Patents by Inventor John Zack

John Zack has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230300138
    Abstract: Methods are provided in which a network device hosts distinct network access resources that are managed by different entities. The method includes obtaining a request for partitioning one or more network resources of an on-premise network device for connecting one or more endpoints to a first network managed by a first entity. The on-premise network device connects one or more endpoints to a second network managed by a different entity. The method further involves partitioning, based on the request, the one or more network resources and connecting the one or more endpoints to the first network using the one or more network resources. The one or more network resources are managed by the first entity while at least one other network resource of the on-premise network device is managed by the different entity and is associated with connecting the one or more endpoints to the second network.
    Type: Application
    Filed: March 15, 2022
    Publication date: September 21, 2023
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, John Matthew Swartz, Paul Brian Giralt, David John Zacks, Gonzalo Salgueiro
  • Publication number: 20230300582
    Abstract: A first connection is established between a meeting server and a first endpoint device associated with a user. At least one multimedia stream for an online collaborative session is provided from the meeting server to the first endpoint device. The meeting server obtains an indication that a first strength of a first short-range wireless communication connection between an audio device and the first endpoint device is less than a second strength of a second short-range wireless communication connection between the audio device and a second endpoint device associated with the user. A second connection is established between the meeting server and the second endpoint device. The at least one multimedia stream is provided from the meeting server to the second endpoint device via the second connection in response to obtaining the indication.
    Type: Application
    Filed: March 16, 2022
    Publication date: September 21, 2023
    Inventors: Prapanch Ramamoorthy, David John Zacks
  • Publication number: 20230300037
    Abstract: A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.
    Type: Application
    Filed: March 15, 2022
    Publication date: September 21, 2023
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Paul Brian Giralt, Gonzalo Salgueiro, David John Zacks
  • Patent number: 11765050
    Abstract: A device associated with an enterprise receives, from a user device, a message indicating that a user of the user device has requested a service level for accessing a service while performing teleworking activities for the enterprise. The user device accesses the service via a network that includes a portion controlled by an Internet Service Provider (ISP). The enterprise has established an agreement with the ISP indicating that the ISP is to provide service levels for users who are performing teleworking activities for the enterprise via the ISP. The ISP associated with the user device is identified based on the message. A request is transmitted to the ISP to provide the service level for the portion of the network that is controlled by the ISP and the ISP provides the service level for accessing the service based on the request.
    Type: Grant
    Filed: March 15, 2022
    Date of Patent: September 19, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Paul Brian Giralt, Gonzalo Salgueiro, David John Zacks
  • Publication number: 20230261928
    Abstract: Methods and devices provide fault injection testing techniques in a production network environment without risking service outages for hosted computing services, by providing examples of a remote network controller configured to communicate with network devices of a network; a remote fault injection communication protocol configuring a remote network controller in communication with a network device to signal a failure injection; and a failure injection module configuring a network device to configure a network device processor to implement a failure injection signaled according to the remote failure injection communication protocol. The method includes a network controller transmitting a failure injection signal in a control plane packet over a network connection to a network device, and the network device creating a child process by executing, in a dedicated runtime environment, a copy of one or more processes impacted by a parsed failure type.
    Type: Application
    Filed: February 17, 2022
    Publication date: August 17, 2023
    Inventors: Nagendra Kumar Nainar, Jaganbabu Rajamanickam, David John Zacks, Carlos M. Pignataro, Madhan Sankaranarayanan, Cesar Obediente, Craig Thomas Hill
  • Publication number: 20230254379
    Abstract: Presented herein are techniques to facilitate infrastructure and policy orchestration in a shared workspace network environment. In one example, a method may include obtaining, by a service broker, a reservation request from a consumer network for a consumer, wherein the reservation request seeks a reservation to reserve, at least in part, at least one workspace device for the consumer for a workspace for a particular day and a particular time period; based on determining that the at least one workspace device is available, providing a response to the consumer network that includes a first indicator for identifying the reservation of the workspace and at least one second indicator identifying the at least one workspace device; and upon receiving a session request from the consumer network that includes the second indicator, establishing a management tunnel to interconnect the consumer network and the at least one workspace device via the service broker.
