Patents Assigned to Cisco Technology
-
Patent number: 12113582Abstract: An access point allocates resource units within a first channel to mitigate interference from an adjacent second channel. The access point obtains a measure of signal strength corresponding to each wireless device attached to an access point, and assigns, for each wireless device, resource units with a first frequency band of the first channel to mitigate interference with a second frequency band of a second channel adjacent to the first channel. An assignment between a set of resource units and a particular wireless device is based on the measure of signal strength corresponding to the particular wireless device. The access point communicates with the wireless devices on the resource units.Type: GrantFiled: August 3, 2023Date of Patent: October 8, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Matthew Aaron Silverman, Pooya Monajemi, Vishal Satyendra Desai, John Martin Blosco
-
Patent number: 12114331Abstract: Provided is a scheduling information transmission/reception method and apparatus for an NR system in a wireless communication system. A method for receiving, by a terminal, scheduling information for data transmission or reception in a wireless communication system according to one aspect of the present invention may comprise the steps of: receiving, from a base station, information indicating a first physical resource supporting a first subcarrier spacing within a time interval and a second physical resource supporting a second subcarrier spacing within the time interval; receiving at least one of first scheduling information for the first physical resource and second scheduling information for the second physical resource; and performing the data transmission or reception on the basis of the at least one of the first scheduling information and the second scheduling information.Type: GrantFiled: May 25, 2023Date of Patent: October 8, 2024Assignee: CISCO TECHNOLOGY, INC.Inventor: Dong Hyun Park
-
Patent number: 12113588Abstract: In one embodiment, a method includes receiving low voltage pulse power from power sourcing equipment at a powered device, synchronizing the powered device with a waveform of the low voltage pulse power received from the power sourcing equipment, and operating the powered device with high voltage pulse power received from the power sourcing equipment.Type: GrantFiled: February 9, 2021Date of Patent: October 8, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Douglas Paul Arduini, Sung Kee Baek, Richard Anthony O'Brien, Joel Richard Goergen, Chad M. Jones, Jason DeWayne Potterf, Ruqi Li
-
Patent number: 12113684Abstract: Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.Type: GrantFiled: January 18, 2022Date of Patent: October 8, 2024Assignee: Cisco Technology, Inc.Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Patent number: 12113928Abstract: Methods, apparatus, and systems for the process-efficient generation of data records for data communications involving groups or aggregates of user equipment (UE), such as IoT devices, are described. In one illustrative example, for each one of a plurality of UEs associated with a group or aggregation identifier (ID), a request which includes data indicative of a network resource usage event of the UE is received and the data are stored in association with the group or aggregation ID. In response to identifying a predetermined condition, the data indicative of the network resource usage events associated with the group or aggregation ID are aggregated, and a request for generating a data record based on the aggregated data is sent to a data function for generating the data record. The generated data record (e.g. a CDR) may be stored for subsequent retrieval for reporting, analysis, network/communications management, or billing.Type: GrantFiled: April 12, 2023Date of Patent: October 8, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Konstantin Livanos, Swapna Anandan
-
Patent number: 12113830Abstract: The present technology includes applying a security policy by an application security system to a transaction within an application that is monitored by the application security system. The present technology includes monitoring transaction occurring between a client device an application over a network. The present technology also includes identifying a first transaction from the transactions as a sensitive transaction. The sensitive transaction is associated with an authentication policy requiring an authentication. The present technology also includes interrupting the application. The present technology also includes prompting the client device for the authentication.Type: GrantFiled: March 30, 2021Date of Patent: October 8, 2024Assignee: Cisco Technology, Inc.Inventors: Thomas Szigeti, David John Zacks, Walter T. Hulick, Jr., Tal Maoz
-
Patent number: 12113698Abstract: Techniques and apparatus for allowing a network fabric to accept network devices associated with other fabric networks are described. An example technique involves establishing a communication session between a first network node and a first control plane of the network fabric, wherein the first network node supports a second control plane different from the first control plane; First routing information from the first network node is imported into a first routing table of the first control plane. Second routing information from a second network node is imported into a second routing table of the first network node.Type: GrantFiled: September 3, 2021Date of Patent: October 8, 2024Assignee: Cisco Technology, Inc.Inventors: Rajeev Kumar, Sanjay K. Hooda, Balaji Pitta Venkatachalapathy, Prakash C. Jain, Rajagopal Venkatraman
