Patents by Inventor Glenn C. Scott
Glenn C. Scott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170295091Abstract: One embodiment provides a system that facilitates routable prefix queries in a CCN. During operation, the system generates, by a client computing device, a query for one or more indices based on a name for an interest, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. An index indicates a number of the contiguous name components beginning from the most general level that represent a routable prefix needed to route the interest to a content producing device that can satisfy the interest. In response to the query, the system receives the one or more indices, which allows the client computing device to determine a remaining number of name components of the interest name which can be encrypted, thereby facilitating protection of private communication in a content centric network.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170289114Abstract: One embodiment provides a system that facilitates mutating and caching content in a CCN. During operation, the system receives, by an intermediate node, a content object that indicates an encrypted payload, a signature, and a parameter for a group to which the content object belongs, wherein the content object includes a name that is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level. The system re-encrypts the content object based on the encrypted payload and the parameter to obtain a new encrypted payload and a new signature, wherein re-encrypting is not based on a private key or a public key associated with the encrypted payload. The system transmits the re-encrypted content object to a client computing device, thereby allowing the client computing device to decrypt the re-encrypted content object and verify the new signature.Type: ApplicationFiled: April 1, 2016Publication date: October 5, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170279920Abstract: One embodiment provides a system for facilitating scheduling of interests in a CCN. The system determines, by a scheduler component, network properties associated with name prefixes of interests transmitted by a plurality of local applications, wherein a name for an interest is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level, and wherein a name prefix includes one or more contiguous name components. The system generates a first interest which indicates a command to set a window size for a transport stack associated with a respective local application based on the network properties. The system transmits the first interest to a component associated with the transport stack, which causes the component to set the window size for the transport stack, thereby facilitating scheduling of interests based on the network properties.Type: ApplicationFiled: March 23, 2016Publication date: September 28, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170272473Abstract: One embodiment provides an interface discovery system that facilitates interface discovery and authentication. During operation, the system receives a message from an unregistered interface via a local interface of a link adapter. The message can include a name. If the system determines that a source identifier of the message is not configured for a channel, the system generates a control message comprising the source identifier and an identifier of the local interface and sends the control message via a transport stack of the system.Type: ApplicationFiled: March 16, 2016Publication date: September 21, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Kevin C. Fox, Glenn C. Scott
-
Publication number: 20170264536Abstract: One embodiment provides a system that facilitates dynamic adjustment of forwarding information in a CCN. During operation, the system receives, by forwarding circuitry, an interest with a name that is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level. The system identifies in a first data structure an entry for one or more name components of the name, wherein the entry includes a list of outgoing interfaces associated with the one or more name components. The system determines network properties in response to forwarding the interest to a first interface of the list. The system reorders the list in order of priority based on the network properties, thereby facilitating the forwarding circuitry to dynamically adjust a likelihood of using a respective interface for forwarding interests associated with the one or more name components.Type: ApplicationFiled: March 14, 2016Publication date: September 14, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170257314Abstract: One embodiment provides a system that facilitates querying of historical network information. During operation, the system generates a query for historical information associated with interest and content object packets, wherein a name for an interest is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level, wherein the query is based on a name prefix that includes one or more contiguous name components. The system transmits the query to a responding entity. In response to receiving the historical information from the responding entity, the system performs an operation that increases network efficiency based on the historical information, thereby facilitating a protocol for querying the historical information to increase network efficiency.Type: ApplicationFiled: March 4, 2016Publication date: September 7, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Ignacio Solis, Andriana Ioannou, Glenn C. Scott
-
Publication number: 20170257444Abstract: One embodiment provides a system that facilitates collection of historical network information. During operation, the system monitors a plurality of packets which include outgoing interests and corresponding incoming content objects, wherein a name for an interest is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. The system collects historical information associated with the packets based on name prefixes of the packets, wherein a name prefix includes one or more contiguous name components. In response to receiving a query from a requesting entity for the historical information, the system transmits the historical information, thereby facilitating the requesting entity to use the historical information to increase network efficiency.Type: ApplicationFiled: March 4, 2016Publication date: September 7, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Ignacio Solis, Andriana Ioannou, Glenn C. Scott
-
Publication number: 20170257461Abstract: One embodiment provides a system that facilitates content closures in a CCN. During operation, the system generates, by a client computing device, an initial interest with a name that is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level, wherein the initial interest indicates a request for a result of a computation. The system receives from a content producing device a content object which indicates a function that outputs the requested result and data to be used as input to the function. The system performs the function based on the indicated data, which outputs the requested result, thereby facilitating a content producing device to offload computation of the function to the client computing device.Type: ApplicationFiled: March 7, 2016Publication date: September 7, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170249468Abstract: One embodiment provides a system that facilitates efficient name encryption in a CCN. During operation, the system determines, by a client computing device, an index for a name of an interest, wherein the name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level, wherein the index indicates a minimum number of the contiguous name components beginning from the most general level that represent a minimum routable prefix needed to route the interest to a content producing device that can satisfy the interest. The system encrypts one or more name components of the interest name beginning with the name component immediately following the minimum routable prefix. The system transmits the interest based on the encrypted name, thereby facilitating efficient name encryption in a CCN.Type: ApplicationFiled: February 29, 2016Publication date: August 31, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Christopher A. Wood, Glenn C. Scott
-
Patent number: 9729662Abstract: A network node can use reputation values to determine when to forego validating a cached Content Object's authenticity. During operation, the network node can receive an Interest over a Content Centric Network (CCN). If the Content Store includes a matching Content Object that satisfies the Interest, the node obtains the cached Content Object. The node then determines whether the Interest includes a validation token that is to be used to validate the Content Object's authenticity. If so, the node determines a reputation value for the Content Object, such that the reputation value indicates a likelihood that validation of the Content Object's authenticity will be successful. If the network node determines that the reputation value exceeds a predetermined threshold, the node returns the Content Object without validating the Content Object's authenticity.Type: GrantFiled: August 11, 2014Date of Patent: August 8, 2017Assignee: CISCO TECHNOLOGY, INC.Inventors: Priya Mahadevan, Glenn C. Scott
-
Patent number: 9729616Abstract: A CCN network node use reputation values for one or more interfaces to determine how to forward an Interest. During operation, the network node can receive an Interest or Content Object via a network interface, determines one or more candidate outbound faces for forwarding the Interest by performing a longest-prefix-matching lookup in a forwarding information base (FIB) using the Interest's name or name prefix as input. A respective FIB entry maps a name prefix to a forwarding rule that includes a corresponding outbound face for the name prefix. The node can determine a reputation value for each of the candidate outbound faces based on reputation information stored in association with the Interest's name or name prefix, and selects a candidate outbound face with a reputation value exceeding a first predetermined threshold. The node can then forward the received Interest via the selected outbound face.Type: GrantFiled: July 18, 2014Date of Patent: August 8, 2017Assignee: CISCO TECHNOLOGY, INC.Inventors: Priya Mahadevan, Glenn C. Scott
-
Patent number: 9716622Abstract: One embodiment of the present invention provides a system for automatic configuration of a computing device in a content-centric network (CCN). During operation, the system sends, by the computing device on at least one of the computing device's faces, an interest in configuration information. The interest has a predetermined name prefix. The system then receives a content object in response to the interest. The content object includes at least a default name prefix, to which the computing device can send other interests. The system further configures the computing device based on the received content object.Type: GrantFiled: April 1, 2014Date of Patent: July 25, 2017Assignee: CISCO TECHNOLOGY, INC.Inventors: Priya Mahadevan, Glenn C. Scott
-
Publication number: 20170201577Abstract: One embodiment provides a system that facilitates secure communication between computing entities. During operation, the system generates a first interest that indicates a vote for a value associated with a group prefix and a round number. In response to the first interest, the system receives a first content object that indicates an acknowledgment of the vote and has a payload that includes a nonce validator. In response to a second interest that indicates an acknowledgment of the first content object, the system receives a second content object that indicates a decision for the value and has a payload that includes a nonce which is used as a pre-image of the nonce validator. The system verifies the second content object based on the nonce and the nonce validator.Type: ApplicationFiled: January 11, 2016Publication date: July 13, 2017Applicant: Palo Alto Research Center IncorporatedInventors: Christopher A. Wood, Glenn C. Scott
-
Patent number: 9699198Abstract: One embodiment of the present invention provides a system for retrieving a content collection over a network. During operation, the system determines additional information associated with the piece of content that is needed for consumption of the content collection; generates a plurality of Interests, which includes at least one Interest for a catalog of the content collection and at least one Interest for the additional information; and forwards, concurrently, the plurality of Interests, thereby facilitating parallel retrieval of the content collection and the additional information.Type: GrantFiled: July 7, 2014Date of Patent: July 4, 2017Assignee: CISCO TECHNOLOGY, INC.Inventors: Ignacio Solis, Glenn C. Scott, Ersin Uzun
