Patents by Inventor Carlos M. Pignataro

Carlos M. Pignataro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240370656
    Abstract: A method includes associating anomalous first text, from a first unstructured data set, with a first classification; processing the first unstructured data set using at least one of ML or AI to identify a second text that is in close context to the first text, and adding the second text to a text list associated with the first classification; enriching the text list by processing the second text to generate a third text, and adding the third text to the text list to produce an enriched text list and such that the third text is also associated with the first classification; matching the text in the enriched text list to text in a second unstructured data set; and classifying the text in the second unstructured data set as having the first classification when the text in the second unstructured data set matches text in the enriched text list.
    Type: Application
    Filed: June 14, 2024
    Publication date: November 7, 2024
    Inventors: Dmitri Goloubev, Nassim Benoussaid, Volodymyr Iashyn, Borys Viacheslavovych Berlog, Carlos M. Pignataro
  • Patent number: 12126691
    Abstract: A connection request is received from a user device associated with a user. The connection request includes an identifier associated with a profile associated with the user, the profile being a static profile or a dynamic profile. An observability profile associated with the user is identified based on the profile when the profile is a static profile and based on a current traffic profile associated with the user device when the profile is a dynamic profile. Measurements associated with a data session are executed for the user device based on the observability profile and one or more configurations are adjusted in a network to improve performance of the data session based on the measurements.
    Type: Grant
    Filed: May 18, 2022
    Date of Patent: October 22, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, David John Zacks, Thomas Szigeti
  • Publication number: 20240349041
    Abstract: This disclosure describes techniques for enabling selective connections between user devices and trusted network devices. An example method includes receiving a beacon from a network device. The beacon includes a trust level of the network device. The method further includes determining that the trust level of the network device satisfies a predetermined trust criterion. Based on determining that the trust level of the network device satisfies the predetermined trust criterion, the method includes transmitting a connection request to the network device. Further, user data is received from the network device.
    Type: Application
    Filed: June 26, 2024
    Publication date: October 17, 2024
    Inventors: David J. Zacks, Thomas Szigeti, Carlos M. Pignataro, Jerome Henry
  • Patent number: 12118444
    Abstract: Systems, methods, and computer-readable for cognitive sensor fusion management include obtaining one or more data streams from one or more sensors. Learning algorithms are used for determining whether a combination of the one or more data streams includes sufficient information for achieving a desired outcome, based on context, business verticals, or other considerations. One or more modifications are determined to at least the one or more data streams or one or more sensors based on whether the combination of the one or more data streams includes sufficient information for achieving the desired outcome. In a closed-loop system, feedback from implementing the one or more modifications can be used to update the desired outcome.
    Type: Grant
    Filed: August 22, 2023
    Date of Patent: October 15, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Simon Dyke, David Delano Ward
  • Patent number: 12120538
    Abstract: Failure prediction signaling and cognitive user migration may be provided. A client device may receive at least a portion of failure prediction data. The client device may then analyze the at least the portion of the failure prediction data. The client device may then roam from a first computing device to a second computing device in response to analyzing the at least the portion of the failure prediction data.
    Type: Grant
    Filed: June 12, 2023
    Date of Patent: October 15, 2024
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Jerome Henry, Robert E. Barton
  • Patent number: 12101219
    Abstract: Techniques for identifying nodes in a data center fabric that are affected by a failure in the fabric, and selectively sending disaggregation advertisements to the nodes affected by the failure. The techniques include a process where a component monitors the network fabric to identify communication paths between leaf nodes, and determines what leaf nodes would be affected by a failure in those communication paths. The component may detect a failure in the network and determine which communication paths, and thus which leaf nodes, are affected by the failure and send disaggregation advertisements to the affected leaf nodes. In some examples, ingress leaf nodes send data through the fabric that indicate egress nodes for the communication paths. Intermediate nodes along may receive the data from the leaf nodes to identify communication paths, and the notify only affected nodes upon detecting a failure in the network.
    Type: Grant
    Filed: January 31, 2023
    Date of Patent: September 24, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Pascal Thubert, Nagendra Kumar Nainar, Carlos M. Pignataro
  • Patent number: 12088628
    Abstract: In one embodiment, an access policy enforcement service receives a user authentication request from an end-user device. The access policy enforcement service identifies a telemetry collection intent from the user authentication request. The access policy enforcement service determines a monitoring policy based on the telemetry collection intent identified from the user authentication request. The access policy enforcement service configures, according to the monitoring policy, one or more telemetry collection agents to collect telemetry for traffic associated with the end-user device.
