Patents by Inventor Jay K. Johnston

Jay K. Johnston has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240144193
    Abstract: Presented herein are techniques associated with proactively scheduling shared resources or responsibilities among multiple users. In one example a method is provided that may include sharing masked calendar information between a first device of a first user and at least one second device of at least one second user based on the first device being proximate to the at least one second device; identifying a conflict involving use of a shared resource at a particular time; comparing first priority metadata for the first user and second priority metadata for the at least one second user; and assigning the use of the shared resource to one of the first user or the at least one second user based, at least in part, on determining that the first user or the at least one second user has a highest priority for use of the shared resource.
    Type: Application
    Filed: October 26, 2022
    Publication date: May 2, 2024
    Inventors: Jay K. Johnston, Magnus Mortensen, David C. White, JR.
  • Publication number: 20240144918
    Abstract: A method, computer system, and computer program product are provided for improving user speech. A data sample of a user speaking one or more words is received, wherein the data sample includes video data and audio data of the user speaking. The data sample is analyzed to determine a correct articulation of a mouth when speaking the one or more words. A synthetic video of the user performing the correct articulation is generated. The synthetic video of the user is presented to the user. A live video of the user is presented to the user while the synthetic video is presented.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Inventors: David C. White, JR., Jay K. Johnston, Magnus Mortensen
  • Publication number: 20240135388
    Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.
    Type: Application
    Filed: October 29, 2023
    Publication date: April 25, 2024
    Inventors: David C. White, JR., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Kevin D. McCabe
  • Publication number: 20240098493
    Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.
    Type: Application
    Filed: November 28, 2023
    Publication date: March 21, 2024
    Inventors: Jay K. JOHNSTON, Jerome HENRY, David C. WHITE, JR., Magnus MORTENSEN, John M. SWARTZ, Robert E. BARTON
  • Patent number: 11875362
    Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.
    Type: Grant
    Filed: October 26, 2020
    Date of Patent: January 16, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David C. White, Jr., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Kevin D. McCabe
  • Patent number: 11877154
    Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network comprising a service set identifier (SSID), a network message is received at a wireless station (STA), from an access point (AP) associated with the wireless network. The STA identifies an encrypted identifier in the network message. The STA validates the encrypted identifier, and in response determines that the AP corresponds to a trusted wireless network. The SSID is designated as trusted, at the STA.
    Type: Grant
    Filed: March 5, 2020
    Date of Patent: January 16, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Jay K. Johnston, Jerome Henry, David C. White, Jr., Magnus Mortensen, John M. Swartz, Robert E. Barton
  • Patent number: 11483248
    Abstract: Techniques for dynamic prioritization of presenting devices in wireless deployments are provided. Data relating to a transmission between a first device and a second device is received, and the first device is classified as a presenting device for the transmission based on the data relating to the transmission. An access point (AP) providing connectivity to the first device is identified, and the AP is configured to prioritize traffic transmitted from the first device responsive to classifying the first device as the presenting device.
    Type: Grant
    Filed: September 2, 2020
    Date of Patent: October 25, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Magnus Mortensen, David C. White, Jr., Jay K. Johnston, John M. Swartz, Matthew A. Silverman
  • Publication number: 20220237626
    Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provision itself to provide automated customer support. The humanoid can be trained for a customer support campaign. The training can include the humanoid observing communications between a human operator and at least one customer regarding at least one customer support case in the customer support campaign. The humanoid can assess at least one confidence level of the humanoid for the customer support campaign to determine whether the humanoid is adequately trained to handle future customer support cases for the customer support campaign. The humanoid can provision itself to handle at least one future customer support case in the customer support campaign in response to determining that it is adequately trained for the customer support campaign.
    Type: Application
    Filed: January 27, 2021
    Publication date: July 28, 2022
    Inventors: David C. White, Jr., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Felipe De Mello
  • Publication number: 20220070101
    Abstract: Techniques for dynamic prioritization of presenting devices in wireless deployments are provided. Data relating to a transmission between a first device and a second device is received, and the first device is classified as a presenting device for the transmission based on the data relating to the transmission. An access point (AP) providing connectivity to the first device is identified, and the AP is configured to prioritize traffic transmitted from the first device responsive to classifying the first device as the presenting device.
    Type: Application
    Filed: September 2, 2020
    Publication date: March 3, 2022
    Inventors: Magnus MORTENSEN, David C. WHITE, JR., Jay K. JOHNSTON, John M. SWARTZ, Matthew A. SILVERMAN
  • Publication number: 20210282014
    Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network comprising a service set identifier (SSID), a network message is received at a wireless station (STA), from an access point (AP) associated with the wireless network. The STA identifies an encrypted identifier in the network message. The STA validates the encrypted identifier, and in response determines that the AP corresponds to a trusted wireless network. The SSID is designated as trusted, at the STA.
    Type: Application
    Filed: March 5, 2020
    Publication date: September 9, 2021
    Inventors: Jay K. JOHNSTON, Jerome HENRY, David C. WHITE, JR., Magnus MORTENSEN, John M. SWARTZ, Robert E. BARTON
  • Patent number: 10764136
    Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller identifies at least one set of critical network elements based on business factors associated with removing the critical network elements from operation. The network controller generates an update plan including timing for installing the update on each respective network element. The timing is based on minimizing the outage duration for the set of critical network elements. The network controller installs the update in each network element according to the timing of the update plan.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: September 1, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jay K. Johnston, David C. White, Jr., Magnus Mortensen
  • Patent number: 10757073
    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: August 25, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: David C White, Jr., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
  • Patent number: 10509715
    Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.
    Type: Grant
    Filed: April 19, 2018
    Date of Patent: December 17, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Magnus Mortensen, Jay K. Johnston
  • Publication number: 20190288907
    Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller identifies at least one set of critical network elements based on business factors associated with removing the critical network elements from operation. The network controller generates an update plan including timing for installing the update on each respective network element. The timing is based on minimizing the outage duration for the set of critical network elements. The network controller installs the update in each network element according to the timing of the update plan.
    Type: Application
    Filed: June 6, 2019
    Publication date: September 19, 2019
    Inventors: Jay K. Johnston, David C. White, JR., Magnus Mortensen
  • Patent number: 10355929
    Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: July 16, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Jay K. Johnston, David C. White, Jr., Magnus Mortensen
  • Publication number: 20190068552
    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
    Type: Application
    Filed: October 29, 2018
    Publication date: February 28, 2019
    Inventors: David C White, JR., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
  • Publication number: 20190026460
    Abstract: An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Michael J. Robertson, Magnus Mortensen, Jay K. Johnston, David C. White, JR.
  • Patent number: 10158605
    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: December 18, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
  • Patent number: 10127144
    Abstract: A testing server tests new code modules, or re-tests previously tested code modules, using individualized sets of test data. The testing server receives test datasets from an execution engine, which runs tested code modules to process operational datasets of computing devices. The testing server receives an untested code module from a user, and obtains test dataset parameters applicable to the untested code module. The testing server generates an individualized set of test datasets based on the test dataset parameters. The testing server tests the untested code module by processing each test dataset in the individualized set of test datasets to produce test results.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: November 13, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Jay K. Johnston, Magnus Mortensen, David C. White, Jr.
  • Publication number: 20180248750
    Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.
    Type: Application
    Filed: February 27, 2017
    Publication date: August 30, 2018
    Inventors: Jay K. Johnston, David C. White, JR., Magnus Mortensen