Patents by Inventor Abhishek Ranjan
Abhishek Ranjan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220141103Abstract: Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.Type: ApplicationFiled: January 18, 2022Publication date: May 5, 2022Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Publication number: 20220131773Abstract: A network analytics system can receive first sensor data, including first network activity and a first timestamp associated with a first clock of a first node, and second sensor data, including second network activity and a second timestamp associated with a second clock of a second node. The system can determine a first delta between the first clock and a third clock based on the first timestamp, and a second delta between the second clock and the third clock. The system can determine a first communication latency associated with a first sensor of the first node, and a second communication latency associated with a second sensor of the second node. The system can generate a report that synchronizes one or more data flows between the first node and the second node based on the first delta, the second delta, the first communication latency, and the second communication latency.Type: ApplicationFiled: January 6, 2022Publication date: April 28, 2022Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 11252060Abstract: A network analytics system can receive first sensor data, including first network activity and a first timestamp associated with a first clock of a first node, and second sensor data, including second network activity and a second timestamp associated with a second clock of a second node. The system can determine a first delta between the first clock and a third clock based on the first timestamp, and a second delta between the second clock and the third clock. The system can determine a first communication latency associated with a first sensor of the first node, and a second communication latency associated with a second sensor of the second node. The system can generate a report that synchronizes one or more data flows between the first node and the second node based on the first delta, the second delta, the first communication latency, and the second communication latency.Type: GrantFiled: January 13, 2020Date of Patent: February 15, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Publication number: 20220038353Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.Type: ApplicationFiled: October 15, 2021Publication date: February 3, 2022Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Publication number: 20210392059Abstract: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.Type: ApplicationFiled: August 26, 2021Publication date: December 16, 2021Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Publication number: 20210358251Abstract: Described are various embodiments of a user activity-related monitoring system and method, and a user access authorization system and method employing same. In one embodiment, a system is provided for authenticating a user authorised to perform a designated activity in a designated environment. The system comprises a wireless digital user authentication device (UAD) operable to: wirelessly establish an authenticated access session at an access point within the designated environment for performing the designated activity; and acquire activity-related data during performance of the designated activity. The system further comprises a digital application operatively associated with the wireless digital UAD and operable to: digitally compare and evaluate compliance of the activity-related data with a digital authenticated activity template within a designated tolerance.Type: ApplicationFiled: May 14, 2020Publication date: November 18, 2021Inventors: Stuart Keith MACLEAN, Abhishek RANJAN
-
Publication number: 20210326931Abstract: A digital advertising system includes an advertisements module that provides a number of digital advertisements for display on a digital display device. A digital sign module including the digital display device displays digital advertisements provided by the advertisements module, and captures video analytics data relating to previous viewers of the digital advertisements displayed by the digital sign module. A data mining module retrieves the video analytics data from the digital sign module and generates trained advertising models based thereon using a data mining algorithm. A content management system module coupled to the advertisements module and the data mining module receives the digital advertisements and the trained advertising models and generates a subset of the advertisements for display based on the trained advertising models.Type: ApplicationFiled: April 5, 2021Publication date: October 21, 2021Inventors: Andrew J. Kuzma, Bradut Vrabete, Addicam V. Sanjay, Shahzad A. Malik, Abhishek Ranjan, Shweta Phadnis, Fengzhan Tian, Kunapareddy Chiranjeevi
-
Patent number: 11153184Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.Type: GrantFiled: December 31, 2018Date of Patent: October 19, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Patent number: 11128552Abstract: Systems, methods, and computer-readable media are provided for determining a packet's round trip time (RTT) in a network. A system can receive information of a packet sent by a component of the network and further determine an expected acknowledgement (ACK) sequence number associated with the packet based upon received information of the packet. The system can receive information of a subsequent packet received by the component and determine an ACK sequence number and a receiving time of the subsequent packet. In response to determining that the ACK sequence number of the subsequent TCP packet matches the expected ACK sequence number, the system can determine a round trip time (RTT) of the packet based upon the received information of the packet and the received information of the subsequent packet.Type: GrantFiled: October 29, 2018Date of Patent: September 21, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Mohammadreza Alizadeh Attar, Navindra Yadav, Abhishek Ranjan Singh, Vimalkumar Jeyakumar, Shashidhar Gandham, Roberto Fernando Spadaro
-
Patent number: 11121948Abstract: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.Type: GrantFiled: June 1, 2016Date of Patent: September 14, 2021Assignee: Cisco Technology, Inc.Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Publication number: 20210243093Abstract: Systems, methods, and computer-readable media are provided for determining a packet's round trip time (RTT) in a network. A system can receive information of a packet sent by a component of the network and further determine an expected acknowledgement (ACK) sequence number associated with the packet based upon received information of the packet. The system can receive information of a subsequent packet received by the component and determine an ACK sequence number and a receiving time of the subsequent packet. In response to determining that the ACK sequence number of the subsequent TCP packet matches the expected ACK sequence number, the system can determine a round trip time (RTT) of the packet based upon the received information of the packet and the received information of the subsequent packet.Type: ApplicationFiled: April 22, 2021Publication date: August 5, 2021Inventors: Mohammadreza Alizadeh Attar, Navindra Yadav, Abhishek Ranjan Singh, Vimalkumar Jeyakumar, Shashidhar Gandham, Roberto Fernando Spadaro
