-
公开(公告)号:US20240427918A1
公开(公告)日:2024-12-26
申请号:US18339035
申请日:2023-06-21
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Cesar Obediente , David John Zacks , Carlos M. Pignataro , Thomas Szigeti , Craig T. Hill
IPC: G06F21/62
Abstract: In one embodiment, a method includes generating a security policy and converting the security policy into a chaos hypothesis. The method also includes initiating execution of the chaos hypothesis across a plurality of microservices within a technology stack. The method further includes receiving metrics associated with the execution of the chaos hypothesis across the plurality of microservices within the technology stack.
-
公开(公告)号:US20240362336A1
公开(公告)日:2024-10-31
申请号:US18307409
申请日:2023-04-26
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Thomas Szigeti , David John Zacks
CPC classification number: G06F21/577 , G06F8/71
Abstract: Techniques are described herein for dynamic service extension to provide risk mitigation upon detecting a threat. In embodiments, such techniques may be performed by a service provider platform and may comprise receiving information about a security threat, identifying one or more components susceptible to the security threat, determining, based on a software bill of materials, at least one data flow that includes a point of delivery (pod) associated with the one or more components, identifying at least one additional service determined to mitigate the security threat, and implementing the at least one additional service in relation to the at least one data flow.
-
公开(公告)号:US12113830B2
公开(公告)日:2024-10-08
申请号:US17216845
申请日:2021-03-30
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John Zacks , Walter T. Hulick, Jr. , Tal Maoz
CPC classification number: H04L63/20 , G06F9/4552 , G06F9/547
Abstract: The present technology includes applying a security policy by an application security system to a transaction within an application that is monitored by the application security system. The present technology includes monitoring transaction occurring between a client device an application over a network. The present technology also includes identifying a first transaction from the transactions as a sensitive transaction. The sensitive transaction is associated with an authentication policy requiring an authentication. The present technology also includes interrupting the application. The present technology also includes prompting the client device for the authentication.
-
公开(公告)号:US20240146643A1
公开(公告)日:2024-05-02
申请号:US17979640
申请日:2022-11-02
Applicant: Cisco Technology, Inc.
Inventor: David John Zacks , Nagendra Kumar Nainar , Madhan Sankaranarayanan , Jaganbabu Rajamanickam , Craig Thomas Hill , Cesar Obediente
Abstract: Technologies for testing resiliency of a data network with real-world accuracy without affecting the flow of production data through the network. A method according to the technologies may include receiving a production data packet and determining a preferred data route toward a destination node for the production data packet based on a first routing information base, wherein the first routing information base includes a database where routes and route metadata are stored according to a routing protocol. The method may also include, receiving a test data packet, and determining an alternate data route toward the destination node for the test data packet based on a second routing information base, wherein the second routing information base simulates an error in the preferred data route. The method may include sending the production data packet to the preferred data route and sending the test data packet to the alternate data route.
-
公开(公告)号:US11924112B2
公开(公告)日:2024-03-05
申请号:US17216879
申请日:2021-03-30
Applicant: Cisco Technology, Inc.
Inventor: David John Zacks , Thomas Szigeti , Walter T. Hulick, Jr.
IPC: H04L47/2408 , H04L9/40 , H04L47/24
CPC classification number: H04L47/2408 , H04L47/2458 , H04L63/08 , H04L63/1416 , H04L63/306 , H04L2463/082
Abstract: Methods and apparatuses for prioritizing transactions are disclosed. An example method of an application performance monitor (APM) comprises intercepting a first packet being transmitted in a network that is monitored by the APM; determining that the first packet is associated with a transaction of the web application that is to be provided with an alternate level of service; modifying a field in the first packet to include metadata interpretable by at least one network device in the network to cause the at least one network device to provide the alternate level of service; and injecting the first packet into the network. The APM may cause network devices to prioritize a specific transaction of an application based on importance.
-
公开(公告)号:US20240054196A1
公开(公告)日:2024-02-15
申请号:US17886411
申请日:2022-08-11
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , David John Zacks , Carlos M. Pignataro , Thomas Szigeti
CPC classification number: G06F21/32 , G02B27/017 , G04G21/025 , G02B2027/0178
Abstract: This disclosure describes techniques for authentication using wearable devices. An example method includes determining that a user is wearing a secondary device; determining that the secondary device has detected a signal output by a primary device; determining that the user has confirmed an authentication factor output by the primary device; and enabling the user to access a secured resource via the primary device.
