Patents by Inventor AKRAM ISMAIL SHERIFF

AKRAM ISMAIL SHERIFF has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11917015
    Abstract: Presented herein are techniques to facilitate infrastructure and policy orchestration in a shared workspace network environment. In one example, a method may include obtaining, by a service broker, a reservation request from a consumer network for a consumer, wherein the reservation request seeks a reservation to reserve, at least in part, at least one workspace device for the consumer for a workspace for a particular day and a particular time period; based on determining that the at least one workspace device is available, providing a response to the consumer network that includes a first indicator for identifying the reservation of the workspace and at least one second indicator identifying the at least one workspace device; and upon receiving a session request from the consumer network that includes the second indicator, establishing a management tunnel to interconnect the consumer network and the at least one workspace device via the service broker.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: February 27, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Carlos M. Pignataro, Nagendra Kumar Nainar, David John Zacks, John Matthew Swartz, Akram Ismail Sheriff
  • Publication number: 20230379319
    Abstract: In one embodiment, a method herein comprises: receiving, at a device, a registration request from a telemetry exporter that transmits telemetry data; generating, by the device, a telemetry configuration file for the telemetry exporter, the telemetry configuration file defining a policy for transmission of telemetry data from the telemetry exporter and an authentication token for the telemetry exporter; sharing, by the device, the policy with a security enforcer; and sending, by the device, the telemetry configuration file to the telemetry exporter, wherein the telemetry exporter is caused to connect with the security enforcer using the authentication token, send the telemetry configuration file to the security enforcer, and transmit collected telemetry data to the security enforcer, and wherein the security enforcer is caused to create a dynamic publish-subscribe stream for publishing the collected telemetry data received from the telemetry exporter based on the telemetry configuration file and the policy.
    Type: Application
    Filed: May 20, 2022
    Publication date: November 23, 2023
    Inventors: Vinay Saini, Rajesh Indira VISWAMBHARAN, Nagendra Kumar NAINAR, Akram Ismail SHERIFF, David John ZACKS
  • Patent number: 11809548
    Abstract: Runtime security threats are detected and analyzed for serverless functions developed for hybrid clouds or other cloud-based deployment environments. One or more serverless functions may be received and executed within a container instance executing in a controlled and monitored environment. The execution of the serverless functions is monitored, using a monitoring layer in the controlled environment to capture runtime data including container application context statistics, serverless function input and output data, and runtime parameter snapshots of the serverless functions. Execution data associated with the serverless functions may be analyzed and provided to various supervised and/or unsupervised machine-learning models configured to detect and analyze runtime security threats.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: November 7, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Akram Ismail Sheriff, Timothy David Keanini
  • Patent number: 11811648
    Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
    Type: Grant
    Filed: September 6, 2022
    Date of Patent: November 7, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
  • Patent number: 11811784
    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.
    Type: Grant
    Filed: June 3, 2022
    Date of Patent: November 7, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff
  • Patent number: 11770251
    Abstract: Techniques and mechanisms for providing continuous integrity validation-based control plane communication in a container-orchestration system, e.g., the Kubernetes platform. A worker node generates a nonce and forwards the nonce to a master node while requesting an attestation token. Using the nonce, the master node generates the attestation token and replies back to the worker node with the attestation token. The worker node validates the attestation token with a CA server to ensure that the master node is not compromised. The worker node sends its authentication credentials to the master node. The master node generates a nonce and forwards the nonce to the worker node while requesting an attestation token. Using the nonce, the worker node generates the attestation token and replies back to the master node with the attestation token. The master node validates the attestation token with the CA server to ensure that the worker node is not compromised.
    Type: Grant
    Filed: September 9, 2020
    Date of Patent: September 26, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff
  • Publication number: 20230254379
    Abstract: Presented herein are techniques to facilitate infrastructure and policy orchestration in a shared workspace network environment. In one example, a method may include obtaining, by a service broker, a reservation request from a consumer network for a consumer, wherein the reservation request seeks a reservation to reserve, at least in part, at least one workspace device for the consumer for a workspace for a particular day and a particular time period; based on determining that the at least one workspace device is available, providing a response to the consumer network that includes a first indicator for identifying the reservation of the workspace and at least one second indicator identifying the at least one workspace device; and upon receiving a session request from the consumer network that includes the second indicator, establishing a management tunnel to interconnect the consumer network and the at least one workspace device via the service broker.
    Type: Application
    Filed: February 9, 2022
    Publication date: August 10, 2023
    Inventors: Carlos M. Pignataro, Nagendra Kumar Nainar, David John Zacks, John Matthew Swartz, Akram Ismail Sheriff
  • Publication number: 20230208855
    Abstract: In one embodiment, a method comprises: receiving, by a process, an executed function flow of a daisy chained serverless function-as-a-service (FaaS) function, the executed function flow having been injected with a particular trace identifier in response to an initial event trigger and span identifiers having been injected by each service that was executed; generating, by the process, a serverless flow graph associated with the particular trace identifier based on linking a path of serverless functions according to correlation of the span identifiers between the serverless functions; performing, by the process, a trace-based analysis of the serverless flow graph through comparison to a baseline of expectation; detecting, by the process, one or more anomalies in the serverless flow graph according to the trace-based analysis; and mitigating, by the process, the one or more anomalies in the serverless flow graph.
