Patents Assigned to Cisco Technology, Inc.
-
Patent number: 8787392Abstract: In one embodiment, one or more routing update parameters may be set for and propagated to nodes of a directed acyclic graph (DAG) in a computer network, the routing update parameters indicative of when to perform a corresponding routing update operation. A decision node (e.g., a root node of the DAG, application in a head-end, etc.) may gather network statistics of the DAG during operation based on the routing update parameters, and may accordingly determine at least one adjusted routing update parameter based on the gathered network statistics. This adjusted routing update parameter may then be propagated to the nodes of the DAG, such that the nodes operate according to the (adaptively) adjusted routing update parameter.Type: GrantFiled: December 17, 2010Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Jean-Philippe Vasseur, Shmuel Shaffer, Sandeep Jay Shetty
-
Patent number: 8787358Abstract: In one implementation, a guest device on an ad hoc network is permitted to initiate a communication session through a packet switched network depending on the destination endpoint of the communication session. A network device maintains a list of approved destination endpoints, which may be identified by telephone numbers, addresses, or uniform resource identifiers. The approved destination endpoints correspond to services that are offered to users of guest devices, such as voicemail, videoconferencing, or customer service. The network device receives a request for a communication session from a guest device, and the request includes data indicative of a destination endpoint. The network device compares the data indicative of the destination endpoint to the list of approved destination endpoints. If there is a match, the request is forwarded to a next hop router. If there is no match the request is dropped or returned to the guest device.Type: GrantFiled: June 28, 2011Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventor: Michael Edric Tasker
-
Patent number: 8788805Abstract: Techniques for securely providing cryptographic keys to trusted intermediate nodes or monitoring devices are described so that SSL, TLS, or IPSec communications can be monitored, compressed over a WAN, or otherwise used. In an embodiment, a trusted intermediate node establishes a secure connection to a key server; receiving session identification data for an encrypted session between a client and a content server during negotiation of the encrypted session, and storing a copy of the session identification data; requesting from the key server, over the secure connection, a decryption key associated with the encrypted session; receiving an encrypted message communicated between the client and the content server; forwarding the encrypted message without modification to a destination address in the encrypted message; and decrypting the encrypted message using the decryption key to result in decrypted data and using or storing the decrypted data in a storage unit.Type: GrantFiled: February 29, 2008Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Michael Herne, David McGrew
-
Patent number: 8784167Abstract: The electronic system has a chassis having a base and a set of flanges extending from the base. The electronic system has electronic circuitry housed within the chassis. The electronic system has a fan assembly having a fan arranged to generate an air stream suitable for cooling the electronic circuitry, and a fan mount. The fan mount has an attachment portion arranged to attach to the fan. The fan mount has a set of chassis interface portions arranged to form a cantilever with the set of flanges relative to the base to vibrationally isolate the fan from the base.Type: GrantFiled: December 10, 2007Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventor: George Youzhi Yi
-
Patent number: 8787213Abstract: In one embodiment, a network device attaches a header including an identifier for an original call to an outgoing refer message and may also modify a table entry for a consultative call to include the identifier. The network device then monitors incoming invite messages for a header containing the identifier and observes that an incoming invite message containing the header correlates to the original call. When a header is not included, the network device extracts information from the incoming invite messages and compares the extracted information to the modified table entry to correlate one of the incoming invite messages to the original call.Type: GrantFiled: May 21, 2012Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Yuan Cai, Shuojiun Wu
-
Patent number: 8789133Abstract: In one implementation, a social media device receives social interaction data including an identity of neighboring mobile devices that have been within a physical proximity of an object mobile device. The social media device hosts a social network service and provides content to a user associated with the object mobile device according to the identity of more neighboring mobile devices. The user of the object mobile device may opt to receive content only from those users that are identified in the social interaction data. The user of the object mobile device may opt to permit only those users that are identified in the social interaction data to receive content generated by the user of the object mobile device. The user may opt to alter the status policy seen by other users so that only users that are identified in the social interaction data see the user as available or online.Type: GrantFiled: April 20, 2011Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Matthew Robert Kuhlke, Alan Darryl Gatzke
-