    Type: Grant
    Filed: October 8, 2021
    Date of Patent: September 10, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Rahul Rammanohar, Kondaveeti Lakshmi Ganesh, David John Zacks
  • Patent number: 12052176
    Abstract: Techniques for policy-based failure handling of data that is received for processing by failed edge services are described herein. The techniques may include receiving, at an edge node of a network, a data handling policy for a service hosted on the edge node. The service may be configured to process traffic on behalf of an application hosted by a cloud-based platform. In some examples, the data handling policy may be stored in a memory that is accessible to the edge node. The techniques may also include receiving traffic at the edge node that is to be processed at least partially by the service. At least partially responsive to detecting an error associated with the service, the edge node may cause the traffic to be handled according to the data handling policy while the service is experiencing the error.
    Type: Grant
    Filed: October 6, 2021
    Date of Patent: July 30, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Rajesh Indira Viswambharan, Nagendra Kumar Nainar, Akram Sheriff, Vinay Saini, David J. Zacks, Carlos M. Pignataro
  • Patent number: 12052562
    Abstract: This disclosure describes techniques for enabling selective connections between user devices and trusted network devices. An example method includes receiving a beacon from a network device. The beacon includes a trust level of the network device. The method further includes determining that the trust level of the network device satisfies a predetermined trust criterion. Based on determining that the trust level of the network device satisfies the predetermined trust criterion, the method includes transmitting a connection request to the network device. Further, user data is received from the network device.
    Type: Grant
    Filed: September 13, 2021
    Date of Patent: July 30, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: David J. Zacks, Thomas Szigeti, Carlos M. Pignataro, Jerome Henry
  • Publication number: 20240250946
    Abstract: Embodiments herein describe disconnecting, by an access node, a first device having a first media access control (MAC) address due to a network violation and receiving, by the access node, information about a second device having a second MAC address different from the first MAC address. In one embodiment, the information is generated by a certificate server based on a token generated by the second device. Further, when the access node determines, based on the information, that the second device is the first device, the access node denies a connection request from the second device.
    Type: Application
    Filed: April 1, 2024
    Publication date: July 25, 2024
    Inventors: Carlos M. PIGNATARO, Nagendra Kumar NAINAR, Jerome HENRY, Robert E. BARTON, Bart A. BRINCKMAN
  • Patent number: 12039276
    Abstract: A method includes associating anomalous first text, from a first unstructured data set, with a first classification; processing the first unstructured data set using at least one of ML or AI to identify a second text that is in close context to the first text, and adding the second text to a text list associated with the first classification; enriching the text list by processing the second text to generate a third text, and adding the third text to the text list to produce an enriched text list and such that the third text is also associated with the first classification; matching the text in the enriched text list to text in a second unstructured data set; and classifying the text in the second unstructured data set as having the first classification when the text in the second unstructured data set matches text in the enriched text list.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: July 16, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Dmitri Goloubev, Nassim Benoussaid, Volodymyr Iashyn, Borys Viacheslavovych Berlog, Carlos M. Pignataro
  • Patent number: 12028378
    Abstract: A method for resuming a Transport Layer Security (TLS) session in a Service Function Chain comprising a plurality of Service Function nodes coupled to a Service Function Forwarder. A request is received at a first Service Function node to establish a TLS session, and a Pre-Shared Key (PSK) and a PSK identifier that uniquely correspond to the first Service Function node and the TLS session are generated. The PSK identifier is forwarded to one or more of the Service Function Forwarder and the plurality of Service Function nodes. A request to resume the TLS session is received from a client device that previously disconnected. It is determined that the connection request contains the PSK identifier, a second Service Function node is selected, and the TLS session is re-established between the client device and the second Service Function node using the same PSK as the prior TLS session.
    Type: Grant
    Filed: December 19, 2022
    Date of Patent: July 2, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: K Tirumaleswar Reddy, Prashanth Patil, Carlos M. Pignataro
  • Publication number: 20240205186
    Abstract: An authorization device obtains a registration request associated with an end device, the registration request including a new randomized media access control (MAC) address associated with the end device; determines whether the end device is authorized to use the new randomized MAC address; transmits a message to the end device with a first randomly generated number when it is determined that the end device is authorized to use the new randomized MAC address; obtains integrity information associated with the end device, the first integrity information being computed based on the first randomly generated number; transmits a request to a validation system to validate the end device based on the first integrity information; obtains an indication that the end device is validated; determines policies associated with the end device when it is determined that the end device is validated; and applies the policies to the end device.
    Type: Application
    Filed: February 29, 2024
    Publication date: June 20, 2024
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Robert E. Barton, Jerome Henry
  • Publication number: 20240195751
    Abstract: A method of orchestrating one or more radio resources among various services executing within a container. The method includes obtaining, by an orchestration engine executing on a network device, a request, from a first service of a plurality of services, for use of a physical/hardware resource that connects a container running on the network device to a network. The request from the first service has a particular priority. The plurality of services execute within the container. The method further includes determining whether to connect the first service to the network via the physical/hardware resource based on the priority and an availability status of the physical/hardware resource and establishing, at a kernel level, a connection between the first service and the physical/hardware resource based on the determining.
