Patents by Inventor Joseph Michael Clarke

Joseph Michael Clarke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180102985
    Abstract: Systems, methods, and computer-readable media for orchestrating data center resources and user access to data. In some examples, a system can determine, at a first time, that a user will need, at a second time, access to data stored at a first location, from a second location. The system can identify a node which is capable of storing the data and accessible by a device from the second location. The system can also determine a first service parameter associated with a network connection between the device and the first location and a second service parameter associated with a network connection between the device and the node. When the second service parameter has a higher quality than the first service parameter, the system can migrate the data from the first location to the node so the device has access to the data from the second location through the node.
    Type: Application
    Filed: October 10, 2016
    Publication date: April 12, 2018
    Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke, Chidambaram Arunachalam, Nagendra Kumar Nainar, Avraham Poupko
  • Patent number: 9875660
    Abstract: In one embodiment, a method includes receiving flight path data regarding the presence of an unmanned aerial vehicle (UAV) at a location at a future time, detecting the presence of the UAV at the location at the future time, determining radio identity data of the UAV using a radio mode of identification, determining optical identity data of the UAV using an optical mode of identification, and certifying the UAV based on a comparison of the radio identity data and the optical identity data to the flight path data.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: January 23, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20170366472
    Abstract: Various implementations disclosed herein enable improved allocation of fog node resources, which supports performance driven partitioning of competing client applications. In various implementations, methods are performed by a fog orchestrator configured to determine allocations of fog resources for competing client applications and partition the competing client applications based on the fog resource allocations. Methods include receiving reservation priority values (RPVs) associated with a plurality of client applications competing for a contested fog node resource, transmitting, to a subset of client devices, a request to provide updated RPVs, and awarding the contested fog node resource to one of the plurality of client applications based on the received RPVs and any updated RPVs.
    Type: Application
    Filed: June 16, 2016
    Publication date: December 21, 2017
    Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20170338883
    Abstract: Various implementations disclosed herein enable transforming mutable wireless coverage areas using network coverage vehicles (NVCs) that are orchestrated by a network coverage controller. In various implementations, the method includes receiving coverage area performance characterization values from NCVs configured to provide a plurality of mutable wireless coverage areas. In various implementations, an arrangement of the mutable wireless coverage areas mutably defines the service area, which changes in accordance with changes to the arrangement of the mutable wireless coverage areas. In various implementations, the method also includes determining NCV operation adjustments for some of the NCVs based on the received coverage area performance characterization values in accordance with a service performance metric; and, altering an arrangement of one or more of the plurality of mutable wireless coverage areas within the service area by providing the NCV operation adjustments to some of the NCVs.
    Type: Application
    Filed: May 20, 2016
    Publication date: November 23, 2017
    Inventors: Joseph Michael Clarke, Gonzalo Salgueiro, Charles Calvin Byers, Ryan Steve D'Souza, Pascal Thubert, Andre Jean-Marie Surcouf, Jerome Henry
  • Publication number: 20170331669
    Abstract: Approaches are disclosed for virtualizing a network management protocol (NMP). A network element offloads processes for communicating in the NMP to a virtualization engine (e.g., a backend virtualization proxy for the network element). The network element transmits a message containing a NMP request to the virtualization engine using service function chaining (SFC) by inserting service plane protocol data (e.g., a network service header (NSH)) into the message (e.g., an impregnated request). The virtualization engine expropriates, from the network element, processes for communicating in the NMP and can, thereby, reduce the computational resources used by the network element for communicating in the NMP. The virtualization engine generates a NMP response to the NMP request. The virtualization engine transmits a different message containing the NMP response to the network element using SFC by inserting service plane protocol data into the message (e.g., an impregnated response).
    Type: Application
    Filed: May 11, 2016
    Publication date: November 16, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Kondaveeti Lakshmi Ganesh, Joseph Michael Clarke, Carlos M. Pignataro
  • Publication number: 20170300693
    Abstract: In one embodiment, a device in a network joins a fog-based malware defense cluster comprising one or more peer devices. The device and each peer device in the cluster are configured to execute a different set of local malware scanners. The device receives a file flagged as suspicious by a node in the network associated with the device. The device determines whether the local malware scanners of the device are able to scan the file. The device sends an assessment request to one or more of the peer devices in the malware defense cluster, in response to determining that the local malware scanners of the device are unable to scan the file.
