Patents by Inventor Hari Shankar
Hari Shankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11943078Abstract: Techniques for a hub node, provisioned in a site of a hub and spoke overlay network, to receive, store, and/or forward network routing information associated with a spoke, and send packets directly to spoke(s) that are remote from the hub node. A first hub node may receive a network advertisement including a border gateway protocol (BGP) large community string from a first spoke local to the first hub node. The first hub node may send the BGP large community string to a second hub node remote from the first hub node. The second hub node may decode network routing information from the BGP large community string and store the network routing information locally. The second hub node may send a packet from a second spoke local to the second hub node directly to the first spoke without the data packet being routed via the first hub node.Type: GrantFiled: July 8, 2022Date of Patent: March 26, 2024Assignee: Cisco Technology, Inc.Inventors: Hari Shankar, Rashmi Garg, Benoit Ganne, Jerome Tollet, Nathan Skrzypczak
-
Publication number: 20240015091Abstract: Techniques for a hub node to, provisioned in a network site of a hub and spoke overlay network, to receive a network advertisement from the spoke, decode network routing requirements from a border gateway protocol (BGP) large community associated with the network advertisement, and store the network routing requirements in association with a route associated with the spoke. The routing requirements may indicate one or more service(s) to be applied to the packet, a trust level associated with the spoke, and/or a trust zone associated with the spoke. The hub node may receive a packet from the spoke to be transmitted to destination spoke. The hub node may then route the packet to the destination spoke, drop the packet, or send the packet to a service node configured to apply the one or more services to the packet based on the routing requirements.Type: ApplicationFiled: July 8, 2022Publication date: January 11, 2024Inventors: Hari Shankar, Eui Sun Ahn, Jeffery Rodd Daviss, Rashmi Garg, Jon Langemak, William Mark Townsley
-
Publication number: 20240015050Abstract: Techniques for a hub node, provisioned in a site of a hub and spoke overlay network, to receive, store, and/or forward network routing information associated with a spoke, and send packets directly to spoke(s) that are remote from the hub node. A first hub node may receive a network advertisement including a border gateway protocol (BGP) large community string from a first spoke local to the first hub node. The first hub node may send the BGP large community string to a second hub node remote from the first hub node. The second hub node may decode network routing information from the BGP large community string and store the network routing information locally. The second hub node may send a packet from a second spoke local to the second hub node directly to the first spoke without the data packet being routed via the first hub node.Type: ApplicationFiled: July 8, 2022Publication date: January 11, 2024Inventors: Hari Shankar, Rashmi Garg, Benoit Ganne, Jerome Tollet, Nathan Skrzypczak
-
Publication number: 20230396991Abstract: A method for stale user context detection and removal is implemented at one of Open Radio Access Network (O-RAN) Centralized Unit (gNB-CU) or Distributed Unit (gNB-DU). In a first variant which utilizes the gNB-CU, the gNB runs a configurable periodic timer for initiating the stale UE detection procedure, i.e., the gNB configures, for every UE context stored in its database, a special Event A1 with the low a1-Threshold=?120 dBm, reportInterval=512 ms, and reportAmount=2. In a second variant which utilizes the gNB-CU, stale UE detection mechanism can be based on a periodic Event A1 configured during initial User admission procedure, i.e., the gNB configures a special Event A1 with the low a1-Threshold=?120 dBm, reportInterval=1 minute, and reportAmount=infinity. In a further variant, stale UE contexts can be identified at the gNB-DU based on periodic Channel State Information (CSI) reports.Type: ApplicationFiled: May 25, 2023Publication date: December 7, 2023Applicant: Mavenir Systems, Inc.Inventors: Hari Shankar Jena, Sachin Vitthal Telang
-
Patent number: 11722463Abstract: In one embodiment, a network security device is configured to monitor data traffic between a first device and a second device. The network security device may be configured to intercept a first initial message of a first encrypted handshaking procedure for a first secure communication session between the first device and the second device, the first initial message specifying a hostname that has been encrypted using first key information associated with the network security device, decrypt at least a portion of the first initial message using the first key information to determine the hostname, re-encrypt the hostname using second key information associated with the second device, and send, to the second device, a second initial message of a second encrypted handshaking procedure for a second secure communication session between the network security device and the second device, the second initial message specifying the hostname re-encrypted using the second key information.Type: GrantFiled: June 6, 2022Date of Patent: August 8, 2023Assignee: Cisco Technology, Inc.Inventors: Jianxin Wang, Hari Shankar
-
