Patents by Inventor Priya Rajagopal

Priya Rajagopal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070005930
    Abstract: Systems and methods are described herein to provide for host virtual memory reconstitution.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Inventors: Hormuzd Khosravi, David Durham, Travis Schluessler, Ravi Sahita, Uday Savagaonkar, Priya Rajagopal
  • Publication number: 20060294596
    Abstract: A tamper-proof access monitor monitors accesses by software executing on a host processor to memory-mapped regions of memory that control input/output resources.
    Type: Application
    Filed: June 27, 2005
    Publication date: December 28, 2006
    Inventors: Priya Govindarajan, Priya Rajagopal
  • Publication number: 20060230456
    Abstract: A heuristic agent in a tamper resistant partition monitors network traffic flow for undesirable worm scanning activity. If the undesired scanning activity is detected, the output of an associated network controller may be throttled or ultimately disabled from the network.
    Type: Application
    Filed: March 24, 2005
    Publication date: October 12, 2006
    Inventors: Gayathri Nagabhushan, Priya Rajagopal, Ravi Sahita
  • Patent number: 7120118
    Abstract: Multiple traffic management nodes may be coupled with separate networks and with a connecting network. The traffic management nodes monitor and classify traffic passing through the connecting network. Current paths through the connecting network are identified and used to build detour paths through the connecting network using traffic management nodes as detour nodes. The detour paths may be shortened, thereby excluding the detour nodes from each detour path. The traffic management nodes and the detour paths may be used to create a traffic engineered system for traffic passing through the connecting network.
    Type: Grant
    Filed: October 18, 2001
    Date of Patent: October 10, 2006
    Assignee: Intel Corporation
    Inventors: Priya Rajagopal, Gerhard W. Gross
  • Patent number: 7110540
    Abstract: A hash table randomly populated with byte patterns is used in finding the byte patterns in a sequence of bytes. A hash function is applied to information associated with a substring of the sequence of bytes to generate a key value. The key value is compared to the keys of the hash table, and if a match is found, the information associated with the substring is compared to corresponding information associated with a substring of a byte pattern stored in the hash table. If a match is found, the substring of the sequence of bytes is compared to the substring of the byte pattern. If a match is found, the substring is compared to the byte pattern.
    Type: Grant
    Filed: April 25, 2002
    Date of Patent: September 19, 2006
    Assignee: Intel Corporation
    Inventors: Priya Rajagopal, David M. Durham
  • Publication number: 20060098646
    Abstract: In one embodiment, a method is provided. The method of this embodiment provides receiving one or more packets that are addressed to an alternate IP (Internet Protocol) address and that include a LADLC (local application data link control) address in a system having an operating system-independent processor (“service processor”) associated with the alternate IP address and an alternate DLC address, and an embedded network stack (“ENS”) of the service processor associated with a primary IP address; performing filtering to determine if the LADLC address matches the alternate DLC address; and if the LADLC address matches the alternate DLC address, then replacing the alternate IP address of the one or more packets with the primary IP address, and forwarding the one or more packets to the ENS.
    Type: Application
    Filed: November 9, 2004
    Publication date: May 11, 2006
    Inventors: Ravi Sahita, Priya Rajagopal, David Durham, Scott Hahn, Carey Smith, Arvind Kumar
  • Publication number: 20060095967
    Abstract: Hardware correlation of software performance statistics. Software may gather data relating to performance of a hardware resource. A hardware component of the system of the hardware resource may obtain data relating to the performance of the hardware resource from a hardware component and the gathered software data, and correlate the software and hardware data. A level of correlation may be determined, and remedial action may be taken based on the correlation of the software and hardware data.
    Type: Application
    Filed: October 29, 2004
    Publication date: May 4, 2006
    Inventors: David Durham, Ravi Sahita, Priya Rajagopal
  • Publication number: 20060095970
    Abstract: A combination of more frequent and less frequent security monitoring may be used to defeat worm or virus attacks. At periodic intervals, a risk assessment scan may be implemented to determine whether or not a worm attack has occurred. Prior thereto, an intermediate detection by an anomaly detection agent may determine whether or not a worm attack may have occurred. If a potential worm attack may have occurred, intermediate action, such as throttling of traffic, may occur. Then, at the next risk assessment scan, a determination may be made as to whether the attack is actually occurring and, if so, more effective and performance altering techniques may be utilized to counter the attack.
    Type: Application
    Filed: November 3, 2004
    Publication date: May 4, 2006
    Inventors: Priya Rajagopal, Ravi Sahita, David Durham
  • Patent number: 7020714
    Abstract: The present invention provides for a method of congestion control for multicast transmission that is entirely managed at the source of the transmission. The various types of filters as well as round trip time estimators (130) that are used in the invention to determine when the rate of the multicast transmission should be reduced to alleviate congestion. The source of the transmission adjusts the rate of transmission based on loss indications that the receivers would otherwise transmit.
    Type: Grant
    Filed: April 6, 2001
    Date of Patent: March 28, 2006
    Assignee: Rensselaer Polytechnic Institute
    Inventors: Shivkumar Kalyanaraman, Neelkanth Natu, Priya Rajagopal, Puneet Thapliyal, Fnu Sidhartha, Jiang Li
  • Publication number: 20060005245
    Abstract: A technique for self-isolation of a network device that has been identified as potentially harmful. The network device may be isolated from the network except for an out-of-band communication channel that can be used for management purposes to restore or repair the device prior to the network connection being re-established.
