Patents by Inventor Cisco Technology
Cisco Technology has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130174279Abstract: A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket storing data, and employing the controller to corrupt at least a portion of the data.Type: ApplicationFiled: February 22, 2013Publication date: July 4, 2013Inventor: Cisco Technology, Inc.
-
Publication number: 20130157658Abstract: Some embodiments disclose a method for providing a tracking area identity list in a communications network. The method includes maintaining a tracking area transition likelihood and a tracking area group transition likelihood, and recording a mobility number and a paging number. The method further includes determining a category associated with the user equipment device based on the recorded mobility number and the recorded paging number, and generating the tracking area identity list for the user equipment device based on the category associated with the user equipment device and one or both of the tracking area transition likelihood and the tracking area group transition likelihood.Type: ApplicationFiled: February 11, 2013Publication date: June 20, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130155877Abstract: In one embodiment, a circuit that extends between a head-end label switching router (LSR) and a tail-end LSR and traverses one or more intermediate LSRs is locked to data plane traffic. The head-end LSR transmits a packet along the circuit that includes a particular time-to-live (TTL) value configured to expire at a particular intermediate LSR at which loopback is to occur. The circuit is used in a loopback mode. The head-end LSR transmits along the circuit a packet that includes a cease loopback request. The circuit ceases to be used in the loopback mode. The circuit is unlocked to permit the circuit to pass data plane traffic.Type: ApplicationFiled: February 19, 2013Publication date: June 20, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130148489Abstract: In one embodiment, a maintenance intermediate point (MIP) receives a packet traveling along a multi-protocol label switching (MPLS) label switched path (LSP) that extends from a first maintenance end point (MEP) to a second MEP. The receiving MIP decrements a time-to-live (TTL) value in a header of the packet. In response the TTL value in the header of the packet equaling a particular value, the receiving MIP examines an associated channel header (ACH) field in an operations, administration, and maintenance (OAM) message stored in a payload of the packet, and determines a particular OAM function to perform based on a code in the ACH field. The receiving MIP performs the particular OAM function.Type: ApplicationFiled: February 6, 2013Publication date: June 13, 2013Applicant: Cisco Technology, Inc.Inventor: Cisco Technology, Inc.
-
Publication number: 20130132197Abstract: In one embodiment, a method comprises identifying, in a network, user selection preferences of an identified user having accessed the network, the identifying based on an accumulation of user selection inputs executed by the identified user, the user selection inputs accumulated relative to input options presented to the user and identifying respective available network items; classifying, by an apparatus in the network, the identified user into one of multiple user affinity categories relative to an advertisement campaign for a targeted product, the classifying based on determining whether one of the user selection inputs represents a view gesture of the user having viewed the targeted product; and selecting an advertisement asset for delivery to the identified user based on the classifying of the identified user into the one user affinity category.Type: ApplicationFiled: January 8, 2013Publication date: May 23, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130128773Abstract: In one embodiment, a node N, within a computer network that utilizes a directed acyclic graph (DAG) to route packets, may select a parent node P that is a parent to the node N in the DAG. The node N may determine a grandparent node GP within the computer network that is a parent of the parent node P in the DAG. The node N may select an alternate parent node P? within the computer network that has connectivity to the grandparent node GP and the node N. A sibling connection may be established within the computer network between the parent node P and the alternate parent node P?. The sibling connection may provide a path for reaching prefixes reachable via the node N.Type: ApplicationFiled: January 18, 2013Publication date: May 23, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc
-
Publication number: 20130129342Abstract: Optical safety functions are incorporated into protection switching modules which maintain redundant pathways to avoid interruptions in optical network connections. The optical safety functions which lower optical power levels upon interruptions of optical connections are effectively combined with protection switching procedures which are also triggered by interruptions in optical network connections. The interoperation of protection and safety processes keep optical power levels below hazardous levels at system points which might be accessible to human operators.Type: ApplicationFiled: January 14, 2013Publication date: May 23, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130132690Abstract: In an embodiment, a data processing method comprises, in a computer executing a supervisor program: the supervisor program establishing a plurality of different memory access permissions comprising any combination of read, write, and execute permissions for one or more different regions of memory of a first domain; setting the memory access permissions of a first set of the regions of memory to execute only; in response to a request from a process to read or write a particular region of memory in the first set, performing one or more responsive actions that prevent the process from reading or modifying one or more instructions or one or more embedded immediate values of the particular region of memory. Embodiments provide selective access to executable memory.Type: ApplicationFiled: November 21, 2012Publication date: May 23, 2013Applicant: Cisco Technology, Inc.Inventor: Cisco Technology, Inc.
