Patents by Inventor Ammar Rayes
Ammar Rayes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8612751Abstract: In one embodiment, a method for securely transferring entitled data from one or more devices in a customer's network to a vendor's network via a public network is described. The data is obtained from a collection module communicatively coupled to the devices. The obtained data is transformed into a format that is recognized by a backend server present in the vendor's network. The transformed data is then assorted by associating the transformed data with corresponding one or more devices. Finally, the assorted data is then encrypted and sent to the backend server securely via the public network along with entitlement attributes corresponding to the one or more devices.Type: GrantFiled: August 20, 2008Date of Patent: December 17, 2013Assignee: Cisco Technology, Inc.Inventors: Ammar Rayes, Subrata Dasgupta, Tom Deckers, Venkataraman Sivasankaran
-
Publication number: 20130313318Abstract: A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining, via the mobile device, whether the hardware or software component is a network component (NC), based on the scanned code. The hardware or software component may be a call manager, server, client device, interface card, repeater, hub, bridge, switch, router, or firewall, for example.Type: ApplicationFiled: May 25, 2012Publication date: November 28, 2013Applicant: CISCO TECHNOLOGY, INC.Inventors: Ammar Rayes, Sanjeev Ukhalkar, Anil Vasireddy, David F. Hinnant
-
Patent number: 8584942Abstract: A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining, via the mobile device, whether the hardware or software component is a network component (NC), based on the scanned code. The hardware or software component may be a call manager, server, client device, interface card, repeater, hub, bridge, switch, router, or firewall, for example.Type: GrantFiled: May 25, 2012Date of Patent: November 19, 2013Assignee: Cisco Technology, Inc.Inventors: Ammar Rayes, Sanjeev Ukhalkar, Anil Vasireddy, David F. Hinnant
-
Patent number: 8589544Abstract: A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination.Type: GrantFiled: November 7, 2012Date of Patent: November 19, 2013Assignee: Cisco Technology, Inc.Inventors: Pradeep K. Banerjee, Shyyunn Sheran Lin, Ammar Rayes, Gregory S. Thompson, Subrata Dasgupta, Virendra K. Malaviya, James McDonnell
-
Publication number: 20130111596Abstract: Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes non-sensitive data and sensitive data. In response to the determining, the first network device generates mapping data that maps dummy information to the sensitive data. The first network device generates output data that comprises the non-sensitive data and the dummy data and sends the output data to a second network device. In other embodiments, the user may select the network parameters that are sensitive. The first network device may also receive first report data from the second network device that identifies a network problem and includes the dummy data and generate second report data by using the mapping data to replace the dummy information with the sensitive data.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Inventors: Ammar Rayes, Subrata Dasgupta, Gaurav Garg, Mark Whitteker
-
Publication number: 20130067078Abstract: A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination.Type: ApplicationFiled: November 7, 2012Publication date: March 14, 2013Inventors: Pradeep K. Banerjee, Shyyunn Sheran Lin, Ammar Rayes, Gregory S. Thompson, Subrata Dasgupta, Virendra K. Malaviya, James McDonnell
-
Patent number: 8332511Abstract: A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination.Type: GrantFiled: July 31, 2010Date of Patent: December 11, 2012Assignee: Cisco Technology, Inc.Inventors: Pradeep K. Banerjee, Shyyunn Sheran Lin, Ammar Rayes, Gregory S. Thompson, Subrata Dasgupta, Virendra K. Malaviya, James McDonnell
-
Patent number: 8261355Abstract: Techniques are disclosed for preventing malicious attacks or other exploits on a computer server. A network manager may be configured to determine a topology of a plurality of network devices and deploy an intrusion prevention system in one or more of the network devices to mitigate attacks against the vulnerable servers. The one or more network devices may be identified based on the topology and one or more constraints for optimizing the deployment of the intrusion prevention systems.Type: GrantFiled: July 24, 2009Date of Patent: September 4, 2012Assignee: Cisco Technology, Inc.Inventors: Ammar Rayes, Zhiyun Qian
-
Patent number: 7974216Abstract: The real time availability of a group of network elements is determined based upon both a real time availability value for each of the network elements and cooperation relationships between the network elements. The cooperation relationships reflect both the topological relationships between the network elements, i.e., how the network elements are connected, and the extent to which network elements interact with each other effectively. For relatively small groups of network elements, where the cooperation relationships are not overly complex, the real time availability is determined directly from the real time availability value for each of the network elements and cooperation relationships between the network elements. Decomposition and recombination are used to determine the real time availability of large groups of network elements based on specific formulas for basic network element topology models.Type: GrantFiled: November 22, 2004Date of Patent: July 5, 2011Assignee: Cisco Technology, Inc.Inventors: Cosmin Nicu Dini, Petre Dini, Manuela I. Popescu, Mark Ammar Rayes
-
Publication number: 20100223382Abstract: A system, method and application for facilitating network support for an install-base network is provided. The method includes performing, at an access node of the install-base network, network discovery to discover one or more nodes of the install-base network. The method also includes collecting, at the nodes, their respective inventories (“network-node inventories”). The method further includes collecting the network-node inventories at the access node, and sending the network-node inventories from the access node to a back-office system external to the install-base network. The method may, optionally, include the access node aggregating the network-node inventories to form aggregate information, and sending the aggregate information to the back-office system in addition to or in lieu of the of network-node inventories.Type: ApplicationFiled: February 27, 2009Publication date: September 2, 2010Applicant: Cisco TechnologyInventors: Ammar Rayes, Michael Cheung, James McDonnell
