Patents by Inventor Hemant Kumar

Hemant Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180109428
    Abstract: This disclosure relates to managing Fog computations between a coordinating node and Fog nodes. In one embodiment, a method for managing Fog computations includes receiving a task data and a request for allocation of at least a subset of a computational task. The task data includes data subset and task constraints associated with at least the subset of the computational task. The Fog nodes capable of performing the computational task are characterized with node characteristics to obtain resource data associated with the Fog nodes. Based on the task data and the resource data, an optimization model is derived to perform the computational task by the Fog nodes. The optimization model includes node constraints including battery degradation constraint, communication path loss constraint, and heterogeneous computational capacities of Fog nodes. Based on the optimization model, at least the subset of the computational task is offloaded to a set of Fog nodes.
    Type: Application
    Filed: July 18, 2017
    Publication date: April 19, 2018
    Applicant: Tata Consultancy Services Limited
    Inventors: Ajay KATTEPUR, Hemant Kumar RATH, Anantha SIMHA
  • Patent number: 9935974
    Abstract: Methods and systems for an integrated solution to flow collection for determination of rate-based DoS attacks targeting ISP infrastructure are provided. According to one embodiment, a method of mitigating DDoS attacks is provided. Information regarding at least one destination within a network for which a distributed denial of service (DDoS) attack status is to be monitored is received by a DDoS attack detection module coupled with a flow controller via a bus. The DDoS attack status is determined for the at least one destination based on the information regarding the at least one destination. When a DDoS attack is detected the flow controller is notified of the DDoS attack status for the at least one destination by the DDoS attack detection module. Responsive thereto, the flow controller directs a route reflector to divert traffic destined for the at least one destination to a DDoS attack mitigation appliance within the network.
    Type: Grant
    Filed: February 28, 2016
    Date of Patent: April 3, 2018
    Assignee: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Publication number: 20180091548
    Abstract: Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS attacks. A DDoS attack mitigation appliance of multiple mitigation appliances controlled by a DDoS attack mitigation central controller receives DDoS attack mitigation policies through a network connecting the controller and the mitigation appliance. A DDoS attack is mitigated by the mitigation appliance based on the received mitigation policies. The mitigation policies are generated by the controller based on granular behavioral packet rate thresholds estimated based on granular traffic rate information collected from one or more of the multiple mitigation appliances controlled by the controller.
    Type: Application
    Filed: November 18, 2017
    Publication date: March 29, 2018
    Applicant: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Patent number: 9883211
    Abstract: In one embodiment, a method includes: receiving a user input requesting an event to be displayed; playing out the requested event; identifying a type of the requested event; estimating a duration of a next commercial break occurring in the requested event according to the type; selecting at least one advertisement having a duration corresponding to the estimated duration of the next commercial break; and playing out the at least one advertisement. Related systems, apparatus and methods are also described.
    Type: Grant
    Filed: August 29, 2013
    Date of Patent: January 30, 2018
    Assignee: Cisco Technology, Inc.
    Inventor: Hemant Kumar
  • Patent number: 9860318
    Abstract: The present application provides a method and system for optimal caching of content in the Information Centric Networks (ICN) and a cache replacement based on a content metric value. The method and system comprises requesting for a plurality of content by a user to a nearest local or edge ICN cache router; delivering by the local or edge ICN cache router the requested plurality of content to the user if it is available in its cache; else forwarding the request for the plurality of content to any of intermediate ICN cache router for finding source of the requested plurality of content; downloading the plurality of content in its downstream path; and storing the downloaded plurality of content based on a content metric value derived by a content metric system (CMS) based on a plurality of network parameters for the requested plurality of content.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: January 2, 2018
    Assignee: Tata Consultancy Services Limited
    Inventors: Bighnaraj Panigrahi, Samar Shailendra, Hemant Kumar Rath, Anantha Simha
  • Publication number: 20170371681
    Abstract: Systems and methods for using distributed Universal Serial Bus (USB) host drivers are disclosed. In one aspect, USB packet processing that was historically done on an application processor is moved to a distributed USB driver running in parallel on a low-power processor such as a digital signal processor (DSP). While a DSP is particularly contemplated, other processors may also be used. Further, a communication path is provided from the low-power processor to USB hardware that bypasses the application processor. Bypassing the application processor in this fashion allows the application processor to remain in a sleep mode for longer periods of time instead of processing digital data received from the low-power processor or the USB hardware. Further, by bypassing the application processor, latency is reduced, which improves the listener experience.
    Type: Application
    Filed: June 23, 2017
    Publication date: December 28, 2017
    Inventors: Ameya Kulkarni, Andrew Cheung, Jay Yu Jae Choi, Daniel Hyongkyu Kim, Hemant Kumar, Vamsi Krishna Samavedam
  • Publication number: 20170346735
    Abstract: A method and a system is disclosed herein for co-operative on-path and off-path caching policy for information centric networks (ICN). In an embodiment, a computer implemented method and system is provided for cooperative on-path and off-path caching policy for information centric networks in which the edge routers or on-path routers optimally store the requested ICN contents and are supported by a strategically placed central off-path cache router for additional level of caching. A heuristic mechanism has also been provided to offload and to optimally store the contents from the on-path routers to off-path central cache router. The present scheme optimally stores the requested ICN contents either in the on-path edge routers or in strategically located off-path central cache router. The present scheme also ensures optimal formulation resulting in reduced cache duplication, delay and network usage.
