Patents by Inventor Raghuram S. Sudhaakar

Raghuram S. Sudhaakar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11777785
    Abstract: In one embodiment, methods, systems, and apparatus are described in which data to be used by a processor is stored in a memory. Network communications with a data center are enabled via a network interface. The processor maintains a reporting policy for reporting anomalous events to the data center, the reporting policy having at least one rule for determining a reporting action to be taken by the processor in response to an anomalous event. The processor further monitors the IoT device for a report of an occurrence of the anomalous event. The processor performs the reporting action according to the at least one rule, in response to the report of the occurrence of the anomalous event. An episodic update to the reporting policy from the data center may be received at the processor, which modifies the reporting policy in accordance with the update. Related methods, systems, and apparatus are also described.
    Type: Grant
    Filed: January 21, 2018
    Date of Patent: October 3, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Subhasri Dhesikan, Raghuram S. Sudhaakar, Kevin Holcomb, Yaron Sella
  • Patent number: 11606366
    Abstract: In one embodiment, a sender node in a serial network identifies a message identifier for a packet to be sent by the sender node. The sender node selects a cyclical redundancy check (CRC) initialization vector associated with the message identifier. The sender node generates a CRC value for the packet, based on the selected initialization vector. The sender node sends the packet via the serial network. The sent packet includes the message identifier and the generated CRC value. In turn, a receiver node that receives the packet uses the generated CRC value to authenticate the sender node.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: March 14, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Yaron Sella, Kevin Holcomb, Raghuram S. Sudhaakar
  • Patent number: 11042635
    Abstract: Many modern devices and machines (e.g., Internet of Things (IoT) devices and connected vehicles (CV)) include wireless interfaces that permit external devices to communicate with the devices and machines. These wireless interfaces can be attacked by malicious actors who can affect the operation of the devices or machines. Embodiments herein describe a user controlled actuator (e.g., a knob, set of buttons, switches, etc.) for responding to a wireless attack. Using the actuator, the user can set a response level depending on the threat. Each threat level can elicit a predefined action or set of actions from a control system in the device or machine.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: June 22, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Yaron Sella, Kevin W. Holcomb, Subhasri Dhesikan, Raghuram S. Sudhaakar
  • Patent number: 11025632
    Abstract: In one embodiment, a device of a vehicle receives a packet comprising a source address, a destination address, an internet protocol (IP) encapsulated controller area network (CAN) message, and CAN message identifier information. The device compares the source address, the destination address, and the CAN message identifier information to an access control list (ACL). The device makes a determination that delivery of the CAN message to the destination address would be a policy violation based on the comparison. The device drops the packet based on the determination that delivery of the CAN message to the destination address would be a policy violation.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: June 1, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Anand Venkata Ramana Murthy Akella, Vishnuprasad Raghavan, Vamsidhar Valluri, Raghuram S. Sudhaakar, Shesha Bhushan Sreenivasamurthy
  • Publication number: 20210006567
    Abstract: In one embodiment, a sender node in a serial network identifies a message identifier for a packet to be sent by the sender node. The sender node selects a cyclical redundancy check (CRC) initialization vector associated with the message identifier. The sender node generates a CRC value for the packet, based on the selected initialization vector. The sender node sends the packet via the serial network. The sent packet includes the message identifier and the generated CRC value. In turn, a receiver node that receives the packet uses the generated CRC value to authenticate the sender node.
    Type: Application
    Filed: July 2, 2019
    Publication date: January 7, 2021
    Inventors: Yaron Sella, Kevin Holcomb, Raghuram S. Sudhaakar
  • Patent number: 10853499
    Abstract: In one example embodiment, a network-connected device provides or obtains one or more computer network communications protected by a key. The network-connected device determines a count of the one or more computer network communications according to one or more properties of the one or more computer network communications. Based on the count of the one or more computer network communications, the network-connected device computes an information entropy of the key. Based on the information entropy of the key, the network-connected device dynamically generates a predicted threat level of the key.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: December 1, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David A. Maluf, Raghuram S. Sudhaakar, Nancy Cam-Winget
  • Patent number: 10666671
    Abstract: In one embodiment, a device in a serial network determines that a suspicious event has occurred in the network. The suspicious event is identified based on timing information for one or more frames in the serial network. The device assesses whether the suspicious event is malicious by evaluating a sequence of events in the network that precede the suspicious event. The device causes a mitigation action to be performed in the network when the suspicious event is deemed malicious.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: May 26, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: David A. Maluf, Raghuram S. Sudhaakar, Sanjiv Doshi
  • Patent number: 10602329
    Abstract: A method includes receiving, by a processor of a data collector, a request for sensor data related to an event. The method also includes sending a plurality of requests for the sensor data to a plurality of on-board units (OBUs), respectively, where the plurality of OBUs is associated with a plurality of vehicles, respectively. The method further includes receiving a plurality of responses from the plurality of OBUs, respectively, wherein each response of the plurality of responses includes a sensor data item related to the event. In more specific embodiments the plurality of requests are sent to the plurality of OBUs based on the plurality of OBUs being located within a certain proximity to the event. In yet further embodiments, each sensor data item of the plurality of responses is encapsulated with a respective tag.