Patent number: 8787402Abstract: A transmitter transmits a data frame as an uninterrupted stream of codeblocks of predefined size on a first data path between a MAC and PHY. It inserts a first idle block of predefined size within the data frame if there is insufficient data. A receiver receives a second idle block on a second data path, the second idle block including a request to slow down the transmission on the first data path. The receiver causes the transmitter to insert a third idle block in response to receiving the second idle block. The transmitter may further send a stream identifier including an identifier for a data stream and a bandwidth factor. The transmitter may send one codeblock chosen from data blocks for the data stream and idle blocks, and then send the bandwidth factor number of codeblocks chosen from data blocks for other data streams and idle blocks.Type: GrantFiled: August 30, 2012Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventor: Hugh Barrass
-
Patent number: 8788972Abstract: Techniques for sorting and filtering a list in a space-constrained viewing area are described. A filter widget and a list of items are displayed in a view of an electronic display screen. In response to user input selecting the filter widget, and without changing to a different view, a filter category overlay is displayed in the view to provide various selectable filter categories. In response to selection of a filter category, a visual depiction of the selected filter category is displayed in the view. The list of items is filtered according to the selected filter category and displayed in the view without changing to any other view. Subsequently added visual depictions are linearly stacked in the view. Further, a filter modification overlay, which provides selectable filtering attributes, is displayed upon selection of a visual depiction.Type: GrantFiled: January 26, 2011Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Daniel Garrison, Brian Sarbin
-
Patent number: 8788823Abstract: Protocol status information is used to perform traffic filtering by dropping messages that are not consistent with the protocol status information. In one embodiment, a method involves comparing message information and protocol status information. The message information is associated with a first message. The protocol status information is obtained in response to one or more second messages, which are conveyed according to a protocol used to assign network addresses to clients. The method also involves determining whether to discard the first message, based on an outcome of the comparison of the message information and the protocol status information. For example, it can be determined that the first message should be discarded, if the message information does not match the protocol status information.Type: GrantFiled: October 22, 2004Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Dehua Huang, Adam J. Sweeney, Pradeep S. Sudame, Silviu Dobrota, Premkumar Jonnala
-
Patent number: 8786670Abstract: Techniques are provided for upstream video sources to be synchronized in vertical sync time and in frame rate, so that a downstream device can create a composite image with low latency. At a video compositor device, a plurality of video streams are received that include at least first and second video streams. First and second vertical synchronization points associated with the first and second video streams points are determined. A difference in time between the first and second vertical synchronization points is determined. At least one control signal or message is generated that is configured to change a video capture frame rate associated with one or both of the first and second video streams to reduce the difference in time and the control message is sent to video capture devices for one or both of the first and second video streams. Techniques are also provided for upstream video sources, e.g., cameras, to receive the control message and respond accordingly.Type: GrantFiled: October 14, 2010Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventor: J. William Mauchly
-
Publication number: 20140198648Abstract: In one embodiment, a method comprises determining a Quality of Service (QoS) policier action for data packets belonging to a first flow of data packets received at an ingress interface of a network switching device, the QoS policier action based on one of multiple prescribed QoS classifications by a QoS policier that aggregates distinct flows of data packets into a single aggregated flow according to prescribed QoS thresholds; and assigning to the first flow of data packets a unique identifier that associates the QoS policier action to identification of the first flow of data packets, enabling identification of the distinct flows of data packets within each of the prescribed QoS classifications.Type: ApplicationFiled: January 15, 2013Publication date: July 17, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Vijaya Kumar KULKARNI, Suraj BAPU, Tarun SAXENA, Anu CHAUHAN
-
Publication number: 20140201000Abstract: In an example embodiment disclosed herein is an apparatus comprising an interface and mobile billboard logic that is coupled with the interface and operable to communicate with an associated device via the interface. The mobile billboard logic obtains location data for the associated device. The mobile billboard logic determines whether a predetermined trigger condition has been met. The mobile billboard logic selectively sends data representative of an advertisement to the associated device to be displayed on a web page being requested by the associated device based on the location of the associated device and whether the predetermined condition has been met.Type: ApplicationFiled: January 14, 2013Publication date: July 17, 2014Applicant: Cisco Technology, Inc.Inventors: Ravi AKIREDDY, Esteban Raul TORRES, Robert J. FRIDAY, Sujai HAJELA, Uday Kumar PYDA
-
Publication number: 20140198912Abstract: A method and system for producing at least one ciphertext block from at least one plaintext block using a block cipher is described, the block cipher including an encryption function Enc, the method and system including receiving n plaintext blocks, wherein n is an integer greater than 0, for each plaintext block of the n plaintext blocks inputting two inputs into a keyed invertible transformation function, e, the two inputs including a masking value, denoted Mi, where 0<i<=n, and one of a plaintext block, denoted Pi, Pi being an i-th plaintext block of the n plaintext blocks, and a function of the plaintext block Pi, where 0<i<=n, wherein one of the two inputs Mi and Pi includes a key for round key generation by the function e and the second of the two inputs Mi and Pi includes a data item operated on during rounds of function e, outputting a result of the function e, the output being at least partially encrypted in a case where the masking value includes an output of the encryption function Enc,Type: ApplicationFiled: July 24, 2012Publication date: July 17, 2014Applicant: Cisco Technology Inc.Inventor: Itsik Mantin
