Patents by Inventor Jay K. Johnston
Jay K. Johnston has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240144193Abstract: Presented herein are techniques associated with proactively scheduling shared resources or responsibilities among multiple users. In one example a method is provided that may include sharing masked calendar information between a first device of a first user and at least one second device of at least one second user based on the first device being proximate to the at least one second device; identifying a conflict involving use of a shared resource at a particular time; comparing first priority metadata for the first user and second priority metadata for the at least one second user; and assigning the use of the shared resource to one of the first user or the at least one second user based, at least in part, on determining that the first user or the at least one second user has a highest priority for use of the shared resource.Type: ApplicationFiled: October 26, 2022Publication date: May 2, 2024Inventors: Jay K. Johnston, Magnus Mortensen, David C. White, JR.
-
Publication number: 20240144918Abstract: A method, computer system, and computer program product are provided for improving user speech. A data sample of a user speaking one or more words is received, wherein the data sample includes video data and audio data of the user speaking. The data sample is analyzed to determine a correct articulation of a mouth when speaking the one or more words. A synthetic video of the user performing the correct articulation is generated. The synthetic video of the user is presented to the user. A live video of the user is presented to the user while the synthetic video is presented.Type: ApplicationFiled: October 31, 2022Publication date: May 2, 2024Inventors: David C. White, JR., Jay K. Johnston, Magnus Mortensen
-
Publication number: 20240135388Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.Type: ApplicationFiled: October 29, 2023Publication date: April 25, 2024Inventors: David C. White, JR., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Kevin D. McCabe
-
Publication number: 20240098493Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network, a first network message is received from a first access point (AP) identifying a first service set identifier (SSID) associated with a first wireless network, a second network message is received from a second AP identifying a second SSID associated with a second wireless network, and a visual similarity is determined between a first visual representation of the first SSID and a second visual representation of the second SSID. The second SSID is designated as suspicious based on the determined visual similarity.Type: ApplicationFiled: November 28, 2023Publication date: March 21, 2024Inventors: Jay K. JOHNSTON, Jerome HENRY, David C. WHITE, JR., Magnus MORTENSEN, John M. SWARTZ, Robert E. BARTON
-
Patent number: 11875362Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.Type: GrantFiled: October 26, 2020Date of Patent: January 16, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: David C. White, Jr., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Kevin D. McCabe
-
Patent number: 11877154Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network comprising a service set identifier (SSID), a network message is received at a wireless station (STA), from an access point (AP) associated with the wireless network. The STA identifies an encrypted identifier in the network message. The STA validates the encrypted identifier, and in response determines that the AP corresponds to a trusted wireless network. The SSID is designated as trusted, at the STA.Type: GrantFiled: March 5, 2020Date of Patent: January 16, 2024Assignee: Cisco Technology, Inc.Inventors: Jay K. Johnston, Jerome Henry, David C. White, Jr., Magnus Mortensen, John M. Swartz, Robert E. Barton
-
Patent number: 11483248Abstract: Techniques for dynamic prioritization of presenting devices in wireless deployments are provided. Data relating to a transmission between a first device and a second device is received, and the first device is classified as a presenting device for the transmission based on the data relating to the transmission. An access point (AP) providing connectivity to the first device is identified, and the AP is configured to prioritize traffic transmitted from the first device responsive to classifying the first device as the presenting device.Type: GrantFiled: September 2, 2020Date of Patent: October 25, 2022Assignee: Cisco Technology, Inc.Inventors: Magnus Mortensen, David C. White, Jr., Jay K. Johnston, John M. Swartz, Matthew A. Silverman
-
Publication number: 20220237626Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provision itself to provide automated customer support. The humanoid can be trained for a customer support campaign. The training can include the humanoid observing communications between a human operator and at least one customer regarding at least one customer support case in the customer support campaign. The humanoid can assess at least one confidence level of the humanoid for the customer support campaign to determine whether the humanoid is adequately trained to handle future customer support cases for the customer support campaign. The humanoid can provision itself to handle at least one future customer support case in the customer support campaign in response to determining that it is adequately trained for the customer support campaign.Type: ApplicationFiled: January 27, 2021Publication date: July 28, 2022Inventors: David C. White, Jr., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Felipe De Mello
-
Publication number: 20220070101Abstract: Techniques for dynamic prioritization of presenting devices in wireless deployments are provided. Data relating to a transmission between a first device and a second device is received, and the first device is classified as a presenting device for the transmission based on the data relating to the transmission. An access point (AP) providing connectivity to the first device is identified, and the AP is configured to prioritize traffic transmitted from the first device responsive to classifying the first device as the presenting device.Type: ApplicationFiled: September 2, 2020Publication date: March 3, 2022Inventors: Magnus MORTENSEN, David C. WHITE, JR., Jay K. JOHNSTON, John M. SWARTZ, Matthew A. SILVERMAN
-
Publication number: 20210282014Abstract: Techniques for identifying a trusted SSID for a wireless network are disclosed. Prior to establishing a connection with a wireless network comprising a service set identifier (SSID), a network message is received at a wireless station (STA), from an access point (AP) associated with the wireless network. The STA identifies an encrypted identifier in the network message. The STA validates the encrypted identifier, and in response determines that the AP corresponds to a trusted wireless network. The SSID is designated as trusted, at the STA.Type: ApplicationFiled: March 5, 2020Publication date: September 9, 2021Inventors: Jay K. JOHNSTON, Jerome HENRY, David C. WHITE, JR., Magnus MORTENSEN, John M. SWARTZ, Robert E. BARTON
