Patents by Inventor Michael H. Behringer
Michael H. Behringer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10142167Abstract: In one embodiment, a device in a network receives update recovery data from a neighbor of the device in the network. The device monitors the neighbor during installation of a software update by the neighbor. The device detects an installation failure of the software update by the neighbor. The device causes recovery of the neighbor using the update recovery data, in response to detecting the installation failure of the software update by the neighbor.Type: GrantFiled: May 13, 2015Date of Patent: November 27, 2018Assignee: CISCO TECHNOLOGY, INC.Inventors: Gaurav Chhabra, Ather Sayeed Kanak, Shashi Kumar Bansal, Michael H. Behringer
-
Patent number: 10110483Abstract: In one embodiment, a method includes receiving at a virtual controller operating at a network device, global parameters for a plurality of virtual machines located in a first network site and in communication with a second network site through a switch, converting at the virtual controller, the global parameters into global overlay network parameters, and transmitting the global overlay network parameters to the switch for use in automatically creating a global network overlay. The global overlay network parameters define an end-to-end network extending from the virtual machines in the first network site to a plurality of virtual machines in the second network site. An apparatus and logic are also disclosed herein.Type: GrantFiled: March 18, 2016Date of Patent: October 23, 2018Assignee: Cisco Technology, Inc.Inventors: Michael H. Behringer, Patrice Bellagamba
-
Patent number: 9774452Abstract: A method in an example embodiment includes creating an initial information package for a device attempting to join a network domain of a network environment; communicating the initial information package to a signing authority; sending an authorization token generated by the signing authority to the device, wherein the device validates the authorization token based on a credential in the device; and receiving an audit history report of the device, wherein the audit history report comprises information regarding previous attempts by the device to join the network environment.Type: GrantFiled: May 27, 2015Date of Patent: September 26, 2017Assignee: Cisco Technology, Inc.Inventors: Steinthor Bjarnason, Michael H. Behringer, Yves Francis Eugene Hertoghs, Max Pritikin
-
Publication number: 20170272359Abstract: In one embodiment, a method includes receiving at a virtual controller operating at a network device, global parameters for a plurality of virtual machines located in a first network site and in communication with a second network site through a switch, converting at the virtual controller, the global parameters into global overlay network parameters, and transmitting the global overlay network parameters to the switch for use in automatically creating a global network overlay. The global overlay network parameters define an end-to-end network extending from the virtual machines in the first network site to a plurality of virtual machines in the second network site. An apparatus and logic are also disclosed herein.Type: ApplicationFiled: March 18, 2016Publication date: September 21, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Michael H. Behringer, Patrice Bellagamba
-
Patent number: 9560018Abstract: A method is provided in one example embodiment and includes configuring a local network element as an autonomic registrar for a designated network domain; establishing an autonomic control plane (“ACP”) between the local network element and one or more remote network elements identified by local network element as a remote neighbor; designating a locally-defined subnet at the local network element to be extended to each of the one or more remote network elements; and executing an ACP command at the local network element, wherein the executing triggers a message to each of the one or more remote network elements, the message including information regarding the designated local subnet. The information included in the message is used by each of the remote network elements to auto-resolve its Locator/Identifier Separation Protocol (“LISP”) configuration, enabling the designated local subnet to be extended to each of the one or more remote network elements.Type: GrantFiled: December 8, 2014Date of Patent: January 31, 2017Assignee: CISCO TECHNOLOGY, INC.Inventors: Patrice Bellagamba, Michael H. Behringer, Santiago Vazquez Freitas
-
Publication number: 20160337169Abstract: In one embodiment, a device in a network receives update recovery data from a neighbor of the device in the network. The device monitors the neighbor during installation of a software update by the neighbor. The device detects an installation failure of the software update by the neighbor. The device causes recovery of the neighbor using the update recovery data, in response to detecting the installation failure of the software update by the neighbor.Type: ApplicationFiled: May 13, 2015Publication date: November 17, 2016Inventors: Gaurav Chhabra, Ather Sayeed Kanak, Shashi Kumar Bansal, Michael H. Behringer
-
Publication number: 20160164832Abstract: A method is provided in one example embodiment and includes configuring a local network element as an autonomic registrar for a designated network domain; establishing an autonomic control plane (“ACP”) between the local network element and one or more remote network elements identified by local network element as a remote neighbor; designating a locally-defined subnet at the local network element to be extended to each of the one or more remote network elements; and executing an ACP command at the local network element, wherein the executing triggers a message to each of the one or more remote network elements, the message including information regarding the designated local subnet. The information included in the message is used by each of the remote network elements to auto-resolve its Locator/Identifier Separation Protocol (“LISP”) configuration, enabling the designated local subnet to be extended to each of the one or more remote network elements.Type: ApplicationFiled: December 8, 2014Publication date: June 9, 2016Applicant: CISCO TECHNOLOGY, INC.Inventors: Patrice Bellagamba, Michael H. Behringer, Santiago Vazquez Freitas
