Patents by Inventor Maik Guenter Seewald

Maik Guenter Seewald has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210400021
    Abstract: A server, in communication with a plurality of microservices in a microservices mesh environment, obtains data about inbound communications to a first microservice and outbound communications from the first microservice of the plurality of microservices. The server analyzes the data to learn an operational behavior of the first microservice and determine a firewall rule set to be applied associated with the first microservice based on the operational behavior learned for the first microservice. The server causes a micro-firewall to be instantiated for the first microservice. The micro-firewall is configured to apply the firewall rule set to inbound communications to the first microservice and outbound communications from the first microservice.
    Type: Application
    Filed: September 2, 2021
    Publication date: December 23, 2021
    Inventors: Robert Edgar Barton, Jerome Henry, Matthias Falkner, Maik Guenter Seewald
  • Publication number: 20210368522
    Abstract: Time Sensitive Networking (TSN) in wireless environments may be provided. First, a Radio Frequency (RF) profile associated with a station may be received by a computing device. Next, a number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and the station based on the received RF profile may be determined. The determined number of TxOPs may then be provided to a wireless controller associated with the AP.
    Type: Application
    Filed: August 6, 2021
    Publication date: November 25, 2021
    Applicant: Cisco Technology, Inc.
    Inventors: Robert E. BARTON, Maik Guenter SEEWALD, Pascal THUBERT, Jerome HENRY
  • Publication number: 20210344561
    Abstract: A network controller automatically adjusts a computer network based on the operational information of an industrial device. The network controller receives a notification from a network element in the computer network that the industrial device attached to the network element has an administrative shell. The administrative shell includes operational information describing the operation of the industrial device. The network controller retrieves the administrative shell from the industrial device. The network controller parses the operational information in the administrative shell to determine an intent for the industrial device, and adjusts the computer network based on the intent of the industrial device.
    Type: Application
    Filed: May 4, 2020
    Publication date: November 4, 2021
    Inventors: Maik Guenter Seewald, Robert Edgar Barton, Jerome Henry
  • Patent number: 11134059
    Abstract: A server, in communication with a plurality of microservices in a microservices mesh environment, obtains data about inbound communications to a first microservice and outbound communications from the first microservice of the plurality of microservices. The server analyzes the data to learn an operational behavior of the first microservice and determine a firewall rule set to be applied associated with the first microservice based on the operational behavior learned for the first microservice. The server causes a micro-firewall to be instantiated for the first microservice. The micro-firewall is configured to apply the firewall rule set to inbound communications to the first microservice and outbound communications from the first microservice.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: September 28, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Edgar Barton, Jerome Henry, Matthias Falkner, Maik Guenter Seewald
  • Publication number: 20210264047
    Abstract: The disclosed technology provides solutions that enable scalable and secure data retrieval between microservices by using microservice attributes to encrypt container based data stores. A process of the technology can include steps for: instantiating a first microservice and a second microservice in a cloud environment, wherein the first microservice is associated with a first attribute label and the second microservice is associated with a second attribute label, generating a first key based on the first attribute label and a second key based on the second attribute label, associating a first data store with the first microservice, wherein the first data store is encrypted using the first key, and associating a second data store with the second microservice, wherein the second data store is encrypted using the second key. Systems and machine readable media are also provided.
    Type: Application
    Filed: April 21, 2021
    Publication date: August 26, 2021
    Inventors: Maik Guenter Seewald, Robert Edgar Barton, Jerome Henry
  • Patent number: 11096196
    Abstract: Time Sensitive Networking (TSN) in wireless environments may be provided. First, a Radio Frequency (RF) profile associated with a station may be received by a computing device. Next, a number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and the station based on the received RF profile may be determined. The determined number of TxOPs may then be provided to a wireless controller associated with the AP.
    Type: Grant
    Filed: September 19, 2019
    Date of Patent: August 17, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Robert E. Barton, Maik Guenter Seewald, Pascal Thubert, Jerome Henry
  • Publication number: 20210194851
    Abstract: According to one or more embodiments of the disclosure, a device in a network identifies a packet sent via the network towards an endpoint as being a control packet for the endpoint. The device extracts one or more control parameter values from the control packet. The device compares the one or more control parameter values to a policy associated with the endpoint. The device initiates a corrective measure, based on a determination that the one or more control parameter values violate the policy associated with the endpoint.