Publication number: 20230121555Abstract: Mixing between I and Q components in coherent homodyne optical signals can occur due to phase shifts, e.g. relative to the local oscillator, relative to the other signal components. In some examples, the phase shifts can arise due to thermal expansion of the optical waveguides and/or can include polarization mixing. A descrambler functions to correct for mixing between multiple signal components. The descrambler may be configured to at least partially correct for a phase difference between a first plurality of modulated optical data signals and a first local oscillator reference signal; and a controller may be configured for determining a first correction parameter for at least partially correcting for the phase difference, and for transmitting the first correction parameter to the descrambler. The controller may be configured for determining the first correction parameter from a first pilot signal transmitted with the first plurality of modulated optical data signals.Type: ApplicationFiled: October 18, 2022Publication date: April 20, 2023Inventors: Thomas W. BAEHR-JONES, Hari SHANKAR, Florian BOHN
-
Patent number: 11483292Abstract: Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.Type: GrantFiled: December 9, 2020Date of Patent: October 25, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Jianxin Wang, Prashanth Patil, Flemming Andreasen, Nancy Cam-Winget, Hari Shankar
-
Publication number: 20220303251Abstract: In one embodiment, a network security device is configured to monitor data traffic between a first device and a second device. The network security device may be configured to intercept a first initial message of a first encrypted handshaking procedure for a first secure communication session between the first device and the second device, the first initial message specifying a hostname that has been encrypted using first key information associated with the network security device, decrypt at least a portion of the first initial message using the first key information to determine the hostname, re-encrypt the hostname using second key information associated with the second device, and send, to the second device, a second initial message of a second encrypted handshaking procedure for a second secure communication session between the network security device and the second device, the second initial message specifying the hostname re-encrypted using the second key information.Type: ApplicationFiled: June 6, 2022Publication date: September 22, 2022Inventors: Jianxin Wang, Hari Shankar
-
Patent number: 11356423Abstract: In one embodiment, a network security device is configured to monitor data traffic between a first device and a second device. The network security device may be configured to intercept a first initial message of a first encrypted handshaking procedure for a first secure communication session between the first device and the second device, the first initial message specifying a hostname that has been encrypted using first key information associated with the network security device, decrypt at least a portion of the first initial message using the first key information to determine the hostname, re-encrypt the hostname using second key information associated with the second device, and send, to the second device, a second initial message of a second encrypted handshaking procedure for a second secure communication session between the network security device and the second device, the second initial message specifying the hostname re-encrypted using the second key information.Type: GrantFiled: January 14, 2020Date of Patent: June 7, 2022Assignee: Cisco Technology, Inc.Inventors: Jianxin Wang, Hari Shankar
-
Patent number: 11281654Abstract: Roll back strategies for database deadlock resolution are customized by identifying a first transaction to a database, identifying a second transaction to the database and detecting a deadlock between the first and second transactions with respect to the database. The deadlock is resolved based upon a predetermined roll back strategy associated with at least one of the first or second transactions to identify a select one of the first and second transactions for roll back and a request is conveyed to roll back the selected one of the first and second transactions, wherein the preferred transaction is allowed to continue processing.Type: GrantFiled: October 23, 2007Date of Patent: March 22, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Snehal S. Antani, Soloman J. Barghouthi, Mohammad N. Fakhar, Sajan Sankaran, Hari Shankar
-
Patent number: 11153013Abstract: The present invention is directed to communication systems and methods. In a specific embodiment, the present invention provides an optical receiver that receives a data stream from an optical transmitter. The optical receiver determines a histogram contour parameter using the data stream and inserts the histogram contour parameter into a back-channel data segment, which is then transmitted to the optical transmitter. The optical transmitter changes its data transmission setting based on the histogram contour parameter. There are other embodiments as well.Type: GrantFiled: November 5, 2020Date of Patent: October 19, 2021Assignee: MARVELL ASIA PTE, LTD.Inventors: Todd Rope, Hari Shankar, Radhakrishnan L. Nagarajan
-
Patent number: 11106739Abstract: The disclosed embodiments provide a system for processing data. During operation, the system stores a conversation containing a series of messages exchanged among a number of participants in a first document containing metadata for the conversation; a second document containing message content for the series of messages, wherein the message content includes a fixed position gap between starting or ending positions in consecutive messages in the series of messages; and one or more additional documents storing message metadata for individual messages in the conversation. Next, the system processes a first search across the series of messages in the conversation using an index of the set of documents. The system also processes, using the index, a second search within individual messages in the series of messages as a span query with a distance that is shorter than the fixed position gap.Type: GrantFiled: March 29, 2019Date of Patent: August 31, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Hari Shankar Sreekumar Menon, Shubham Gupta, Suruchi H. Shah, Ali Sadiq Mohamed, Parinkumar D. Shah