    Type: Application
    Filed: December 22, 2021
    Publication date: June 29, 2023
    Inventors: Akram Ismail Sheriff, Rajiv Asati, Nagendra Kumar Nainar, Ariel Shuper, Hendrikus G.P. Bosch
  • Publication number: 20230188496
    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.
    Type: Application
    Filed: February 3, 2023
    Publication date: June 15, 2023
    Inventors: Thomas Szigeti, David John Zacks, Akram Ismail Sheriff, Guy Keinan, Walter T. Hulick, JR.
  • Patent number: 11601393
    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.
    Type: Grant
    Filed: October 4, 2021
    Date of Patent: March 7, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Thomas Szigeti, David John Zacks, Akram Ismail Sheriff, Guy Keinan, Walter T. Hulick, Jr.
  • Patent number: 11558927
    Abstract: In one embodiment, a supervisory service for a wireless network obtains frequency-time Doppler profile information for an endpoint node attached to a first access point in the wireless network. The supervisory service uses the frequency-time Doppler profile information for the endpoint node as input to a machine learning model. The machine learning model is trained to output an action for the endpoint node with respect to the wireless network. The supervisory service causes the action for the endpoint node with respect to the wireless network to be performed.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: January 17, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Shankar Ramanathan, M. David Hanes, Muhilan Natarajan, Gonzalo Salgueiro, Robert Edgar Barton, Jerome Henry, Akram Ismail Sheriff
  • Patent number: 11558194
    Abstract: In one embodiment, a method comprises: receiving, by a parent network device providing at least a portion of a directed acyclic graph (DAG) according to a prescribed routing protocol in a low power and lossy network, a destination advertisement object (DAO) message, the DAO message specifying a target Internet Protocol (IP) address claimed by an advertising network device in the DAG and the DAO message further specifying a secure token associated with the target IP address; and selectively issuing a cryptographic challenge to the DAO message to validate whether the advertising network device generated the secure token.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: January 17, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Pascal Thubert, Huimin She, Patrick Wetterwald, Akram Ismail Sheriff, Eric Michel Levy-Abegnoli
  • Patent number: 11523314
    Abstract: In one embodiment, a device in a wireless network receives telemetry data from a plurality of autonomous vehicles. The telemetry data is indicative of radio signal quality metrics experienced by the vehicles at a particular location over time. The device forms an array of wireless roaming thresholds by applying regression to the telemetry data. The device computes an optimum roaming threshold from the array of wireless roaming thresholds to be used by the vehicles when approaching the location. The device triggers, based on the computed optimum threshold, one or more of the autonomous vehicles to initiate access point roaming when approaching the particular location.
    Type: Grant
    Filed: January 6, 2021
    Date of Patent: December 6, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Akram Ismail Sheriff, Xiaoguang Jason Chen, Jun Liu, Robert Edgar Barton, Jerome Henry
  • Patent number: 11489762
    Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
    Type: Grant
    Filed: June 2, 2020
    Date of Patent: November 1, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
  • Publication number: 20220294806
    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.
    Type: Application
    Filed: June 3, 2022
    Publication date: September 15, 2022
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff
  • Publication number: 20220254509
    Abstract: This disclosure describes techniques for identifying and reporting a space or individual that has been exposed to an infectious disease. An example method includes identifying sensor data related to one or more individuals in a space; determining, based on the sensor data, that a particular individual among the one or more individuals is infected with an infectious disease; generating a report requesting that the space be disinfected; and outputting the report to a computing device.
    Type: Application
    Filed: February 5, 2021
    Publication date: August 11, 2022
    Inventors: Akram Ismail Sheriff, Hazim Hashim Dahir, Thomas Szigeti
  • Patent number: 11362837
    Abstract: In one embodiment, a method comprises: identifying, by a root network device of a directed acyclic graph (DAG) in a low power and lossy network, a child network device in the DAG, including identifying a first rank associated with the child network device; allocating, by the root network device, an allocated rank for the child network device, the allocated rank different from the first rank; and outputting, by the root network device, a message to the child network device specifying the allocated rank, the message causing the child network device to implement the allocated rank in the DAG, including causing the child network device to generate and output a Destination Oriented Directed Acyclic Graph (DODAG) information object (DIO) message specifying the child network device is using the allocated rank.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: June 14, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Pascal Thubert, Huimin She, Patrick Wetterwald, Akram Ismail Sheriff, Eric Michel Levy-Abegnoli
  • Patent number: 11356461
    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: June 7, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff
  • Publication number: 20220129540
    Abstract: Runtime security threats are detected and analyzed for serverless functions developed for hybrid clouds or other cloud-based deployment environments. One or more serverless functions may be received and executed within a container instance executing in a controlled and monitored environment. The execution of the serverless functions is monitored, using a monitoring layer in the controlled environment to capture runtime data including container application context statistics, serverless function input and output data, and runtime parameter snapshots of the serverless functions. Execution data associated with the serverless functions may be analyzed and provided to various supervised and/or unsupervised machine-learning models configured to detect and analyze runtime security threats.
    Type: Application
    Filed: October 22, 2020
    Publication date: April 28, 2022
    Inventors: Akram Ismail Sheriff, Timothy David Keanini
  • Publication number: 20220103570
    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff