Patents by Inventor Ananth Raman

Ananth Raman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210152521
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from a data source different from the appliance. Disclosed example firewalls further apply, based on evaluation of the first dynamic object and the second dynamic object, the firewall rule to first network traffic associated with a first device in communication with the network.
    Type: Application
    Filed: January 25, 2021
    Publication date: May 20, 2021
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Patent number: 10904216
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from an external data source. Disclosed example firewalls further determine, based on the first dynamic object and the second dynamic object, whether the firewall rule is to apply to first network traffic associated with a first device in communication with the network.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: January 26, 2021
    Assignee: McAfee, LLC
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Publication number: 20190349335
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from an external data source. Disclosed example firewalls further determine, based on the first dynamic object and the second dynamic object, whether the firewall rule is to apply to first network traffic associated with a first device in communication with the network.
    Type: Application
    Filed: July 29, 2019
    Publication date: November 14, 2019
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Patent number: 10367787
    Abstract: A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of devices. The dynamic objects may be updated from real-time data sources and non-real time inventories of data. Dynamic objects may be used for either or both of source and destination in a firewall rule. Where the dynamic object includes non-real time data, the dynamic object may be synchronized with the non-real time data inventory on a configurable basis. By using dynamic objects, the firewall can provide flexibility in the rules to allow control over user-owned and controlled devices.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: July 30, 2019
    Assignee: McAfee, LLC
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Publication number: 20160315911
    Abstract: A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of devices. The dynamic objects may be updated from real-time data sources and non-real time inventories of data. Dynamic objects may be used for either or both of source and destination in a firewall rule. Where the dynamic object includes non-real time data, the dynamic object may be synchronized with the non-real time data inventory on a configurable basis. By using dynamic objects, the firewall can provide flexibility in the rules to allow control over user-owned and controlled devices.
    Type: Application
    Filed: December 20, 2013
    Publication date: October 27, 2016
    Inventors: Bikram Kumar GUPTA, Ananth RAMAN, Manuel NEDBAL, Elanthiraiyan A. Anbalagan
  • Patent number: 8640237
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: January 28, 2014
    Assignee: McAfee, Inc.
    Inventors: Steven M. Haeffele, Ramesh M. Gupta, Ananth Raman, Srikant Vissamsetti
  • Patent number: 8555389
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: October 8, 2013
    Assignee: McAfee, Inc.
    Inventors: Steven M. Haeffele, Ramesh M. Gupta, Ananth Raman, Srikant Vissamsetti
  • Publication number: 20110296516
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
    Type: Application
    Filed: August 8, 2011
    Publication date: December 1, 2011
    Inventors: Steven M. Haeffele, Ramesh M. Gupta, Ananth Raman, Srikant Vissamsetti
  • Publication number: 20110296527
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
    Type: Application
    Filed: August 8, 2011
    Publication date: December 1, 2011
    Inventors: Steven M. Haeffele, Ramesh M. Gupta, Ananth Raman, Srikant Vissamsetti
  • Patent number: 8015611
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
    Type: Grant
    Filed: September 10, 2007
    Date of Patent: September 6, 2011
    Assignee: McAfee, Inc.
    Inventors: Steven M. Haeffele, Ramesh M. Gupta, Ananth Raman, Srikant Vissamsetti
  • Patent number: 7823204
    Abstract: A method of detecting intrusions on a computer includes the step of identifying an internet protocol field range describing fields within internet protocol packets received by a computer. A connectivity range is also established which describes a distribution of network traffic received by the computer. An internet protocol field threshold and a connectivity threshold are then determined from the internet protocol field range and connectivity range, respectively. During the operation of the computer, values are calculated for the internet protocol field range and connectivity range. These values are compared to the internet protocol metric threshold and connectivity metric threshold so as to identify an intrusion on the computer.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: October 26, 2010
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman
  • Patent number: 7624444
    Abstract: A method of detecting intrusions on a computer includes the step of identifying an internet protocol field range describing fields within internet protocol packets received by a computer. A connectivity range is also established which describes a distribution of network traffic received by the computer. An internet protocol field threshold and a connectivity threshold are then determined from the internet protocol field range and connectivity range, respectively. During the operation of the computer, values are calculated for the internet protocol field range and connectivity range. These values are compared to the internet protocol metric threshold and connectivity metric threshold so as to identify an intrusion on the computer.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: November 24, 2009
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman
  • Patent number: 7610610
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific.
    Type: Grant
    Filed: January 10, 2005
    Date of Patent: October 27, 2009
    Assignee: McAfee, Inc.
    Inventors: Steven M. Haeffele, Ramesh M. Gupta, Ananth Raman, Srikant Vissamsetti
  • Patent number: 7409714
    Abstract: A method of forming a virtual intrusion detection system includes the step of positioning a set of sensors in a network environment, each sensor supporting multiple logical traffic paths. The method also includes the step of providing a set of sensor management systems corresponding to the set of sensors. This set of sensor management systems enforces a set of virtual intrusion detection systems, wherein each virtual intrusion detection system corresponds to a predetermined logical traffic path through the set of sensors, each virtual detection system providing sensor traffic information solely to authorized parties.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: August 5, 2008
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman
  • Publication number: 20080060073
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners.
    Type: Application
    Filed: September 10, 2007
    Publication date: March 6, 2008
    Inventors: Steven Haeffele, Ramesh Gupta, Ananth Raman, Srikant Vissamsetti
  • Patent number: 7308715
    Abstract: An intrusion signature describing an attack is stored on a computer. Once a plurality of internet protocol packets is received, the plurality of internet protocol packets collectively containing an information sequence within a series of states, it is rearranged so as to place the information sequence in order. Each state of the series of states is then successively examined so as to correlate the information sequence to the intrusion signature.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: December 11, 2007
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman
  • Patent number: 7234168
    Abstract: A method of provisioning a computer against computer attacks includes constructing a hierarchy characterizing different computer attacks and counter measures, and traversing this hierarchy to identify computer attacks and countermeasures relevant to a target platform. Detection and protection measures are collected in response to this traversing. These detection and protection measures are then downloaded to a security sensor associated with the target platform.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: June 19, 2007
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman
  • Publication number: 20060156403
    Abstract: A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners.
    Type: Application
    Filed: January 10, 2005
    Publication date: July 13, 2006
    Inventors: Steven Haeffele, Ramesh Gupta, Ananth Raman, Srikant Vissamsetti
  • Publication number: 20060117386
    Abstract: A method of detecting intrusions on a computer includes the step of identifying an internet protocol field range describing fields within internet protocol packets received by a computer. A connectivity range is also established which describes a distribution of network traffic received by the computer. An internet protocol field threshold and a connectivity threshold are then determined from the internet protocol field range and connectivity range, respectively. During the operation of the computer, values are calculated for the internet protocol field range and connectivity range. These values are compared to the internet protocol metric threshold and connectivity metric threshold so as to identify an intrusion on the computer.
    Type: Application
    Filed: January 13, 2006
    Publication date: June 1, 2006
    Inventors: Ramesh Gupta, Parveen Jain, Keith Amidon, Fengmin Gong, Srikant Vissamsetti, Steve Haeffele, Ananth Raman
  • Publication number: 20030014662
    Abstract: A method of detecting intrusions on a computer includes storing an intrusion signature describing an attack on a computer. Once a plurality of internet protocol packets is received, the plurality of internet protocol packets collectively containing an information sequence within a series of states, it is rearranged so as to place the information sequence in order. Each state of the series of states is then successively examined so as to correlate the information sequence to the intrusion signature.
    Type: Application
    Filed: June 13, 2002
    Publication date: January 16, 2003
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman