-
公开(公告)号:US20220022124A1
公开(公告)日:2022-01-20
申请号:US16928471
申请日:2020-07-14
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Sangram Kishore Lakkaraju , Mark Grayson , Oliver James Bull , Louis Gwyn Samuel
Abstract: Techniques are provided for downlink packet replication to support handovers. In one example, downlink packet replication occurs on a fabric node in an S1AP handover scenario. In another example, downlink packet replication occurs on a source Access Point (AP) using a target AP as a secondary AP in an S1AP handover scenario. In yet another example, downlink packet replication occurs on a source AP using packet encapsulation in an S1AP handover scenario. In still another example, downlink packet replication occurs on a source AP in an X2 handover scenario. Similar techniques are provided for any suitable telecommunications/cellular technology.
-
公开(公告)号:US20210274426A1
公开(公告)日:2021-09-02
申请号:US17022744
申请日:2020-09-16
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Jerome Henry , Bart A. Brinckman , Matthew Stephen MacPherson
Abstract: Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.
-
公开(公告)号:US20210274048A1
公开(公告)日:2021-09-02
申请号:US17023722
申请日:2020-09-17
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Jerome Henry
Abstract: Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.
-
公开(公告)号:US11038881B2
公开(公告)日:2021-06-15
申请号:US16178239
申请日:2018-11-01
Applicant: Cisco Technology, Inc.
Inventor: Bart Brinckman , Jerome Henry , Malcolm Muir Smith , Mark Grayson , David Delano Ward
Abstract: Various embodiments disclosed herein include apparatuses, systems, devices, and methods for anonymously generating an encrypted session for a client device in a wireless network. The method comprises, in response to providing, to the client device in the wireless network, a request for credentials associated with the client device, obtaining, from the client device, a response including proposed credentials associated with the client device. The method further comprises determining whether or not the format of the response matches a response template. The method further comprises, in response to determining that the format of the response matches the response template, generating an encrypted wireless session for the client device independent of the proposed credentials associated with the client device.
-
公开(公告)号:US11006266B2
公开(公告)日:2021-05-11
申请号:US16291727
申请日:2019-03-04
Applicant: Cisco Technology, Inc.
Inventor: Anand Oswal , Sudhir Kumar Jain , Rajesh S. Pazhyannur , Mark Grayson
Abstract: In one example, a server obtains, from a device having an embedded Subscriber Identification Module (eSIM), a unique identifier of the eSIM. The server validates the device based on the unique identifier of the eSIM. The server provides, to the device, a unique credential for a profile of the eSIM. The profile of the eSIM corresponds to a network of an enterprise. The server provides, to a credential database, the unique credential for the profile of the eSIM. The credential database including the unique credential for the profile of the eSIM indicates that the device is permitted to access the network of the enterprise.
-
公开(公告)号:US20210136583A1
公开(公告)日:2021-05-06
申请号:US17088770
申请日:2020-11-04
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Vimal Srivastava , Mark Grayson , Sudhir Kumar Jain , Anand Oswal
Abstract: Techniques are described to provide open access in a neutral host environment. In one example, a method includes obtaining, by a mobility management node of a neutral host network, a network connectivity request from a user equipment, wherein the network connectivity request comprises an indication of a preferred service provider to which the user equipment is to be connected; determining, by the mobility management node, that the preferred service provider provides non-subscription-based network connectivity for the neutral host network; based on determining that the preferred service provider provides non-subscription-based network connectivity for the neutral host network, establishing secure communications for the user equipment, wherein the secure communications are established for the user equipment without authenticating an identity of user equipment; and providing network connectivity between the user equipment and the preferred service provider upon establishing the secure communications.
-
公开(公告)号:US10911475B2
公开(公告)日:2021-02-02
申请号:US16434564
申请日:2019-06-07
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Santosh Ramrao Patil , Gangadharan Byju Pularikkal
Abstract: Various implementations disclosed herein enable identifying anomalies in a network. For example, in various implementations, a method of identifying anomalies in a network is performed by a network node. In various implementations, the network node includes one or more processors, and a non-transitory memory. In various implementations, the method includes generating a characteristic indicator that characterizes a device type based on communications associated with a first device of the device type. In various implementations, the method includes determining, based on communications associated with the first device, a performance indicator that indicates a performance of the first device. In various implementations, the method includes synthesizing an anomaly indicator as a function of the performance indicator in relation to the characteristic indicator.
-
公开(公告)号:US20200288424A1
公开(公告)日:2020-09-10
申请号:US16562912
申请日:2019-09-06
Applicant: Cisco Technology, Inc.
Inventor: Mark Grayson , Rajesh S. Pazhyannur , Srinath Gundavelli , Mickael James Graham
Abstract: A mobility management entity (MME) controls an enterprise fabric. The MME receives from a mobile device via a cellular network a request to initiate an attach procedure. In response, the MME acquires from the mobile device a unique equipment identifier of the mobile device. The MME generates an enterprise identity for the mobile device based on the unique equipment identifier, and registers the enterprise identity in the enterprise fabric. The MME signals to a user plane function of the cellular network that the mobile device has been registered, to trigger the user plane function to acquire an Internet Protocol (IP) address of the mobile device based on the enterprise identity. The MME receives from the user plane function the acquired IP address. The MME sends to the mobile device, through the cellular network, an attach accept message that includes the acquired IP address for use by the mobile device.
-
公开(公告)号:US10462699B2
公开(公告)日:2019-10-29
申请号:US14480284
申请日:2014-09-08
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Mark Grayson , Srinath Gundavelli
Abstract: An example method is provided in one example embodiment and may include receiving an attach trigger for a user equipment (UE) within a trusted access network; configuring a first signaling path for the UE for a first Internet protocol (IP) connection; and configuring a second signaling path for the UE for a second IP connection, wherein the first and second IP connections are associated with different IP version types. The method can include switching traffic for the UE between the first signaling path for the first IP connection and the second signaling path for the second IP connection based on IP version type of the traffic.
-
公开(公告)号:US10440619B2
公开(公告)日:2019-10-08
申请号:US15222465
申请日:2016-07-28
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Mukesh Taneja , Mark Grayson
IPC: H04W4/00 , H04W36/00 , H04W12/06 , H04B17/318 , H04L29/06 , H04W36/14 , H04W88/06 , H04W84/12 , H04W84/04
Abstract: In one example embodiment, an apparatus is provided that includes an antenna that receives, in a first wireless network, a first identifier of a second wireless network access point. The apparatus also includes a processor that processes data received by the antenna. The apparatus transmits, in the first wireless network, the first identifier of the second wireless network access point. The apparatus establishes a tunnel to the second wireless network. The antenna transmits a second identifier of the second wireless network access point.
-
-
-
-
-
-
-
-
-