    Type: Application
    Filed: February 27, 2024
    Publication date: June 13, 2024
    Inventors: Shankar Ramanathan, Nagendra Kumar Nainar, Carlos M. Pignataro
  • Publication number: 20240195678
    Abstract: A method is performed by a network controller that is configured to control routers configured to forward a multicast flow downstream from a first hop router that is a root of a multicast tree formed by the routers to last hop routers that terminate branches of the multicast tree, respectively. The method includes collecting operational configuration information from the routers and constructing a topological view of the multicast tree based on the operational configuration information; causing the routers to forward multicast probes downstream from the first hop router along all of the branches toward the last hop routers to trace the multicast tree; receiving, from particular ones of the last hop routers that received the multicast probes, indications that the multicast probes were received; and detecting failures in the multicast tree based on the indications and the topological view.
    Type: Application
    Filed: December 13, 2022
    Publication date: June 13, 2024
    Inventors: Mankamana Prasad Mishra, Nitin Kumar, Frank Brockners, Carlos M. Pignataro, Rakesh Gandhi
  • Publication number: 20240171616
    Abstract: Differentiated service in a federation-based access network is provided by receiving a set of credentials from a User Equipment (UE) for a wireless network offering a plurality of service levels. In response to determining that the set of credentials indicate a realm associated with a given service level, network access is provided to the UE according to the given service level. In response to determining that the given service level is not a highest service level in the wireless network, a list of one or more preferred realms is transmitted to the UE, where each realm of the list of one or more preferred realms is associated with one or more higher service levels than the given service level.
    Type: Application
    Filed: January 25, 2024
    Publication date: May 23, 2024
    Inventors: Jerome HENRY, Robert E. BARTON, Carlos M. PIGNATARO, Nagendra Kumar NAINAR, Malcolm M. SMITH, Mark GRAYSON, Bart A. BRINCKMAN
  • Patent number: 11991090
    Abstract: A method of orchestrating one or more radio resources among various services executing within a container. The method includes obtaining, by an orchestration engine executing on a network device, a request, from a first service of a plurality of services, for use of a physical/hardware resource that connects a container running on the network device to a network. The request from the first service has a particular priority. The plurality of services execute within the container. The method further includes determining whether to connect the first service to the network via the physical/hardware resource based on the priority and an availability status of the physical/hardware resource and establishing, at a kernel level, a connection between the first service and the physical/hardware resource based on the determining.
    Type: Grant
    Filed: October 19, 2022
    Date of Patent: May 21, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Shankar Ramanathan, Nagendra Kumar Nainar, Carlos M. Pignataro
  • Publication number: 20240154947
    Abstract: Aspects of the disclosure include a method and associated network device. The method includes authenticating an identity of a user of a client device after the client device is associated with an access network provider. Authenticating the identity of the user comprises receiving, from an identity provider, a credential associated with the identity, and receiving, from the identity provider, information identifying a network-based service to be applied to network traffic with the client device. The method further includes establishing, using the credential and the received information, a secure connection between the access network provider and a service provider that is capable of providing the network-based service. The method further includes receiving network traffic from the service provider. Packets of the network traffic include an assurance value that enables the client device to determine that the network-based service is being provided by the service provider.
    Type: Application
    Filed: January 16, 2024
    Publication date: May 9, 2024
    Inventors: Nagendra Kumar NAINAR, Robert E. BARTON, Carlos M. PIGNATARO, Jerome HENRY, Bart A. BRINCKMAN
  • Patent number: 11979403
    Abstract: Embodiments herein describe disconnecting, by an access node, a first device having a first media access control (MAC) address due to a network violation and receiving, by the access node, information about a second device having a second MAC address different from the first MAC address. In one embodiment, the information is generated by a certificate server based on a token generated by the second device. Further, when the access node determines, based on the information, that the second device is the first device, the access node denies a connection request from the second device.
    Type: Grant
    Filed: May 27, 2021
    Date of Patent: May 7, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Carlos M. Pignataro, Nagendra Kumar Nainar, Jerome Henry, Robert E. Barton, Bart A. Brinckman
  • Patent number: 11979744
    Abstract: Federation policy exchange is provided in response to receiving a sharing query from an Access Point (AP) indicating that an associated wireless network supports federated identities with data sharing, determining whether the sharing query is within sharing preferences; and in response to determining that the sharing query is within the sharing preferences, transmitting, to the AP, a positive response for identity sharing that authorizes collection and sharing of identity data with at least one entity identified in a sharing policy for the associated wireless network. In various embodiments, federation policy exchange includes transmitting a support notification, via an AP, indicating support for federated identities with data sharing within a wireless network associated with the AP; and in response to receiving a first identify sharing preference from a User Equipment (UE) that indicates that negotiation is preferred, transmitting a sharing policy for the wireless network to the UE.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: May 7, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Jerome Henry, Louis G. Samuel, Mark Grayson, Bart A. Brinckman, Robert E. Barton, Carlos M. Pignataro, Nagendra Kumar Nainar, Matthew MacPherson