-
Publication number: 20170170955Abstract: One embodiment provides a system that facilitates efficient key retrieval by using key catalogs in a content centric network. During operation, the system generates, by a client computing device, a first interest for a key indicated in a signed key catalog. In response to receiving the key, the system verifies the received key by determining that a hash of the received key matches a hash of the key as indicated in the catalog based on a name for the received key. The system generates a second interest for a content object, wherein a name for the second interest includes a name prefix associated with the key as indicated in the catalog, wherein the first interest is transmitted before or concurrent with transmitting the second interest. In response to receiving the content object, the system verifies the received content object based on the key.Type: ApplicationFiled: December 9, 2015Publication date: June 15, 2017Applicant: Palo Alto Research Center IncorporatedInventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170163760Abstract: One embodiment provides a system that deletes cached content. During operation, the system generates, by a content producing device, a content object packet that includes a name for the content object and a deletion identifier that is used to verify a subsequent deletion command. The system receives a notification message that includes a routable prefix for a router and indicates that the router has cached the content object packet. The system stores in a data structure a mapping between the routable prefix, the name, and a previously generated deletion token which is used as a pre-image of the deletion identifier. In response to determining a condition to delete the cached content object packet, the system transmits a deletion command based on the routable prefix, wherein the deletion command includes the deletion token and the name for the cached copy of the content object packet to be deleted.Type: ApplicationFiled: December 2, 2015Publication date: June 8, 2017Applicant: Palo Alto Research Center IncorporatedInventors: Christopher A. Wood, Glenn C. Scott
-
Publication number: 20170149647Abstract: One embodiment provides a system that facilitates a content requesting device to handle a potential timeout event. During operation, the system receives, by a content producing device, a packet that corresponds to a first Interest message from a content requesting device, where the first Interest includes a name. Responsive to determining that additional time is required to generate a matching Content Object for the first Interest, the system generates a notification message which indicates a time period after which a second Interest is to be sent out by the content requesting device. The name for the second Interest can be the same as the name for the first Interest or a new name as indicated in the notification message. The system transmits the notification message to the content requesting device, thereby facilitating the content requesting device to handle a potential timeout event.Type: ApplicationFiled: February 1, 2017Publication date: May 25, 2017Applicant: CISCO SYSTEMS, INC.Inventors: Priya Mahadevan, Glenn C. Scott, Marc E. Mosko
-
Publication number: 20170091251Abstract: One embodiment provides a system that facilitates a single interface for file I/O and network communication. During operation, the system receives from a local application a first command to create content. The first command includes a content name and access control information that indicates how the content may be accessed. The content name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. The system creates a first manifest which is a content object that indicates a set of content objects by a name and a digest. The first manifest name is the content name corresponding to the first command, and access to the manifest is based on the access control information included in the first command. The system transmits to the local application the first manifest and an indicator of success for creating the first manifest.Type: ApplicationFiled: February 24, 2016Publication date: March 30, 2017Applicant: Palo Alto Research Center IncorporatedInventors: Christopher A. Wood, Glenn C. Scott
-
Patent number: 9590887Abstract: One embodiment provides a system that facilitates a content requesting device to handle a potential timeout event. During operation, the system receives, by a content producing device, a packet that corresponds to a first Interest message from a content requesting device, where the first Interest includes a name. Responsive to determining that additional time is required to generate a matching Content Object for the first Interest, the system generates a notification message which indicates a time period after which a second Interest is to be sent out by the content requesting device. The name for the second Interest can be the same as the name for the first Interest or a new name as indicated in the notification message. The system transmits the notification message to the content requesting device, thereby facilitating the content requesting device to handle a potential timeout event.Type: GrantFiled: July 18, 2014Date of Patent: March 7, 2017Assignee: CISCO SYSTEMS, INC.Inventors: Priya Mahadevan, Glenn C. Scott, Marc E. Mosko
-
Publication number: 20170034240Abstract: One embodiment provides a system that facilitates content negotiation in a content centric network. During operation, the system receives, by a content producing device, a packet that corresponds to a first interest, wherein an encoded name for the interest indicates a plurality of qualifiers for acceptable types of requested content, and wherein a name is a hierarchically structured variable length identifier which comprises contiguous name components. The system generates a first content object that satisfies one of the indicated plurality of qualifiers, wherein a name for the content object is the encoded name, and wherein a content object indicates data and a content type corresponding to the satisfied qualifier.Type: ApplicationFiled: July 27, 2015Publication date: February 2, 2017Applicant: Palo Alto Research Center IncorporatedInventors: Glenn C. Scott, Christopher A. Wood, Ignacio Solis