-
Patent number: 12113640Abstract: A computer network efficiently provides a multicast network flow to a multicast recipient across a multihomed network element. The multihomed network element includes network devices that receive multicast data from a source of a multicast network flow. Each particular network device that received the multicast data publishes a notification indicating that the multicast network flow is available from the particular network device. The computer network receives a subscription to the multicast network flow from a multicast recipient, and determines whether to bridge the multicast data across the multihomed network element based on a multicast configuration of the computer network. The multihomed network element provides the multicast data to the multicast recipient from at least one of the particular network devices that received the multicast data from the source of the multicast network flow.Type: GrantFiled: July 24, 2023Date of Patent: October 8, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Mankamana Mishra, Swadesh Agrawal, Ali Sajassi, Ijsbrand Wijnands, Samir Thoria
-
Publication number: 20240334197Abstract: Wireless planning for reduced power consumption may be provided. Characteristics of a space may be received, wherein the characteristics include a representation of the space. A model of the space may be generated using the representation of the space. Next, a coverage requirement and a power saving requirement may be determined for the space. An initial wireless plan may be generated including one or more APs positioned in the model of the space. The initial wireless plan may be adjusted based on the coverage requirement and the power saving requirement to generate a final wireless plan.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Taha HAJAR, Samer M. SALAM, Amine CHOUKIR, Salvatore VALENZA
-
Publication number: 20240334341Abstract: Improving transmitter Effective Isotropic Radiated Power (EIRP) may be provided. Improving EIRP may include sending a trigger frame to a client and receiving an uplink transmission from the client in response. A client Transmission (TX) power and a Received Signal Strength Indication (RSSI) associated with the client may be determined using the uplink transmission. Next, a client location may be determined. A pathloss associated with the client may be determined using the client location and the uplink transmission. A directional gain may then be determined using the client TX power, the pathloss, and the RSSI. An array gain is determined based on the directional gain. An Access Point (AP) TX power is adjusted based on the array gain.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Sivadeep Reddy KALAVAKURU, Fred Jay ANDERSON, Saber SOLTANI, Xiangxiang FANG
-
Publication number: 20240333404Abstract: Real-time radio self-calibration may be provided. The self-calibration may begin by sampling a Transmission (TX) signal. An achievable Error Vector Magnitude (EVM) for one or more frames may be determined based on the TX signal. Link budgets for clients may be determined using a TX power and a supported Modulation and Coding Scheme (MCS). A per packet TX power is adjusted based on the achievable EVM and a TX retry rate. The PA linearity of the radio may also be adjusted based on the achievable EVM and the link budget. The client may be regrouped into a new MCS based on the link budget.Type: ApplicationFiled: March 28, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Sivadeep KALAVAKURU, Fred ANDERSON, Xiangxiang FANG, Ardalan ALIZADEH
-
Publication number: 20240333738Abstract: A method to perform the techniques described herein includes receiving a first email from a first sender to a first receiver. The method may include determining a first maliciousness prediction that indicates a first likelihood that the first email is malicious. The method may include determining that the first maliciousness prediction fails to satisfy a maliciousness pattern associated with malicious emails. The method may include receiving a second email from the first sender to the first receiver. The method may include determining that the first email and second email were received within a threshold period of time. The method may include determining an overall maliciousness prediction that indicates an overall likelihood that the first email and second email in combination are malicious. The method may include determining that the overall maliciousness prediction satisfies the maliciousness pattern.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Jan Brabec, Tomas Sixta
-
Publication number: 20240333755Abstract: A method of detecting a domain generation algorithm (DGA) may include categorizing a plurality of domain name system (DNS) queries received from a client device based on a perplexity score to obtain a group of categorized DNS queries. The method may further include verifying that the DNS queries correspond to a number of unique qualified names (qnames) or fully quantified domain names (FQDNs) within the group of categorized DNS queries. The method may further include transmitting to a DGA cache a number of entries including an identification of the client device transmitting the DNS queries and a perplexity score, the identification of the client device and the perplexity score defining a family of DNS queries that are produced by the DGA. The method may further include blocking subsequent DNS queries from the client device based on entries within a blocklist.Type: ApplicationFiled: March 27, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: David Rodriguez, Andrea Michelle Kaiser
-