-
Patent number: 11095670Abstract: In one example embodiment, a network management device generates a first script defining a first function for detecting a first customizable network event in a sequence of customizable network events indicative of a security threat to a network. The network management device activates the first script at a first network device in the network so as to cause the first network device to execute the first function for detecting the first customizable network event, and obtains, from the first network device, one or more indications that the first network device has detected the first customizable network event. Based on the one or more indications, the network management device determines whether to activate a second script defining a second function for detecting a second customizable network event in the sequence at a second network device in the network capable of detecting the second customizable network event.Type: GrantFiled: July 9, 2018Date of Patent: August 17, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Subharthi Paul, Saman Taghavi Zargar, Jayaraman Iyer, Hari Shankar
-
Patent number: 11092024Abstract: The present disclosure is directed to a system for mitigating rotor bow at a turbine engine. The system includes a casing circumferentially surrounding a rotor assembly in which a heat pipe is attached to the casing and extended circumferentially around the rotor assembly.Type: GrantFiled: October 9, 2018Date of Patent: August 17, 2021Assignee: General Electric CompanyInventors: Arvind Namadevan, Weize Kang, Hari Shankar Thakur, Arnab Sen, Mayur Ghawat
-
Publication number: 20210218714Abstract: In one embodiment, a network security device is configured to monitor data traffic between a first device and a second device. The network security device may be configured to intercept a first initial message of a first encrypted handshaking procedure for a first secure communication session between the first device and the second device, the first initial message specifying a hostname that has been encrypted using first key information associated with the network security device, decrypt at least a portion of the first initial message using the first key information to determine the hostname, re-encrypt the hostname using second key information associated with the second device, and send, to the second device, a second initial message of a second encrypted handshaking procedure for a second secure communication session between the network security device and the second device, the second initial message specifying the hostname re-encrypted using the second key information.Type: ApplicationFiled: January 14, 2020Publication date: July 15, 2021Inventors: Jianxin Wang, Hari Shankar
-
Publication number: 20210119974Abstract: Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.Type: ApplicationFiled: December 9, 2020Publication date: April 22, 2021Inventors: Jianxin Wang, Prashanth Patil, Flemming Andreasen, Nancy Cam-Winget, Hari Shankar
-
Publication number: 20210058160Abstract: The present invention is directed to communication systems and methods. In a specific embodiment, the present invention provides an optical receiver that receives a data stream from an optical transmitter. The optical receiver determines a histogram contour parameter using the data stream and inserts the histogram contour parameter into a back-channel data segment, which is then transmitted to the optical transmitter. The optical transmitter changes its data transmission setting based on the histogram contour parameter. There are other embodiments as well.Type: ApplicationFiled: November 5, 2020Publication date: February 25, 2021Inventors: Todd ROPE, Hari SHANKAR, Radhakrishnan L. NAGARAJAN
-
Patent number: 10911409Abstract: Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.Type: GrantFiled: May 21, 2018Date of Patent: February 2, 2021Assignee: Cisco Technology, Inc.Inventors: Jianxin Wang, Prashanth Patil, Flemming Andreasen, Nancy Cam-Winget, Hari Shankar
-
Patent number: 10862589Abstract: The present invention is directed to communication systems and methods. In a specific embodiment, the present invention provides an optical receiver that receives a data stream from an optical transmitter. The optical receiver determines a histogram contour parameter using the data stream and inserts the histogram contour parameter into a back-channel data segment, which is then transmitted to the optical transmitter. The optical transmitter changes its data transmission setting based on the histogram contour parameter. There are other embodiments as well.Type: GrantFiled: March 24, 2020Date of Patent: December 8, 2020Assignee: INPHI CORPORATIONInventors: Todd Rope, Hari Shankar, Radhakrishnan L. Nagarajan
-
Publication number: 20200311151Abstract: The disclosed embodiments provide a system for processing data. During operation, the system stores a conversation containing a series of messages exchanged among a number of participants in a first document containing metadata for the conversation; a second document containing message content for the series of messages, wherein the message content includes a fixed position gap between starting or ending positions in consecutive messages in the series of messages; and one or more additional documents storing message metadata for individual messages in the conversation. Next, the system processes a first search across the series of messages in the conversation using an index of the set of documents. The system also processes, using the index, a second search within individual messages in the series of messages as a span query with a distance that is shorter than the fixed position gap.Type: ApplicationFiled: March 29, 2019Publication date: October 1, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Hari Shankar Sreekumar Menon, Shubham Gupta, Suruchi H. Shah, Ali Sadiq Mohamed, Parinkumar D. Shah