    Type: Grant
    Filed: May 12, 2017
    Date of Patent: March 24, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Sateesh K. Addepalli, Raghuram S. Sudhaakar, Lillian Lei Dai, Robert Edward Somers
  • Patent number: 10581932
    Abstract: In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in the network (e.g., hierarchically lower sensors or routers). The collected data may then be converted to aggregated metadata according to a dynamic schema, and the aggregated metadata is stored at the router. The aggregated metadata may also be transmitted to one or more hierarchically higher routers in the network. Queries may then be served by the router based on the aggregated metadata, accordingly.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: March 3, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Sateesh K. Addepalli, Raghuram S. Sudhaakar, Jean-Philippe Vasseur, Flavio Bonomi
  • Publication number: 20200036717
    Abstract: In one embodiment, a device of a vehicle receives a packet comprising a source address, a destination address, an internet protocol (IP) encapsulated controller area network (CAN) message, and CAN message identifier information. The device compares the source address, the destination address, and the CAN message identifier information to an access control list (ACL). The device makes a determination that delivery of the CAN message to the destination address would be a policy violation based on the comparison. The device drops the packet based on the determination that delivery of the CAN message to the destination address would be a policy violation.
    Type: Application
    Filed: December 5, 2018
    Publication date: January 30, 2020
    Inventors: Anand Venkata Ramana Murthy Akella, Vishnuprasad Raghavan, Vamsidhar Valluri, Raghuram S. Sudhaakar, Shesha Bhushan Sreenivasamurthy
  • Publication number: 20200026852
    Abstract: Many modern devices and machines (e.g., Internet of Things (IoT) devices and connected vehicles (CV)) include wireless interfaces that permit external devices to communicate with the devices and machines. These wireless interfaces can be attacked by malicious actors who can affect the operation of the devices or machines. Embodiments herein describe a user controlled actuator (e.g., a knob, set of buttons, switches, etc.) for responding to a wireless attack. Using the actuator, the user can set a response level depending on the threat. Each threat level can elicit a predefined action or set of actions from a control system in the device or machine.
    Type: Application
    Filed: July 20, 2018
    Publication date: January 23, 2020
    Inventors: Yaron SELLA, Kevin W. HOLCOMB, Subhasri DHESIKAN, Raghuram S. SUDHAAKAR
  • Publication number: 20190229976
    Abstract: In one embodiment, methods, systems, and apparatus are described in which data to be used by a processor is stored in a memory. Network communications with a data center are enabled via a network interface. The processor maintains a reporting policy for reporting anomalous events to the data center, the reporting policy having at least one rule for determining a reporting action to be taken by the processor in response to an anomalous event. The processor further monitors the IoT device for a report of an occurrence of the anomalous event. The processor performs the reporting action according to the at least one rule, in response to the report of the occurrence of the anomalous event. An episodic update to the reporting policy from the data center may be received at the processor, which modifies the reporting policy in accordance with the update. Related methods, systems, and apparatus are also described.