    Type: Application
    Filed: June 9, 2004
    Publication date: January 5, 2006
    Inventors: David Durham, Ravi Sahita, Priya Rajagopal, James Kardach, Scott Hahn, Raj Yavatkar
  • Publication number: 20060005015
    Abstract: A system and method are provided to preserve the confidentiality and/or integrity of a sensitive communication from its source to its destination whether locally on the platform, between platforms, or even the same program over time.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: David Durham, Ravi Sahita, Priya Rajagopal, Travis Schluessler, Vincent Zimmer
  • Publication number: 20050289311
    Abstract: A system and method are provided to preserve the confidentiality and/or integrity of a sensitive communication from its source to its destination whether locally on the platform, between platforms, or even the same program over time.
    Type: Application
    Filed: June 29, 2004
    Publication date: December 29, 2005
    Inventors: David Durham, Ravi Sahita, Priya Rajagopal, Travis Schluessler, Vincent Zimmer
  • Publication number: 20050289316
    Abstract: According to one embodiment a computer system is disclosed. The computer system includes a central processing unit (CPU), a memory control device coupled to the CPU, a main memory device coupled to the memory control device, a bus coupled to the memory control device, and one or more devices, coupled to the bus. A physical segment of the main memory device is remapped to a bus device region of the main memory for exclusive use by the one or more devices.
    Type: Application
    Filed: June 24, 2004
    Publication date: December 29, 2005
    Inventors: David Durham, Priya Rajagopal, Ravi Sahita
  • Publication number: 20050229246
    Abstract: A context-aware firewall and intrusion detection system receives a definition of a Protocol State Machine (PSM) that defines the expected behavior of any protocol (FTP, HTTP, etc.). The PSM provides rules for detecting flows that deviate from the defined protocol behavior and taking appropriate actions. PSMs are comprised of rule groups define behavior of a protocol. The rules include conditions and actions that may be executed if the conditions are satisfied, The actions include dynamically adding filters to be applied to the network flow, saving results for use in later executed rules, and activating and deactivating rules. Thus, these firewalls are capable of selective and intelligent Processing based on flow state information and control payload.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 13, 2005
    Inventors: Priya Rajagopal, Ravi Sahita, Pankaj Parmar
  • Publication number: 20050183082
    Abstract: An apparatus and method for a generic, extensible and efficient data manager for virtual peripheral component interconnect devices (VPCIDs). The apparatus includes a data manager and a data repository, where the data manager utilizes the data repository to maintain information for at least one virtual machine (VM). The VM data structure contains elements to associate the VM with zero or more instances of multiple VPCIDs.
    Type: Application
    Filed: February 17, 2004
    Publication date: August 18, 2005
    Inventors: Saul Lewites, Priya Rajagopal
  • Publication number: 20050135380
    Abstract: In some embodiments, a method includes generating a prefix trie for a set of patterns, generating a suffix trie for the set of patterns, and establishing respective links between nodes of the prefix trie and respective corresponding nodes of the suffix trie. In some embodiments, a method includes adding a suffix to a suffix tree, so that the suffix (which is at least a portion of a pattern) is represented in the tree by a path that begins at a first node and ends at a second node, and associating with at least the first node and the second node a pattern identifier that identifies the pattern.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Inventors: Ravi Sahita, David Durham, Priya Rajagopal
  • Publication number: 20050100019
    Abstract: The present disclosure relates to the processing of a packet utilizing a generic rule based engine, and, more specifically, to the processing of a packet or stream of packets, which are transmitted across a network, utilizing a generic rule based engine that is part of a network processor.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Inventors: Ravi Sahita, Priya Rajagopal
  • Publication number: 20040049593
    Abstract: The present invention provides for a method of congestion control for multicast transmission that is entirely managed at the source of the transmission. The various types of filters as well as round trip time estimators (130) that are used in the invention to determine when the rate of the multicast transmission should be reduced to alleviate congestion.
    Type: Application
    Filed: July 30, 2003
    Publication date: March 11, 2004
    Inventors: Shivkumar Kalyanaraman, Neelkanth Natu, Priya Rajagopal, Puneet Thapliyal, Sidhartha, Jiang Li
  • Publication number: 20040008629
    Abstract: A fully automated method of providing network services on demand is disclosed. The method includes receiving a request for download traffic from a user and beginning transmission of the download traffic to the user. The user is provided with the option of requesting better service level if required for an extra cost. If the user experiences poor service quality, the user then submits a service request by simply clicking a button. The NHCC then automatically identifies the customer traffic, determines the service parameters for the download traffic. With a global view of the existing network topology and conditions, the NHCC determines if the incoming service level request can be accommodated. If the network can be provisioned to accommodate the request, the NHCC sends traffic provisioning requests to Smart Nodes. The download traffic quality then improves thereby providing the customer with better quality of service.
    Type: Application
    Filed: July 15, 2002
    Publication date: January 15, 2004
    Applicant: Intel Corporation
    Inventors: Priya Rajagopal, David Michael Durham
  • Publication number: 20030204703
    Abstract: A hash table randomly populated with byte patterns is used in finding the byte patterns in a sequence of bytes. A hash function is applied to information associated with a substring of the sequence of bytes to generate a key value. The key value is compared to the keys of the hash table, and if a match is found, the information associated with the substring is compared to corresponding information associated with a substring of a byte pattern stored in the hash table. If a match is found, the substring of the sequence of bytes is compared to the substring of the byte pattern. If a match is found, the substring is compared to the byte pattern.
    Type: Application
    Filed: April 25, 2002
    Publication date: October 30, 2003
    Inventors: Priya Rajagopal, David M. Durham