Patents by Inventor Jyoti Verma

Jyoti Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11233742
    Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.
    Type: Grant
    Filed: November 5, 2019
    Date of Patent: January 25, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Samir Dilipkumar Saklikar, Jayaraman Iyer, Robin Edgard Martherus, Morteza Ansari, Jyoti Verma
  • Publication number: 20210135995
    Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.
    Type: Application
    Filed: November 5, 2019
    Publication date: May 6, 2021
    Inventors: Samir Dilipkumar Saklikar, Jayaraman Iyer, Robin Edgard Martherus, Morteza Ansari, Jyoti Verma
  • Patent number: 10313396
    Abstract: Techniques are provided by which devices in a network may subscribe to a rapidly changing rules in central threat repository. The policies associated with threats are filtered so that just current attack vectors from within subnets learned via routing and/or forwarding information (at the network level of the network) are installed in the local access control list/policy database of the network devices. As routing changes occur, the list of applied policies are continually refined/revisited and pulled from a central security application. Publish/subscribe mechanisms ensure “zombie” policies are not left over in the device after reboot or routing changes occur.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: June 4, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Eric A. Voit, Jyoti Verma
  • Patent number: 10296744
    Abstract: A method and related apparatus for performing inspection of flows within a software defined network includes monitoring an indicator indicative of a presence of malware in a selected flow in an electronic communications network, when the indicator suggests the presence of malware in the selected flow, requesting a network device to redirect the selected flow, or to copy the selected flow and send a resulting copy of the selected flow, to a security appliance, and causing the security appliance to be reconfigured in response to the indicator that suggest the presence of malware in the selected flow.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: May 21, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Kenneth S. Beck, Jyoti Verma, Jason R. Brvenik
  • Publication number: 20180139240
    Abstract: Techniques are provided by which devices in a network may subscribe to a rapidly changing rules in central threat repository. The policies associated with threats are filtered so that just current attack vectors from within subnets learned via routing and/or forwarding information (at the network level of the network) are installed in the local access control list/policy database of the network devices. As routing changes occur, the list of applied policies are continually refined/revisited and pulled from a central security application. Publish/subscribe mechanisms ensure “zombie” policies are not left over in the device after reboot or routing changes occur.
    Type: Application
    Filed: March 31, 2017
    Publication date: May 17, 2018
    Inventors: Eric A. Voit, Jyoti Verma