Patents by Inventor Derek William Engi
Derek William Engi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250240626Abstract: A method, computer system, and computer program product are provided for performing automated eavesdropping detection and remediation. A distance between a first and second wireless client device is determined with reference to a wireless access point based on wireless signals transmitted by the devices. A first and second signal loss are determined with reference to the first and second wireless client devices and the wireless access point. Material properties for any physical structures between the first and second wireless client devices are derived based on the signal losses. A sound attenuation is determined between the first and second wireless client devices based on the material properties. It is determined whether a first user of the first wireless client device can hear audio of a second user of the second wireless client device based on the sound attenuation determined between the first wireless client device and the second wireless client device.Type: ApplicationFiled: January 19, 2024Publication date: July 24, 2025Inventors: Derek William Engi, Matthew David Barber, Thomas E. Fincher, Marianna Pittokopiti, Matthew Robert Engle, Joseph Michael Clarke
-
Patent number: 12323290Abstract: Methods are provided for generating hierarchical summaries with actionable recommendations having various granularities. Specifically, the methods involve obtaining notifications related to network issues and generating meta-semantic data that includes a summary of each of the notifications. The methods further involve obtaining inventory data of network devices in a plurality of domains of a network. The inventory data includes configuration information of the network devices. The methods further involve generating a multi-level hierarchical summary specific to the network based on the inventory data and the meta-semantic data. The multi-level hierarchical summary includes a first level specific to one or more affected network devices and a second level specific to a group of network devices. The methods further involve providing the multi-level hierarchical summary for performing one or more actions associated with the network.Type: GrantFiled: March 16, 2023Date of Patent: June 3, 2025Assignee: CISCO TECHNOLOGY, INC.Inventors: Qixu Gong, Benjamin L Chang, Qihong Shao, Derek William Engi, Jaime Madruga Rita
-
Publication number: 20250036674Abstract: A method comprises: receiving a query on a topic from a user associated with user attributes indicative of a user comprehension level on the topic; providing the query to an AI model; receiving from the AI model a response to the query that has a response comprehension level on the topic that is less than the user comprehension level; iteratively adding, to the query, topically-relevant user attributes of the user attributes to produce iterative queries that increase in technical detail on the topic; providing the iterative queries to the AI model; responsive to providing the iterative queries, receiving, from the AI model, iterative responses that increase in technical detail on the topic and have response comprehension levels that increase on the topic; and determining, among the iterative responses, a final response having a response comprehension level that most nearly matches the user comprehension level.Type: ApplicationFiled: August 30, 2023Publication date: January 30, 2025Inventors: M. David Hanes, Vivek Kumar Singh, Gonzalo A. Salgueiro, Derek William Engi
-
Publication number: 20250021586Abstract: A method for learning potential correlation of data structures and fields across multiple disparate data sources. The method automatically identifies relationships that exist in multiple data sources to facilitate a data broker that can return the “shortest-path-to-data”. The method includes communicating with a data lake that integrates access to data stored in a plurality of different data sources. The method next includes correlating, via the data lake, data fields in data sets across the plurality of different data sources to identify relationships across the plurality of different data sources. A request to access data is obtained, and the method determines that data for the request is stored in two or more data sources of the plurality of different data sources, selects a particular data source of the two or more data sources and retrieves the data for the request from the particular data source.Type: ApplicationFiled: July 11, 2023Publication date: January 16, 2025Inventors: Derek William Engi, Brett Dunstan, Peter Jozef Hugo De Vriendt, Ravi Garg
-
Publication number: 20240395072Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.Type: ApplicationFiled: July 31, 2024Publication date: November 28, 2024Inventors: Derek William Engi, Gonzalo Salgueiro, Pascale Delaunay, Julie Allen
-
Publication number: 20240388571Abstract: A system and method for an artificial intelligence (AI) confidentiality proxy that can protect a network from the transferal of sensitive AI data sets to outside AI systems. A data contract is established between the proxy and outside AI systems could function as well as user personas for additional protection. This system can also integrate with the network and provide security policy content and inspection rules.Type: ApplicationFiled: July 26, 2023Publication date: November 21, 2024Inventors: M. David Hanes, Vivek Kumar Singh, Gonzalo Salgueiro, Derek William Engi
-
Patent number: 12149410Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.Type: GrantFiled: June 27, 2022Date of Patent: November 19, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Derek William Engi, Gonzalo Salgueiro, M. David Hanes, Bradley Wise, Md Atiqur Rahman
-
Publication number: 20240314020Abstract: Methods are provided for generating hierarchical summaries with actionable recommendations having various granularities. Specifically, the methods involve obtaining notifications related to network issues and generating meta-semantic data that includes a summary of each of the notifications. The methods further involve obtaining inventory data of network devices in a plurality of domains of a network. The inventory data includes configuration information of the network devices. The methods further involve generating a multi-level hierarchical summary specific to the network based on the inventory data and the meta-semantic data. The multi-level hierarchical summary includes a first level specific to one or more affected network devices and a second level specific to a group of network devices. The methods further involve providing the multi-level hierarchical summary for performing one or more actions associated with the network.Type: ApplicationFiled: March 16, 2023Publication date: September 19, 2024Inventors: Qixu Gong, Benjamin L. Chang, Qihong Shao, Derek William Engi, Jaime Madruga Rita
