Patents by Inventor Elango Ganesan

Elango Ganesan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12328204
    Abstract: In one embodiment, a device determines a hierarchy of layers of a network comprising a plurality of networking devices. The device configures, in response to a request by a client to access remotely a particular endpoint in the network, a proxy chain of remote access agents executed by a plurality of networking devices in the network to allow the client to access remotely the particular endpoint. Each of those networking devices proxies traffic between different layers of the hierarchy. The device determines an access policy for the particular endpoint indicative of which commands may be sent to the particular endpoint by the client, based in part on where the particular endpoint is in the hierarchy. The device controls, based on the access policy, whether a command sent by the client is transmitted via the proxy chain to the particular endpoint.
    Type: Grant
    Filed: December 22, 2022
    Date of Patent: June 10, 2025
    Assignee: Cisco Technology, Inc.
    Inventors: Robert E. Barton, Flemming Stig Andreasen, Jerome Henry, Elango Ganesan
  • Patent number: 12323422
    Abstract: In one embodiment, a remote access manager receives an access request from a client to remotely access a device on a local network. The remote access manager generates a universally unique identifier for the access request. The remote access manager sends a response to the client having a one-time use domain name system name that is based on the universally unique identifier. The remote access manager communicates with a web proxy to authorize the client to remotely access the device.
    Type: Grant
    Filed: March 7, 2022
    Date of Patent: June 3, 2025
    Assignee: Cisco Technology, Inc.
    Inventors: Michael Freed, Madeline Y. Bernstein, Ruben Erick Escolero, Elango Ganesan
  • Publication number: 20250150348
    Abstract: A method of cross-domain policy orchestration may include executing, with a cross-domain automation (CDA) controller, a macro-segmentation of a plurality of domains based at least in part on metadata defining a mapping to a corresponding plurality of domain controllers, and executing, with the CDA controller, a micro-segmentation of policies within a group based at least in part on a merged policy matrix obtained from policies of the domain controllers.
    Type: Application
    Filed: November 3, 2023
    Publication date: May 8, 2025
    Applicant: Cisco Technology, Inc.
    Inventors: Sanjay Kumar Hooda, MASSIMILIANO ARDICA, DARRIN JOSEPH MILLER, ELANGO GANESAN, IAN MCDOWELL CAMPBELL, SARAVANAN RADHAKRISHNAN
  • Publication number: 20250141730
    Abstract: Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
    Type: Application
    Filed: January 2, 2025
    Publication date: May 1, 2025
    Inventors: Swapna Anandan, Elango Ganesan, Flemming S Andreasen
  • Publication number: 20250141927
    Abstract: In one implementation, a method is disclosed comprising: determining, by a process, a network topology of a particular computer network and capabilities of particular devices within the network topology; determining, by the process, a logical framework of the particular computer network; mapping, by the process, access control and segmentation features of the particular devices to the logical framework based on the capabilities of the particular devices; and causing, by the process, mapped access control and segmentation features to be implemented to enforce the logical framework within the network topology.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: Elango GANESAN, Swapna ANANDAN, Akshay KHUSHU, Flemming Stig ANDREASEN
  • Publication number: 20250080393
    Abstract: Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
    Type: Application
    Filed: September 5, 2023
    Publication date: March 6, 2025
    Inventors: Swapna Anandan, Elango Ganesan, Flemming S Andreasen
  • Patent number: 12244450
    Abstract: Embodiments relate to a method for enhancing and prioritizing operation technology (OT) control systems in a safety instrumented system (SIS) environment by incorporating safety levels. The method includes receiving network packets associated with OT systems by network interface. From network packets, OT systems associated with safety integrity level (SIL) values are identified. In response to identifying OT control systems associated with SIL values, determining priority levels from SIL values of OT systems. The method includes identifying, among OT control systems, network packets associated with a critical OT system associated with a SIL value having a higher priority level. The critical OT system may be prioritized that comprises encoding the network packets of the critical OT system, with corresponding SIL value. The prioritized critical OT system may be prioritized based on SIL value and classified into a network group associated with a network tag to deliver traffic with higher priority.
    Type: Grant
    Filed: September 5, 2023
    Date of Patent: March 4, 2025
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Swapna Anandan, Elango Ganesan, Flemming S Andreasen
  • Patent number: 12143492
    Abstract: A zero-touch deployment (ZTD) manager receives a first request to issue a first cryptographic token to a constrained device for establishing a communications session between the constrained device and a secured resource. The ZTD manager evaluates identity information corresponding to the constrained device and determines whether the identity information is valid. If so, the ZTD manager returns the first cryptographic token to the constrained device, where it is stored in cache memory. The ZTD manager receives a second request to obtain a second cryptographic token from the secured resource. When the second cryptographic token is provided to the secured resource, the secured resource uses this second cryptographic token to validate the first cryptographic token and to facilitate the communications session with the constrained device.
