-
公开(公告)号:US20230085382A1
公开(公告)日:2023-03-16
申请号:US17476864
申请日:2021-09-16
Applicant: Cisco Technology, Inc.
Inventor: Vinay Saini , Robert E. Barton , Jerome Henry
IPC: H04L29/06
Abstract: Techniques are provided for controlling access entitlement for networking device data. In one example, a geographic location of a networking device is determined. A request to access data associated with the networking device is obtained from a user device. A user parameter of a user associated with the user device is determined. An access policy that controls access to the data based on the geographic location of the networking device and the user parameter is identified. The request to access the data is permitted or denied based on the geographic location of the networking device, the user parameter, and the access policy.
-
公开(公告)号:US20220255934A1
公开(公告)日:2022-08-11
申请号:US17168276
申请日:2021-02-05
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Vinay Saini , Robert Edgar Barton
Abstract: Disclosed are methods, systems, and non-transitory computer-readable media for using a sponsor as a proxy for multi-factor authentication of a first user account for a first user when a primary multi-factor authentication mechanism is unavailable to the first user account, comprising registering the sponsor in a multi-factor authentication chain of trust associated with the first user account; requesting verification of an identity of the first user from the sponsor; receiving, from the sponsor, a verification of the identity of the first user; and granting access to a service to the first user account.
-
73.
公开(公告)号:US20220078209A1
公开(公告)日:2022-03-10
申请号:US17014875
申请日:2020-09-08
Applicant: Cisco Technology, Inc.
Inventor: Rajesh I V , Rammohan Ravindranath , Prashanth Patil , Vinay Saini
Abstract: A trusted application manager (TAM) includes a processor, and a non-transitory computer-readable media storing instructions that, when executed by the processor, causes the processor to perform operations comprising obtaining, from a secure access service edge (SASE) device executing a security service, a data set defining intelligence provided by the security service, defining a policy based at least in part on the intelligence provided by the security service, and managing a trusted application (TA) based on the policy.
-
公开(公告)号:US11019565B2
公开(公告)日:2021-05-25
申请号:US16548727
申请日:2019-08-22
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Shankar Ramanathan , Vinay Saini , Robert Edgar Barton
Abstract: The disclosed technology relates to a process for managing power consumption of Wi-Fi access points. The solution is composed of three parts. A first part creates power profiles for each of the switches having access points within a computer network that detail how power consumption for an access point can be modified based on changing one or more elements associated with the access point. The second part creates a time-based radio constraint profile that details power requirements for an access point based on client devices connected to the access point within a pre-defined area to ensure that each client device can connect and stay connected with the access point. The third part utilizes machine learning to generate a model that identifies optimal settings for the access point in order to achieve a specific level of power consumption for the access point.
-
公开(公告)号:US20210058859A1
公开(公告)日:2021-02-25
申请号:US16548727
申请日:2019-08-22
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Shankar Ramanathan , Vinay Saini , Robert Edgar Barton
Abstract: The disclosed technology relates to a process for managing power consumption of Wi-Fi access points. The solution is composed of three parts. A first part creates power profiles for each of the switches having access points within a computer network that detail how power consumption for an access point can be modified based on changing one or more elements associated with the access point. The second part creates a time-based radio constraint profile that details power requirements for an access point based on client devices connected to the access point within a pre-defined area to ensure that each client device can connect and stay connected with the access point. The third part utilizes machine learning to generate a model that identifies optimal settings for the access point in order to achieve a specific level of power consumption for the access point.
-
公开(公告)号:US20210045091A1
公开(公告)日:2021-02-11
申请号:US16536555
申请日:2019-08-09
Applicant: Cisco Technology, Inc.
Inventor: Ankush Ganpatrai Arora , Rajaneesh Sudhakar Shetty , Ananya Simlai , Vinay Saini
Abstract: A method is provided for use in a network that includes a plurality of user plane functions that perform processing of user plane traffic sessions from one or more mobile wireless user devices. The method includes periodically monitoring resource utilization of the plurality of user plane functions to estimate a resource utilization level of respective user plane functions. Based on the periodically monitoring, the method further includes storing for the respective user plane functions a resource utilization level indicator for each of the respective user plane functions according a resource utilization level of the respective user plane functions. User plane traffic sessions for a given tracking area are re-assigned (moved) among the plurality of user plane functions based on the resource utilization level indicators for the respective user plane functions to achieve a desired quality of experience for the user plane traffic sessions.
-
-
-
-
-