Patents by Inventor AKRAM ISMAIL SHERIFF

AKRAM ISMAIL SHERIFF has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220103570
    Abstract: Techniques and mechanisms for providing integrity verified paths using only integrity validated pods of nodes. A network service mesh (NSM) associated with a first pod may locally generate a nonce and provide the nonce to the first pod, where the request includes a request for an attestation token. Using the nonce, the first pod may generate the attestation token and reply back to the NSM. The NSM may generate a second request for an attestation token and forward it to a NSE pod, where the request includes a second locally generated nonce generated by the NSM. The NSE pod may generate the second attestation token using the second nonce and reply back to the NSM. The NSM may then have the attestation tokens verified or validated by a certificate authority (CA) server. The NSM may thus instantiate an integrity verified path between the first pod and the NSE pod.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff
  • Publication number: 20220078015
    Abstract: Techniques and mechanisms for providing continuous integrity validation-based control plane communication in a container-orchestration system, e.g., the Kubemetes platform. A worker node generates a nonce and forwards the nonce to a master node while requesting an attestation token. Using the nonce, the master node generates the attestation token and replies back to the worker node with the attestation token. The worker node validates the attestation token with a CA server to ensure that the master node is not compromised. The worker node sends its authentication credentials to the master node. The master node generates a nonce and forwards the nonce to the worker node while requesting an attestation token. Using the nonce, the worker node generates the attestation token and replies back to the master node with the attestation token. The master node validates the attestation token with the CA server to ensure that the worker node is not compromised.
    Type: Application
    Filed: September 9, 2020
    Publication date: March 10, 2022
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff
  • Publication number: 20210377157
    Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
    Type: Application
    Filed: June 2, 2020
    Publication date: December 2, 2021
    Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
  • Publication number: 20210345451
    Abstract: In one embodiment, a supervisory service for a wireless network obtains frequency-time Doppler profile information for an endpoint node attached to a first access point in the wireless network. The supervisory service uses the frequency-time Doppler profile information for the endpoint node as input to a machine learning model. The machine learning model is trained to output an action for the endpoint node with respect to the wireless network. The supervisory service causes the action for the endpoint node with respect to the wireless network to be performed.
    Type: Application
    Filed: April 30, 2020
    Publication date: November 4, 2021
    Inventors: Shankar Ramanathan, M. David Hanes, Muhilan Natarajan, Gonzalo Salgueiro, Robert Edgar Barton, Jerome Henry, Akram Ismail Sheriff
  • Publication number: 20210288803
    Abstract: In one embodiment, a method comprises: receiving, by a parent network device providing at least a portion of a directed acyclic graph (DAG) according to a prescribed routing protocol in a low power and lossy network, a destination advertisement object (DAO) message, the DAO message specifying a target Internet Protocol (IP) address claimed by an advertising network device in the DAG and the DAO message further specifying a secure token associated with the target IP address; and selectively issuing a cryptographic challenge to the DAO message to validate whether the advertising network device generated the secure token.
    Type: Application
    Filed: June 1, 2021
    Publication date: September 16, 2021
    Inventors: PASCAL THUBERT, HUIMIN SHE, PATRICK WETTERWALD, AKRAM ISMAIL SHERIFF, ERIC MICHEL LEVY-ABEGNOLI
  • Patent number: 11057211
    Abstract: In one embodiment, a method comprises: receiving, by a parent network device providing at least a portion of a directed acyclic graph (DAG) according to a prescribed routing protocol in a low power and lossy network, a destination advertisement object (DAO) message, the DAO message specifying a target Internet Protocol (IP) address claimed by an advertising network device in the DAG and the DAO message further specifying a secure token associated with the target IP address; and selectively issuing a cryptographic challenge to the DAO message to validate whether the advertising network device generated the secure token.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: July 6, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Pascal Thubert, Huimin She, Patrick Wetterwald, Akram Ismail Sheriff, Eric Michel Levy-Abegnoli
  • Patent number: 11051172
