Patents by Inventor Atul Mahamuni

Atul Mahamuni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10033698
    Abstract: A network filter is implemented so that filter terms that include intra-term OR conditions and converted to sub-terms that include only logical AND conditions. In one implementation, a device may include logic to receive a filter definition including one or more terms, at least some of the terms including logical OR conditions, that define how network traffic through the device is to be filtered, the logic expanding the one or more terms in the filter such that terms that contain logical OR conditions are expanded into a plurality of sub-terms that each contains only logical AND conditions. The device may further include a ternary content-addressable memory (TCAM) programmed to include a separate entry corresponding to each of the sub-terms.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: July 24, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Anand Ammundi, Atul Mahamuni
  • Patent number: 9735957
    Abstract: According to one embodiment, techniques are provided to enable secure communication among devices in a mesh network using a group temporal key. An authenticator device associated with a mesh network stores a pairwise master key for each of a plurality of devices in a mesh network upon authentication of the respective devices. Using the pairwise master key, the authenticator device initiates a handshake procedure with a particular device in the mesh network to mutually derive a pairwise temporal key from the pairwise master key. The authenticator device encrypts and signs a group temporal key using the pairwise temporal key for the particular device and sends the group temporal key encrypted and signed with the pairwise temporal key to the particular device.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: August 15, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni, Jonathan Hui, Wei Hong, Alec Woo
  • Patent number: 9531716
    Abstract: In one embodiment, a service enabled network (SEN) controller receives, from a control plane of a network service device, service instructions for corresponding network services. The SEN controller may then distribute the service instructions for the network services to appropriate network access devices within the computer network, such that each of the network access devices may correspondingly implement the network services at their respective data planes, thus providing a distributed implementation of the network service within the computer network.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: December 27, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Pere Monclus, Valentina Alaria, Vina Ermagan, Atul Mahamuni
  • Publication number: 20160344697
    Abstract: A network filter is implemented so that filter terms that include intra-term OR conditions and converted to sub-terms that include only logical AND conditions. In one implementation, a device may include logic to receive a filter definition including one or more terms, at least some of the terms including logical OR conditions, that define how network traffic through the device is to be filtered, the logic expanding the one or more terms in the filter such that terms that contain logical OR conditions are expanded into a plurality of sub-terms that each contains only logical AND conditions. The device may further include a ternary content-addressable memory (TCAM) programmed to include a separate entry corresponding to each of the sub-terms.
    Type: Application
    Filed: August 4, 2016
    Publication date: November 24, 2016
    Inventors: Anand AMMUNDI, Atul MAHAMUNI
  • Patent number: 9413662
    Abstract: A network filter is implemented so that filter terms that include intra-term OR conditions and converted to sub-terms that include only logical AND conditions. In one implementation, a device may include logic to receive a filter definition including one or more terms, at least some of the terms including logical OR conditions, that define how network traffic through the device is to be filtered, the logic expanding the one or more terms in the filter such that terms that contain logical OR conditions are expanded into a plurality of sub-terms that each contains only logical AND conditions. The device may further include a ternary content-addressable memory (TCAM) programmed to include a separate entry corresponding to each of the sub-terms.
    Type: Grant
    Filed: January 13, 2009
    Date of Patent: August 9, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Anand Ammundi, Atul Mahamuni
  • Patent number: 9270560
    Abstract: Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information.
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: February 23, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni
  • Patent number: 9071611
    Abstract: In one embodiment, a method includes receiving a communication from an endpoint device at a network access device located within a data path between the endpoint device and a network, identifying a network admission control policy for the endpoint device, enforcing at the network access device, the network admission control policy for traffic received from the endpoint device, and forwarding at the network access device, traffic from the endpoint device to the network in accordance with the network admission control policy. An apparatus is also disclosed.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: June 30, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni, Azim Ozakil, Bora A. Akyol, Peirong Feng, Thomas J. Enderwick, Aji Joseph, Shashi Kumar, Sambasivam Valliappan
  • Publication number: 20150106625
    Abstract: According to one embodiment, techniques are provided to enable secure communication among devices in a mesh network using a group temporal key. An authenticator device associated with a mesh network stores a pairwise master key for each of a plurality of devices in a mesh network upon authentication of the respective devices. Using the pairwise master key, the authenticator device initiates a handshake procedure with a particular device in the mesh network to mutually derive a pairwise temporal key from the pairwise master key. The authenticator device encrypts and signs a group temporal key using the pairwise temporal key for the particular device and sends the group temporal key encrypted and signed with the pairwise temporal key to the particular device.
    Type: Application
    Filed: December 19, 2014
    Publication date: April 16, 2015
    Inventors: Navindra Yadav, Atul Mahamuni, Jonathan Hui, Wei Hong, Alec Woo
  • Patent number: 8990892
    Abstract: Techniques are provided for adaptive routing of authentication packets in a network, such as a wireless mesh network. At an authenticated device in the network, an authentication packet is received over the network from a device that is seeking authentication. The authentication packet is encapsulated for transmission in Layer 3 packets over an Internet Protocol (IP) tunnel to an authenticator device associated in the network. Similarly, for an authentication packet encapsulated in Layer 3 packets from the authenticator device over the IP tunnel, the authentication packet is decapsulated from the Layer 3 packets and transmitted over the network to the device seeking authentication.