-
Patent number: 7620714Abstract: A method is disclosed for a method for measuring the availability of a network element or service. For each network element N, a current real availability value CRAVN and a current time value CTVN are associated with network element N. Additionally, for each network element N, an operational state value OSVN is associated with network element N. At a later time, indicated by a new time value NTVN, a new real availability value NRAVN for network element N is determined based on the current availability value CRAVN, the current time value CTVN, the new time value NTVN, and the operational state value OSVN. The new real availability value NRAVN is stored. Thus, each separate network element N may be associated with a separate real availability value that accurately reflects the availability of network element N specifically, regardless of any availability approximated for network element N's type.Type: GrantFiled: November 14, 2003Date of Patent: November 17, 2009Assignee: Cisco Technology, Inc.Inventors: Cosmin Dini, Petre Dini, Jackson Shyu, Mark Ammar Rayes
-
Patent number: 7607021Abstract: An isolation approach for network users associated with elevated risk is disclosed for protecting networks. In one approach a method comprises the computer-implemented steps of determining a user identifier associated with a network device that has caused a security event in a network; causing the network device to receive a network address that is selected from a subset of addresses within a specified pool associated with suspected malicious network users; and configuring one or more security restrictions with respect to the selected network address.Type: GrantFiled: March 9, 2004Date of Patent: October 20, 2009Assignee: Cisco Technology, Inc.Inventors: Mark Ammar Rayes, Michael Cheung, Ralph Droms, Petre Dini
-
Patent number: 7492711Abstract: A method of determining an amount of bandwidth needed on a communication link is disclosed. According to one aspect of the method, instead of considering only user behavior or only traffic characteristics, the amount of bandwidth needed on the link is determined based on both user behavior and traffic characteristics. The determined amount is stored in memory. By accounting for both user behavior and traffic characteristics, the method determines the amount of bandwidth needed on a communication link more accurately.Type: GrantFiled: August 21, 2003Date of Patent: February 17, 2009Assignee: Cisco Technology, Inc.Inventors: Michael Cheung, Mark Ammar Rayes
-
Publication number: 20080060026Abstract: A method and apparatus is disclosed for security-management of IP TV subscribers across a network comprising: receiving and storing at an access network element, a plurality of requests to connect to one or more multicast groups from a plurality of ports; retrieving, the plurality of requests from the access network element; generating, from the plurality of requests a first profile associated with a first port, wherein the profile includes multicast group request information associated with the first port; and detecting one or more anomalies based on the first profile and subscriber information and generating a notification if one or more anomalies are detected.Type: ApplicationFiled: August 29, 2006Publication date: March 6, 2008Inventors: Michael Cheung, Mark Ammar Rayes
-
Patent number: 7237267Abstract: A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of receiving a set of data regarding a user of a computer network; automatically deciding on a course of action based on the set of data, wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision.Type: GrantFiled: October 16, 2003Date of Patent: June 26, 2007Assignee: Cisco Technology, Inc.Inventors: Ammar Rayes, Michael Cheung
-
Patent number: 7234163Abstract: A method is disclosed for preventing spoofing of network addresses. A binding is established between an Internet Protocol (IP) address, a Media Access Control (MAC) address, and a port. An Address Resolution Protocol (ARP) table is updated based on the binding.Type: GrantFiled: September 16, 2002Date of Patent: June 19, 2007Assignee: Cisco Technology, Inc.Inventors: Ammar Rayes, Michael Cheung
-
Patent number: 7151884Abstract: A method and a system for re-establishing the connection of a network device with a network, using viral communication, are provided. According to the various embodiments, a disconnected network device acts as a simple wireless device and contacts a neighboring network device to obtain configuration information. The request can be forwarded to a network management station (NMS) through one or more neighbors of the disconnected network device. Connectivity is obtained by executing the configuration instructions obtained from the NMS.Type: GrantFiled: October 20, 2005Date of Patent: December 19, 2006Assignee: Cisco Technology, Inc.Inventors: Mark Ammar Rayes, Michael Cheung
-
Publication number: 20050086502Abstract: A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of receiving a set of data regarding a user of a computer network; automatically deciding on a course of action based on the set of data, wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision.Type: ApplicationFiled: October 16, 2003Publication date: April 21, 2005Inventors: Ammar Rayes, Michael Cheung
-
Patent number: 6560204Abstract: Methods and systems are provided for estimating the source-destination traffic in a packet-switched network. Source-destination traffic is critical input to a variety of network engineering and planning functions. However, it is difficult and prohibitively expensive to directly measure source-destination traffic in a packet-switched network. Channel link measurements are more readily available for packet-switched networks. Thus, methods and systems in accordance with the present invention use channel link measurements, along with knowledge of traffic paths through the network for source-destination pairs, to estimate source-destination traffic.Type: GrantFiled: March 2, 1999Date of Patent: May 6, 2003Assignee: Telcordia Technologies, Inc.Inventor: Ammar Rayes
-
Patent number: 5787161Abstract: In communication network, the network blocking probability can be efficiently calculated by applying a Gaussian approximation to a fixed point algorithm. Gaussian curves are approximated to represent state probability distributions of the network links. By efficiently calculating the network blocking probability, the network can be optimally designed by lowering the network blocking probability below a threshold at the least cost.Type: GrantFiled: November 13, 1995Date of Patent: July 28, 1998Assignee: Bell Communications Research, Inc.Inventors: Ammar Rayes, Paul Seungkyu Min