    Type: Application
    Filed: January 21, 2018
    Publication date: July 25, 2019
    Inventors: Subhasri DHESIKAN, Raghuram S. Sudhaakar, Kevin Holcomb, Yaron Sella
  • Patent number: 10362083
    Abstract: Information describing a rule to be applied to a traffic stream is received at an edge network device. The traffic stream is received at the edge network device. A schema is applied to the traffic stream at the edge network device. It is determined that a rule triggering condition has been met. The rule is applied to the traffic stream, at the edge network device, in response to the rule triggering condition having been met. At least one of determining that the rule triggering event has taken place or applying the rule is performed based on the applied schema.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: July 23, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Vijaynarayanan Subramanian, Raghuram S. Sudhaakar, David A. Maluf
  • Patent number: 10333887
    Abstract: In one embodiment, a network device connected to an Internet Protocol (IP) network and a serial network scans an infrastructure of the serial network. Based on the scanning, the network device can determine one or more serial endpoints within the serial network infrastructure, and may then allocate an IP address to each of the one or more serial endpoints. The network device may then map received IP network traffic into serial protocol commands on the serial network for a destination serial endpoint having an allocated IP address corresponding to a destination IP address of the received IP network traffic, and may also bridge data present on the serial network from a sourcing serial endpoint into an IP message on the IP network with an indication of a corresponding allocated IP address of the sourcing serial endpoint, accordingly.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: June 25, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: David A. Maluf, Raghuram S. Sudhaakar, John Burns, Jan Medved, Herbert Wildfeuer, Klement Sekera
  • Publication number: 20190171823
    Abstract: In one example embodiment, a network-connected device provides or obtains one or more computer network communications protected by a key. The network-connected device determines a count of the one or more computer network communications according to one or more properties of the one or more computer network communications. Based on the count of the one or more computer network communications, the network-connected device computes an information entropy of the key. Based on the information entropy of the key, the network-connected device dynamically generates a predicted threat level of the key.
    Type: Application
    Filed: April 10, 2018
    Publication date: June 6, 2019
    Inventors: David A. Maluf, Raghuram S. Sudhaakar, Nancy Cam-Winget
  • Publication number: 20180343326
    Abstract: In one embodiment, a device between a Controller Area Network (CAN)-based network and an Internet Protocol (IP)-based network receives a CAN message from a node in the CAN-based network. The CAN message comprises a CAN message identifier and a data field. The device determines an IP header based on the CAN message identifier and the CAN message. The device converts the data field of the CAN message into an IP message that includes the determined IP header. The device sends the IP message via the IP network to one or more eligible destinations for the IP message.
    Type: Application
    Filed: May 26, 2017
    Publication date: November 29, 2018
    Inventors: Herbert Wildfeuer, Pradeep Kumar Kathail, Subhasri Dhesikan, Raghuram S. Sudhaakar
  • Publication number: 20180316700
    Abstract: In one embodiment, a device in a serial network determines that a suspicious event has occurred in the network. The suspicious event is identified based on timing information for one or more frames in the serial network. The device assesses whether the suspicious event is malicious by evaluating a sequence of events in the network that precede the suspicious event. The device causes a mitigation action to be performed in the network when the suspicious event is deemed malicious.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: David A. Maluf, Raghuram S. Sudhaakar, Sanjiv Doshi
  • Publication number: 20180063216
    Abstract: Information describing a rule to be applied to a traffic stream is received at an edge network device. The traffic stream is received at the edge network device. A schema is applied to the traffic stream at the edge network device. It is determined that a rule triggering condition has been met. The rule is applied to the traffic stream, at the edge network device, in response to the rule triggering condition having been met. At least one of determining that the rule triggering event has taken place or applying the rule is performed based on the applied schema.
    Type: Application
    Filed: October 23, 2017
    Publication date: March 1, 2018
    Inventors: Vijaynarayanan Subramanian, Raghuram S. Sudhaakar, David A. Maluf
  • Publication number: 20180048619
    Abstract: In one embodiment, a network device connected to an Internet Protocol (IP) network and a serial network scans an infrastructure of the serial network. Based on the scanning, the network device can determine one or more serial endpoints within the serial network infrastructure, and may then allocate an IP address to each of the one or more serial endpoints. The network device may then map received IP network traffic into serial protocol commands on the serial network for a destination serial endpoint having an allocated IP address corresponding to a destination IP address of the received IP network traffic, and may also bridge data present on the serial network from a sourcing serial endpoint into an IP message on the IP network with an indication of a corresponding allocated IP address of the sourcing serial endpoint, accordingly.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: David A. Maluf, Raghuram S. Sudhaakar, John Burns, Jan Medved, Herbert Wildfeuer, Klement Sekera
  • Patent number: 9888363
    Abstract: A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical applications (for example) in response to determining that the battery level is above a reserve threshold while the power state of the vehicle is engine-off. The method also includes allocating remaining power in excess of the reserve threshold to non-critical applications according to a power management policy. The power management policy may comprise at least one of a user power preference index and an application power preference index.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: February 6, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Sateesh K. Addepalli, Fabio R. Maino, Lillian Lei Dai, Raghuram S. Sudhaakar, Chin-Ju Chen, Erick D. Lee