Patents by Inventor Gopal Agrawal

Gopal Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11916874
    Abstract: Provided in some embodiments are systems and methods for determining a data flow path including a plurality of network devices for routing data from a first network device to a second network device; determining for the network devices one or more flow rules that specify an input for receiving data, an output for outputting data, and a role tag indicative of a role of a network device, where the role tag for one or more flow rules for a first network device of the network devices indicates a source role; distributing, to the network devices, the one or more flow rules; determining malicious activity on the data flow path; determining that the first network device is a source based at least in part on the role tag for the first network device; and sending, to the first network device, a blocking flow rule to inhibit routing of malicious data.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: February 27, 2024
    Assignee: McAfee, LLC
    Inventors: Shivakrishna Anandam Mulka, Shankar Subramanian, Jayakrishnan Karunakaran Nair, Gopal Agrawal, Shankar Ganesh Pillaiyar Nattamai Jeyaprakash
  • Patent number: 11102173
    Abstract: Provided in some embodiments are systems and methods for determining a data flow path including a plurality of network devices for routing data from a first network device to a second network device; determining for the network devices one or more flow rules that specify an input for receiving data, an output for outputting data, and a role tag indicative of a role of a network device, where the role tag for one or more flow rules for a first network device of the network devices indicates a source role; distributing, to the network devices, the one or more flow rules; determining malicious activity on the data flow path; determining that the first network device is a source based at least in part on the role tag for the first network device; and sending, to the first network device, a blocking flow rule to inhibit routing of malicious data.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: August 24, 2021
    Assignee: McAfee, LLC
    Inventors: Shivakrishna Anandam Mulka, Shankar Subramanian, Jayakrishnan Karunakaran Nair, Gopal Agrawal, Shankar Ganesh Pillaiyar Nattamai Jeyaprakash
  • Publication number: 20210218706
    Abstract: Provided in some embodiments are systems and methods for determining a data flow path including a plurality of network devices for routing data from a first network device to a second network device; determining for the network devices one or more flow rules that specify an input for receiving data, an output for outputting data, and a role tag indicative of a role of a network device, where the role tag for one or more flow rules for a first network device of the network devices indicates a source role; distributing, to the network devices, the one or more flow rules; determining malicious activity on the data flow path; determining that the first network device is a source based at least in part on the role tag for the first network device; and sending, to the first network device, a blocking flow rule to inhibit routing of malicious data
    Type: Application
    Filed: March 31, 2021
    Publication date: July 15, 2021
    Inventors: Shivakrishna Anandam Mulka, Shankar Subramanian, Jayakrishnan Karunakaran Nair, Gopal Agrawal, Shankar Ganesh Pillaiyar Nattamai Jeyaprakash
  • Patent number: 10129125
    Abstract: In an example, there is disclosed a computing apparatus, having: a network interface to communicatively couple to a software-defined network (SDN); first one or more logic elements providing an SDN controller engine to provide a control function for the SDN; and second one or more logic elements providing a route tracing engine to: receive a tunneling notification from a network device agent, the tunneling notification associated with a network flow; and perform a backtracking traceroute operation to deterministically identify a source device for the flow. There is also disclosed a method of providing the foregoing, and one or more tangible, non-transitory computer-readable storage mediums for providing the foregoing.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: November 13, 2018
    Assignee: McAfee, LLC
    Inventors: Gopal Agrawal, Shivakrishna Anandam Mulka
  • Publication number: 20180191679
    Abstract: Provided in some embodiments are systems and methods for determining a data flow path including a plurality of network devices for routing data from a first network device to a second network device; determining for the network devices one or more flow rules that specify an input for receiving data, an output for outputting data, and a role tag indicative of a role of a network device, where the role tag for one or more flow rules for a first network device of the network devices indicates a source role; distributing, to the network devices, the one or more flow rules; determining malicious activity on the data flow path; determining that the first network device is a source based at least in part on the role tag for the first network device; and sending, to the first network device, a blocking flow rule to inhibit routing of malicious data.
    Type: Application
    Filed: May 18, 2016
    Publication date: July 5, 2018
    Inventors: Shivakrishna Anandam MULKA, Shankar SUBRAMANIAN, Jayakrishnan Karunakaran NAIR, Gopal AGRAWAL, Shanar Ganes Pillaiyar Nattamai JEYAPRAKASH
  • Publication number: 20170180234
    Abstract: In an example, there is disclosed a computing apparatus, having: a network interface to communicatively couple to a software-defined network (SDN); first one or more logic elements providing an SDN controller engine to provide a control function for the SDN; and second one or more logic elements providing a route tracing engine to: receive a tunneling notification from a network device agent, the tunneling notification associated with a network flow; and perform a backtracking traceroute operation to deterministically identify a source device for the flow. There is also disclosed a method of providing the foregoing, and one or more tangible, non-transitory computer-readable storage mediums for providing the foregoing.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Applicant: McAfee, Inc.
    Inventors: Gopal Agrawal, Shivakrishna Anandam Mulka
  • Patent number: 5404424
    Abstract: A method for real time message transmission in a token ring network is provided. The method initializes each node in the network, including setting a maximum message transmission time H.sub.i such that ##EQU1## is the transmission time of a message in a message stream, P.sub.i is the period length of the message stream, TTRT is the target token rotation time, and .tau. is the portion of TTRT that is unavailable to transmit messages. The messages are then transmitted when a token arrives at a node for the duration of H.sub.i. Using this method with the timed token protocol, the synchronous messages are guaranteed to be transmitted before their deadlines if the utilization of synchronous messages is no more than 33% of available utilization.
    Type: Grant
    Filed: September 22, 1992
    Date of Patent: April 4, 1995
    Assignees: The Texas A&M University System, University of Houston-Clear Lake
    Inventors: Wei Zhao, Gopal Agrawal, Biao Chen, Sadegh Davari
  • Patent number: 5313466
    Abstract: A method for real time message transmission in a token ring network is provided. The method initializes each node in the network, including setting a maximum message transmission time H.sub.i for node i such that ##EQU1## where C.sub.i is the transmission time of a message in a message stream, P.sub.i is the period length of the message stream, and a is a non-negative constant between zero and one. The messages are then transmitted when a token arrives at a node for the duration of H.sub.i. Using this method with the timed token protocol, the synchronous messages are guaranteed to be transmitted before their deadlines if the utilization of synchronous messages is no more than ##EQU2## of available utilization.
    Type: Grant
    Filed: September 22, 1992
    Date of Patent: May 17, 1994
    Assignee: The Texas A&M University System
    Inventors: Wei Zhao, Biao Chen, Gopal Agrawal