-
Publication number: 20130124948Abstract: This invention relates to methods for obtaining a bin number of path metrics. When performing such methods, a histogram is provided, which composes a bin number of values, a maximum value and a tail region left or right of the maximum value. A bin number of path metrics is obtained from said values. According to an embodiment a local extremum is removed from said tail region. According to another embodiment the tail region is forced to be convex. According to a further embodiment a maximum metric difference between neighboring metrics is ensured.Type: ApplicationFiled: January 3, 2013Publication date: May 16, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130124977Abstract: In particular embodiments, a method for editing a web page includes identifying a plurality of components that collectively form a programmatic representation of a first web page. At least one of the components has content that dynamically changes in response to data retrieved externally from the content. A second web page is generated. The second web page includes a plurality of parameters. Each parameter of the second web page corresponds to a respective one of the identified plurality of components. One or more modifications made to the plurality of parameters are interpreted. A programmatic representation of a third web page is generated, the generation based at least in part on the interpretation.Type: ApplicationFiled: January 4, 2013Publication date: May 16, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130115963Abstract: Particular embodiments provide an access gateway that facilitates communication between a plurality of access technologies. The access gateway facilitates data communication with an access terminal through a bearer path. A radio resource manager is configured to provide radio resource management functions for the communications. The radio resource manager is decoupled from the bearer path and provides control of radio transmission characteristics for the bearer path to the gateway. Because the radio resource manager is not in the bearer path, the access gateway may be access technology agnostic. Thus, the access gateway does not need to have access-specific modules based on the radio technology for each bearer path.Type: ApplicationFiled: December 3, 2012Publication date: May 9, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130114456Abstract: Systems and methods for providing trigger based dynamic changes to a packet flow in a communication network are described. The trigger based dynamic changes can include upgrading and downgrading quality of service (QoS), processing the packet flow, and providing services to the packet flow. These changes can be provided by inspecting packets at a gateway for trigger conditions and setting up a proxy instance for the packet flows. The proxy can coordinate QoS changes and management of packet flows. The triggers can be based on the destination of the packet, for example, the uniform resource locator (URL) and/or by the services (e.g., email, video, messaging) that the subscriber is accessing. The triggers can also be based on the identity of the user or agreements a provider might have with an operator of network equipment for users accessing the provider's website.Type: ApplicationFiled: December 21, 2012Publication date: May 9, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130095799Abstract: In one embodiment, a method for ensuring quality of a media message is provided. The method includes receiving information for a media message. At least a portion of the media is analyzed to determine a media quality for the media message. The method then determines if the media quality is acceptable. If the media quality is not acceptable, then an alert may be sent regarding the media quality of the media message. For example, a caller may be prompted to re-record a media message.Type: ApplicationFiled: December 7, 2012Publication date: April 18, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130089110Abstract: A channel synchronization method in which local serializers serially transmits first n-bit codes, respectively, to remote deserializers, respectively. Also local deserializers serially receive first n-bit codes, respectively, from remote serializers, respectively. One of the first n-bit codes transmitted to one of the remote serializers indicates one of the local deserializers is not link aligned.Type: ApplicationFiled: November 30, 2012Publication date: April 11, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130086299Abstract: In an embodiment, a data processing method comprises implementing a memory event interface to a hypercall interface of a hypervisor or virtual machine operating system to intercept page faults associated with writing pages of memory that contain a computer program; receiving a page fault resulting from a guest domain attempting to write a memory page that is marked as not executable in a memory page permissions system; determining a first set of memory page permissions for the memory page that are maintained by the hypervisor or virtual machine operating system; determining a second set of memory page permissions for the memory page that are maintained independent of the hypervisor or virtual machine operating system; determining a particular memory page permission for the memory page based on the first set and the second set; processing the page fault based on the particular memory page permission, including performing at least one security function associated with regulating access of the guest domain to thType: ApplicationFiled: October 3, 2012Publication date: April 4, 2013Applicant: Cisco Technology, Inc.Inventor: Cisco Technology, Inc.