    Type: Application
    Filed: April 15, 2016
    Publication date: October 19, 2017
    Inventors: Tao Zhang, Yi Zheng, Helder F. Antunes, Danyang Raymond Zheng, Jack C. Cham, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20170295109
    Abstract: In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.
    Type: Application
    Filed: April 12, 2016
    Publication date: October 12, 2017
    Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke, Carlos M. Pignataro, Nagendra Kumar Nainar
  • Publication number: 20170278410
    Abstract: In one embodiment, a method includes receiving flight path data regarding the presence of an unmanned aerial vehicle (UAV) at a location at a future time, detecting the presence of the UAV at the location at the future time, determining radio identity data of the UAV using a radio mode of identification, determining optical identity data of the UAV using an optical mode of identification, and certifying the UAV based on a comparison of the radio identity data and the optical identity data to the flight path data.
    Type: Application
    Filed: March 28, 2016
    Publication date: September 28, 2017
    Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20170250908
    Abstract: Presented herein are segment-routing methods and systems that facilitate data plane signaling of a packet as a candidate for capture at various network nodes within a segment routing (SR) network. The signaling occurs in-band, via the data plane—that is, a capture or interrogation signal is embedded within the respective packet that carries a user traffic. The signaling is inserted, preferably when the packet is classified, e.g., at the ingress node of the network, to which subsequent network nodes with the SR network are signaled to capture or further inspect the packet for capture.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Nagendra Kumar Nainar, Richard Furr, Carlos Pignataro, Joseph Michael Clarke
  • Publication number: 20170251065
    Abstract: Presented herein are service-function chaining techniques that enable data plane signaling of a packet as a candidate for capture at various network nodes along a service function path of a service function chain. That is, a capture signal is embedded within the respective packet that carries a user traffic. The signaling occurs in-band, via the data plane, such that classification of the packet for capture beneficially occurs, at the ingress node of the network, once to which subsequent network nodes along a service function path are signaled to capture or further inspect the packet for capture. Service function chaining treats service functions as resources with associated attributes available for scheduled consumption to which selective traffic are steered according to a policy construct to the requisite network-service resources.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Richard Furr, Nagendra Kumar Nainar, Carlos Pignataro, Joseph Michael Clarke
  • Publication number: 20170250907
    Abstract: Presented herein are methods and systems that facilitate data plane signaling of a packet as a candidate for capture at various network nodes within an IPv6 network. The signaling occurs in-band, via the data plane—that is, a capture or interrogation signal is embedded within the respective packet (e.g., in the packet header) that carries a user traffic. The signaling is inserted, preferably when the packet is classified, e.g., at the ingress node of the network, to which subsequent network nodes with the IPv6 network are signaled to capture or further inspect the packet for capture.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Carlos Pignataro, Richard Furr, Nagendra Kumar Nainar, Joseph Michael Clarke
  • Publication number: 20170244622
    Abstract: In one embodiment, a device in a network places a path of a service function chain into a testing state. The device causes a self-assessment instruction to be propagated along the path while the path is in the testing state. The device analyzes self-assessment results from nodes along the path. The device adjusts a state of the path based on the analyzed self-assessment results.
    Type: Application
    Filed: February 24, 2016
    Publication date: August 24, 2017
    Inventors: Gonzalo Salgueiro, Joseph Michael Clarke, Carlos M. Pignataro
  • Publication number: 20170126647
    Abstract: In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
    Type: Application
    Filed: October 28, 2015
    Publication date: May 4, 2017
    Inventors: Tao Zhang, Yi Zheng, Helder F. Antunes, Marcelo Yannuzzi, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20170093610
    Abstract: A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS). Having the network address for the NMS, the network device may generate a vCard comprising the attributes necessary for registering with the NMS. The network device may then communicate the vCard to the NMS. The NMS may then be configured to identify, register, and add the network device to a directory.
