Patents by Inventor Harsh Kapoor

Harsh Kapoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924691
    Abstract: The present disclosure provides a method for improving call performance in a wireless network. The method includes sending an invite request to a server to initiate a Voice over New Radio (VoNR) service, where the UE is connected with a first network entity, and where the invite request comprises a media feature tag. The method includes initiating an Evolved Packet System fallback (EPS FB) service timer based on the media feature tag and a quality of service (QoS) timer and establishing a call over a second network entity using a dedicated bearer when the EPS FB command is received from the server. The call is established over the second network entity using the dedicated bearer by sending a service request to the server and/or sending an update request to the server when the EPS FB timer is expired and the EPS FB command is not received from the server.
    Type: Grant
    Filed: August 13, 2021
    Date of Patent: March 5, 2024
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Srinivas Chinthalapudi, Kashmira Kapoor, Kedar Santosh Kumar Aalla, Harsh Kothari
  • Patent number: 9525696
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: December 20, 2016
    Assignee: Blue Coat Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20160366160
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: April 25, 2016
    Publication date: December 15, 2016
    Applicant: Blue Coat Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Patent number: 8402540
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: March 19, 2013
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20120240185
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: March 9, 2012
    Publication date: September 20, 2012
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Patent number: 8135657
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: August 24, 2011
    Date of Patent: March 13, 2012
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20120017262
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: August 24, 2011
    Publication date: January 19, 2012
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Patent number: 8010469
    Abstract: Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security are described. Such flow processing facilities may be used for inspecting network traffic packet payloads to detect security threats and intrusions across accessible layers of the network IP stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: August 30, 2011
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Patent number: 7979368
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: July 12, 2011
    Assignee: Crossbeam Systems, Inc.
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, John C. Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080262990
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 29, 2007
    Publication date: October 23, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080262991
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 29, 2007
    Publication date: October 23, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080229415
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 29, 2007
    Publication date: September 18, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080162390
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: July 3, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080133518
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: June 5, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080134330
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: June 5, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20080133517
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: October 24, 2007
    Publication date: June 5, 2008
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen D. Justus, JC Ferguson, Yevgeny Korsunsky, Paul S. Gallo, Charles Ching Lee, Timothy M. Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20070192863
    Abstract: A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps.
    Type: Application
    Filed: December 13, 2006
    Publication date: August 16, 2007
    Inventors: Harsh Kapoor, Moisey Akerman, Stephen Justus, JC Ferguson, Yevgeny Korsunsky, Paul Gallo, Charles Lee, Timothy Martin, Chunsheng Fu, Weidong Xu
  • Publication number: 20030021287
    Abstract: A method and a system are provided for use in communicating data between a time division multiplexing (TDM) network and a packet based network. A clock signal is derived from data packets containing data originally transmitted over the TDM network. Outgoing TDM data is obtained using the data packets and the clock signal. The outgoing TDM data has timing characteristics of the data originally transmitted over the TDM network. Data extracted from the data packets may be collected in a FIFO and the clock signal may be derived in part from fill level information for the FIFO.
    Type: Application
    Filed: May 2, 2002
    Publication date: January 30, 2003
    Applicant: Appian Communications, Inc.
    Inventors: Charles Lee, Harsh Kapoor
  • Publication number: 20030009599
    Abstract: A ring is configured that has multiple nodes connected by first and second channels. A distributing filter is provided that is configured to direct a first type of data to the first channel in the ring and a second type of data to the second channel in the ring. A fault is detected on at least one of the first and second channels in the ring. The distributing filter is adjusted to redirect data in the ring to avoid the fault.
    Type: Application
    Filed: May 2, 2002
    Publication date: January 9, 2003
    Applicant: Appian Communications, Inc.
    Inventors: Charles Lee, Harsh Kapoor, Jonathan Morgan
  • Patent number: 6310882
    Abstract: A switching architecture for very high data rates which is placed between a port connecting to a fiber optic gigabit ethernet link and a two Gbit/sec backplane of a concentrator. A port connects to the link for both receiving and transmitting data packets from and to the link. A first FTE receives a data packet from the port, and analyzes the data packet to determine if the data packet should be forwarded to the backplane of the concentrator. If the data packet is to be forwarded, the first FTE sends the data packet to a backplane connection for connecting to the backplane of the network concentrator. A second FTE is connected to the backplane connection. The second FTE receives a data packet from the backplane connection, and analyzes the data packet in a manner similar to the first FTE to determine if a packet should be forwarded to the port.
    Type: Grant
    Filed: January 27, 1999
    Date of Patent: October 30, 2001
    Assignee: 3Com Corporation
    Inventors: Gary D. Lorenz, Bruce W. Thompson, Harsh Kapoor, Charles R. Weaver, Brian J. Myrick