Cisco Technology Inc patent applications on 14th August 2025
Patent Applications by Cisco Technology Inc on 14th August 2025
Cisco Technology Inc: 27 patent applications
Cisco Technology Inc has applied for patents in the areas of G06F21/72 (ELECTRIC DIGITAL DATA PROCESSING (computer systems based on specific computational models, 2), G06F40/40 (ELECTRIC DIGITAL DATA PROCESSING (computer systems based on specific computational models, 2), G06F11/3428 (Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation {; Recording or statistical evaluation of user activity, e.g. usability assessment}, 2), H04L41/0816 (Configuration management of networks or network elements (address allocation, 2), H04L2101/622 (TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION (arrangements common to telegraphic and telephonic communication, 2)
Patent Applications by Cisco Technology Inc
20250258337. BI-MATERIAL MODE MULTIPLEXER
Abstract: The present disclosure describes a mode multiplexer with layered optical waveguides formed using different materials. The mode multiplexer includes a first optical waveguide and a second optical waveguide. The first optical waveguide includes a first end and a second end. The first end is wider than...
20250258818. Cache-Generated Frequently Asked Questions Page
Abstract: In one embodiment, a method for a cache-generated frequently asked questions page includes converting a received query into a set of embeddings and performing a semantic searching operation based on information contained in the set of embeddings against a cache of question and answer pairs. The meth...
20250258908. USING ROOT-OF-TRUST (ROT) TO CONTINUOUSLY MONITOR DEVICE OPERATION FOR IMPAIRMENT
Abstract: A method for monitoring an Integrated Circuit (IC). The method includes a Root-Of-Trust (ROT) module to actuate a monitoring process to monitor at least one feature being performed in ongoing operations of the IC in accordance with a policy. The ROT module receives data that defines the policy that ...
20250258964. CONTINUOUS IMPAIRMENT OF A CHIP UPON DETECTING A DAMAGED PACKAGE
Abstract: A method for monitoring an Integrated Circuit (IC). The method includes decrypting, by the Root-Of-Trust (ROT) module, an identity package that resides in a non-volatile memory of the IC using a secret accessible by the ROT module. The identity package is configured in a decrypted state at the non-v...
20250258999. MEMORY-BASED FUNCTION CALLING FOR LOGICAL FORMULATION AND INFERENCE FOR LARGE LANGUAGE MODELS
Abstract: In one embodiment, a method comprises: parsing, using a large language model, a constraint satisfaction problem statement into a sequence of sentences corresponding to a plurality of individual problem sentences and a plurality of individual answer choices; invoking respective primitives from a set ...
20250259010. BENCHMARKING MODULAR NATURAL LANGUAGE PROCESSING PIPELINES
Abstract: In one embodiment, a method herein comprises: obtaining, by a device, one or more modular natural language processing pipelines each having a respective plurality of selected pipeline stage components; processing, by the device, an input text by the one or more modular natural language processing pi...
20250259011. PERFORMANCE MONITORING, MITIGATION, AND RETRAINING OF LARGE LANGUAGE MODELS
Abstract: In one embodiment, a method herein comprises: extracting topics from queries submitted into a large language model; determining a quality of outputs from the large language model in response to the queries; assessing per-topic performance of the large language model across the topics queried into th...
20250259430. CLIENT-SIDE, PRE-TRAINING PERTURBATION IN FEDERATED LEARNING
Abstract: In one embodiment, a device in a federated learning system receives a global model from an aggregation node. The device applies noise to the global model, to form a noise-augmented model. The device performs local training using the noise-augmented model and a local training dataset, to form a local...
20250259627. AUTOMATIC PERSONALIZATION FOR SPEECH RECOGNITION SYSTEMS
Abstract: According to one or more embodiments of the disclosure, automatic personalization for speech recognition systems is provided by a method that includes detecting, by a device, unrecognized words within an automated transcript of audio from a communication session and associating, by the device, the u...
20250260416. COMPARATOR CAPABLE OF OPERATING AT LOW POWER SUPPLY VOLTAGE
Abstract: Embodiments herein describe a comparator with a preamplifier that includes output transistors that help drive output nodes of a latch. In one embodiment, when the latch is in an active mode, the output transistors in the preamplifier help latch transistors in the latch to drive the output nodes of t...
20250260615. TOPOLOGY-DRIVEN INTERCONVERSION OF RING NETWORK CONFIGURATIONS
Abstract: Methods and devices provide network configuration provisioning wherein, based on topology of a ring network and an ordering of network devices, a network controller requests network devices of the ring network to provision configuration from a first layer 2 network protocol to a second layer 2 netwo...
20250260616. COORDINATING PACKET AND STATE EXTRACTION ACROSS DEVICES USING CONTROL/DATA PLANE SIGNALING
Abstract: Techniques for capturing device state information from multiple network devices when a network error occurs are described. A network controller determines a trigger event and a trigger action. The trigger action is an action to be taken by a network device in response to the trigger event occurring,...
20250260638. OPTIMIZED MULTICAST TRANSPORT MIGRATION PROCEDURES
Abstract: The present technology provides solutions for optimizing communications between nodes and can include receiving, by a first node from a second node, an advertisement indicating an advertisement transport protocol supported by the second node, where the first node supports a plurality of transport pr...
20250260644. INTER-COMPATIBLE FORWARDING MODES IN NETWORK FABRIC OVERLAYS
Abstract: Methods and devices configure edge nodes of a virtual network overlay to continuously forward data plane traffic flows between client devices of a common subnet over the course of at least some of the edge nodes being EF-configured. TF-configured edge nodes and EF-configured edge nodes both play rol...
20250260645. PROVIDING DUAL-HOMED, ACTIVE-ACTIVE DEVICES ON NETWORK FABRICS
Abstract: Techniques for edge nodes of a network fabric to identify L2 broadcast messages that have been looped through connections with dual-homed, active-active endpoints. The edge nodes receive an L2 broadcast message from the network fabric, and store a source MAC address of the message in a local map-cac...