-
Patent number: 12080105Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.Type: GrantFiled: July 16, 2021Date of Patent: September 3, 2024Assignee: Cisco Technology, Inc.Inventors: Derek William Engi, Gonzalo Salgueiro, Pascale Delaunay, Julie Allen
-
Patent number: 11824741Abstract: In one embodiment, an illustrative method herein comprises: determining, by a process, for each group of policies configured across a plurality of network devices in a computer network, an information set having a list of all policy components used for each group and which policies within each group have which particular policy components of the list of all policy components used for that group; performing, by the process, a comparative analysis of similarity and component variance on policies within each group based on the information set; deriving, by the process, an overall complexity indicator for each group based on the comparative analysis; and providing, from the process to an assessment interface, a ranking of each group as compared to other groups of policies within the computer network based on their respective overall complexity indicator.Type: GrantFiled: August 24, 2022Date of Patent: November 21, 2023Assignee: Cisco Technology, Inc.Inventors: Derek William Engi, Gonzalo Salgueiro, Ravi Prakash Garg
-
Publication number: 20230018509Abstract: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.Type: ApplicationFiled: July 16, 2021Publication date: January 19, 2023Inventors: Derek William Engi, Gonzalo Salgueiro, Pascale Delaunay, Julie Allen
-
Publication number: 20220329488Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.Type: ApplicationFiled: June 27, 2022Publication date: October 13, 2022Inventors: Derek William Engi, Gonzalo Salgueiro, M. David Hanes, Bradley Wise, Md Atiqur Rahman
-
Patent number: 11456917Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.Type: GrantFiled: June 1, 2020Date of Patent: September 27, 2022Assignee: Cisco Technology, Inc.Inventors: Howard Steven Nelson, Derek William Engi, Gonzalo Salgueiro, Vijay Pillai
-
Patent number: 11438226Abstract: In one example, a logical representation of a first graph is generated. The first graph indicates a configuration of a network device in a network at a first time. The first graph includes a first node representative of a first configuration block of the network device, a second node representative of a second configuration block of the network device, and a first link that indicates, by connecting the first node and the second node, that the first configuration block is associated with the second configuration block. The logical representation of the first graph is compared to a logical representation of a second graph that indicates an actual or planned configuration of the network device at a second time subsequent to the first time. In response, one or more changes in the configuration of the network device from the first time to the second time are identified.Type: GrantFiled: February 2, 2021Date of Patent: September 6, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Derek William Engi, Gonzalo Salgueiro, M. David Hanes, Bradley Wise, Md Atiqur Rahman
-
Patent number: 11418397Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.Type: GrantFiled: February 1, 2021Date of Patent: August 16, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Derek William Engi, Gonzalo Salgueiro, M. David Hanes, Bradley Wise, Md Atiqur Rahman
-
Publication number: 20220247638Abstract: Techniques described herein relate to automatically generating standard network device configurations. In one example, one or more groups of network device configuration blocks may be obtained. An analysis of the one or more groups of network device configuration blocks may be performed, including identifying respective frequencies associated with respective network device configuration blocks of the one or more groups of network device configuration blocks. Based on the respective frequencies, one or more network device configuration blocks of the one or more groups of network device configuration blocks may be automatically aggregated into a standard network device configuration.Type: ApplicationFiled: February 1, 2021Publication date: August 4, 2022Inventors: Derek William Engi, Gonzalo Salgueiro, M. David Hanes, Bradley Wise, Md Atiqur Rahman
-
Publication number: 20220247630Abstract: In one example, a logical representation of a first graph is generated. The first graph indicates a configuration of a network device in a network at a first time. The first graph includes a first node representative of a first configuration block of the network device, a second node representative of a second configuration block of the network device, and a first link that indicates, by connecting the first node and the second node, that the first configuration block is associated with the second configuration block. The logical representation of the first graph is compared to a logical representation of a second graph that indicates an actual or planned configuration of the network device at a second time subsequent to the first time. In response, one or more changes in the configuration of the network device from the first time to the second time are identified.Type: ApplicationFiled: February 2, 2021Publication date: August 4, 2022Inventors: Derek William Engi, Gonzalo Salgueiro, M. David Hanes, Bradley Wise, Md Atiqur Rahman
-
Publication number: 20210377114Abstract: Techniques and architecture for determining compliance of a network with respect to a network design solution. The techniques may include determining a role for each network device of a network that comprises multiple network devices and determining one or more policies related to each network device with respect to other network devices of the network. The techniques may further include based at least in part on the roles for each network device and the one or more policies, determining a level of compliance of a configuration of the network with respect to a network design solution. Based at least in part on the level of compliance, a remedial action may be performed. In configurations, a machine learning model may be used.Type: ApplicationFiled: June 1, 2020Publication date: December 2, 2021Inventors: Howard Steven Nelson, Derek William Engi, Gonzalo Salgueiro, Vijay Pillai