    Type: Application
    Filed: February 2, 2017
    Publication date: November 30, 2017
    Applicant: Tata Consultancy Services Limited
    Inventors: Hemant Kumar RATH, Bighnaraj PANIGRAHI, Anantha SIMHA
  • Publication number: 20170335167
    Abstract: Methods of treating a subterranean formation penetrated by a well bore, by providing a treatment fluid comprising non-homogeneous particulates including a degradable material and a hydrolysis catalyst; by introducing the treatment fluid into the well bore; and by creating a plug with the treatment fluid.
    Type: Application
    Filed: November 10, 2015
    Publication date: November 23, 2017
    Inventors: Zinaida Yurievna USOVA, Shitong S. ZHU, Bruno LECERF, Hemant Kumar Jethalal LADVA
  • Patent number: 9826033
    Abstract: Redirecting message flows to bypass load balancers. A destination intermediary receives a source-side message that includes a virtual address of a load balancer as a destination, and that is augmented to include a network address of a destination machine as a destination. The destination intermediary determines that a source intermediary should address subsequent network messages that originate from a source machine and that are associated with the same multi-message flow to the destination machine while bypassing the load balancer. The destination intermediary modifies the source-side message so the destination for the source-side message addresses the destination machine, and passes the modified source-side message to the destination machine.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: November 21, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hemant Kumar, Parveen Kumar Patel, Deepak Bansal
  • Patent number: 9825990
    Abstract: Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS attacks. A DDoS attack mitigation appliance of multiple mitigation appliances controlled by a DDoS attack mitigation central controller receives DDoS attack mitigation policies through a network connecting the controller and the mitigation appliance. A DDoS attack is mitigated by the mitigation appliance based on the received mitigation policies. The mitigation policies are generated by the controller based on granular behavioral packet rate thresholds estimated based on granular traffic rate information collected from one or more of the multiple mitigation appliances controlled by the controller.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: November 21, 2017
    Assignee: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Patent number: 9815234
    Abstract: An injection molding machine includes a base, a stationary platen fixed to the base for holding a first mold section, and a moving platen for holding a second mold section. The moving platen is slidably supported on a platen slide surface fixed to the base and moveable along a machine axis between a mold closed position, in which the moving platen is drawn towards the stationary platen, and a maximum daylight position, in which the moveable platen is spaced axially apart from the stationary platen by a platen opening. The machine further includes a carriage support structure slidably supporting a stack mold carriage for holding a mold center section. The stack mold carriage is translatable parallel to the machine axis between a carriage advanced position and a carriage retracted position spaced axially apart from the carriage advanced position by a carriage stroke length.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: November 14, 2017
    Assignee: ATHENA AUTOMATION LTD
    Inventors: Robert D. Schad, Carsten Link, Hemant Kumar
  • Patent number: 9807540
    Abstract: Methods, systems, and devices are described for peer-to-peer (P2P) group owner (GO) multi-channel concurrent (MCC) operation and an associated absence period indication for legacy client devices. In some aspects, an absence period during which a peer-to-peer (P2P) group owner (GO) is unavailable to receive transmissions from client devices wirelessly coupled with the P2P GO may be identified. A notice of absence (NoA) may be transmitted by the P2P GO, the P2P NoA indicating the absence period if the client devices wirelessly coupled with the P2P GO include a P2P client device that supports a P2P protocol. A legacy wireless beacon may be transmitted by the P2P GO, the legacy wireless beacon comprising an information element (IE) indicating the absence period if the client devices wirelessly coupled with the P2P GO include a legacy client device that does not support the P2P protocol.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: October 31, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Sougat Ray, Sunit Pujari, Hemant Kumar Sahoo, Imran Ansari
  • Publication number: 20170302698
    Abstract: Methods and systems for a scalable solution to behavioral Distributed Denial of Service (DDoS) attacks targeting a network are provided. According to one embodiment, a method to determine the scaling treatment is provided for various granular layer parameters of the Open System Interconnection (OSI) model for communication systems. A hardware-based apparatus helps identify packet rates and determine packet rate thresholds through continuous and adaptive learning with multiple DDoS attack mitigation components. The system can be scaled up by stacking multiple DDoS attack mitigation components to provide protection against large scale DDoS attacks by distributing load across these stacked components.
