Patents by Inventor Harsha Narayan

Harsha Narayan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180075157
    Abstract: Disclosed are systems and methods for converting disparate documents to a linked table, for one or more financial entities. More particularly, at least one embodiment of the present invention pertains to a method and apparatus for converting disparate financial, regulatory, and disclosure documents to a linked table. For instance, the system and method can gather information and content from one or more pages of a website for a company, and can automatically find and organize disparate financial documents, such as through the application of heuristics that are related to the available content, wherein the heuristics can be specific to the type of documents that are encountered. The system and method reorganize the available content within a link database, to provide standard accessibility. In some embodiments, the available documents are available through a standardized user interface, wherein financial, regulatory, and disclosure documents are presented as hyperlinks within a linked table.
    Type: Application
    Filed: March 10, 2016
    Publication date: March 15, 2018
    Inventor: Harsha NARAYAN
  • Patent number: 8677453
    Abstract: Techniques for highly parallel evaluation of XACML policies are described herein. In one embodiment, attributes are extracted from a request for accessing a resource including at least one of a user attribute and an environment attribute. Multiple individual searches are concurrently performed, one for each of the extracted attributes, in a policy store having stored therein rules and policies written in XACML, where the rules and policies are optimally stored using a bit vector algorithm. The individual search results associated with the attributes are then combined to generate a single final result using a predetermined policy combination algorithm. It is then determined whether the client is eligible to access the requested resource of the datacenter based on the single final result, including performing a layer-7 access control process, where the network element operates as an application service gateway to the datacenter. Other methods and apparatuses are also described.
    Type: Grant
    Filed: May 19, 2008
    Date of Patent: March 18, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: David Chang, Nagaraj Bagepalli, Harsha Narayan, Abhijit Patra
  • Patent number: 7984235
    Abstract: A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry.
    Type: Grant
    Filed: January 29, 2010
    Date of Patent: July 19, 2011
    Assignee: Juniper Networks, Inc.
    Inventors: Harsha Narayan, Kenneth Huang, Ruturaj Pathak, Soren B. Pendersen
  • Patent number: 7975097
    Abstract: A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry.
    Type: Grant
    Filed: January 29, 2010
    Date of Patent: July 5, 2011
    Assignee: Juniper Networks, Inc.
    Inventors: Harsha Narayan, Kenneth Huang, Ruturaj Pathak, Soren B. Pendersen
  • Publication number: 20100138600
    Abstract: A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry.
    Type: Application
    Filed: January 29, 2010
    Publication date: June 3, 2010
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Harsha NARAYAN, Kenneth HUANG, Ruturaj PATHAK, Soren B. PEDERSEN
  • Publication number: 20100131703
    Abstract: A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry.
    Type: Application
    Filed: January 29, 2010
    Publication date: May 27, 2010
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Harsha NARAYAN, Kenneth HUANG, Ruturaj PATHAK, Soren B. PEDERSEN
  • Patent number: 7680978
    Abstract: A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry.
    Type: Grant
    Filed: September 5, 2007
    Date of Patent: March 16, 2010
    Assignee: Juniper Networks, Inc.
    Inventors: Harsha Narayan, Kenneth Huang, Ruturaj Pathak, Soren B. Pedersen
  • Publication number: 20090288136
    Abstract: Techniques for highly parallel evaluation of XACML policies are described herein. In one embodiment, attributes are extracted from a request for accessing a resource including at least one of a user attribute and an environment attribute. Multiple individual searches are concurrently performed, one for each of the extracted attributes, in a policy store having stored therein rules and policies written in XACML, where the rules and policies are optimally stored using a bit vector algorithm. The individual search results associated with the attributes are then combined to generate a single final result using a predetermined policy combination algorithm. It is then determined whether the client is eligible to access the requested resource of the datacenter based on the single final result, including performing a layer-7 access control process, where the network element operates as an application service gateway to the datacenter. Other methods and apparatuses are also described.
    Type: Application
    Filed: May 19, 2008
    Publication date: November 19, 2009
    Applicant: Rohati Systems, Inc.
    Inventors: David Chang, Nagaraj Bagepalli, Harsha Narayan, Abhijit Patra
  • Publication number: 20060221956
    Abstract: Methods for performing packet classification via prefix pair bit vectors. Unique prefix pairs in an access control list (ACL) are identified, with each prefix pair comprising a unique combination of a source prefix and a destination prefix. Corresponding prefix pair bit vectors (PPBVs) are defined for each unique source prefix and unique destination prefix in the ACL, with each PPBV including a string of bits and each bit position in the string associated with a corresponding prefix pair. A list of transport field value combinations are associated with each prefix pair based on corresponding entries in the ACL. During packet-processing operations, PPBV lookups are made using the source and destination prefix header values, and the PPBVs are logically ANDed to identify applicable prefix pairs. A search is then performed on transport field value combinations corresponding to the prefix pairs and the packet header to identify a highest priority rule.
    Type: Application
    Filed: June 28, 2005
    Publication date: October 5, 2006
    Inventors: Harsha Narayan, Alok Kumar
  • Publication number: 20060221954
    Abstract: Methods for performing packet classification. In one embodiment, packets are classified using a rule bit vector optimization scheme, wherein original rule bit vectors in recursive flow classification (RFC) chunks are optimized by removing useless bits that have no effect on the ultimate rule identified by an associated RFC lookup process. The unique optimized rule bit vectors for associated chunks are then cross-producted to produce an optimized downstream chunk. In another embodiment, a rule database splitting scheme is employed. Under this technique, split criteria is defined to split a rule database, such as splitting based on a particular field value or range. A respective set of downstream chunks is then generated for each partition, beginning with the chunks in a split phase. The applicable rule bit vectors for the chunks associated with a common group and partition are identified, and then unique applicable rule bit vectors for those chunks are cross-producted to produce downstream chunks.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Inventors: Harsha Narayan, Alok Kumar
  • Publication number: 20060221967
    Abstract: Methods for performing packet classification via partitioned bit vectors. Rules in an access control list (ACL) are partitioned into a plurality of partitions, wherein each partition is defined by a meta-rule comprising a set of filter dimension ranges and/or values covering the rules in that partition. Filter data structures comprising rule bit vectors are then built, each including multiple filter entries defining packet header filter criteria corresponding to one or more filter dimensions. Partition bit vectors identifying, for each filter entry, any partition having a meta-rule defining a filter dimension range or value that covers that entry's packet header filter criteria are also generated and stored in a corresponding data structure.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Inventors: Harsha Narayan, Alok Kumar