    Abstract: In one example, a wireless Access Point (AP) is configured to provide network connectivity between a User Equipment (UE) and a private wireless network. The wireless AP obtains, from the private wireless network, an indication that the UE is unregistered with the private wireless network. In response to the indication that the UE is unregistered with the private wireless network, the wireless AP provides, to the private wireless network, an indication to initiate an emergency attach procedure with respect to the UE. In response to the indication to initiate the emergency attach procedure, the wireless AP obtains, from the private wireless network, an indication that the UE is authorized to access the private wireless network. In response to the indication that the UE is authorized to access the private wireless network, the wireless AP provides guest access to the private wireless network on behalf of the UE.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: June 29, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Raghavaiah Avula, Akram Ismail Sheriff, Santosh Ramrao Patil, Gangadharan Byju Pularikkal
  • Patent number: 10999738
    Abstract: Techniques for identification and isolation of Internet-of-Things devices in an enterprise network are described. In one embodiment, a method includes detecting a plurality of devices having a first network interface to connect to a wireless wide area network and a second network interface to connect to an enterprise network. The method also includes identifying a first subset of the plurality of devices as Internet-of-Things (IoT) devices based on at least a detected repetition rate on a physical random access channel of a transmission made by a device of the plurality of devices. The method includes assigning the IoT devices to a separate network segment within the enterprise network.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: May 4, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Santosh Ramrao Patil, Matthew Aaron Silverman, Huaiyi Wang, Gangadharan Byju Pularikkal, Akram Ismail Sheriff
  • Publication number: 20210127309
    Abstract: In one embodiment, a device in a wireless network receives telemetry data from a plurality of autonomous vehicles. The telemetry data is indicative of radio signal quality metrics experienced by the vehicles at a particular location over time. The device forms an array of wireless roaming thresholds by applying regression to the telemetry data. The device computes an optimum roaming threshold from the array of wireless roaming thresholds to be used by the vehicles when approaching the location. The device triggers, based on the computed optimum threshold, one or more of the autonomous vehicles to initiate access point roaming when approaching the particular location.
    Type: Application
    Filed: January 6, 2021
    Publication date: April 29, 2021
    Inventors: Akram Ismail Sheriff, Xiaoguang Jason Chen, Jun Liu, Robert Edgar Barton, Jerome Henry
  • Publication number: 20210051478
    Abstract: In one example, a wireless Access Point (AP) is configured to provide network connectivity between a User Equipment (UE) and a private wireless network. The wireless AP obtains, from the private wireless network, an indication that the UE is unregistered with the private wireless network. In response to the indication that the UE is unregistered with the private wireless network, the wireless AP provides, to the private wireless network, an indication to initiate an emergency attach procedure with respect to the UE. In response to the indication to initiate the emergency attach procedure, the wireless AP obtains, from the private wireless network, an indication that the UE is authorized to access the private wireless network. In response to the indication that the UE is authorized to access the private wireless network, the wireless AP provides guest access to the private wireless network on behalf of the UE.
    Type: Application
    Filed: August 13, 2019
    Publication date: February 18, 2021
    Inventors: Raghavaiah Avula, Akram Ismail Sheriff, Santosh Ramrao Patil, Gangadharan Byju Pularikkal
  • Patent number: 10904778
    Abstract: Techniques and mechanisms for detecting and deducing of urgent messages in low-power and lossy networks (LLNs) using a correlation analysis of the nodes within a network and machine learning (ML) models. Utilizing these techniques, a field network director (FND) of the network can determine neighboring devices within the network. ML models may be utilized to determine that based upon receipt of a power outage notification (PON) message and/or a power restoration notification (PRN) message from nodes, neighboring nodes of the nodes may also have suffered a power outage and/or a subsequent power restoration, even if the FND did not receive a corresponding PON message and/or a corresponding PRN message from the neighboring nodes of the network. Thus, loss of power and subsequent power restoration may be handled for large numbers of neighboring nodes within the network, even when only a few PON messages and/or subsequent PRN messages are received.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: January 26, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Lele Zhang, Akram Ismail Sheriff, Chuanwei Li, Wenjia Wu
  • Patent number: 10904805
    Abstract: In one embodiment, a device in a wireless network receives telemetry data from a plurality of autonomous vehicles. The telemetry data is indicative of radio signal quality metrics experienced by the vehicles at a particular location over time. The device forms an array of wireless roaming thresholds by applying regression to the telemetry data. The device computes an optimum roaming threshold from the array of wireless roaming thresholds to be used by the vehicles when approaching the location. The device triggers, based on the computed optimum threshold, one or more of the autonomous vehicles to initiate access point roaming when approaching the particular location.