    Type: Application
    Filed: June 30, 2017
    Publication date: October 19, 2017
    Applicant: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Patent number: 9781607
    Abstract: System(s) and method(s) for network resource optimization in a service area of a communication network are described. The method includes dividing a service area into a plurality of sub-areas, where each of the plurality of sub-areas is serviced by at least one network resource from a pre-determined number of network resources. The method further includes determining a locally optimal deployment solution comprising at least one local allocation attribute for the at least one network resource in each of the plurality of sub-areas, to meet a plurality of objectives for network resource optimization. The method further includes obtaining a globally optimal deployment solution comprising at least one global allocation attribute for allocation of the pre-determined number of network resources in the service area, based on the locally optimal deployment solution to meet the plurality of objectives.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: October 3, 2017
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Hemant Kumar Rath, K N R Surya Vara Prasad, Vishvesh Revoori, Anantha Simha
  • Patent number: 9781033
    Abstract: Methods and systems for providing requested content to a user device in an Overlay Information Centric Network (O-ICN) architecture are disclosed herein. The method may include receiving a request for accessing content, from the user device. The request is routed to the ICN manager from an ICN router. The method may also include parsing the request to determine whether the request is an ICN based request. The ICN-based request is associated with a flag. Further, the method includes based on the determination, identifying at least one network entity hosting the requested content. The identification is based on a name of the content. The method also includes sending a notification to the at least one identified network entity for providing the requested content to the user device.
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: October 3, 2017
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Samar Shailendra, Bighnaraj Panigrahi, Hemant Kumar Rath, Anantha Simha
  • Publication number: 20170264646
    Abstract: Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for controlling multiple distributed denial of service (DDoS) mitigation appliances. A DDoS attack mitigation central controller configures attack mitigation policies for the DDoS attack mitigation appliances. The DDoS attack mitigation policies are sent to the DDoS attack mitigation appliances through a network connecting the DDoS attack mitigation central controller and the DDoS attack mitigation appliances.
    Type: Application
    Filed: May 31, 2017
    Publication date: September 14, 2017
    Applicant: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Publication number: 20170264638
    Abstract: Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS attacks. A DDoS attack mitigation appliance of multiple mitigation appliances controlled by a DDoS attack mitigation central controller receives DDoS attack mitigation policies through a network connecting the controller and the mitigation appliance. A DDoS attack is mitigated by the mitigation appliance based on the received mitigation policies. The mitigation policies are generated by the controller based on granular behavioral packet rate thresholds estimated based on granular traffic rate information collected from one or more of the multiple mitigation appliances controlled by the controller.
    Type: Application
    Filed: May 31, 2017
    Publication date: September 14, 2017
    Applicant: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Publication number: 20170257348
    Abstract: Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to one embodiment, header, state, rate and content anomalies are prevented and network policy enforcement is provided for session initiation protocol (SIP). A hardware-based apparatus helps identify SIP rate-thresholds through continuous and adaptive learning. The apparatus can determine SIP header and SIP state anomalies and drop packets containing those anomalies. SIP requests and responses are inspected for known malicious contents using a Content Inspection Engine. The apparatus integrates advantageous solutions to prevent anomalous packets and enables a policy based packet filter for SIP.
    Type: Application
    Filed: May 24, 2017
    Publication date: September 7, 2017
    Applicant: Fortinet, Inc.
    Inventors: Hemant Kumar Jain, Venkata Yallapragada, Bhavin Shah, Radhika Palepu
  • Patent number: 9742800
    Abstract: Systems and methods for software defined behavioral DDoS attack mitigation are provided. According to one embodiment, a method is provided for mitigating DDoS attacks. A DDoS attack mitigation appliance of multiple mitigation appliances controlled by a DDoS attack mitigation central controller receives DDoS attack mitigation policies through a network connecting the controller and the mitigation appliance. A DDoS attack is mitigated by the mitigation appliance based on the received mitigation policies. The mitigation policies are generated by the controller based on granular behavioral packet rate thresholds estimated based on granular traffic rate information collected from one or more of the multiple mitigation appliances controlled by the controller.
    Type: Grant
    Filed: December 31, 2016
    Date of Patent: August 22, 2017
    Assignee: Fortinet, Inc.
    Inventor: Hemant Kumar Jain
  • Publication number: 20170237657
    Abstract: A method and a system is disclosed herein for co-operative on-path and off-path caching policy for information centric networks (ICN). In an embodiment, a computer implemented method and system is provided for cooperative on-path and off-path caching policy for information centric networks in which the edge routers or on-path routers optimally store the requested ICN contents and are supported by a strategically placed central off-path cache router for additional level of caching. A heuristic mechanism has also been provided to offload and to optimally store the contents from the on-path routers to off-path central cache router. The present scheme optimally stores the requested ICN contents either in the on-path edge routers or in strategically located off-path central cache router. The present scheme also ensures optimal formulation resulting in reduced cache duplication, delay and network usage.
    Type: Application
    Filed: February 2, 2017
    Publication date: August 17, 2017
    Applicant: Tata Consultancy Services Limited
    Inventors: Hemant Kumar RATH, Bighnaraj PANIGRAHI, Anantha SIMHA