Patents by Inventor Mark Grayson

Mark Grayson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210288936
    Abstract: Presented herein are techniques to facilitate OpenRoaming integration into a Wireless Roaming Intermediary Exchange (WRIX) data-clearing and financial-settlement architecture. In one example, a method is provided that may include querying, by an application endpoint, a Domain Name System (DNS) server to determine support for a service for a domain; and obtaining, by the application endpoint from the DNS server, an explicit indication that one of: the service is not supported for the domain; or the service is proprietary and is supported for the domain.
    Type: Application
    Filed: August 10, 2020
    Publication date: September 16, 2021
    Inventors: Mark Grayson, Bart A. Brinckman
  • Patent number: 11121883
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for protecting user privacy in the playback of user sessions are described. In one aspect, a method includes accessing, for a user session with one or more user interfaces, event data that includes interface data specifying a structure of the user interface(s), and, for each of one or more user interface elements for which content was presented by the user interface(s) during the user session, an encrypted content element including the content of the user interface element encrypted using a public key corresponding to a rule enabling recording of the content of the user interface element and data identifying the rule. Playback of the user session is generated including, for each of the interface element(s), decrypting the encrypted content element for the user interface element and presenting the decrypted content during the playback of the user session.
    Type: Grant
    Filed: March 18, 2021
    Date of Patent: September 14, 2021
    Assignee: FullStory, Inc.
    Inventors: Joel Grayson Webber, Benjamin David Dean, Mark Nicholas Seth Fowler
  • Publication number: 20210274426
    Abstract: Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.
    Type: Application
    Filed: September 16, 2020
    Publication date: September 2, 2021
    Inventors: Mark Grayson, Jerome Henry, Bart A. Brinckman, Matthew Stephen MacPherson
  • Publication number: 20210274048
    Abstract: Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.
    Type: Application
    Filed: September 17, 2020
    Publication date: September 2, 2021
    Inventors: Mark Grayson, Jerome Henry
  • Publication number: 20210258245
    Abstract: Techniques are described to provide for the ability to combine policies in a manner that utilized policy purposes to generate a combined policy. In one example, a method includes obtaining, at a network entity of a network, a plurality of policies, wherein each policy is associated with a policy purpose defined by a policy originator; combining the plurality of policies by the network entity to generate a combined policy, wherein the combining is performed based on a ranking of policy purposes; and enforcing the combined policy at one or more policy enforcement entities of the network for one or more packet flows communicated between a client and the network.
    Type: Application
    Filed: February 14, 2020
    Publication date: August 19, 2021
    Inventors: Louis Gwyn Samuel, Mark Grayson
  • Patent number: 11089602
    Abstract: Systems, methods, and computer-readable media for radio resource management in a Citizens Broadband Radio Service (CBRS) network include one or more CBRS devices (CBSDs) which can obtain a group type associated with the CBSDs and their associated Radio Environment Map (REM) reports of one or more frequency channels of the CBRS network. The group type and the REM reports may be provided to a Self-Organizing Network (SON) manager of the CBRS network, where the SON manager may determine and provide to the CBSDs, one or more of a channel utilization information, transmission power, or mobility load management information for the CBSD, based on the group type and the REM reports.
    Type: Grant
    Filed: September 12, 2019
    Date of Patent: August 10, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Akram Sheriff, Santosh Ramrao Patil, Gangadharan Byju Pularikkal, Mark Grayson
  • Publication number: 20210218727
    Abstract: The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.
    Type: Application
    Filed: January 14, 2020
    Publication date: July 15, 2021
    Inventors: Malcolm Muir Smith, Bart Brinckman, Mark Grayson, Jerome Henry, Matthew Stephen MacPherson
  • Publication number: 20210185506
    Abstract: Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS).
