-
公开(公告)号:US20250036674A1
公开(公告)日:2025-01-30
申请号:US18458739
申请日:2023-08-30
Applicant: Cisco Technology, Inc.
Inventor: M. David Hanes , Vivek Kumar Singh , Gonzalo A. Salgueiro , Derek William Engi
IPC: G06F16/335 , G06F16/332
Abstract: A method comprises: receiving a query on a topic from a user associated with user attributes indicative of a user comprehension level on the topic; providing the query to an AI model; receiving from the AI model a response to the query that has a response comprehension level on the topic that is less than the user comprehension level; iteratively adding, to the query, topically-relevant user attributes of the user attributes to produce iterative queries that increase in technical detail on the topic; providing the iterative queries to the AI model; responsive to providing the iterative queries, receiving, from the AI model, iterative responses that increase in technical detail on the topic and have response comprehension levels that increase on the topic; and determining, among the iterative responses, a final response having a response comprehension level that most nearly matches the user comprehension level.
-
公开(公告)号:US11438226B2
公开(公告)日:2022-09-06
申请号:US17165364
申请日:2021-02-02
Applicant: Cisco Technology, Inc.
Inventor: Derek William Engi , Gonzalo Salgueiro , M. David Hanes , Bradley Wise , Md Atiqur Rahman
IPC: H04L41/0816 , H04L41/08 , H04L41/0604 , H04L41/22 , H04L41/085
Abstract: In one example, a logical representation of a first graph is generated. The first graph indicates a configuration of a network device in a network at a first time. The first graph includes a first node representative of a first configuration block of the network device, a second node representative of a second configuration block of the network device, and a first link that indicates, by connecting the first node and the second node, that the first configuration block is associated with the second configuration block. The logical representation of the first graph is compared to a logical representation of a second graph that indicates an actual or planned configuration of the network device at a second time subsequent to the first time. In response, one or more changes in the configuration of the network device from the first time to the second time are identified.
-
公开(公告)号:US11456917B2
公开(公告)日:2022-09-27
申请号:US16889306
申请日:2020-06-01
Applicant: Cisco Technology, Inc.
Inventor: Howard Steven Nelson , Derek William Engi , Gonzalo Salgueiro , Vijay Pillai
IPC: H04L41/0893 , G06N20/00 , H04L41/16 , H04L41/0813 , G06K9/62
Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.
-
公开(公告)号:US20210377114A1
公开(公告)日:2021-12-02
申请号:US16889306
申请日:2020-06-01
Applicant: Cisco Technology, Inc.
Inventor: Howard Steven Nelson , Derek William Engi , Gonzalo Salgueiro , Vijay Pillai
Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.
-
公开(公告)号:US20240395072A1
公开(公告)日:2024-11-28
申请号:US18791027
申请日:2024-07-31
Applicant: Cisco Technology, Inc.
Inventor: Derek William Engi , Gonzalo Salgueiro , Pascale Delaunay , Julie Allen
Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.
-
公开(公告)号:US12149410B2
公开(公告)日:2024-11-19
申请号:US17850209
申请日:2022-06-27
Applicant: Cisco Technology, Inc.
Inventor: Derek William Engi , Gonzalo Salgueiro , M. David Hanes , Bradley Wise , Md Atiqur Rahman
Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.
-
公开(公告)号:US11418397B1
公开(公告)日:2022-08-16
申请号:US17164339
申请日:2021-02-01
Applicant: Cisco Technology, Inc.
Inventor: Derek William Engi , Gonzalo Salgueiro , M. David Hanes , Bradley Wise , Md Atiqur Rahman
Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.
-
公开(公告)号:US20250021586A1
公开(公告)日:2025-01-16
申请号:US18350143
申请日:2023-07-11
Applicant: Cisco Technology, Inc.
Inventor: Derek William Engi , Brett Dunstan , Peter Jozef Hugo De Vriendt , Ravi Garg
IPC: G06F16/28
Abstract: A method for learning potential correlation of data structures and fields across multiple disparate data sources. The method automatically identifies relationships that exist in multiple data sources to facilitate a data broker that can return the “shortest-path-to-data”. The method includes communicating with a data lake that integrates access to data stored in a plurality of different data sources. The method next includes correlating, via the data lake, data fields in data sets across the plurality of different data sources to identify relationships across the plurality of different data sources. A request to access data is obtained, and the method determines that data for the request is stored in two or more data sources of the plurality of different data sources, selects a particular data source of the two or more data sources and retrieves the data for the request from the particular data source.
-
公开(公告)号:US20240388571A1
公开(公告)日:2024-11-21
申请号:US18359060
申请日:2023-07-26
Applicant: Cisco Technology, Inc.
Inventor: M. David Hanes , Vivek Kumar Singh , Gonzalo Salgueiro , Derek William Engi
Abstract: A system and method for an artificial intelligence (AI) confidentiality proxy that can protect a network from the transferal of sensitive AI data sets to outside AI systems. A data contract is established between the proxy and outside AI systems could function as well as user personas for additional protection. This system can also integrate with the network and provide security policy content and inspection rules.
-
公开(公告)号:US20230018509A1
公开(公告)日:2023-01-19
申请号:US17378013
申请日:2021-07-16
Applicant: Cisco Technology, Inc.
Inventor: Derek William Engi , Gonzalo Salgueiro , Pascale Delaunay , Julie Allen
Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.
-
-
-
-
-
-
-
-
-