    Type: Grant
    Filed: August 4, 2022
    Date of Patent: November 12, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Michael Freed, Elango Ganesan, Swapna Anandan
  • Patent number: 12075342
    Abstract: Automatic onboarding of a device onto a cellular network may be provided through a Wireless Local Area Network (WLAN). Subsequent to a device connecting to a first network (e.g., the WLAN), information associated with the device and the first network may be received. One or more tags may be generated and an intent profile may be defined for the device based on the received information, where the intent profile may indicate at least a second network (e.g., the cellular network) that the device is enabled to connect with and one or more policies associated with the connection. The tags and intent profile may be transmitted to a service provider platform, and an onboarding profile template identified using the tags and the intent profile may be received from the service provider platform. The onboarding profile template may be provided to the device to enable connection to the second network.
    Type: Grant
    Filed: November 22, 2022
    Date of Patent: August 27, 2024
    Inventors: Vinay Saini, Robert Edgar Barton, Elango Ganesan, Swapna Anandan, Jerome Henry
  • Publication number: 20240236045
    Abstract: In one embodiment, a device receives discovery data generated by a plurality of networking devices in a network. The device determines, based on the discovery data, a hierarchy of layers of the network. The device receives a request by a client that is external to the network to access remotely a particular endpoint in the network. The device configures, and in response to the request, a proxy chain of remote access agents executed by a subset of networking devices from the plurality of networking devices to allow the client to access remotely the particular endpoint, each of those networking devices proxying traffic between different layers of the network.
    Type: Application
    Filed: October 21, 2022
    Publication date: July 11, 2024
    Inventors: Robert E. Barton, Flemming Stig ANDREASEN, Jerome HENRY, Elango GANESAN
  • Publication number: 20240214386
    Abstract: In one embodiment, a device determines a hierarchy of layers of a network comprising a plurality of networking devices. The device configures, in response to a request by a client to access remotely a particular endpoint in the network, a proxy chain of remote access agents executed by a plurality of networking devices in the network to allow the client to access remotely the particular endpoint. Each of those networking devices proxies traffic between different layers of the hierarchy. The device determines an access policy for the particular endpoint indicative of which commands may be sent to the particular endpoint by the client, based in part on where the particular endpoint is in the hierarchy. The device controls, based on the access policy, whether a command sent by the client is transmitted via the proxy chain to the particular endpoint.
    Type: Application
    Filed: December 22, 2022
    Publication date: June 27, 2024
    Inventors: Robert E. Barton, Flemming Stig Andreasen, Jerome Henry, Elango Ganesan
  • Publication number: 20240154954
    Abstract: In some implementations, a device receives a login request from a web browser executed by a client endpoint in a first network. The device provides a one-time password to the web browser that causes the client endpoint to invoke a local handler process associated with an access service executed by the client endpoint or invoke access by the web browser to a particular uniform resource locator on the device. The device receives a remote connection request from the access service that includes the one-time password to access a target endpoint in a second network. The device configures, based on the remote connection request, a remote access connection between the client endpoint in the first network and the target endpoint in the second network.
    Type: Application
    Filed: September 11, 2023
    Publication date: May 9, 2024
    Inventors: Elango Ganesan, Michael Freed, Maged Khalil
  • Publication number: 20240137344
    Abstract: In one embodiment, a device receives discovery data generated by a plurality of networking devices in a network. The device determines, based on the discovery data, a hierarchy of layers of the network. The device receives a request by a client that is external to the network to access remotely a particular endpoint in the network. The device configures, and in response to the request, a proxy chain of remote access agents executed by a subset of networking devices from the plurality of networking devices to allow the client to access remotely the particular endpoint, each of those networking devices proxying traffic between different layers of the network.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Inventors: Robert E. Barton, Flemming Stig ANDREASEN, Jerome HENRY, Elango GANESAN
  • Patent number: 11917399
    Abstract: In one embodiment, a service receives a device registration request sent by an endpoint device, wherein the endpoint device executes an onboarding agent that causes the endpoint device to send the device registration request via a cellular connection to a private access point name (APN) associated with the service. The service verifies that a network address of the endpoint device from which the device registration request was sent is associated with an integrated circuit card identifier (ICCID) or international mobile equipment identity (IMEI) indicated by the device registration request. The service identifies a tenant identifier associated with the ICCID or IMEI. The service sends, based on the tenant identifier, a device registration response to the endpoint device via the private APN.