    Type: Application
    Filed: June 9, 2020
    Publication date: June 17, 2021
    Inventors: Srinath Gundavelli, Sangram Kishore Lakkaraju, Mark Grayson, Louis Gwyn Samuel, Timothy Peter Stammers
  • Publication number: 20210185752
    Abstract: Techniques are described for integrating cellular access within an enterprise fabric. In one example, a method includes obtaining, by a cellular termination function via a cellular access point, a request from a client for data plane connectivity via a network, wherein the cellular access point is registered within the network and is in communication with a first switch of the network; obtaining, by the cellular termination function, cellular policy information and enterprise policy information for the client; obtaining, by the cellular termination function, an Internet Protocol (IP) address for the client; and establishing data plane connectivity for the client with the network via the cellular access point, the first switch of the network, and a second switch of the network based, at least in part, on the IP address for the client, wherein the second switch connects the network with one or more data networks.
    Type: Application
    Filed: December 17, 2019
    Publication date: June 17, 2021
    Inventors: Louis Gwyn Samuel, Srinath Gundavelli, Oliver James Bull, Mark Grayson, Sangram Kishore Lakkaraju, Shree N. Murthy
  • Patent number: 11038881
    Abstract: Various embodiments disclosed herein include apparatuses, systems, devices, and methods for anonymously generating an encrypted session for a client device in a wireless network. The method comprises, in response to providing, to the client device in the wireless network, a request for credentials associated with the client device, obtaining, from the client device, a response including proposed credentials associated with the client device. The method further comprises determining whether or not the format of the response matches a response template. The method further comprises, in response to determining that the format of the response matches the response template, generating an encrypted wireless session for the client device independent of the proposed credentials associated with the client device.
    Type: Grant
    Filed: November 1, 2018
    Date of Patent: June 15, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Bart Brinckman, Jerome Henry, Malcolm Muir Smith, Mark Grayson, David Delano Ward
  • Patent number: 11019564
    Abstract: Roaming Consortium Identifier (RCOI)-based handling of identity requirements may be provided. First, an access device may advertise an identifier. The identifier may identify a roaming federation and an identity type used by a service provider in order to provide service by the access device. Next, a request to associate with the access device may be received from a user device. The request may be compliant with the identity type advertised in the identifier. The user device may then be associated with the access device in response to receiving the request.
    Type: Grant
    Filed: July 15, 2019
    Date of Patent: May 25, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Grayson, Jerome Henry, Malcolm Muir Smith, Bart A. Brinckman
  • Patent number: 11018983
    Abstract: Systems, methods, and devices are disclosed for providing a quality of service between nodes. A service provider can receive, from a first node of a customer network to an ingress node of a service provider network, packets bound for a second node on the customer network that is remote from the first node. The packets are mapped to a network segment according to a traffic type based on an identifier associated with the packets that identifies the traffic type of the packets. The packets are sent via their mapped network segment to an egress node with connectivity to the second node of the customer network according to a quality of service associated with the traffic type identified by the identifier.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: May 25, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Gangadharan Byju Pularikkal, Santosh Ramrao Patil, Mark Grayson, Swaminathan Anantha, Sourav Chakraborty
  • Publication number: 20210152513
    Abstract: Techniques are described to provide multipath mobility via Domain Name System-as-an-Authoritative Source (DNS-AS) techniques. In one example, a method includes obtaining, by a multipath policy decision element, a plurality of multipath policy recommendations for an application, wherein the plurality of multipath policy recommendations are obtained from one or more multipath policy recommendation elements; combining the plurality of multipath policy recommendations to generate a policy enforcement decision, wherein the policy enforcement decision identifies, at least in part, one or more network paths that are to be utilized for one or more packet flows associated with the application, wherein each of the one or more network paths is associated with an access type; and enforcing the policy enforcement decision for one or more packet flows associated with the application.
    Type: Application
    Filed: April 16, 2020
    Publication date: May 20, 2021
    Inventors: Mark Grayson, Oliver James Bull, Louis Gwyn Samuel, Srinath Gundavelli
  • Patent number: 11006266
    Abstract: In one example, a server obtains, from a device having an embedded Subscriber Identification Module (eSIM), a unique identifier of the eSIM. The server validates the device based on the unique identifier of the eSIM. The server provides, to the device, a unique credential for a profile of the eSIM. The profile of the eSIM corresponds to a network of an enterprise. The server provides, to a credential database, the unique credential for the profile of the eSIM. The credential database including the unique credential for the profile of the eSIM indicates that the device is permitted to access the network of the enterprise.