    Type: Grant
    Filed: October 22, 2019
    Date of Patent: January 26, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Akram Ismail Sheriff, Xiaoguang Jason Chen, Jun Liu, Robert Edgar Barton, Jerome Henry
  • Patent number: 10743199
    Abstract: Techniques for optimizing performance of narrowband Internet-of-Things (NB-IoT) devices in a wireless wide area network (WWAN) are described. In one embodiment, a method includes providing a NB-IoT base station in an in-band deployment mode to operate within a WWAN. The NB-IoT base station is configured to use a physical resource block of the WWAN for communicating with a plurality of NB-IoT devices. The method includes causing a reduction of a power level for a transmission from an initial power level to a first reduced power level. The method includes obtaining parameters associated with performance and throughput for the WWAN and comparing the parameters to a quality threshold. Based on the comparison of the parameters to the threshold, the method includes determining whether or not to reduce the power level for the physical resource block from the first reduced power level to a second reduced power level.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: August 11, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Santosh Ramrao Patil, Mark Grayson, Gangadharan Byju Pularikkal, Akram Ismail Sheriff
  • Publication number: 20200252809
    Abstract: Techniques for optimizing performance of narrowband Internet-of-Things (NB-IoT) devices in a wireless wide area network (WWAN) are described. In one embodiment, a method includes providing a NB-IoT base station in an in-band deployment mode to operate within a WWAN. The NB-IoT base station is configured to use a physical resource block of the WWAN for communicating with a plurality of NB-IoT devices. The method includes causing a reduction of a power level for a transmission from an initial power level to a first reduced power level. The method includes obtaining parameters associated with performance and throughput for the WWAN and comparing the parameters to a quality threshold. Based on the comparison of the parameters to the threshold, the method includes determining whether or not to reduce the power level for the physical resource block from the first reduced power level to a second reduced power level.
    Type: Application
    Filed: February 1, 2019
    Publication date: August 6, 2020
    Inventors: Santosh Ramrao Patil, Mark Grayson, Gangadharan Byju Pularikkal, Akram Ismail Sheriff
  • Publication number: 20200245148
    Abstract: Techniques for identification and isolation of Internet-of-Things devices in an enterprise network are described. In one embodiment, a method includes detecting a plurality of devices having a first network interface to connect to a wireless wide area network and a second network interface to connect to an enterprise network. The method also includes identifying a first subset of the plurality of devices as Internet-of-Things (IoT) devices based on at least a detected repetition rate on a physical random access channel of a transmission made by a device of the plurality of devices. The method includes assigning the IoT devices to a separate network segment within the enterprise network.
    Type: Application
    Filed: January 28, 2019
    Publication date: July 30, 2020
    Inventors: Santosh Ramrao Patil, Matthew Aaron Silverman, Huaiyi Wang, Gangadharan Byju Pularikkal, Akram Ismail Sheriff
  • Publication number: 20200186349
    Abstract: In one embodiment, a method comprises: receiving, by a parent network device providing at least at portion of a directed acyclic graph (DAG) according to a prescribed routing protocol in a low power and lossy network, a destination advertisement object (DAO) message, the DAO message specifying a target Internet Protocol (IP) address claimed by an advertising network device in the DAG and the DAO message further specifying a secure token associated with the target IP address; and selectively issuing a cryptographic challenge to the DAO message to validate whether the advertising network device generated the secure token.
    Type: Application
    Filed: December 10, 2018
    Publication date: June 11, 2020
    Inventors: PASCAL THUBERT, HUIMIN SHE, PATRICK WETTERWALD, AKRAM ISMAIL SHERIFF, ERIC MICHEL LEVY-ABEGNOLI
  • Publication number: 20200186362
    Abstract: In one embodiment, a method comprises: identifying, by a root network device of a directed acyclic graph (DAG) in a low power and lossy network, a child network device in the DAG, including identifying a first rank associated with the child network device; allocating, by the root network device, an allocated rank for the child network device, the allocated rank different from the first rank; and outputting, by the root network device, a message to the child network device specifying the allocated rank, the message causing the child network device to implement the allocated rank in the DAG, including causing the child network device to generate and output a Destination Oriented Directed Acyclic Graph (DODAG) information object (DIO) message specifying the child network device is using the allocated rank.
    Type: Application
    Filed: November 15, 2019
    Publication date: June 11, 2020
    Inventors: PASCAL THUBERT, HUIMIN SHE, PATRICK WETTERWALD, AKRAM ISMAIL SHERIFF, ERIC MICHEL LEVY-ABEGNOLI