-
Publication number: 20140201837Abstract: A method and system to detect an evasion attack are provided. The system may include a repository to store signature fragments that together constitute an attack signature, an interceptor to intercept a data packet associated with a network connection, a string-matching module to determine whether the payload of the data packet includes any of the stored signature fragments thereby identifying a match, a responder to perform a prevention action in response to the match, and a detector to detect that a size of the data packet is less than a size threshold. The system may further include a state machine to commence maintaining a state for the network connection in response to the detector determining that the size of the data packet is less than the size threshold.Type: ApplicationFiled: December 16, 2013Publication date: July 17, 2014Applicant: Cisco Technology, Inc.Inventors: George Varghese, Flavio Giovanni Bonomi, John Andrew Fingerhut
-
Publication number: 20140201384Abstract: According to one embodiment, a local proxy caches in a local stream store one or more streams of data transmitted over the WAN to a remote proxy. In response to a flow of data received from one of the clients of the local LAN, the local proxy chunks using a predetermined chunk algorithm the flow into chunks in sequence, and selectively indexes the chunks in a chunk index maintained by the local proxy based on locations of the chunks in the flow, where a number of chunks in a first region of the flow indexed is different than a number of chunks in a second region of the flow indexed. The chunk index includes multiple chunk index entries referenced to the steams stored in the stream store.Type: ApplicationFiled: January 16, 2013Publication date: July 17, 2014Applicant: Cisco Technology, Inc.Inventor: Sean Christopher Rhea
-
Publication number: 20140200940Abstract: Presented herein are techniques for automatically rescheduling one or more meetings in order to make a time slot available for scheduling of a meeting, e.g., a high priority urgent meeting. At a server that manages calendars for a plurality of users, a request is received to schedule a meeting between a first user and one or more other users. It is determined whether there is at least one other meeting involving any of the one or more other users that conflicts with the meeting. If so, the at least one other meeting is automatically rescheduled to another time.Type: ApplicationFiled: January 14, 2013Publication date: July 17, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: David Putterman, John Russell, Brian Glanville, Konstas Yannakopoulos, Dhiren Patel
-
Publication number: 20140198175Abstract: In one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call requests entry and determines whether the conference bridge has available resources to process the call. The conference bridge enables the call to join the conference via a second conference bridge associated with a second caller endpoint participating in the conference according to whether the conference bridge has available resources to process the call.Type: ApplicationFiled: March 17, 2014Publication date: July 17, 2014Applicant: Cisco Technology, Inc.Inventors: Shmuel Shaffer, Labhesh Patel, Mukul Jain, Sanjeev Kumar
-
Publication number: 20140201516Abstract: To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network devices without user input. This control plane is hidden from the user, preventing any configuration that may bring down the connectivity for OAM.Type: ApplicationFiled: January 15, 2013Publication date: July 17, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Steinthor Bjarnason, Michael Behringer, Yves Hertoghs, Toerless Eckert, Balaji B. L.
-
Publication number: 20140201308Abstract: A local stream store of a local proxy caches one or more streams of data transmitted over the WAN to a remote proxy, where each stream is stored in a continuous manner and identified by a unique stream identifier (ID). In response to a flow of data received from a client, the local proxy examines the flow of data to determine whether at least a portion of the flow has been previously transmitted to the remote proxy via one of the streams currently stored in the local stream store. If the portion of the flow has been previously transmitted to the remote proxy, the local proxy transmits a first message to the remote proxy without sending actual content of the portion of the flow to indicate that the portion of the flow has been transmitted in one of the streams previously transmitted to the remote proxy.Type: ApplicationFiled: January 16, 2013Publication date: July 17, 2014Applicant: Cisco Technology, Inc.Inventor: Sean Christopher Rhea
-
Publication number: 20140198800Abstract: In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the original packet along a less-specific path through the cloud switch, the less-specific path based on a domain index of an egress domain for the original packet. The copy of the original packet is modified to create a more specific path learn request packet. The ingress leaf node forwards the more specific path learn request packet along the less-specific path through the cloud switch. The ingress leaf node received back a more specific path learn request reply packet that includes an indication of a fabric system port. The ingress leaf node then programs a forwarding table based on the indication of the fabric system port, to have subsequent packets of the traffic flow forwarded along a more-specific path.Type: ApplicationFiled: January 17, 2013Publication date: July 17, 2014Applicant: CISCO TECHNOLOGY, INC.Inventors: Pags Krishnamoorthy, Rajagopalan Janakiraman, Chia Alex Tsai, Vinay Parameswarannair