-
Publication number: 20130077629Abstract: An apparatus and method for emulating a shared or source distribution tree within an MPLS network. In one embodiment of the method, a router receives a multicast data packet. The router transmits the multicast data packet to a first router via a first point-to-point label switched path (LSP). The router replicates the multicast data packet to produce a replicated multicast data packet. Then the router transmits the replicated multicast data packet to a second router via a second point-to-point LSP. The first point-to-point LSP is distinct from the second point-to-point LSP.Type: ApplicationFiled: November 20, 2012Publication date: March 28, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130070641Abstract: A system and method wherein mobile nodes scan both 802.16 and 802.11 radio channels for neighbor access points. A mobile node reports both WiMax and WiFi neighbor access points to its parent access point. A parent access point advertises both WiMax and WiFi neighbor access points to child mobile nodes to facilitate faster roaming and load balancing. A parent WiMax AP can direct a mobile node to roam to a neighbor WiFi access point that has a lighter load or offers enhanced services. As an option, a location tracking protocol is used to determine the location of a mobile node and the mobile node's parent AP advertises neighbor APs that offer services in the mobile node's location.Type: ApplicationFiled: November 14, 2012Publication date: March 21, 2013Applicant: Cisco Technology, Inc.Inventor: Cisco Technology, Inc
-
Publication number: 20130057056Abstract: In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to verify that the PD is adapted to receive inline power, then a plurality of classification cycles are carried out to convey a series of inline power classes back to the PSE. The series of inline power classes may all be the same, in which case the PD is legacy equipment and is adapted to receive the power level corresponding to that class. If they are not all the same, information is thus conveyed to the PSE which may, for example, correspond to a specific power level to be applied or to other information.Type: ApplicationFiled: October 3, 2012Publication date: March 7, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130051224Abstract: In one embodiment, a set of tunnels is determined that traverse a particular link connected to an intermediate node in a network. The intermediate node computes, in a coordinated path computation, paths for tunnels of the set of tunnels that do not include the particular link. The coordinated path computation considers each of the tunnels of the set of tunnels. The intermediate node selects one or more tunnels of the set of tunnels for preemption. The one or more tunnels are selected as tunnels that are reroutable by respective head-end nodes of the one or more other tunnels. Notifications are sent to one or more other intermediate nodes that inform the one or more other intermediate nodes of the one or more tunnels selected for preemption.Type: ApplicationFiled: October 26, 2012Publication date: February 28, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.
-
Publication number: 20130051218Abstract: In one embodiment, a spanning tree protocol (STP) is executed to assign a first port of an intermediate network device to a Root Port Role, a second port of the intermediate network device to an Alternate Port Role, a third port of the intermediate network device to a Designated Port Role, and a fourth port of the intermediate network device to a Backup Port Role. At least one bridge protocol data unit (BPDU) message is periodically sent from the first port assigned Root Port Role, the second port assigned Alternate Port Role and the fourth port assigned Backup Port Role, irrespective of receipt of any BPDU messages from neighboring intermediate network devices. In response to a failure to receive a BPDU message from a neighboring intermediate network device on the third port assigned Designated Port Role within a threshold amount of time, one or more actions are taken.Type: ApplicationFiled: October 23, 2012Publication date: February 28, 2013Applicant: CISCO TECHNOLOGY, INC.Inventor: Cisco Technology, Inc.