    Type: Application
    Filed: February 9, 2022
    Publication date: August 10, 2023
    Inventors: Carlos M. Pignataro, Nagendra Kumar Nainar, David John Zacks, John Matthew Swartz, Akram Ismail Sheriff
  • Patent number: 11722359
    Abstract: A method, computer system, and computer program product are provided for detecting drift in predictive models for network devices and traffic. A plurality of streams of time-series telemetry data are obtained, the time-series telemetry data generated by network devices of a data network. The plurality of streams are analyzed to identify a subset of streams, wherein each stream of the subset of streams includes telemetry data that is substantially empirically distributed. The subset of streams of time-series data are analyzed to identify a change point. In response to identifying the change point, additional time-series data is obtained from one or more streams of the plurality of streams of time-series telemetry data. A predictive model is trained using the additional time-series data to update the predictive model and provide a trained predictive model.
    Type: Grant
    Filed: September 20, 2021
    Date of Patent: August 8, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Enzo Fenoglio, David John Zacks, Zizhen Gao, Carlos M. Pignataro, Dmitry Goloubev
  • Patent number: 11706214
    Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
    Type: Grant
    Filed: April 8, 2021
    Date of Patent: July 18, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Thomas Szigeti, Alan Robert Lynn, David John Zacks, Frank Michaud
  • Publication number: 20230198946
    Abstract: Methods are provided for predictive policy enforcement using encapsulated metadata. The methods involve obtaining a packet of an encapsulated traffic flow that is transported in a software-defined wide area network (SD-WAN) or in a cloud network. The packet includes a network virtualization tunneling header with an appended service plane protocol header and a payload. The methods further involve extracting, from the appended service plane protocol header, without performing deep packet inspection, enriched metadata that includes fields for one or more attributes related to a source of the packet or a destination of the packet, determining at least one network policy based on the enriched metadata, and applying, to the packet, the at least one network policy that relates to gathering analytics and/or transporting the encapsulated traffic flow to the destination.
    Type: Application
    Filed: December 21, 2021
    Publication date: June 22, 2023
    Inventors: David John Zacks, Dmitry Goloubev, Zizhen Gao, Carlos M. Pignataro, Nagendra Kumar Nainar
  • Publication number: 20230188496
    Abstract: Methods are provided in which a domain name system (DNS) service obtains a lookup request for information about a source of a traffic flow being transmitted to a network resource external of a service cluster and performs, based on the lookup request, a lookup operation for a microservice that is the source of the traffic flow, among a plurality of microservices of the service cluster registered with the DNS service. The methods further include providing information about the microservice based on the lookup operation. The information includes at least a name of the microservice for visibility of the microservice external of the service cluster.
    Type: Application
    Filed: February 3, 2023
    Publication date: June 15, 2023
    Inventors: Thomas Szigeti, David John Zacks, Akram Ismail Sheriff, Guy Keinan, Walter T. Hulick, JR.
  • Publication number: 20230169500
    Abstract: In one embodiment, a microservice, that provides one or more services for one or more distributed business transactions offered by an application, obtains a service request for a particular business transaction involving a particular user device executing the application. The microservice determines whether the service request includes an indication of authentication results for the particular business transaction that satisfy one or more authentication requirements of the microservice. The microservice sends, based on the indication of authentication results for the particular business transaction not satisfying the one or more authentication requirements of the microservice, a request for the particular user device to perform authentication for the particular business transaction to satisfy the one or more authentication requirements.
    Type: Application
    Filed: November 26, 2021
    Publication date: June 1, 2023
    Inventors: Walter Theodore Hulick, JR., David John Zacks, Thomas Szigeti, Renato Scaglioni Quedas
  • Patent number: 11665079
    Abstract: A method comprising: at a management entity configured to communicate with a network: upon detecting a performance problem on a network path in the network, generating a trigger probe having a correlation identifier, the trigger probe configured to transit the network path and, on one or more designated network nodes of the network path, trigger (i) capturing a full device state, including a control plane state and a data plane state, and (ii) exporting a report of the full device state with the correlation identifier; sending the trigger probe along the network path; receiving, from each of the one or more designated network nodes, the report that includes the correlation identifier and the full device state; and correlating each report to the performance problem based on the correlation identifier in each report, to diagnose a root cause of the performance problem using the full device state in each report.
    Type: Grant
    Filed: May 16, 2022
    Date of Patent: May 30, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David John Zacks, Carlos M. Pignataro, Nagendra Kumar Nainar, Hans F. Ashlock, Thomas Szigeti, Prapanch Ramamoorthy
  • Patent number: 11665078
    Abstract: Techniques are described for end-to-end network tracing involving external services. In one example, a synthetic agent identifies one or more external services that are involved in a process for interacting with a target application server. In response to identifying the one or more external services, the synthetic agent obtains telemetry data associated with the one or more external services. The synthetic agent correlates the telemetry data associated with the one or more external services and telemetry data associated with the target application server to generate an end-to-end network trace associated with the target application server.