    Type: Application
    Filed: April 2, 2020
    Publication date: June 24, 2021
    Inventors: Robert Edgar Barton, Thomas Szigeti, Jerome Henry, Ruben Gerald Lobo, Laurent Jean Charles Hausermann, Maik Guenter Seewald, Daniel R. Behrens
  • Publication number: 20210194815
    Abstract: According to one or more embodiments of the disclosure, a networking device receives a policy for an endpoint in a network. The policy specifies one or more component tags and one or more activity tags that were assigned to the endpoint based on deep packet inspection of traffic associated with the endpoint. The networking device identifies a set of tags for a particular traffic flow in the network associated with the endpoint. The set of tags comprises one or more component tags or activity tags associated with the particular traffic flow. The networking device makes a determination that the particular traffic flow violates the policy based on the set of tags comprising a tag that is not in the policy. The networking device initiates, based on the determination that the particular traffic flow violates the policy, a corrective measure with respect to the particular traffic flow.
    Type: Application
    Filed: April 21, 2020
    Publication date: June 24, 2021
    Inventors: Robert Edgar Barton, Thomas Szigeti, Jerome Henry, Ruben Gerald Lobo, Laurent Jean Charles Hausermann, Maik Guenter Seewald, Daniel R. Behrens
  • Publication number: 20210194760
    Abstract: According to one or more embodiments of the disclosure, a service obtains one or more component tags and one or more activity tags that were assigned to an endpoint device in a network based on deep packet inspection of traffic associated with the endpoint device. The service determines an intent of the endpoint device, using the one or more component tags and the one or more activity tags that were assigned to the endpoint device. The service translates the intent of the endpoint device into a network segmentation policy. The service configures a network overlay in the network that implements the network segmentation policy.
    Type: Application
    Filed: April 20, 2020
    Publication date: June 24, 2021
    Inventors: Robert Edgar Barton, Thomas Szigeti, Jerome Henry, Ruben Gerald Lobo, Laurent Jean Charles Hausermann, Maik Guenter Seewald, Daniel R. Behrens
  • Patent number: 11036876
    Abstract: The disclosed technology provides solutions that enable scalable and secure data retrieval between microservices by using microservice attributes to encrypt container based data stores. A process of the technology can include steps for: instantiating a first microservice and a second microservice in a cloud environment, wherein the first microservice is associated with a first attribute label and the second microservice is associated with a second attribute label, generating a first key based on the first attribute label and a second key based on the second attribute label, associating a first data store with the first microservice, wherein the first data store is encrypted using the first key, and associating a second data store with the second microservice, wherein the second data store is encrypted using the second key. Systems and machine readable media are also provided.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: June 15, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Maik Guenter Seewald, Robert Edgar Barton, Jerome Henry
  • Patent number: 11005822
    Abstract: In one embodiment, a network policy engine obtains a substation configuration description for a substation, indicative of intelligent electronic devices (IEDs), associated network communication devices, and related communication configuration information. The network policy engine then creates a mapping of the IEDs and the associated network communication devices based on the substation configuration description, associating each of the IEDs to a corresponding network port of the associated network communication devices. The network policy engine may then further create network control parameters based on the substation configuration description, which comprise defined communication flows for the IEDs and associated security group tags (SGTs) for the defined communication flows.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: May 11, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Robert Edgar Barton, Maik Guenter Seewald, Jerome Henry
  • Publication number: 20210092754
    Abstract: Time Sensitive Networking (TSN) in wireless environments may be provided. First, a Radio Frequency (RF) profile associated with a station may be received by a computing device. Next, a number of Transmit Opportunities (TxOPs) to use for transmitting data between an Access Point (AP) and the station based on the received RF profile may be determined. The determined number of TxOPs may then be provided to a wireless controller associated with the AP.
    Type: Application
    Filed: September 19, 2019
    Publication date: March 25, 2021
    Applicant: Cisco Technology, Inc.
    Inventors: Robert E. BARTON, Maik Guenter SEEWALD, Pascal THUBERT, Jerome HENRY
  • Patent number: 10897516
    Abstract: In one embodiment, a method comprises: storing, by a computing device in a non-deterministic data network, a plurality of data packets originated by a source device into a mass storage medium associated with the computing device; receiving, by the computing device, a data request originated by an access point device providing deterministic reachability to a deterministic device in a deterministic data network providing reachability to multiple deterministic devices, the request specifying one or more deterministic constraints associated with reaching the deterministic device; and supplying, by the computing device, a selected one of the data packets to the access point device for delivery of data stored therein to the deterministic device according to the one or more deterministic constraints.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: January 19, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Patrick Wetterwald, Pascal Thubert, Maik Guenter Seewald, Eric Michel Levy-Abegnoli
  • Patent number: 10848202
    Abstract: A methodology includes determining a first delay between a first relay and a first label edge router, a second delay between a second relay and a second label edge router, and a third delay of a label-switched path between the first label edge router and the second label edge router. Based on the first, second, and third delays, it is determined whether an end-to-end latency between the first relay and the second relay exceeds an end-to-end latency threshold.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: November 24, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Robert Barton, Maik Guenter Seewald, Michael Alan Kowal
  • Publication number: 20200351249
    Abstract: In one embodiment, a network policy engine obtains a substation configuration description for a substation, indicative of intelligent electronic devices (IEDs), associated network communication devices, and related communication configuration information. The network policy engine then creates a mapping of the IEDs and the associated network communication devices based on the substation configuration description, associating each of the IEDs to a corresponding network port of the associated network communication devices. The network policy engine may then further create network control parameters based on the substation configuration description, which comprise defined communication flows for the IEDs and associated security group tags (SGTs) for the defined communication flows.