-
Publication number: 20210160157Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.Type: ApplicationFiled: January 29, 2021Publication date: May 27, 2021Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Publication number: 20210152443Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.Type: ApplicationFiled: January 29, 2021Publication date: May 20, 2021Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
-
Publication number: 20210126912Abstract: Described are various embodiments of a system for monitoring a physical user presence during an authenticated user access session at an access point.Type: ApplicationFiled: October 25, 2019Publication date: April 29, 2021Inventors: Stuart Keith MACLEAN, Abhishek RANJAN
-
Patent number: 10977692Abstract: A digital advertising system includes an advertisements module that provides a number of digital advertisements for display on a digital display device. A digital sign module including the digital display device displays digital advertisements provided by the advertisements module, and captures video analytics data relating to previous viewers of the digital advertisements displayed by the digital sign module. A data mining module retrieves the video analytics data from the digital sign module and generates trained advertising models based thereon using a data mining algorithm. A content management system module coupled to the advertisements module and the data mining module receives the digital advertisements and the trained advertising models and generates a subset of the advertisements for display based on the trained advertising models.Type: GrantFiled: September 16, 2016Date of Patent: April 13, 2021Assignee: Intel CorporationInventors: Andrew J. Kuzma, Brad Vrabete, Addicam V. Sanjay, Shahzad A. Malik, Abhishek Ranjan, Shweta Phadnis, Fengzhan Tian, Kunapareddy Chiranjeevi
-
Patent number: 10862776Abstract: Managing a network environment to identify spoofed packets is disclosed. A method includes analyzing, via a first capture agent, packets processed by a first environment in a network associated with a first host, and analyzing, via a second capture agent, packets processed by a second environment in the network associated with a second host. The method includes collecting the first data and the second data at a collector and generating a topological map of the network and a history of network activity associated with the first environment and the second environment. The method includes extracting network data from a packet and comparing the extracted network data with stored network data in the database. When the comparison indicates that the extracted network data does not match the stored network data (i.e., the reported source does not match an expected source for the packet), determining that the packet is a spoofed packet.Type: GrantFiled: June 2, 2016Date of Patent: December 8, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Publication number: 20200358676Abstract: Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.Type: ApplicationFiled: July 28, 2020Publication date: November 12, 2020Inventors: Abhishek Ranjan Singh, Shih-Chun Chang, Varun Sagar Malhotra, Hai Trong Vu, Jackson Ngoc Ki Pang
-
Publication number: 20200351184Abstract: Systems, methods, and computer-readable media for hierarchichal sharding of flows from sensors to collectors. A first collector can receive a first portion of a network flow from a first capturing agent and determine that a second portion of the network flow was not received from the first capturing agent. The first collector can then send the first portion of the network flow to a second collector. A third collector can receive the second portion of the network flow from a second capturing agent and determine that the third collector did not receive the first portion of the network flow. The third collector can then send the second portion of the network flow to the second collector. The second collector can then aggregate the first portion and second portion of the network flow to yield the entire portion of the network flow.Type: ApplicationFiled: July 15, 2020Publication date: November 5, 2020Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Publication number: 20200342086Abstract: Described are various embodiments of a digital user authentication device, the device comprising: a user authentication interface operable to receive as input unique user identification data required to execute a digital user authentication process; a distinct physiological sensor operable to interface with the user to acquire a physiological signal from the user to automatically confirm a live user presence during said authentication process; and a digital data processor and computer-readable memory operable to execute computer-readable instructions to invoke said user authentication process based on said unique user identification data while confirming said live user presence based on said physiological signal such that a successful user authentication is only concluded upon confirmation of said live user presence during said authentication process. Various authentication, access authorization and revocation systems and processes are also described.Type: ApplicationFiled: January 18, 2019Publication date: October 29, 2020Inventors: Stephen OUNG, Avrum Douglas HOLLINGER, Gregor SIMEONOV, Abhishek RANJAN
-
Patent number: 10797973Abstract: Systems, methods, and computer-readable media are provided for determining whether a node in a network is a server or a client. In some examples, a system can collect, from one or more sensors that monitor at least part of data traffic being transmitted via a pair of nodes in a network, information of the data traffic. The system can analyze attributes of the data traffic such as timing, port magnitude, degree of communication, historical data, etc. Based on analysis results and a predetermined rule associated with the attributes, the system can determine which node of the pair of nodes is a client and which node is a server.Type: GrantFiled: December 9, 2019Date of Patent: October 6, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Ali Parandehgheibi, Abhishek Ranjan Singh, Omid Madani, Vimalkumar Jeyakumar, Ellen Christine Scheib, Navindra Yadav, Mohammadreza Alizadeh Attar