    Type: Application
    Filed: December 8, 2016
    Publication date: March 30, 2017
    Applicant: Cisco Technology, Inc.
    Inventors: Carlos M. Pignataro, Gonzalo Salgueiro, Joseph Michael Clarke
  • Patent number: 9582594
    Abstract: In one embodiment, a method for facilitating centralized issue tracking. The method includes receiving information on a case from an issue tracking system (case information). The method facilitates executing a tagging method stored in a memory device that reads the case information, determines whether a part of the case information is desired information, and then tags the desired information. Finally, the method facilitates communicating the tagged information to a centralized database, where the centralized database stores the tagged information, and where the tagged information is accessible to the issue tracking system and at least one other issue tracking system.
    Type: Grant
    Filed: February 19, 2015
    Date of Patent: February 28, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Carlos M. Pignataro, Gonzalo A. Salgueiro, Joseph Michael Clarke, Rodney Dunn
  • Publication number: 20170050748
    Abstract: Embodiments herein describe a perch for screening drones before permitting access to a restricted geographic region. The perch may include various scanners for evaluating the payload of the drone, its hardware, and flight control software. In one embodiment, the screening perch includes a conveyor belt that moves the drone through various scanners or stages in the perch. In one embodiment, the perch ensures the drone is properly configured to enter the restricted geographic region. The region may include multiple requirements or criteria that must be satisfied before a drone is permitted to enter. For example, the drone may need a signed flight plan, cargo that is less than a certain percentage of its weight, or an approved flight controller before being permitted into the restricted region. In this manner, the perch serves as a controlled entrance point for drones attempting to enter the restricted region.
    Type: Application
    Filed: April 19, 2016
    Publication date: February 23, 2017
    Inventors: Charles Calvin BYERS, Gonzalo A. SALGUEIRO, Joseph Michael CLARKE
  • Patent number: 9525589
    Abstract: A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS). Having the network address for the NMS, the network device may generate a vCard comprising the attributes necessary for registering with the NMS. The network device may then communicate the vCard to the NMS. The NMS may then be configured to identify, register, and add the network device to a directory.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: December 20, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Carlos M. Pignataro, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20160112502
    Abstract: In one embodiment, a method comprises: determining application processing capabilities in one or more network devices, in a data network, for execution of at least a portion of a prescribed application on identifiable data packets from a requesting network device and destined for a computing device; and sending instructions to the one or more network devices, the instructions enabling the one or more network devices to execute at least the portion of the prescribed application, on behalf of the computing device, in response to detecting receipt of the identifiable data packets.
    Type: Application
    Filed: October 20, 2014
    Publication date: April 21, 2016
    Inventors: JOSEPH MICHAEL CLARKE, GONZALO SALGUEIRO, MICHAEL DAVID HANES
  • Publication number: 20150161280
    Abstract: In one embodiment, a method for facilitating centralized issue tracking. The method includes receiving information on a case from an issue tracking system (case information). The method facilitates executing a tagging method stored in a memory device that reads the case information, determines whether a part of the case information is desired information, and then tags the desired information. Finally, the method facilitates communicating the tagged information to a centralized database, where the centralized database stores the tagged information, and where the tagged information is accessible to the issue tracking system and at least one other issue tracking system.
    Type: Application
    Filed: February 19, 2015
    Publication date: June 11, 2015
    Inventors: Carlos M. Pignataro, Gonzalo A. Salgueiro, Joseph Michael Clarke, Rodney Dunn
  • Patent number: 9020949
    Abstract: In one example, a method for facilitating centralized issue tracking. The method includes receiving information on a case from an issue tracking system (case information). The method facilitates executing a tagging method stored in a memory device that reads the case information, determines whether a part of the case information is desired information, and then tags the desired information. Finally, the method facilitates communicating the tagged information to a centralized database, where the centralized database stores the tagged information, and where the tagged information is accessible to the issue tracking system and at least one other issue tracking system.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: April 28, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Carlos M. Pignataro, Gonzalo A. Salgueiro, Joseph Michael Clarke, Rodney Dunn