    Type: Grant
    Filed: May 18, 2022
    Date of Patent: May 30, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Hans F. Ashlock, Thomas Szigeti, David John Zacks
  • Publication number: 20230118857
    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.
    Type: Application
    Filed: December 16, 2022
    Publication date: April 20, 2023
    Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
  • Publication number: 20230112101
    Abstract: In one embodiment, an access policy enforcement service receives a user authentication request from an end-user device. The access policy enforcement service identifies a telemetry collection intent from the user authentication request. The access policy enforcement service determines a monitoring policy based on the telemetry collection intent identified from the user authentication request. The access policy enforcement service configures, according to the monitoring policy, one or more telemetry collection agents to collect telemetry for traffic associated with the end-user device.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 13, 2023
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Rahul Rammanohar, Kondaveeti Lakshmi Ganesh, David John Zacks
  • Publication number: 20230100471
    Abstract: In one embodiment, an agent process performs performance monitoring according to either a network performance monitoring platform or an application performance monitoring platform. The agent process exchanges a request message with a remote agent process (performing performance monitoring according to the opposing platform), where the request message comprises a transaction identifier and a requested action. The agent process also exchanges, in response to the request message, a response message with the remote agent process, wherein the response message comprises an acknowledgment of the transaction identifier and the requested action.
    Type: Application
    Filed: September 29, 2021
    Publication date: March 30, 2023
    Inventors: Madhuvanthi Cheyyar Rajasekaran, Walter Theodore Hulick, JR., David John Zacks, Anusha Maltesh, Krishma Harendra Kapadia
  • Publication number: 20230098281
    Abstract: A method, computer system, and computer program product are provided for controlling data access and visibility using a context-based security policy. A request from an endpoint device to receive data is received at a server, wherein the request includes one or more contextual attributes of the endpoint device including an identity of a user of the endpoint device. The one or more contextual attributes are processed to determine that the endpoint device is authorized to receive the data. A security policy is determined for the data based on the one or more contextual attributes. The data is transmitted, including the security policy, to the endpoint device, wherein the endpoint devices enforces the security policy to selectively permit access to the data by preventing the endpoint device from displaying the data to an unauthorized individual.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, David John Zacks, Thomas Szigeti
  • Publication number: 20230092777
    Abstract: A method, computer system, and computer program product are provided for decentralized machine learning. A plurality of computing networks are identified by determining that each computing network of the plurality of computing networks satisfies a predetermined number of criteria. A decentralized learning agent is provided to each computing network, wherein the decentralized learning agent is provided with input parameters for training and is trained using training data associated with a computing network to which the decentralized learning agent is provided. A plurality of learned parameters are obtained from the plurality of computing networks, wherein each learned parameter of the plurality of learned parameters is obtained by training the decentralized learning agent provided to each respective computing network. A global model is generated based on the plurality of learned parameters.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, David John Zacks, Dmitry Goloubev
  • Publication number: 20230093130
    Abstract: A method, computer system, and computer program product are provided for detecting drift in predictive models for network devices and traffic. A plurality of streams of time-series telemetry data are obtained, the time-series telemetry data generated by network devices of a data network. The plurality of streams are analyzed to identify a subset of streams, wherein each stream of the subset of streams includes telemetry data that is substantially empirically distributed. The subset of streams of time-series data are analyzed to identify a change point. In response to identifying the change point, additional time-series data is obtained from one or more streams of the plurality of streams of time-series telemetry data. A predictive model is trained using the additional time-series data to update the predictive model and provide a trained predictive model.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Inventors: Enzo Fenoglio, David John Zacks, Zizhen Gao, Carlos M. Pignataro, Dmitry Goloubev
  • Publication number: 20230078197
    Abstract: In one example, a controller obtains a request to store an object-based storage object and identifies a data sovereignty policy identifier associated with the object-based storage object. The controller queries a data sovereignty policy manager for a data sovereignty policy associated with the data sovereignty policy identifier and obtains, from the data sovereignty policy manager, an indication of the data sovereignty policy. The controller stores the object-based storage object in compliance with the data sovereignty policy.
    Type: Application
    Filed: September 16, 2021
    Publication date: March 16, 2023
    Inventors: Robert E. Barton, Jerome Henry, Vinay Saini, David John Zacks, Carlos M. Pignataro, Nagendra Kumar Nainar