Patents Assigned to Cisco Technology
  • Publication number: 20070104170
    Abstract: Methods and apparatus for registering a mobile device such as a mobile node or mobile router with a Home Agent in an asymmetric link environment. A Foreign Agent associates each of one or more interfaces of the Foreign Agent with a different care-of address. An agent advertisement including the care-of address for the one or more interfaces of the Foreign Agent is then sent via one or more uplinks. A registration request is received via a downlink router. The registration request identifies a care-of address associated with one of the one or more interfaces of the Foreign Agent. One of the interfaces identified by the care-of address is ascertained, thereby identifying the interface to which the mobile device has roamed. The registration request is forwarded to the Home Agent. A registration reply is received from the Home Agent. The registration reply is then forwarded to the mobile device via the ascertained interface.
    Type: Application
    Filed: December 27, 2006
    Publication date: May 10, 2007
    Applicant: Cisco Technology, inc.
    Inventors: Kent Leung, Alpesh Patel
  • Publication number: 20070106786
    Abstract: A method for detecting an infective element in a network environment is provided that includes detecting, by a first computer, an infective element within a second computer. A signal is generated and communicated that identifies the second computer as being associated with the infective element. The signal includes an address associated with the second computer. The signal is received and, in response to the signal, a communicating capability of the second computer is disabled.
    Type: Application
    Filed: September 1, 2006
    Publication date: May 10, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Robert Gleichauf
  • Publication number: 20070104197
    Abstract: Remote routers are configured to block the return path to malicious websites with the use of split tunneling while allowing paths to third party resource websites. The iBGP protocol runs on the agent's router, advertises routes and enables the head-end to set up a policy at each remote router. Enterprise policies for blocking access to “blackholed” website addresses are centrally administered but third party website traffic is not routed to the enterprise's network resources. Since remote offices may connect directly to third party websites, latency is minimized and network resources at the enterprise are not unduly burdened.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 10, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Joel King
  • Publication number: 20070106911
    Abstract: A method and apparatus for secure storage of data by using redundant keys is provided. The method includes encrypting a data set by using a master key, which can be encrypted by different sync keys. Sync keys can be generated by different supervisor cards. Thereafter, the encrypted master key and the encrypted data set can be stored in a memory. Further, credentials stored in one of the supervisor cards can be encrypted and transferred to other supervisor cards, to provide redundancy of supervisor cards.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 10, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Chandan Mishra, Fabio Maino, Anand Hariharan
  • Publication number: 20070106807
    Abstract: A method, system and apparatus for dial plan debugging are provided in the invention. The method includes hop-by-hop debugging of large inter-networks. Information related to a next hop is received at each hop. A set of results, based on this information, including the route pattern of a call, is displayed. The displayed information indicates nodes at which the call may fail. Back-routing of the call in case the call may fail is also described.
    Type: Application
    Filed: November 10, 2005
    Publication date: May 10, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Prashant Hegde, Shiva Shankar J.
  • Patent number: 7215674
    Abstract: An edge router receives datagrams to be forwarded an SVC. If the SVC is not already set up, the edge router buffers the datagrams until the SVC set up is complete. The buffered datagrams are forwarded once the SVC set up is complete. According to another aspect of the present invention, different buffering requirements are supported for different user applications. A policy table may be configured by a service provider specifying the requirements associated with potentially each flow (e.g., combination of source/destination IP addresses, source/destination port number), and the datagram on each flow may be buffered accordingly.
    Type: Grant
    Filed: April 22, 2002
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Pankaj Vyas, Rajeev Govindraj Kolla, Ashoka Kallappa
  • Patent number: 7213768
    Abstract: Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or “sleep” when a user leaves one or more of the devices. Users may be automatically identified and associated. The “presence” of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.
    Type: Grant
    Filed: March 16, 2005
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Labhesh Patel, Shmuel Shaffer, Gebran Chahrouri, Shantanu Sarkar, Bruce Moon, Joseph Khouri
  • Patent number: 7216176
    Abstract: A method of redirecting a client request, directed from a client to a first server, to a second server. The client request is received at the second server and automatically forwarded or redirected to the first server. The first server processes the request and generates a result message, which may include a document formatted in a markup language. The first server sends the result message to the second server. A process at the second server identifies, in the result message, references to resources of the first server. The references to resources of the first server are replaced with translated references that reference the second server, and the translated references are sent to the client as a response to the client request. As a result, subsequent client requests that are based on the response or the result message are always directed to the second server rather than to the first server. Accordingly, the second server can prevent the client from communicating directly with the first server.
