Patents by Inventor Marc Austin

Marc Austin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10645085
    Abstract: Various implementations disclosed herein enable a method of managing device access on one or more operator networks. The method includes determining correspondence between a first adaptor module of a plurality of adaptor modules and a first request to manage devices deployed on a first operator network associated with the first adaptor module. The first request conforms to a first interface. The method includes converting, by the first adaptor module, the first request into a second request that conforms to a second interface provided by an operator entity associated with the first operator network. The second interface is configured to mask network elements of the first operator network in order to prevent direct communication with the network elements. The method includes transmitting the second request to the operator entity via the second interface. The transmitting satisfies a security criterion to shield the network elements from the device management system.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: May 5, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Deepika Sikri, Pallavi Vanacharla, Marc Austin, Suvitha Kesavan, Suparna Kumar, Blair David Martin
  • Publication number: 20180255061
    Abstract: Various implementations disclosed herein enable a method of managing device access on one or more operator networks. The method includes determining correspondence between a first adaptor module of a plurality of adaptor modules and a first request to manage devices deployed on a first operator network associated with the first adaptor module. The first request conforms to a first interface. The method includes converting, by the first adaptor module, the first request into a second request that conforms to a second interface provided by an operator entity associated with the first operator network. The second interface is configured to mask network elements of the first operator network in order to prevent direct communication with the network elements. The method includes transmitting the second request to the operator entity via the second interface. The transmitting satisfies a security criterion to shield the network elements from the device management system.
    Type: Application
    Filed: March 1, 2017
    Publication date: September 6, 2018
    Inventors: Deepika Sikri, Pallavi Vanacharla, Marc Austin, Suvitha Kesavan, Suparna Kumar, Blair David Martin