-
Patent number: 10764136Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller identifies at least one set of critical network elements based on business factors associated with removing the critical network elements from operation. The network controller generates an update plan including timing for installing the update on each respective network element. The timing is based on minimizing the outage duration for the set of critical network elements. The network controller installs the update in each network element according to the timing of the update plan.Type: GrantFiled: June 6, 2019Date of Patent: September 1, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Jay K. Johnston, David C. White, Jr., Magnus Mortensen
-
Patent number: 10757073Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.Type: GrantFiled: October 29, 2018Date of Patent: August 25, 2020Assignee: Cisco Technology, Inc.Inventors: David C White, Jr., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
-
Automatic classification and parallel processing of untested code in a protected runtime environment
Patent number: 10509715Abstract: A system is provided to run new code modules safely in a duplicative, protected environment without affecting the code modules that are already trusted to be on the system. The system receives a new code module that validates operational data of a computing device, and instantiates a new, parallel execution engine to run the new code module on the operational data in parallel with another execution engine running the trusted/verified code modules that also validate the same operational data. The new engine runs the new code module with the operational data to produce new code module results. The production engine runs the trusted/verified code modules with the operational data to produce verified code module results. The new code module results are combined with the verified code module results to produce combined results describing the operational status of the computing device.Type: GrantFiled: April 19, 2018Date of Patent: December 17, 2019Assignee: Cisco Technology, Inc.Inventors: David C. White, Jr., Magnus Mortensen, Jay K. Johnston -
Publication number: 20190288907Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller identifies at least one set of critical network elements based on business factors associated with removing the critical network elements from operation. The network controller generates an update plan including timing for installing the update on each respective network element. The timing is based on minimizing the outage duration for the set of critical network elements. The network controller installs the update in each network element according to the timing of the update plan.Type: ApplicationFiled: June 6, 2019Publication date: September 19, 2019Inventors: Jay K. Johnston, David C. White, JR., Magnus Mortensen
-
Patent number: 10355929Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.Type: GrantFiled: February 27, 2017Date of Patent: July 16, 2019Assignee: Cisco Technology, Inc.Inventors: Jay K. Johnston, David C. White, Jr., Magnus Mortensen
-
Publication number: 20190068552Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.Type: ApplicationFiled: October 29, 2018Publication date: February 28, 2019Inventors: David C White, JR., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
-
Publication number: 20190026460Abstract: An application security monitors data traffic from computing devices to a remote application in a first computing environment, such as a production service chain. The application security monitor detects an anomaly in the data traffic from a computing device. Based on the anomaly, the remote application is substantially reproduced in a second computing environment, such as a scrubbing environment. The application security monitor redirects the anomalous data to the remote application in the second computing environment. The application security monitor determines whether the data traffic from the first computing device corresponds to malicious activity or legitimate activity by the computing device. Responsive to a determination that the data traffic from the first computing device corresponds to legitimate activity, the application security monitor applies to the first computing environment any changes in the second computing environment caused by the redirected traffic from the computing device.Type: ApplicationFiled: July 19, 2017Publication date: January 24, 2019Inventors: Michael J. Robertson, Magnus Mortensen, Jay K. Johnston, David C. White, JR.
-
Patent number: 10158605Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.Type: GrantFiled: November 24, 2015Date of Patent: December 18, 2018Assignee: Cisco Technology, Inc.Inventors: David C. White, Jr., Jay K. Johnston, Rama Darbha, Magnus Mortensen, Carlos M. Pignataro
-
Patent number: 10127144Abstract: A testing server tests new code modules, or re-tests previously tested code modules, using individualized sets of test data. The testing server receives test datasets from an execution engine, which runs tested code modules to process operational datasets of computing devices. The testing server receives an untested code module from a user, and obtains test dataset parameters applicable to the untested code module. The testing server generates an individualized set of test datasets based on the test dataset parameters. The testing server tests the untested code module by processing each test dataset in the individualized set of test datasets to produce test results.Type: GrantFiled: October 24, 2016Date of Patent: November 13, 2018Assignee: Cisco Technology, Inc.Inventors: Jay K. Johnston, Magnus Mortensen, David C. White, Jr.
-
Publication number: 20180248750Abstract: A computer-implemented method is provided for a network controller to implement an update on network elements with minimal disruption. The network controller receives a request to install the update on a number of network elements in one or more networks. Installing the update in each respective network element removes it from operation for an outage duration of time. The network controller determines how network flows will be distributed in the networks due to the outage from installing the update, and generates an update plan that includes timing for installing the update on each network element. The timing is based on how the network flows will be distributed in the networks. The network controller installs the update in each network element according to the timing of the update plan.Type: ApplicationFiled: February 27, 2017Publication date: August 30, 2018Inventors: Jay K. Johnston, David C. White, JR., Magnus Mortensen