    Type: Grant
    Filed: March 1, 2004
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: David N. Still, John S. Calabrese
  • Patent number: 7216164
    Abstract: Mechanisms and techniques provide a method for determining the performance of a server, based upon a connection characteristic of a connection between the server and a client. The connection characteristic, such as the window size of the server, provides information regarding the performance or capacity of the server. Variation between the connection characteristic and a preferred connection characteristic is used by a data communications device, for example, to determine the performance of the server. Based upon the variation in the connection characteristic, the data communications device is then able to direct incoming content requests to other servers in communication with a network, as required.
    Type: Grant
    Filed: October 9, 2002
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Bryan Whitmore, James W. O'Toole, Jr.
  • Patent number: 7215669
    Abstract: Embedded addressing information is identified in a packet by providing a database including a plurality of records. Each record is operable to identify a packet having embedded addressing information and the embedded addressing information in the packet. Packets are compared to the database records to determine whether the packets include embedded addressing information. In response to determining that a packet includes embedded addressing information, the embedded addressing information is identified in the packet for translation between disparate addressing systems.
    Type: Grant
    Filed: December 4, 2002
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventor: Satyanarayana B. Rao
  • Patent number: 7216161
    Abstract: An algorithm and a device manage a feature that allows a user to maintain an active session when moving from port to port. The device comprises a first memory, a second memory, and a verifier. The first memory stores a list of ports. The second memory stores a list of active sessions. Each active session identifies a port on which a user is connected. The verifier communicates with the first memory and the second memory and periodically checks each session in the list of active sessions. If a session is inactive, the verifier searches for the user on other ports. If verifier identifies the user on another port, the verifier updates the list of active sessions with the user identified on that other port.
    Type: Grant
    Filed: November 8, 2001
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: William Peckham, Dandi Lynde-Redman
  • Patent number: 7215641
    Abstract: The present invention provides a per-flow dynamic buffer management scheme for a data communications device. With per-flow dynamic buffer limiting, the header information for each packet is mapped into an entry in a flow table, with a separate flow table provided for each output queue. Each flow table entry maintains a buffer count for the packets currently in the queue for each flow. On each packet enqueuing action, a dynamic buffer limit is computed for the flow and compared against the buffer count already used by the flow to make a mark, drop, or enqueue decision. A packet in a flow is dropped or marked if the buffer count is above the limit. Otherwise, the packet is enqueued and the buffer count incremented by the amount used by the newly-enqueued packet. The scheme operates independently of packet data rate and flow behavior, providing means for rapidly discriminating well-behaved flows from non-well-behaved flows in order to manage buffer allocation accordingly.
    Type: Grant
    Filed: November 2, 2004
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Andreas V. Bechtolsheim, David R. Cheriton
  • Patent number: 7216086
    Abstract: A method is disclosed for automatically identifying and resolving one or more discrepancies in an outsourced manufacturing supply chain in which a plurality of supply chain partners participate. According to this aspect, information representing one or more supply chain events is received from each of the supply chain partners in a database with which each of the supply chain partners may communicate over a public network. One or more rules are applied periodically to the supply chain event information, resulting in generating one or more alerts pertaining to one or more discrepancies that are found in the supply chain event information. The alerts are communicated to the supply chain partners who are participating in a transaction to which the discrepancies relate. Each alert remains active until second information is received that represents a second supply chain event that resolves the alert. According to one feature, the alerts are periodically escalated until they are resolved.
    Type: Grant
    Filed: April 30, 2001
    Date of Patent: May 8, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Franklin Grosvenor, Arvind Bedi, John Turk, Richard Roney, Timothy Butzow
  • Publication number: 20070101414
    Abstract: An endpoint uses Interactive Connectivity Establishment (ICE) to enable multimedia communications to traverse Network Address Translators (NATs). A security policy enables security devices and asymmetric security devices to forward ICE messages. A management device stores information about an initial message. Later, a security device receives an ICE message and sends and authorization request to the management device. The management device compares information in the authorization request to information in memory. According to the comparison, the management device authorizes the security device to forward the ICE message.