    Type: Grant
    Filed: February 2, 2023
    Date of Patent: February 27, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Elango Ganesan, Michael Freed, Scott Taft Potter
  • Patent number: 11909739
    Abstract: A method includes determining a corresponding level of a security model associated with each device of a plurality of devices connected to a network, each level of the security model having a corresponding tag; applying, to each of the plurality of devices, the corresponding tag based on the corresponding level of the security model with which each of the plurality of devices are associated; receiving, over a network connection, network traffic from at least one of the plurality of devices and the corresponding tag; analyzing the corresponding tag associated with the network traffic; determining a destination for the network traffic; applying one or more security measures to the network traffic based on the corresponding tag for the at least one device and a corresponding tag of the destination for the network traffic; and sending the network traffic to the destination with the corresponding tag of the destination.
    Type: Grant
    Filed: August 6, 2021
    Date of Patent: February 20, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Jerome Henry, Robert Edgar Barton, Elango Ganesan, Flemming Stig Andreasen
  • Publication number: 20240048384
    Abstract: A zero-touch deployment (ZTD) manager receives a first request to issue a first cryptographic token to a constrained device for establishing a communications session between the constrained device and a secured resource. The ZTD manager evaluates identity information corresponding to the constrained device and determines whether the identity information is valid. If so, the ZTD manager returns the first cryptographic token to the constrained device, where it is stored in cache memory. The ZTD manager receives a second request to obtain a second cryptographic token from the secured resource. When the second cryptographic token is provided to the secured resource, the secured resource uses this second cryptographic token to validate the first cryptographic token and to facilitate the communications session with the constrained device.
    Type: Application
    Filed: August 4, 2022
    Publication date: February 8, 2024
    Inventors: Michael Freed, Elango Ganesan, Swapna Anandan
  • Publication number: 20240031017
    Abstract: According to one or more embodiments of the disclosure, a device associated with a first cluster of data sources may identify an amount of data from the first cluster of data sources to be sent by the device to a satellite. The device may send, to the satellite, a request for a transmission window that indicates the amount of data to be sent by the device to the satellite. The device may receive, from the satellite, an indication of an assigned transmission window during which the device may transmit data to the satellite. The satellite may compute the assigned transmission window based on the amount of data and such that the assigned transmission window does not overlap an assigned transmission window of a neighboring device associated with a second cluster of data sources. The device may send, during the assigned transmission window, the data towards the satellite.
    Type: Application
    Filed: July 20, 2022
    Publication date: January 25, 2024
    Inventors: Robert E. Barton, Francesco Basile, Michael Freed, Yen Chih Lee, Elango Ganesan
  • Patent number: 11800422
    Abstract: In one embodiment, an earthbound transceiver in a low earth orbit (LEO) satellite network establishes a connection with a first LEO satellite from a first set of LEO satellites. The first set of LEO satellites are distributed across a first plurality of orbits including first neighboring LEO satellites of the first LEO satellite, and the first neighboring LEO satellites have a fixed or semi-fixed position relative to the first LEO satellite. The earthbound transceiver determines first signal strength values associated with the first set of LEO satellites and second signal strength values associated with a second set of LEO satellites. The earthbound transceiver then periodically compares the first signal strength values to the second signal strength values. At an optimal handoff time, the earthbound transceiver initiates the handoff operation from the first LEO satellite to a second LEO satellite from the second set of LEO satellites.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: October 24, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Arman Rezaee, Ali Sajassi, Alessandro Erta, Elango Ganesan, Pradeep Kumar Kathail
  • Publication number: 20230188978
    Abstract: In one embodiment, a service receives a device registration request sent by an endpoint device, wherein the endpoint device executes an onboarding agent that causes the endpoint device to send the device registration request via a cellular connection to a private access point name (APN) associated with the service. The service verifies that a network address of the endpoint device from which the device registration request was sent is associated with an integrated circuit card identifier (ICCID) or international mobile equipment identity (IMEI) indicated by the device registration request. The service identifies a tenant identifier associated with the ICCID or IMEI. The service sends, based on the tenant identifier, a device registration response to the endpoint device via the private APN.
    Type: Application
    Filed: February 2, 2023
    Publication date: June 15, 2023
    Inventors: Elango GANESAN, Michael FREED, Scott Taft POTTER
  • Publication number: 20230081990
    Abstract: Automatic onboarding of a device onto a cellular network may be provided through a Wireless Local Area Network (WLAN). Subsequent to a device connecting to a first network (e.g., the WLAN), information associated with the device and the first network may be received. One or more tags may be generated and an intent profile may be defined for the device based on the received information, where the intent profile may indicate at least a second network (e.g., the cellular network) that the device is enabled to connect with and one or more policies associated with the connection. The tags and intent profile may be transmitted to a service provider platform, and an onboarding profile template identified using the tags and the intent profile may be received from the service provider platform. The onboarding profile template may be provided to the device to enable connection to the second network.
    Type: Application
    Filed: November 22, 2022
    Publication date: March 16, 2023
    Applicant: Cisco Technology, Inc.
    Inventors: Vinay SAINI, Robert Edgar BARTON, Elango GANESAN, Swapna ANANDAN, Jerome HENRY