-
7.
公开(公告)号:US20240048436A1
公开(公告)日:2024-02-08
申请号:US18380594
申请日:2023-10-16
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Jaganbabu Rajamanickam , David John Zacks , Carlos M. Pignataro , Madhan Sankaranarayanan , Cesar Obediente , Craig Thomas Hill
IPC: H04L41/0604 , H04L67/133 , H04L41/0631 , H04L41/0654 , H04L61/103 , H04L9/40
CPC classification number: H04L41/0627 , H04L67/133 , H04L41/0631 , H04L41/0654 , H04L61/103 , H04L63/101
Abstract: Methods and devices provide fault injection testing techniques in a production network environment without risking service outages for hosted computing services, by providing examples of a remote network controller configured to communicate with network devices of a network; a remote fault injection communication protocol configuring a remote network controller in communication with a network device to signal a failure injection; and a failure injection module configuring a network device to configure a network device processor to implement a failure injection signaled according to the remote failure injection communication protocol. The method includes a network controller transmitting a failure injection signal in a control plane packet over a network connection to a network device, and the network device creating a child process by executing, in a dedicated runtime environment, a copy of one or more processes impacted by a parsed failure type.
-
公开(公告)号:US11864077B2
公开(公告)日:2024-01-02
申请号:US17696322
申请日:2022-03-16
Applicant: Cisco Technology, Inc.
Inventor: Prapanch Ramamoorthy , David John Zacks
IPC: H04W4/80 , H04W24/02 , H04R29/00 , H04B17/318
CPC classification number: H04W4/80 , H04B17/318 , H04R29/001 , H04W24/02 , H04R2420/07
Abstract: A first connection is established between a meeting server and a first endpoint device associated with a user. At least one multimedia stream for an online collaborative session is provided from the meeting server to the first endpoint device. The meeting server obtains an indication that a first strength of a first short-range wireless communication connection between an audio device and the first endpoint device is less than a second strength of a second short-range wireless communication connection between the audio device and a second endpoint device associated with the user. A second connection is established between the meeting server and the second endpoint device. The at least one multimedia stream is provided from the meeting server to the second endpoint device via the second connection in response to obtaining the indication.
-
公开(公告)号:US11863450B1
公开(公告)日:2024-01-02
申请号:US18063291
申请日:2022-12-08
Applicant: Cisco Technology, Inc.
Inventor: Cesar Obediente , Craig Thomas Hill , Nagendra Kumar Nainar , David John Zacks , Jaganbabu Rajamanickam , Madhan Sankaranarayanan
IPC: H04L45/76
CPC classification number: H04L45/76
Abstract: A method comprises: at a network device configured to be connected to a network and having control and data planes, and interfaces configured for network operations in the network: upon receiving, from a controller, instructions to form a local twin of the network device that is a virtual replica of the network device to be used for test purposes, creating the local twin and configuring the local twin to include virtual control and data planes, and virtual interfaces, which are virtual replicas of, and operate independently from, the control and data planes, and the interfaces, of the network device, respectively; and hosting the local twin on physical resources of the network device such that the local twin is configured for virtual network operations on the network device that replicate, but are independent from, the network operations.
-
公开(公告)号:US20230421651A1
公开(公告)日:2023-12-28
申请号:US17846146
申请日:2022-06-22
Applicant: Cisco Technology, Inc.
Inventor: Walter T. Hulick, JR. , Carlos M. Pignataro , David John Zacks , Thomas Szigeti
IPC: H04L67/50 , H04L67/1396 , H04L67/10 , G06Q10/10
CPC classification number: H04L67/535 , H04L67/1396 , H04L67/10 , G06Q10/10
Abstract: Techniques are provided for an “on demand” or event-triggered end user monitoring/remote user monitoring (EUM/RUM) solution that is activated when the user has requested it, or an event (conditions of which are set by a user) occurs that triggers activation of the EUM/RUM solution. This EUM/RUM may be completely integrated into an enterprise IT Help Desk system, whereby support “tickets” are automatically generated when the monitoring solution is instantiated.
-
-
-
-
-
-
-
-
-