Patents by Inventor Prashanth Patil

Prashanth Patil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9369491
    Abstract: In one implementation, two or more endpoints or client devices communication uses a peer-to-peer, browser based, real time communication protocol. One example of such a protocol is Web Real-Time Communication (WebRTC). An intermediary device receives from a first endpoint, a request for communication with a second endpoint, using the browser based real time communication. The intermediary device identifies a control protocol based on the request for communication, and receives one or more write keys from the first endpoint. The intermediary device monitors communication between the first endpoint and the second endpoint using the one or more write keys. Examples for the intermediary devices include servers, firewalls, and other network devices.
    Type: Grant
    Filed: November 10, 2014
    Date of Patent: June 14, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Tirumaleswar Reddy, Daniel Wing, Prashanth Patil
  • Publication number: 20160134659
    Abstract: In one implementation, two or more endpoints or client devices communication uses a peer-to-peer, browser based, real time communication protocol. One example of such a protocol is Web Real-Time Communication (WebRTC). An intermediary device receives from a first endpoint, a request for communication with a second endpoint, using the browser based real time communication. The intermediary device identifies a control protocol based on the request for communication, and receives one or more write keys from the first endpoint. The intermediary device monitors communication between the first endpoint and the second endpoint using the one or more write keys. Examples for the intermediary devices include servers, firewalls, and other network devices.
    Type: Application
    Filed: November 10, 2014
    Publication date: May 12, 2016
    Inventors: Tirumaleswar Reddy, Daniel Wing, Prashanth Patil
  • Patent number: 9300538
    Abstract: An example method for facilitating on-demand bandwidth provisioning in a network environment is provided and includes receiving a request from a client at a first network for accommodating flow characteristics at a second network that is associated with executing an application at the first network, determining that the request cannot be fulfilled with available network resources allocated to the client by the second network, advising the client of additional cost for accommodating the flow characteristics, and authorizing additional network resources in the second network to accommodate the flow characteristics after receiving notification from the client of payment of the additional cost.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: March 29, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: K. Tirumaleswar Reddy, Prashanth Patil, Daniel G. Wing, William C. VerSteeg, Christopher Wild
  • Publication number: 20160080395
    Abstract: In one implementation, a network device is configured to monitor communications associated with an endpoint and identify domain name service messages in the communications. Subsequently, the network device receives a hypertext transfer protocol (HTTP) request and determines whether a destination internet protocol (IP) address of the HTTP request is present in or absent from the domain name service messages. When the IP address is absent from the domain name service messages, the HTTP request is modified to trigger increased security.
    Type: Application
    Filed: September 17, 2014
    Publication date: March 17, 2016
    Inventors: Tirumaleswar Reddy, Prashanth Patil, Daniel Wing
  • Patent number: 9288231
    Abstract: In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced on both the SecaaS and content delivered from the Web-Cache. This identity-based policy implementation outside the network using SecaaS and within the network for web-cached content provides consistent identity-based security while still providing content to end-users with high performance. Content inspected and/or modified by SecaaS may be cached in the enterprise premises so that requests for content from an origin server decreases, freeing Internet bandwidth and reducing access time. Local caching of streaming content may decrease latency while local implementation of identity-based policy continues to limit the streamed content as appropriate. Local implementation of identity-based policy may reduce the load on SecaaS.
    Type: Grant
    Filed: July 22, 2013
    Date of Patent: March 15, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Tirumaleswar Reddy, Prashanth Patil, Ramesh Nethi, Daniel Wing, Christopher Wild
  • Publication number: 20160065476
    Abstract: An example method for access network capacity monitoring and planning based on flow characteristics in a network environment is provided and includes receiving, at a server in a first network, a request from a client at a second network for accommodating flow characteristics for a flow through the first network between the client and a remote destination, accommodating the flow characteristics if the request can be fulfilled with available network resources allocated to the client by the first network, measuring the flow at the first network between the client and the remote destination, exporting flow details including flow measurements and the requested flow characteristics to a flow collector, and denying the request if the flow collector determines that the flow measurements do not match the requested flow characteristics. In some embodiments, the flow measurements include fine-grain flow measurements, wherein the method further comprises receiving a request for the fine-grain flow measurements.
