Patents by Inventor Chandra Prasad
Chandra Prasad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200304523Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.Type: ApplicationFiled: June 11, 2020Publication date: September 24, 2020Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
-
Patent number: 10742529Abstract: Systems, methods, and computer-readable media for hierarchichal sharding of flows from sensors to collectors. A first collector can receive a first portion of a network flow from a first capturing agent and determine that a second portion of the network flow was not received from the first capturing agent. The first collector can then send the first portion of the network flow to a second collector. A third collector can receive the second portion of the network flow from a second capturing agent and determine that the third collector did not receive the first portion of the network flow. The third collector can then send the second portion of the network flow to the second collector. The second collector can then aggregate the first portion and second portion of the network flow to yield the entire portion of the network flow.Type: GrantFiled: April 24, 2019Date of Patent: August 11, 2020Assignee: Cisco Technology, Inc.Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Publication number: 20200244554Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.Type: ApplicationFiled: April 10, 2020Publication date: July 30, 2020Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Publication number: 20200225204Abstract: A contaminant measurement system is provided. The system is operable to detect and measure a concentration level of a preselected contaminant, e.g., lead, in water disposed within a chamber of the system. The system includes a detection agent that is operable to interact with the preselected contaminant in the water. The detection agent can be a plurality of polymeric beads or a membrane, for example. The system has a sensing circuit that includes a pair of electrodes spaced from one another and both at least partially disposed in the water. A controller is communicatively coupled with the sensing circuit and is configured to receive one or more electric signals from the sensing circuit. The controller determines a parameter indicative of the concentration level of the preselected contaminant based on the one or more electrical signals. The controller then determines and outputs the concentration level of the preselected contaminant.Type: ApplicationFiled: January 10, 2019Publication date: July 16, 2020Inventors: Somak Chatterjee, Sharath Chandra Prasad, Allamneni Naga Tejaswini, Balaji Srinivasan, Moinuddin Mohd Bilal, Gregory Sergeevich Chernov, Andrew Reinhard Krause
-
Publication number: 20200228426Abstract: A network analytics system can receive first sensor data, including first network activity and a first timestamp associated with a first clock of a first node, and second sensor data, including second network activity and a second timestamp associated with a second clock of a second node. The system can determine a first delta between the first clock and a third clock based on the first timestamp, and a second delta between the second clock and the third clock. The system can determine a first communication latency associated with a first sensor of the first node, and a second communication latency associated with a second sensor of the second node. The system can generate a report that synchronizes one or more data flows between the first node and the second node based on the first delta, the second delta, the first communication latency, and the second communication latency.Type: ApplicationFiled: January 13, 2020Publication date: July 16, 2020Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 10693749Abstract: An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be associated with various components of a network and can describe expected behavior of these various components. A system performing this method can then choose a nodes or nodes to generate traffic according to the pattern and send an instruction accordingly. After this synthetic traffic is generated, the system can compare the behavior of the components with the expected behavior. An alert can then be created to notify an administrator or otherwise remedy any problems.Type: GrantFiled: May 17, 2016Date of Patent: June 23, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Rohit Chandra Prasad, Bharathwaj Sankara Viswanathan, Hoang Viet Nguyen, Vimalkumar Jeyakumar, Roberto Fernando Spadaro, Varun Sagar Malhotra, Navindra Yadav
-
Patent number: 10686804Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.Type: GrantFiled: November 2, 2018Date of Patent: June 16, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
-
Publication number: 20200136940Abstract: Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.Type: ApplicationFiled: December 23, 2019Publication date: April 30, 2020Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Patent number: 10623282Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.Type: GrantFiled: June 2, 2016Date of Patent: April 14, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Publication number: 20200061564Abstract: A system and method are directed toward the synthesis of polymeric capsules using a phase inversion process by extrusion of polymeric droplets through a syringe-needle assembly or an iris-shutter mechanism. The polymeric solution may be prepared by dissolving PAN (polyacrylonitrile) polymer in DMF (Dimethyl Formamide) solvent at high temperature through continuous stirring. Following preparation of the capsules, further treatment was initiated using triethylamine in gelation bath to make the final product an efficient removal agent of water hardness.Type: ApplicationFiled: August 21, 2018Publication date: February 27, 2020Inventors: Somak Chatterjee, Sharath Chandra Prasad, Srinivas Pasham, Balaji Srinivasan, Gaurav Kumar Verma, Andrew Reinhard Krause, Gregory Sergeevich Chernov
-
Publication number: 20200052984Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.Type: ApplicationFiled: October 21, 2019Publication date: February 13, 2020Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 10537194Abstract: In one embodiment, a controller determines a particular compartment of a smart postal box in which a package is to be delivered. The controller associates the particular compartment with an authorized entity. The controller provides the authorized entity access to the particular compartment by aligning rolling doors of the smart postal box with the particular compartment.Type: GrantFiled: October 26, 2017Date of Patent: January 21, 2020Assignee: Cisco Technology, Inc.Inventors: Charles Calvin Byers, Gonzalo Salgueiro, Aparna Vellala, Salini Kumar Bogadapati, Jagadish Chandra Prasad Mynampati