    Type: Grant
    Filed: July 6, 2011
    Date of Patent: March 24, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni, Jonathan Hui, Alec Woo
  • Patent number: 8959607
    Abstract: According to one embodiment, techniques are provided to enable secure communication among devices in a mesh network using a group temporal key. An authenticator device associated with a mesh network stores a pairwise master key for each of a plurality of devices in a mesh network upon authentication of the respective devices. Using the pairwise master key, the authenticator device initiates a handshake procedure with a particular device in the mesh network to mutually derive a pairwise temporal key from the pairwise master key. The authenticator device encrypts and signs a group temporal key using the pairwise temporal key for the particular device and sends the group temporal key encrypted and signed with the pairwise temporal key to the particular device.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: February 17, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni, Jonathan Hui, Wei Hong, Alec Woo
  • Patent number: 8848724
    Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.
    Type: Grant
    Filed: April 16, 2012
    Date of Patent: September 30, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Sreenivas Voruganti, Atul Mahamuni
  • Patent number: 8806573
    Abstract: Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate devices in a lossy network receives an authentication start message from a particular device to be authenticated. The authenticator device determines a schedule for engaging in an authentication procedure for the particular device based on an indication of current network utilization.
    Type: Grant
    Filed: August 9, 2011
    Date of Patent: August 12, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Atul Mahamuni, Navindra Yadav, Jonathan Hui, Alec Woo, Wei Hong
  • Publication number: 20140156840
    Abstract: Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information.
    Type: Application
    Filed: February 7, 2014
    Publication date: June 5, 2014
    Applicant: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni
  • Patent number: 8688828
    Abstract: Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: April 1, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni
  • Publication number: 20130054784
    Abstract: Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information.
    Type: Application
    Filed: August 29, 2011
    Publication date: February 28, 2013
    Applicant: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Atul Mahamuni
  • Publication number: 20130042301
    Abstract: Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate devices in a lossy network receives an authentication start message from a particular device to be authenticated. The authenticator device determines a schedule for engaging in an authentication procedure for the particular device based on an indication of current network utilization.
    Type: Application
    Filed: August 9, 2011
    Publication date: February 14, 2013
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Atul Mahamuni, Navindra Yadav, Jonathan Hui, Alec Woo, Wei Hong
  • Publication number: 20130036305
    Abstract: According to one embodiment, techniques are provided to enable secure communication among devices in a mesh network using a group temporal key. An authenticator device associated with a mesh network stores a pairwise master key for each of a plurality of devices in a mesh network upon authentication of the respective devices. Using the pairwise master key, the authenticator device initiates a handshake procedure with a particular device in the mesh network to mutually derive a pairwise temporal key from the pairwise master key. The authenticator device encrypts and signs a group temporal key using the pairwise temporal key for the particular device and sends the group temporal key encrypted and signed with the pairwise temporal key to the particular device.
    Type: Application
    Filed: August 3, 2011
    Publication date: February 7, 2013
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Atul Mahamuni, Jonathan Hui, Wei Hong, Alec Woo
  • Publication number: 20130014217
    Abstract: Techniques are provided for adaptive routing of authentication packets in a network, such as a wireless mesh network. At an authenticated device in the network, an authentication packet is received over the network from a device that is seeking authentication. The authentication packet is encapsulated for transmission in Layer 3 packets over an Internet Protocol (IP) tunnel to an authenticator device associated in the network. Similarly, for an authentication packet encapsulated in Layer 3 packets from the authenticator device over the IP tunnel, the authentication packet is decapsulated from the Layer 3 packets and transmitted over the network to the device seeking authentication.
    Type: Application
    Filed: July 6, 2011
    Publication date: January 10, 2013
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Atul Mahamuni, Jonathan Hui, Alec Woo
  • Publication number: 20120275464
    Abstract: Methods and systems consistent with the present invention provide dynamic buffer allocation to a plurality of queues of differing priority levels. Each queue is allocated fixed minimum number of buffers that will not be de-allocated during buffer reassignment. The rest of the buffers are intelligently and dynamically assigned to each queue depending on their current need. The system then monitors and learns the incoming traffic pattern and resulting drops in each queue due to traffic bursts. Based on this information, the system readjusts allocation of buffers to each traffic class. If a higher priority queue does not need the buffers, it gradually relinquishes them. These buffers are then assigned to other queues based on the input traffic pattern and resultant drops. These buffers are aggressively reclaimed and reassigned to higher priority queues when needed.
    Type: Application
    Filed: April 16, 2012
    Publication date: November 1, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Sreenivas Voruganti, Atul Mahamuni
  • Publication number: 20120216239
    Abstract: In one embodiment, a method includes receiving a communication from an endpoint device at a network access device located within a data path between the endpoint device and a network, identifying a network admission control policy for the endpoint device, enforcing at the network access device, the network admission control policy for traffic received from the endpoint device, and forwarding at the network access device, traffic from the endpoint device to the network in accordance with the network admission control policy. An apparatus is also disclosed.
    Type: Application
    Filed: February 23, 2011
    Publication date: August 23, 2012
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Atul Mahamuni, Azim Ozakil, Bora A. Akyol, Peirong Feng, Thomas J. Enderwick, Aji Joseph, Shashi Kumar, Sambasivam Valliappan