    Type: Application
    Filed: September 3, 2014
    Publication date: March 3, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: K. Tirumaleswar Reddy, Anca Zamfir, Daniel G. Wing, William C. VerSteeg, Prashanth Patil
  • Publication number: 20160036848
    Abstract: In an approach, a cloud connector component acts as a broker between a client computer, a security-enhanced domain name server, and a content scanning server. When receiving a domain name service (DNS) request from a client computer, the cloud connector forwards the DNS request to the security-enhanced domain name server. The security-enhanced domain name server performs a DNS lookup on a URL contained within the DNS request to determine a network address for a corresponding content provider. In addition, the security-enhanced domain name server calculates a reputation score for the content provider and determines whether the content provider is trustworthy based on the reputation score. The security-enhanced domain name server then sends a DNS response back to the cloud connector that specifies the network address and the result of the trustworthy determination. If the content provider is trustworthiness, the cloud connector forwards the DNS response to the client computer.
    Type: Application
    Filed: September 11, 2014
    Publication date: February 4, 2016
    Inventors: TIRUMALESAR REDDY, PRASHANTH PATIL, SANDEEP RAO
  • Publication number: 20160013985
    Abstract: An example method for facilitating on-demand bandwidth provisioning in a network environment is provided and includes receiving a request from a client at a first network for accommodating flow characteristics at a second network that is associated with executing an application at the first network, determining that the request cannot be fulfilled with available network resources allocated to the client by the second network, advising the client of additional cost for accommodating the flow characteristics, and authorizing additional network resources in the second network to accommodate the flow characteristics after receiving notification from the client of payment of the additional cost.
    Type: Application
    Filed: July 10, 2014
    Publication date: January 14, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: K. Tirumaleswar Reddy, Prashanth Patil, Daniel G. Wing, William C. VerSteeg, Christopher Wild
  • Publication number: 20150334029
    Abstract: Various embodiments are disclosed for prioritizing network flows and providing differentiated quality of service in a telecommunications network. In some embodiments, a SecaaS can be utilized to signal flow characteristics of one or more network flows to a connector in a network so that the network can install differentiated quality of service against the one or more network flows based upon the received flow characteristics. Some embodiments enable a connector in a network to act as a PCP client to signal received flow characteristics to an upstream PCP server hosted by an adjacent access network.
    Type: Application
    Filed: May 15, 2014
    Publication date: November 19, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Prashanth Patil, Tirumaleswar Reddy, Daniel Wing, William Ver Steeg
  • Patent number: 9185562
    Abstract: In one implementation, traffic in a mobile network is directed across multiple paths to a single cloud server or security server (e.g., a security as a service). The mobile device detects a cloud connector through a primary connection based on an attachment or connection via a first interface of a mobile device. The mobile device sends a request to the cloud connector for an identification of a cloud security server associated with the cloud connector. After receiving the identification of the cloud security server, the mobile device directs one or more subsequent data flows or subflows for a second interface or another interface of the mobile device to the cloud server or security server. The second data flow and the second interface are associated with another network that is external to the enterprise network and trusted network connection or not associated with the enterprise network and the trusted network connection.
    Type: Grant
    Filed: July 17, 2013
    Date of Patent: November 10, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Tirumaleswar Reddy, Prashanth Patil, Daniel Wing
  • Patent number: 9154484
    Abstract: In one implementation, identity based security features and policies are applied to endpoint devices behind an intermediary device, such as a network address translation device. The access network switch authenticates an endpoint based on a user identity and a credential. A hypertext transfer protocol (HTTP) packet is generated or modified to include the user identity in an inline header. The HTTP packet including the user identity is sent to a policy enforcement device to look up one or more policies for the endpoint. The access switch receives traffic from the policy enforcement device that is filtered according the user identity. Subsequent TCP connections may also include identity information within the TCP USER_HINT option in a synchronization packet thus allowing identity propagation for other applications and protocols.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: October 6, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Daniel G. Wing, Srinivas Chivukula, Tirumaleswar Reddy, Prashanth Patil
  • Publication number: 20150149657
    Abstract: In one implementation, downloading of streaming content using a security as a service (SecaaS) system is more efficient because portions of the streaming content may not be inspected by the SecaaS. A first request to download content from a content provider is received, and a connection is initiated with a security provider, which inspects the first chunk of the content and generates a routing instruction based on the inspection of the first chunk of content. Based on the routing instructions and the inspection of the first chunk, a request for a second chunk of the streaming content is addressed to the content provider. The second chunk of the streaming content, circumvents the SecaaS system.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Tirumaleswar Reddy, Prashanth Patil, William Ver Steeg, Daniel Wing
  • Publication number: 20150067033
    Abstract: Techniques are provided for optimizing a choice of relay servers for optimizing network traffic flow between peer devices in a network. An allocate request message is received from a router device in a network and is destined for a relay server in the network. The message requests a public identifier from the relay server for the client device. Identifier information is inserted in the message that indicates an identity of the router device. A server device configured to operate as a relay server in the network receives the allocate request message. Based on the identifier information, the server device selects a particular router device in the network path to operate as a newly designated relay server for the client device. The server device sends to the client device an alternate server response message that indicates that the particular router device is selected as the newly designated relay server.
    Type: Application
    Filed: September 5, 2013
    Publication date: March 5, 2015
    Applicant: Cisco Technology, Inc
    Inventors: Pål-Erik S. Martinsen, Prashanth Patil
  • Publication number: 20150026757
    Abstract: In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced on both the SecaaS and content delivered from the Web-Cache. This identity-based policy implementation outside the network using SecaaS and within the network for web-cached content provides consistent identity-based security while still providing content to end-users with high performance. Content inspected and/or modified by SecaaS may be cached in the enterprise premises so that requests for content from an origin server decreases, freeing Internet bandwidth and reducing access time. Local caching of streaming content may decrease latency while local implementation of identity-based policy continues to limit the streamed content as appropriate. Local implementation of identity-based policy may reduce the load on SecaaS.
    Type: Application
    Filed: July 22, 2013
    Publication date: January 22, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Tirumaleswar Reddy, Prashanth Patil, Ramesh Nethi, Daniel Wing, Christopher Wild
  • Publication number: 20150026756
    Abstract: In one implementation, traffic in a mobile network is directed across multiple paths to a single cloud server or security server (e.g., a security as a service). The mobile device detects a cloud connector through a primary connection based on an attachment or connection via a first interface of a mobile device. The mobile device sends a request to the cloud connector for an identification of a cloud security server associated with the cloud connector. After receiving the identification of the cloud security server, the mobile device directs one or more subsequent data flows or subflows for a second interface or another interface of the mobile device to the cloud server or security server. The second data flow and the second interface are associated with another network that is external to the enterprise network and trusted network connection or not associated with the enterprise network and the trusted network connection.
    Type: Application
    Filed: July 17, 2013
    Publication date: January 22, 2015
    Inventors: Tirumaleswar Reddy, Prashanth Patil, Daniel Wing
  • Publication number: 20140237539
    Abstract: In one implementation, identity based security features and policies are applied to endpoint devices behind an intermediary device, such as a network address translation device. The access network switch authenticates an endpoint based on a user identity and a credential. A hypertext transfer protocol (HTTP) packet is generated or modified to include the user identity in an inline header. The HTTP packet including the user identity is sent to a policy enforcement device to look up one or more policies for the endpoint. The access switch receives traffic from the policy enforcement device that is filtered according the user identity. Subsequent TCP connections may also include identity information within the TCP USER_HINT option in a synchronization packet thus allowing identity propagation for other applications and protocols.
    Type: Application
    Filed: February 21, 2013
    Publication date: August 21, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Daniel G. Wing, Srinivas Chivukula, Tirumaleswar Reddy, Prashanth Patil
  • Publication number: 20140105103
    Abstract: In one implementation, traffic in a mobile network is offloaded to a security as a service server or a cloud server. A mobile access gateway (MAG) in the mobile network identifies one or more mobile nodes that are configured for communication on the mobile network. The MAG receives a message that includes an address of a mobile node and sends a request based on the message to the security as a service server. The MAG forwards traffic flows to the security as a service server according to the message, which is configured to detect an indication of malicious software in the traffic flows and/or filter content of the traffic flows according to a user profile.
    Type: Application
    Filed: October 16, 2012
    Publication date: April 17, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Ramesh Nethi, Tirumaleswar Reddy, Srinivas Chivukula, Prashanth Patil