    Type: Application
    Filed: May 3, 2019
    Publication date: November 5, 2020
    Inventors: Robert Edgar Barton, Maik Guenter Seewald, Jerome Henry
  • Publication number: 20200177549
    Abstract: A server, in communication with a plurality of microservices in a microservices mesh environment, obtains data about inbound communications to a first microservice and outbound communications from the first microservice of the plurality of microservices. The server analyzes the data to learn an operational behavior of the first microservice and determine a firewall rule set to be applied associated with the first microservice based on the operational behavior learned for the first microservice. The server causes a micro-firewall to be instantiated for the first microservice. The micro-firewall is configured to apply the firewall rule set to inbound communications to the first microservice and outbound communications from the first microservice.
    Type: Application
    Filed: December 4, 2018
    Publication date: June 4, 2020
    Inventors: Robert Edgar Barton, Jerome Henry, Matthias Falkner, Maik Guenter Seewald
  • Publication number: 20200057863
    Abstract: The disclosed technology provides solutions that enable scalable and secure data retrieval between microservices by using microservice attributes to encrypt container based data stores. A process of the technology can include steps for: instantiating a first microservice and a second microservice in a cloud environment, wherein the first microservice is associated with a first attribute label and the second microservice is associated with a second attribute label, generating a first key based on the first attribute label and a second key based on the second attribute label, associating a first data store with the first microservice, wherein the first data store is encrypted using the first key, and associating a second data store with the second microservice, wherein the second data store is encrypted using the second key. Systems and machine readable media are also provided.
    Type: Application
    Filed: August 20, 2018
    Publication date: February 20, 2020
    Inventors: Maik Guenter Seewald, Robert Edgar Barton, Jerome Henry
  • Patent number: 10567295
    Abstract: A method for teleprotection over a segment routed network comprises receiving network requirements for communication between a first teleprotection relay and a second teleprotection relay, the first teleprotection relay associated with a first router of the segment routed network, and the second teleprotection relay associated with a second router of the segment routed network, identifying a primary path from the first router to the second router satisfying the network requirements, determining a congruent reverse of the primary path satisfies the network requirements, sending, to the first router, the primary path, the first router routing traffic from the first teleprotection relay to the second teleprotection relay using the primary path, and sending, to the second router, the congruent reverse of the primary path, the second router routing traffic from the second teleprotection relay to the first teleprotection relay using the congruent reverse of the primary path.
    Type: Grant
    Filed: May 17, 2018
    Date of Patent: February 18, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Robert Barton, Maik Guenter Seewald, Michael Alan Kowal, Muthurajah Sivabalan, Jerome Henry
  • Publication number: 20190356600
    Abstract: A method for teleprotection over a segment routed network comprises receiving network requirements for communication between a first teleprotection relay and a second teleprotection relay, the first teleprotection relay associated with a first router of the segment routed network, and the second teleprotection relay associated with a second router of the segment routed network, identifying a primary path from the first router to the second router satisfying the network requirements, determining a congruent reverse of the primary path satisfies the network requirements, sending, to the first router, the primary path, the first router routing traffic from the first teleprotection relay to the second teleprotection relay using the primary path, and sending, to the second router, the congruent reverse of the primary path, the second router routing traffic from the second teleprotection relay to the first teleprotection relay using the congruent reverse of the primary path.
    Type: Application
    Filed: May 17, 2018
    Publication date: November 21, 2019
    Applicant: Cisco Technology, Inc.
    Inventors: Robert Barton, Maik Guenter Seewald, Michael Alan Kowal, Muthurajah Sivabalan, Jerome Henry
  • Patent number: 10389173
    Abstract: In one embodiment, a method comprises a topology processor generating a power grid topology model of a power grid topology controlled via a communications network having a corresponding communications architecture overlying the power grid topology. The topology processor generates a communications architecture model of the communications architecture. In response to receiving a request for executing a change in at least a portion of the power grid topology, the topology processor identifies power grid topology model data associated with the portion of the power grid topology, and identifies communications architecture model data identifying a corresponding portion of the communications architecture associated with the portion of the power grid topology.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: August 20, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Maik Guenter Seewald, Patrick Wetterwald