Patents by Inventor John W. Garrett, JR.

John W. Garrett, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146659
    Abstract: Methods are provided for a collaborative, decentralized insight engineering based on exchanging telemetry vectors with peer network devices. Each network device independently detects a deviation in its functioning using machine learning of generated feature vectors. Specifically, the methods involve obtaining, from at least one peer network device, at least a first feature vector that represents at least one insight generated from telemetry data of a respective peer network device. The intermediate network device and the at least one peer network device are configured to forward packets of a traffic flow. The methods further involve determining whether a deviation related to one or more of the network devices, exists based at least on the first feature vector and performing the at least one predefined action based on determining that the deviation exists.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Inventors: Xinping Xu, David C. White, JR., John W. Garrett, JR., Mark Ammar Rayes, Joel Abraham Obstfeld
  • Patent number: 11294744
    Abstract: A management entity receives device fingerprints representing corresponding devices connected to one or more networks. Each device fingerprint includes a multi-bit word indicating hardware, software, network configuration, and failure features for a corresponding one of the devices. The management entity processes the device fingerprints using different methods including statistical risk of failure scoring methods and machine learning risk of failure scoring methods, to produce from each of the methods a respective risk of failure for each device. The management entity combines the respective risk of failures for each device into a composite risk of failure for each device, ranks the devices based on the composite risk of failures for the devices, to produce a risk ranking of the devices, and outputs the risk ranking.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: April 5, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Nidhi Kao, Ulf Vinneras, John W. Garrett, Jr.
  • Publication number: 20200348994
    Abstract: A management entity receives device fingerprints representing corresponding devices connected to one or more networks. Each device fingerprint includes a multi-bit word indicating hardware, software, network configuration, and failure features for a corresponding one of the devices. The management entity processes the device fingerprints using different methods including statistical risk of failure scoring methods and machine learning risk of failure scoring methods, to produce from each of the methods a respective risk of failure for each device. The management entity combines the respective risk of failures for each device into a composite risk of failure for each device, ranks the devices based on the composite risk of failures for the devices, to produce a risk ranking of the devices, and outputs the risk ranking.
    Type: Application
    Filed: July 21, 2020
    Publication date: November 5, 2020
    Inventors: Nidhi Kao, Ulf Vinneras, John W. Garrett, JR.
  • Patent number: 10826771
    Abstract: Techniques for system self-assessment using a state identity vector are described. In one embodiment, a method includes obtaining a policy that includes a combination of a plurality of features and a set of desired values for the features. The method also includes comparing the policy to a device fingerprint for a network device and determining compliance with the policy based on the comparison between the device fingerprint and the combination of features. The device fingerprint comprises a multi-bit word having a plurality of positions, with each position representing a feature associated with the network device. Upon determining that the network device is not in compliance with one or more features included in the combination of features of the policy, the method includes implementing a responsive action by the network device according to a schema that defines instructions for each feature represented by the plurality of positions in the device fingerprint.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: November 3, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: John W. Garrett, Jr., Brett Dunstan, Jeffrey Owen Apcar
  • Patent number: 10769006
    Abstract: A management entity receives device fingerprints representing corresponding devices connected to one or more networks. Each device fingerprint includes a multi-bit word indicating hardware, software, network configuration, and failure features for a corresponding one of the devices. The management entity processes the device fingerprints using different methods including statistical risk of failure scoring methods and machine learning risk of failure scoring methods, to produce from each of the methods a respective risk of failure for each device. The management entity combines the respective risk of failures for each device into a composite risk of failure for each device, ranks the devices based on the composite risk of failures for the devices, to produce a risk ranking of the devices, and outputs the risk ranking.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: September 8, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Nidhi Kao, Ulf Vinneras, John W. Garrett, Jr.
  • Publication number: 20200106673
    Abstract: Techniques for system self-assessment using a state identity vector are described. In one embodiment, a method includes obtaining a policy that includes a combination of a plurality of features and a set of desired values for the features. The method also includes comparing the policy to a device fingerprint for a network device and determining compliance with the policy based on the comparison between the device fingerprint and the combination of features. The device fingerprint comprises a multi-bit word having a plurality of positions, with each position representing a feature associated with the network device. Upon determining that the network device is not in compliance with one or more features included in the combination of features of the policy, the method includes implementing a responsive action by the network device according to a schema that defines instructions for each feature represented by the plurality of positions in the device fingerprint.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Inventors: John W. Garrett, JR., Brett Dunstan, Jeffrey Owen Apcar
  • Publication number: 20200042370
    Abstract: A management entity receives device fingerprints representing corresponding devices connected to one or more networks. Each device fingerprint includes a multi-bit word indicating hardware, software, network configuration, and failure features for a corresponding one of the devices. The management entity processes the device fingerprints using different methods including statistical risk of failure scoring methods and machine learning risk of failure scoring methods, to produce from each of the methods a respective risk of failure for each device. The management entity combines the respective risk of failures for each device into a composite risk of failure for each device, ranks the devices based on the composite risk of failures for the devices, to produce a risk ranking of the devices, and outputs the risk ranking.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Nidhi Kao, Ulf Vinneras, John W. Garrett, JR.