-
公开(公告)号:US12009998B1
公开(公告)日:2024-06-11
申请号:US18202080
申请日:2023-05-25
Applicant: Cisco Technology, Inc.
Inventor: Saswat Praharaj , Fabio R. Maino , Alberto Rodriguez Natal , Pradeep Kumar Kathail , Bruce McDougall
IPC: H04L41/5019 , H04L12/46
CPC classification number: H04L41/5019 , H04L12/4633
Abstract: Techniques for informing a network of an application's service-level agreement (SLA) objective(s) so the network can ensure the SLA is met end-to-end, thereby allowing core network support of deterministic SLA and application-based routing without using network-based application recognition (NBAR) and/or compromising user privacy. The techniques may include receiving a first connection request to establish a network-domain connection between different network domains that meets or exceeds a service level objective. Based on the first connection request, the network-domain connection may be established between the different network domains to meet or exceed the service-level objective. In some examples, a second connection request may be received to establish a tunnel between a source application and a destination application, which are disposed in the different network domains. Based on the second connection request, the techniques may include establishing the tunnel between the source application and the destination application utilizing the network-domain connection.
-
公开(公告)号:US20230185918A1
公开(公告)日:2023-06-15
申请号:US17547084
申请日:2021-12-09
Applicant: Cisco Technology, Inc.
Inventor: Eric Voit , Einar Nilsen-Nygaard , Frank Brockners , Pradeep Kumar Kathail
IPC: G06F21/57
CPC classification number: G06F21/57 , G06F2221/033
Abstract: This disclosure describes techniques for selectively placing and maintaining sensitive workloads in subsystems that achieve a minimum level of trustworthiness. An example method includes identifying at least one trustworthiness requirement associated with an application and transmitting, to a first subsystem, a request for at least one trustworthiness characteristic of the first subsystem and at least one second subsystem connected to the first subsystem. A response indicating the at least one trustworthiness characteristic is received from the first subsystem. The example method further includes determining that the at least one trustworthiness characteristic satisfies the at least one trustworthiness requirement; and causing the application to operate on a mesh comprising the first subsystem and the at least one second subsystem.
-
3.
公开(公告)号:US11611557B2
公开(公告)日:2023-03-21
申请号:US17307446
申请日:2021-05-04
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Shree N. Murthy , Pradeep Kumar Kathail , Brian Weis
IPC: H04L9/40 , H04L47/2441 , H04W80/02 , H04L65/1073
Abstract: A method is provided to anonymize the media access control (MAC) address of a client device. The method involves generating a plurality of media access control (MAC) addresses for use by a client device in a network. Policies are defined that determine which one of the plurality of MAC addresses is to be used by the client device. The plurality of MAC addresses allocated for use by the client device are registered with a management entity in the network.
-
公开(公告)号:US11558198B2
公开(公告)日:2023-01-17
申请号:US16841997
申请日:2020-04-07
Applicant: Cisco Technology, Inc.
Inventor: Eric Voit , Srinivas Vundru , Peter Panburana , David Wayne Mills , Pradeep Kumar Kathail
Abstract: The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor.
-
公开(公告)号:US20220360953A1
公开(公告)日:2022-11-10
申请号:US17316205
申请日:2021-05-10
Applicant: Cisco Technology, Inc.
Inventor: Sri Gundavelli , Indermeet Singh Gandhi , Pradeep Kumar Kathail , Louis Gwyn Samuel
IPC: H04W4/14
Abstract: Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.
-
公开(公告)号:US11283812B2
公开(公告)日:2022-03-22
申请号:US16715271
申请日:2019-12-16
Applicant: Cisco Technology, Inc.
Inventor: Pradeep Kumar Kathail , Eric Voit
IPC: H04L29/06 , H04L12/24 , H04L41/0803
Abstract: Systems, methods, and computer-readable media for evaluation of trustworthiness of network devices are proposed. In one aspect, a first network device can determine a first determine a first probability of a security compromise of a second network device based on visible indicators. The first network device can also determine a second probability of the security compromise of the second device based on invisible indicators. The first network device also determines a trust degradation score for the second network device and establishes, based on the trust degradation score, a specified type of communication session with the second network device.
-
公开(公告)号:US20210314161A1
公开(公告)日:2021-10-07
申请号:US16841997
申请日:2020-04-07
Applicant: Cisco Technology, Inc.
Inventor: Eric Voit , Srinivas Vundru , Peter Panburana , David Wayne Mills , Pradeep Kumar Kathail
Abstract: The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor.
-
公开(公告)号:US20200342766A1
公开(公告)日:2020-10-29
申请号:US16393246
申请日:2019-04-24
Applicant: Cisco Technology, Inc.
Inventor: Srinath Gundavelli , Vimal Srivastava , Pradeep Kumar Kathail
Abstract: Techniques are described herein for dynamic platoon management. The techniques may include obtaining dynamic location data of a vehicle, where the dynamic location data indicates a current or predicted location of the vehicle. Based on the dynamic location data, a platoon of vehicles that is optimal for the vehicle to join may be identified. The vehicle may be dynamically joined to the platoon.
-
公开(公告)号:US20180343326A1
公开(公告)日:2018-11-29
申请号:US15606251
申请日:2017-05-26
Applicant: Cisco Technology, Inc.
Inventor: Herbert Wildfeuer , Pradeep Kumar Kathail , Subhasri Dhesikan , Raghuram S. Sudhaakar
Abstract: In one embodiment, a device between a Controller Area Network (CAN)-based network and an Internet Protocol (IP)-based network receives a CAN message from a node in the CAN-based network. The CAN message comprises a CAN message identifier and a data field. The device determines an IP header based on the CAN message identifier and the CAN message. The device converts the data field of the CAN message into an IP message that includes the determined IP header. The device sends the IP message via the IP network to one or more eligible destinations for the IP message.
-
公开(公告)号:US20250097676A1
公开(公告)日:2025-03-20
申请号:US18967844
申请日:2024-12-04
Applicant: Cisco Technology, Inc.
Inventor: Sri Gundavelli , Indermeet Singh Gandhi , Pradeep Kumar Kathail , Louis Gwyn Samuel
Abstract: Systems, methods, and computer-readable media are provided for inter-network messaging among private and public 5G networks. For instance, a first server on a public 5G mobile network can receive a first message directed to a first wireless device associated with a first network identity. The first server can determine, based on the first network identity, that the first wireless device is associated with a second network identity, wherein the second network identity is used to identify the first wireless device on a private 5G mobile network. The first server can send a copy of the first message to a second server on the private 5G mobile network for transmission to the first wireless device through the private 5G mobile network based on the second network identity.
-
-
-
-
-
-
-
-
-