-
Patent number: 10536357Abstract: Systems, methods, and non-transitory computer-readable storage media for synchronizing timestamps of a sensor report to the clock of a device. In one embodiment, the device receives a report from a sensor of a node. The report can include a network activity of the node captured by the sensor and a first timestamp relative to the clock of the node. The device can then determine a second timestamp relative to the clock of the collector indicating receipt of the report by the device and from the sensor at the node. The device can also determine a delta between the first timestamp and the second timestamp, and a communication latency associated with a communication channel between the device and the sensor. Next, the device can adjust the delta based on the communication latency, and generate a third timestamp based on the adjusted delta.Type: GrantFiled: February 10, 2016Date of Patent: January 14, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 10516586Abstract: Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.Type: GrantFiled: June 2, 2016Date of Patent: December 24, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Patent number: 10467058Abstract: Systems and methods according to various embodiments disclose a worker process manager adapted to spawn one or more worker processes on a server and to load an application on each of the worker processes. The worker process manager is adapted to isolate the one or more worker processes from each other and to control resource usage by the worker processes. A resource manager is adapted to detect applications that overuse system resources. The worker process manager is adapted to isolate worker processes and to control resource usage using one or more of the following techniques: least-privilege execution, messaging isolation, credentials isolation, data isolation, network isolation, fair share resource usage, and managed runtime security. Heuristic algorithms are used to detect applications that frequently overuse system resources that are unchargeable and that cause system unresponsiveness.Type: GrantFiled: December 20, 2011Date of Patent: November 5, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Girish Mittur Venkataramanappa, Mandyam Kishore, Andreas Ulbrich, Aarthi Rajmohan Saravanakumar, Chandra Prasad, Yann Christensen, Dharma Shukla, Amol Kulkarni
-
Publication number: 20190322963Abstract: An enzymatically produced ?-glucan oligomer/polymer compositions is provided. The enzymatically produced ?-glucan oligomer/polymers can be derivatized into ?-glucan ether compounds. The ?-glucan oligomers/polymers and the corresponding ?-glucan ethers are cellulose and/or protease resistant, making them suitable for use in fabric care and laundry care applications. Methods for the production and use of the present compositions are also provided.Type: ApplicationFiled: May 20, 2019Publication date: October 24, 2019Inventors: ROBERT DICOSIMO, Qiong Cheng, Rakesh Nambiar, Jayme L. Paullin, Mark S. Payne, Jahnavi Chandra Prasad, Zheng You
-
Patent number: 10454793Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.Type: GrantFiled: June 2, 2016Date of Patent: October 22, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 10439904Abstract: Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. A method includes determining a lineage for a process within the network and then evaluating, through knowledge of the lineage, the source of the command that initiated the process. The method includes capturing data from a plurality of capture agents at different layers of a network, each capture agent of the plurality of capture agents configured to observe network activity at a particular location in the network, developing, based on the data, a lineage for a process associated with the network activity and, based on the lineage, identifying an anomaly within the network.Type: GrantFiled: June 2, 2016Date of Patent: October 8, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Publication number: 20190253330Abstract: Systems, methods, and computer-readable media for hierarchichal sharding of flows from sensors to collectors. A first collector can receive a first portion of a network flow from a first capturing agent and determine that a second portion of the network flow was not received from the first capturing agent. The first collector can then send the first portion of the network flow to a second collector. A third collector can receive the second portion of the network flow from a second capturing agent and determine that the third collector did not receive the first portion of the network flow. The third collector can then send the second portion of the network flow to the second collector. The second collector can then aggregate the first portion and second portion of the network flow to yield the entire portion of the network flow.Type: ApplicationFiled: April 24, 2019Publication date: August 15, 2019Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Navindra Yadav, Khawar Deen, Varun Sagar Malhotra
-
Publication number: 20190235712Abstract: Disclosed herein are system, method, and computer program product embodiments for quickly switching between multiple dashboards of an application. An embodiment operates by tracking changes made to a first dashboard of an application. The embodiment receives a selection for a second dashboard of the application. The embodiment stores a first data set and a first data state of the first dashboard in a cache. The embodiment removes the first dashboard from memory. The embodiment loads a second dashboard of the application into memory based on the selection. The embodiment then updates the second dashboard in the memory based on a second data set associated with the second dashboard and the shared data associated with a. plurality of dashboards.Type: ApplicationFiled: January 31, 2018Publication date: August 1, 2019Applicant: salesforce.com, inc.Inventors: Yuseung KIM, Behzad Richey, Naga Siva Chandra Prasad Pamidi, Juyong Kim