Publication number: 20240334249Abstract: Network initiated Wi-Fi Stream Classification Service (SCS) may be provided. SCS flow parameters may first be negotiated. A flow may be provisioned using the SCS flow parameters. A Station (STA) may associate with an Access Point (AP), and the STA may be allowed to communicate with the AP using the flow according to the SCS flow parameters.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Malcolm SMITH, Indermeet GANDHI, Saswat PRAHARAJ
-
Publication number: 20240334370Abstract: Fine Time Measurement (FTM) improvement for AP self-positioning may be provided. First, an Access Point (AP) graph may be generated. An AP pair may be determined for FTM AP self-positioning based on the AP graph, A plurality of Transmit (TX) signals may be sent to a paired AP of the AP pair using two more TX antennas, wherein the plurality of TX signals include FTM action frames and have a first constant Cyclic Shift Delay (CSD). A plurality of Receive (RX) signals may be received from the paired AP using two or more RX antennas, wherein the plurality of RX signals include FTM action frames and have a second constant CSD, Outlier RX signals having a low Received Signal Strength Indicator (RSSI) may be removed from the plurality of RX signals. An AP position may be determined based on the plurality of RX signals.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Sivadeep Reddy KALAVAKURU, Laurent Alexandre PIERRUGUES, Jerome HENRY, Behrouz SHAYESTEH, Ardalan ALIZADEH
-
Publication number: 20240333598Abstract: Systems and methods provide for creating a network device hierarchy among a plurality of nodes. The network device hierarchy may include a plurality of geography-based groups defined by a corresponding number of geolocations. The operations further include associating each of the plurality of geography-based groups with a plurality of different configuration intents, associating each of the plurality of nodes with one of the plurality of geography-based groups, and deploying the plurality of nodes based on their respective one of the geolocations.Type: ApplicationFiled: May 18, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Ankur Bhargava, Bhairav Dutia, Vivek Agarwal, Aastha Verma
-
Publication number: 20240334416Abstract: Opportunistic power grant, and specifically to providing opportunistic power grants to Access Points (APs) by an Automated Frequency Coordination (AFC) may be provided. An Access Point may be operating in a low power mode. The AP may connect to a STA and send a token to the STA, wherein the token includes a request for a STA location. The AP may receive the STA location in response. The AP may send the token and the STA location to an AFC. The AP may then receive instructions to operate in a standard power mode from the AFC. The AP may change operation to the standard power mode in response.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Indermeet S. GANDHI, Sudhir K. JAIN
-
Publication number: 20240334512Abstract: Alleviating spectral regrowth and Receive (RX) blocking may be provided. To alleviate spectral regrowth and RX blocking one or more targeted intermodulation products may be identified for a Transmit (TX) data packet of a radio of a Multi-Link Device (MLD). A puncture resolution and a puncture position on the Bandwidth (BW) of the TX data packet may then be determined. A puncture of the TX data packet may then be caused, wherein the puncture has the puncture resolution and the puncture position.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Sivadeep Reddy KALAVAKURU, Fred Jay ANDERSON, Robert BADEA, Ardalan ALIZADEH
-
Publication number: 20240333733Abstract: In some aspects, the techniques described herein relate to a method for detecting malicious emails, the method including: receiving an email, wherein the email is associated with a markup payload; determining, based on the markup payload, text data associated with the email; determining, using the text data and a first machine learning model, a first representation of the email representing text associated with the email; rendering the email to generate image data that represents a rendering of the email; determining, using the image data and a second machine learning model, a second representation of the email that represents at least the rendering of the email; and determining a prediction for the email based on the first representation and the second representation, wherein the prediction represents whether the email is predicted to be malicious based on the first representation and the second representation.Type: ApplicationFiled: March 28, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Jan Brabec, Radek Starosta
-
Publication number: 20240333762Abstract: In some aspects, the techniques described herein relate to a method for detecting malicious emails, the method including: receiving an email, wherein the email is associated with a markup payload; determining, based on the markup payload, text data associated with the email; determining, using the text data and a first machine learning model, a first representation of the email representing text associated with the email; rendering the email to generate image data that represents a rendering of the email; determining, using the image data and a second machine learning model, a second representation of the email that represents at least the rendering of the email; and determining a prediction for the email based on the first representation and the second representation, wherein the prediction represents whether the email is predicted to be malicious based on the first representation and the second representation.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Applicant: Cisco Technology, Inc.Inventors: Tomas Sixta, Filip Srajer