-
公开(公告)号:US11533241B2
公开(公告)日:2022-12-20
申请号:US17704449
申请日:2022-03-25
Applicant: Cisco Technology, Inc.
Inventor: Qihong Shao , David John Zacks , Xinjun Zhang
IPC: G06F15/173 , H04L41/14 , H04L41/12 , H04L41/147 , H04L41/5067 , H04L43/045 , H04L43/06 , H04L43/0817 , H04L43/55
Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
-
公开(公告)号:US11122443B2
公开(公告)日:2021-09-14
申请号:US16575688
申请日:2019-09-19
Applicant: Cisco Technology, Inc.
Inventor: Vishal Satyendra Desai , David John Zacks
IPC: H04W16/20 , H04B17/318 , H04B17/364 , H04L12/24 , H04L12/26 , H04W8/00 , H04W48/16 , H04W48/20 , H04W80/02
Abstract: Wireless access point locations can be determined by processing a combination of wired and wireless telemetry. Wireless telemetry can be combined with backend network management information to isolate a set of access points within a radio frequency neighborhood cluster. Wired telemetry, including time domain reflectometer operations performed by a local switch, can be used to refine location estimates of the isolated set of access points. Trilateration can be used to pinpoint the access point locations and the pinpointed locations can be overlaid on a floor plan map.
-
公开(公告)号:US20210092616A1
公开(公告)日:2021-03-25
申请号:US16575688
申请日:2019-09-19
Applicant: Cisco Technology, Inc.
Inventor: Vishal Satyendra Desai , David John Zacks
IPC: H04W16/20 , H04W8/00 , H04W80/02 , H04L12/24 , H04L12/26 , H04B17/318 , H04B17/364 , H04W48/16 , H04W48/20
Abstract: Wireless access point locations can be determined by processing a combination of wired and wireless telemetry. Wireless telemetry can be combined with backend network management information to isolate a set of access points within a radio frequency neighborhood cluster. Wired telemetry, including time domain reflectometer operations performed by a local switch, can be used to refine location estimates of the isolated set of access points. Trilateration can be used to pinpoint the access point locations and the pinpointed locations can be overlaid on a floor plan map.
-
公开(公告)号:US20200036610A1
公开(公告)日:2020-01-30
申请号:US16043779
申请日:2018-07-24
Applicant: Cisco Technology, Inc.
Inventor: Atri Indiresan , Linda Tin-Wen Cheng , Melvin Tsai , Peter Geoffrey Jones , Da-Yuan Tung , David John Zacks
IPC: H04L12/26 , H04L12/741 , H04L29/06
Abstract: Presented herein is an exemplified system and method that provides visibility, for traffic analytics, into secured encapsulated packet (e.g., secure VXLAN-GPE packet, a secure metadata-GPE packet or other GPE standards). The exemplified system and method facilitate encryption of traffic in a granular manner that also facilitate the monitoring of said secure traffic in a fabric network in an end-to-end manner throughout the network. Such monitoring can be beneficially used for analytics, performance analysis, and network debugging/troubleshooting.
-
公开(公告)号:US12299097B2
公开(公告)日:2025-05-13
申请号:US17390610
申请日:2021-07-30
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr. , David John Zacks , Thomas Szigeti
Abstract: According to one or more embodiments of the disclosure, the techniques herein are directed toward a dynamic transaction-aware web application authentication using call intercepts. In one embodiment, a method comprises: intercepting, by a monitoring process, calls made for transactions within an executing application; determining, by the monitoring process, whether a particular intercepted call triggers an enhanced user authentication requirement for a particular transaction; initiating, by the monitoring process in response to the particular intercepted call triggering the enhanced user authentication requirement, a corresponding challenge to adequately authenticate a user for the particular transaction; and allowing, by the monitoring process, the particular intercepted call to proceed for the particular transaction in response to an adequately authenticated user for the particular transaction.
-
公开(公告)号:US20240427899A1
公开(公告)日:2024-12-26
申请号:US18213983
申请日:2023-06-26
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, JR. , David John Zacks , Thomas Szigeti
IPC: G06F21/57
Abstract: In some embodiments, operational characteristics-based container management may include receiving, by a device and from a container agent executing in a container environment, operational characteristics of an application instance executing in the container environment; determining, by the device and based on the operational characteristics, whether the application instance executing in the container environment is associated with a policy violation for application instances; generating, by the device, a notification of the policy violation when the device determines that the application instance is associated with the policy violation; and causing, by the device, the container environment to perform a mitigation action of the policy violation by the application instance.
-
公开(公告)号:US20240406205A1
公开(公告)日:2024-12-05
申请号:US18328530
申请日:2023-06-02
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Ted Hulick
IPC: H04L9/40
Abstract: A method of application program interface (API) endpoint host redirection may include with an intelligent domain name system (DNS) engine (IDE) associated with a containerized service within a pod of a mesh network, snooping a DNS query from the containerized service, identifying within the DNS query, an API endpoint name, snooping a DNS response associated with the DNS query, identifying an Internet protocol (IP) address associated with the API endpoint name, transmitting the API endpoint name and the IP address to a controller, receiving, from the controller, a list of safe API endpoint hosts with no known security vulnerabilities based on security data obtained from at least one security service, caching, at the IDE, the list of safe API endpoint hosts including safe IP addresses, and transmitting to the containerized service, via the IDE, IP addresses of safe API endpoint hosts within the list of safe API endpoint hosts.
-
公开(公告)号:US20240380734A1
公开(公告)日:2024-11-14
申请号:US18780780
申请日:2024-07-23
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Walter T. Hulick, JR. , Rachana Anubhav Soni , Hemamalini Subash
Abstract: A method is provided that is performed using an application performance management agent running on an application and/or application microservices. The method comprises detecting a request to the application and/or application microservices for data, and inserting data compliance metadata into packet headers of packets that are to be sent in response to the request by the application and/or application microservices. The data compliance metadata comprises data-compliance markings associated with the data based on user/operator-defined data compliance requirements. The method further includes causing the packets to be sent into a network so that one or more network devices or services in the network can read the data compliance metadata and apply packet handling policies.
-
79.
公开(公告)号:US20240364748A1
公开(公告)日:2024-10-31
申请号:US18764557
申请日:2024-07-05
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Walter T. Hulick, JR. , Tal Maoz
CPC classification number: H04L63/20 , G06F9/4552 , G06F9/547
Abstract: The present technology includes applying a security policy by an application security system to a transaction within an application that is monitored by the application security system. The present technology includes monitoring transaction occurring between a client device an application over a network. The present technology also includes identifying a first transaction from the transactions as a sensitive transaction. The sensitive transaction is associated with an authentication policy requiring an authentication. The present technology also includes interrupting the application. The present technology also includes prompting the client device for the authentication.
-
公开(公告)号:US20240364687A1
公开(公告)日:2024-10-31
申请号:US18306700
申请日:2023-04-25
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , David John Zacks , Thomas Szigeti , Flemming S. Andreasen
IPC: H04L9/40
CPC classification number: H04L63/0876
Abstract: This disclosure describes techniques for validating a network device based on an operational context of the network device. The techniques may include receiving, via an intercepting node, a DNS query from a querying device. The techniques may include extracting the metadata from the DNS query. Based at least in part on verifying a signature of the metadata, the techniques may include extracting a location code from the metadata. Based at least in part on comparing the location code to an expected location of the intercepting node, the techniques may include sending a response to the querying device indicating a contextual validation of the querying device.
-
-
-
-
-
-
-
-
-