao V. R. KOMPELLA , Charles FLEMING
IPC: G06N20/00
Abstract: In one implementation, a device receives, via a user interface, one or more constraint parameters for each of a plurality of machine learning models that perform different analytics tasks. The device computes, based on the one or more constraint parameters, a set of weights for the plurality of machine learning models. The device generates a unified model by performing knowledge distillation on the plurality of machine learning models using the set of weights. The device deploys the unified model for execution by a particular node in a network.
-
公开(公告)号:US20250085442A1
公开(公告)日:2025-03-13
申请号:US18466716
申请日:2023-09-13
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Peiman Amini , Ardalan Alizadeh , Niloo Bahadori
Abstract: Devices, systems, methods, and processes for accurately determining a location of a device are described herein. The device may receive Global Navigation Satellite System (GNSS) data from two satellites in two time periods. The device can determine two pseudo range differences corresponding to the two satellites. The device may further determine two contours based on the two pseudo range differences. An overlap between the two contours may be utilized by the device to determine the location. The device can also determine the location of the device based on a contour and an estimated location. The device may utilize a Global Positioning System (GPS) database, an Access Points (AP) database, or one or more servers to retrieve the estimated location. The device can further configure an operating frequency and an output power based on the location in real-time.
-
公开(公告)号:US20250080577A1
公开(公告)日:2025-03-06
申请号:US18475896
申请日:2023-09-27
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Omid Mirzaei
IPC: H04L9/40
Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.
-
公开(公告)号:US20250080564A1
公开(公告)日:2025-03-06
申请号:US18460786
申请日:2023-09-05
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Bhavik Pradeep Shah , Indermeet Singh Gandhi , Jerome Henry
IPC: H04L9/40
Abstract: Provided herein are techniques to facilitate vulnerability management for one or more endpoint devices of a network based on network infrastructure security context. In one example, a computer-implemented method may include determining a base vulnerability score for a particular vulnerability that is detected for an endpoint device of an enterprise network; determining topology information for the endpoint device within the enterprise network; translating the particular vulnerability to triggering information; performing a comparison between the security policies for the one or more network security mechanisms of network security infrastructure and the triggering information to determine whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device; and generating an updated vulnerability score for the particular vulnerability by adjusting the base vulnerability score based on whether the endpoint device is protected from the particular vulnerability being triggered for the endpoint device.
-
-
-
-
-
-
-
-
-