-
Publication number: 20150280916Abstract: A method in an example embodiment includes creating an initial information package for a device attempting to join a network domain of a network environment; communicating the initial information package to a signing authority; sending an authorization token generated by the signing authority to the device, wherein the device validates the authorization token based on a credential in the device; and receiving an audit history report of the device, wherein the audit history report comprises information regarding previous attempts by the device to join the network environment.Type: ApplicationFiled: May 27, 2015Publication date: October 1, 2015Applicant: CISCO TECHNOLOGY, INC.Inventors: Steinthor Bjarnason, Michael H. Behringer, Yves Francis Eugene Hertoghs, Max Pritikin
-
Patent number: 9130837Abstract: A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes communicating the initial information package to a signing authority, receiving an authorization token from the signing authority, and sending the authorization token to the unconfigured device, where the unconfigured device validates the authorization token based on a credential in the unconfigured device. In more specific embodiments, the initial information package includes a unique device identifier of the unconfigured device and a domain identifier of the domain. In further embodiments, the signing authority creates the authorization token by applying an authorization signature to the unique device identifier and the domain identifier. In other embodiments, the method includes receiving an audit history report of the unconfigured device and applying a policy to the device based on the audit history report.Type: GrantFiled: May 22, 2012Date of Patent: September 8, 2015Assignee: CISCO TECHNOLOGY, INC.Inventors: Steinthor Bjarnason, Michael H. Behringer, Yves Francis Eugene Hertoghs, Max Pritikin
-
Patent number: 8792504Abstract: A computer system includes functionality enabling a provider edge router to determine whether network data such as VRF information is properly associated with a corresponding virtual private network. A first node through which the network data is transmitted generates a signature value uniquely associated with the virtual private network. The first node forwards the signature value along with the network data to a second node of the physical network. The second node, in turn, verifies that the network data (such as VRF information) is properly associated with the second node (and virtual network) based on its own generation of a signature value, which is compared with the signature value received from the first node.Type: GrantFiled: December 13, 2010Date of Patent: July 29, 2014Assignee: Cisco Technology, IncInventors: James N. Guichard, Michael H. Behringer
-
Patent number: 8688807Abstract: In one embodiment, accessing a device name, which includes a hostname and a domain name, of a network device; applying a hash function to the domain name to obtain 40 bits as a Global ID of an Internet Protocol version 6 (IPv6) unique local address (ULA); and encoding the hostname to obtain 80 bits as a Subnet ID and an Interface ID of the IPv6 ULA.Type: GrantFiled: August 18, 2011Date of Patent: April 1, 2014Assignee: Cisco Technology, Inc.Inventors: Michael H. Behringer, Steinthor Bjarnason, Alvaro Retana, Yves Francis Eugene Hertoghs
-
Publication number: 20130318343Abstract: A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes communicating the initial information package to a signing authority, receiving an authorization token from the signing authority, and sending the authorization token to the unconfigured device, where the unconfigured device validates the authorization token based on a credential in the unconfigured device. In more specific embodiments, the initial information package includes a unique device identifier of the unconfigured device and a domain identifier of the domain. In further embodiments, the signing authority creates the authorization token by applying an authorization signature to the unique device identifier and the domain identifier. In other embodiments, the method includes receiving an audit history report of the unconfigured device and applying a policy to the device based on the audit history report.Type: ApplicationFiled: May 22, 2012Publication date: November 28, 2013Inventors: Steinthor Bjarnason, Michael H. Behringer, Yves Francis Eugene Hertoghs, Max Pritikin
-
Publication number: 20130046864Abstract: In one embodiment, accessing a device name, which includes a hostname and a domain name, of a network device; applying a hash function to the domain name to obtain 40 bits as a Global ID of an Internet Protocol version 6 (IPv6) unique local address (ULA); and encoding the hostname to obtain 80 bits as a Subnet ID and an Interface ID of the IPv6 ULA.Type: ApplicationFiled: August 18, 2011Publication date: February 21, 2013Applicant: CISCO TECHNOLOGY, INC.Inventors: Michael H. Behringer, Steinthor Bjarnason, Alvaro Retana, Yves Francis Eugene Hertoghs
-
Patent number: 7870604Abstract: A computer system includes functionality enabling a provider edge router to determine whether network data such as VRF information is properly associated with a corresponding virtual private network. A first node through which the network data is transmitted generates a signature value uniquely associated with the virtual private network. The first node forwards the signature value along with the network data to a second node of the physical network. The second node, in turn, verifies that the network data (such as VRF information) is properly associated with the second node (and virtual network) based on its own generation of a signature value, which is compared with the signature value received from the first node.Type: GrantFiled: August 29, 2003Date of Patent: January 11, 2011Assignee: Cisco Technology, Inc.Inventors: James N. Guichard, Michael H. Behringer