    Type: Application
    Filed: November 1, 2005
    Publication date: May 3, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Daniel Wing, Robert Bell
  • Publication number: 20070100871
    Abstract: A method and apparatus for creating management information specifications in a schema by a user. According to various embodiments of the method, a first file is defined by using a metaschema. The metaschema is represented in a schema definition format. Subsequently, a second file corresponding to the first file is defined. The second file includes directives for depicting various elements of a metaschema. The user is then prompted to fill various fields that correspond to the various elements of the metaschema. As a result, the management information specifications are included in a document corresponding to the metaschema. The management information specifications in the document are then converted to form the management information specifications into a metaschema document. The metaschema document represents a schema. The schema includes the management information specifications.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Alexander Clemm, Jung Tjong, Eshwar Rao Yedavalli
  • Publication number: 20070098011
    Abstract: A device and method for routing network data through a network. The device comprises an end cap assembly which includes an end cap coupled to a wiring card having an interposer board. The method includes processing a plurality of network transmissions through an end cap, and routing the network transmissions to an interposer board.
    Type: Application
    Filed: November 1, 2005
    Publication date: May 3, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Thomas Spivey
  • Publication number: 20070097992
    Abstract: A system for resolving address conflicts in a network. In an illustrative embodiment, the system includes an address-configuration module that is adapted to assign addresses to one or more devices. The one or more devices are connected to the network via device interfaces. An interface-monitoring module communicates with the address-configuration module. The interface-monitoring module is adapted to determine when an address conflict involving plural addresses occurs and to provide a signal in response thereto. A conflict-resolution module is adapted to selectively terminate one or more device interfaces associated with the plural addresses in response to the signal and based on the addresses and one or more predetermined precedence rules. In a more specific embodiment, the system further employs a user interface for facilitating selectively adjusting the precedence rules.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Pradeep Singh, David Ward
  • Publication number: 20070099632
    Abstract: A method and system for detecting a wireless network includes receiving at a mobile device a signal having data indicative of a location of the mobile device. A determination is made whether the mobile device is within the coverage area of a specified network based on the data. The mobile device scans for the specified network in response to at least determining that it is within the coverage area of the specified network.
    Type: Application
    Filed: December 18, 2006
    Publication date: May 3, 2007
    Applicant: Cisco Technology, Inc.
    Inventor: Ojas Choksi
  • Patent number: 7212798
    Abstract: An apparatus, a carrier medium storing instructions to implement a method, and a method for controlling the gain of a radio receiver for receiving packets of information in a wireless network. The receiver is connected to an antenna subsystem and has receive signal path including a plurality of sections including a first section coupled to the antenna subsystem and a next section. Each section has an adjustable gain and is able to provide a measure of the signal strength at its output. The method includes waiting for a start of packet indication, providing a measure of the signal strength at the output of the first section and the next section, and adjusting the gains of the first and the next sections using the provided measured signal strengths. In one embodiment, the receive signal path includes a filter, the provided measure for the first section is before the filter, and the provided measure for the second section is after the filter.
    Type: Grant
    Filed: July 17, 2003
    Date of Patent: May 1, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Andrew R. Adams, Philip J. Ryan, Brian Hart
  • Patent number: 7213154
    Abstract: A method for detecting within a networked computer a target vulnerability such as a Trojan Horse residing therein is disclosed, wherein the vulnerability is characterized by a signature response to an encrypted query. The method includes encrypting a plurality of query data packets in accordance with a plurality of encryption keys, each encrypted query data packet including a defined query field specific to the target vulnerability. The method further includes storing the plurality of encrypted query data packets in a memory. The method further includes thereafter scanning the networked computer for a target vulnerability residing within the networked computer by sending successive ones of the encrypted-and-stored query data packets to the host computer and analyzing responses thereto from the host computer with respect to the characteristic signature. Preferably, the encrypting is performed for substantially all of the encryption keys within a defined key space.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: May 1, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Earl Thomas Carter, Michael T. Shinn