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: May 11, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Anand Oswal, Sudhir Kumar Jain, Rajesh S. Pazhyannur, Mark Grayson
  • Publication number: 20210136583
    Abstract: Techniques are described to provide open access in a neutral host environment. In one example, a method includes obtaining, by a mobility management node of a neutral host network, a network connectivity request from a user equipment, wherein the network connectivity request comprises an indication of a preferred service provider to which the user equipment is to be connected; determining, by the mobility management node, that the preferred service provider provides non-subscription-based network connectivity for the neutral host network; based on determining that the preferred service provider provides non-subscription-based network connectivity for the neutral host network, establishing secure communications for the user equipment, wherein the secure communications are established for the user equipment without authenticating an identity of user equipment; and providing network connectivity between the user equipment and the preferred service provider upon establishing the secure communications.
    Type: Application
    Filed: November 4, 2020
    Publication date: May 6, 2021
    Inventors: Srinath Gundavelli, Vimal Srivastava, Mark Grayson, Sudhir Kumar Jain, Anand Oswal
  • Publication number: 20210120000
    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network.
    Type: Application
    Filed: December 29, 2020
    Publication date: April 22, 2021
    Inventors: Gangadharan Byju Pularikkal, Mark Grayson, Santosh Ramrao Patil, Jerome Henry, Bart Brinckman, Mark Allen Webb
  • Publication number: 20210112126
    Abstract: In one embodiment, a method includes: transmitting a message to a first end point that includes an instruction to initiate a communication type, wherein the communication type includes sharing a randomization token between the first and second end points; obtaining a first communication report from the first end point and a second communication report from the second end point in response to initialization of a communication based on the communication type between the first end point and the second end point across the network, wherein the first and second communication reports respectively include a first and second hash that corresponds to a function of the randomization token and identity information; determining whether the first hash matches the second hash; generating a value that correlates the first and second end points with the communication across the network in response to determining that the first hash matches the second hash.
    Type: Application
    Filed: December 22, 2020
    Publication date: April 15, 2021
    Inventors: Mark Grayson, Jerome Henry
  • Publication number: 20210092645
    Abstract: Techniques are described to provide traffic steering and policy combining in a mobile network. In one example, a method includes combining, by a policy function of a network, a user equipment (UE) access policy comprising UE access rules obtained from a UE with a network-based access policy associated with the network to generate a combined access policy, the combined access policy comprising combined access rules; communicating the combined access rules to the UE via a message, wherein the message comprises an indication that indicates that the UE is not allowed to override the combined access rules with the UE access rules; and communicating the combined access rules to a user plane function handling traffic for the UE.
    Type: Application
    Filed: February 14, 2020
    Publication date: March 25, 2021
    Inventors: Mark Grayson, Louis Gwyn Samuel
  • Publication number: 20210084658
    Abstract: Systems, methods, and computer-readable media for radio resource management in a Citizens Broadband Radio Service (CBRS) network include one or more CBRS devices (CBSDs) which can obtain a group type associated with the CBSDs and their associated Radio Environment Map (REM) reports of one or more frequency channels of the CBRS network. The group type and the REM reports may be provided to a Self-Organizing Network (SON) manager of the CBRS network, where the SON manager may determine and provide to the CBSDs, one or more of a channel utilization information, transmission power, or mobility load management information for the CBSD, based on the group type and the REM reports.
    Type: Application
    Filed: September 12, 2019
    Publication date: March 18, 2021
    Inventors: Akram Sheriff, Santosh Ramrao Patil, Gangadharan Byju Pularikkal, Mark Grayson
  • Publication number: 20210076215
    Abstract: The present technology pertains to a system, method, and non-transitory computer-readable medium for confirming the identities of devices requesting roaming access on a network by authoritative identity providers and proxies for authoritative identity providers. The technology can, in response to a receipt of a request from a device for roaming access, connect to an identity entity at an address by a network access provider, wherein the request for roaming access identifies an authoritative identity provider host name; receive a certificate from the identity entity; and determine, using the certificate, whether the identity entity is an authoritative identity provider or a proxy for an authoritative identity provider.
    Type: Application
    Filed: September 5, 2019
    Publication date: March 11, 2021
    Inventor: Mark Grayson