Patents by Inventor Harsh Kapoor
Harsh Kapoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924691Abstract: The present disclosure provides a method for improving call performance in a wireless network. The method includes sending an invite request to a server to initiate a Voice over New Radio (VoNR) service, where the UE is connected with a first network entity, and where the invite request comprises a media feature tag. The method includes initiating an Evolved Packet System fallback (EPS FB) service timer based on the media feature tag and a quality of service (QoS) timer and establishing a call over a second network entity using a dedicated bearer when the EPS FB command is received from the server. The call is established over the second network entity using the dedicated bearer by sending a service request to the server and/or sending an update request to the server when the EPS FB timer is expired and the EPS FB command is not received from the server.Type: GrantFiled: August 13, 2021Date of Patent: March 5, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Srinivas Chinthalapudi, Kashmira Kapoor, Kedar Santosh Kumar Aalla, Harsh Kothari
-
Patent number: 9525696Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: GrantFiled: March 9, 2012Date of Patent: December 20, 2016Assignee: Blue Coat Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20160366160Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: April 25, 2016Publication date: December 15, 2016Applicant: Blue Coat Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Patent number: 8402540Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: GrantFiled: October 24, 2007Date of Patent: March 19, 2013Assignee: Crossbeam Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20120240185Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: March 9, 2012Publication date: September 20, 2012Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Patent number: 8135657Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: GrantFiled: August 24, 2011Date of Patent: March 13, 2012Assignee: Crossbeam Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20120017262Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: August 24, 2011Publication date: January 19, 2012Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Patent number: 8010469Abstract: Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security are described. Such flow processing facilities may be used for inspecting network traffic packet payloads to detect security threats and intrusions across accessible layers of the network IP stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources.Type: GrantFiled: October 29, 2007Date of Patent: August 30, 2011Assignee: Crossbeam Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Patent number: 7979368Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: GrantFiled: October 29, 2007Date of Patent: July 12, 2011Assignee: Crossbeam Systems, Inc.Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080262990Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 29, 2007Publication date: October 23, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080262991Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 29, 2007Publication date: October 23, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080229415Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 29, 2007Publication date: September 18, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080162390Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: July 3, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080133518Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: June 5, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080134330Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: June 5, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20080133517Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: October 24, 2007Publication date: June 5, 2008Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20070192863Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.Type: ApplicationFiled: December 13, 2006Publication date: August 16, 2007Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, JC Ferguson, Yevgeny Korsunsky, Paul Gallo, Charles Lee, Timothy Martin, Chunsheng Fu, Weidong Xu
-
Publication number: 20030021287Abstract: A method and a system are provided for use in communicating data between a time division multiplexing (TDM) network and a packet based network. A clock signal is derived from data packets containing data originally transmitted over the TDM network. Outgoing TDM data is obtained using the data packets and the clock signal. The outgoing TDM data has timing characteristics of the data originally transmitted over the TDM network. Data extracted from the data packets may be collected in a FIFO and the clock signal may be derived in part from fill level information for the FIFO.Type: ApplicationFiled: May 2, 2002Publication date: January 30, 2003Applicant: Appian Communications, Inc.Inventors: Charles Lee, Harsh Kapoor
-
Publication number: 20030009599Abstract: A ring is configured that has multiple nodes connected by first and second channels. A distributing filter is provided that is configured to direct a first type of data to the first channel in the ring and a second type of data to the second channel in the ring. A fault is detected on at least one of the first and second channels in the ring. The distributing filter is adjusted to redirect data in the ring to avoid the fault.Type: ApplicationFiled: May 2, 2002Publication date: January 9, 2003Applicant: Appian Communications, Inc.Inventors: Charles Lee, Harsh Kapoor, Jonathan Morgan
-
Patent number: 6310882Abstract: A switching architecture for very high data rates which is placed between a port connecting to a fiber optic gigabit ethernet link and a two Gbit/sec backplane of a concentrator. A port connects to the link for both receiving and transmitting data packets from and to the link. A first FTE receives a data packet from the port, and analyzes the data packet to determine if the data packet should be forwarded to the backplane of the concentrator. If the data packet is to be forwarded, the first FTE sends the data packet to a backplane connection for connecting to the backplane of the network concentrator. A second FTE is connected to the backplane connection. The second FTE receives a data packet from the backplane connection, and analyzes the data packet in a manner similar to the first FTE to determine if a packet should be forwarded to the port.Type: GrantFiled: January 27, 1999Date of Patent: October 30, 2001Assignee: 3Com CorporationInventors: Gary D. Lorenz, Bruce W. Thompson, Harsh Kapoor, Charles R. Weaver, Brian J. Myrick