Patents by Inventor Kausum Kumar

Kausum Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11086700
    Abstract: A simplified mechanism to deploy and control a multi-segmented application by using application-based manifests that express how application segments of the multi-segment application are to be defined or modified, and how the communication profiles between these segments. These manifests are application specific. Also, in some cases, deployment managers in a software defined datacenter (SDDC) provide these manifests as templates to administrators, who can use these templates to express their intent when they are deploying multi-segment applications in the datacenter. Application-based manifests can also be used to control previously deployed multi-segmented applications in the SDDC. Using such manifests would enable the administrators to be able to manage fine grained micro-segmentation rules based on endpoint and network attributes.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: August 10, 2021
    Assignee: VMWARE, INC.
    Inventors: Sirisha Myneni, Arijit Chanda, Laxmikant Vithal Gunda, Arnold Poon, Farzad Ghannadian, Kausum Kumar
  • Publication number: 20210226845
    Abstract: Some embodiments provide a method for visualizing a realization status of configuration changes for a set of logical entities of a logical network. The method generates a first presentation of a list of logical entities and a realization status for each logical entity in the list, where the realization status indicates whether all configuration changes for the logical entity have been realized. In response to a selection of a particular logical entity in the displayed list for which at least one configuration change has not been realized, the method generates a second presentation comprising a view of pending configuration changes for the selected particular logical entity.
    Type: Application
    Filed: December 23, 2020
    Publication date: July 22, 2021
    Inventors: Kapil Goyal, W. Andrew Lambeth, Tea Liukkonen-Olmiala, Kausum Kumar
  • Publication number: 20210184914
    Abstract: Example methods and systems are provided for network diagnosis. One example method may comprise: detecting an egress packet and determining whether each of multiple network issues is detected for the egress packet or a datapath between a first virtualized computing instance and a second virtualized computing instance. The method may also comprise: generating network diagnosis code information specifying whether each of the multiple network issues is detected or not detected; generating an encapsulated packet by encapsulating the egress packet with an outer header that specifies the network diagnosis code information; and sending the encapsulated packet towards the second virtualized computing instance to cause a second computer system to perform one or more remediation actions based on the network diagnosis code information.
    Type: Application
    Filed: December 16, 2019
    Publication date: June 17, 2021
    Applicant: VMware, Inc.
    Inventors: Sirisha MYNENI, Kausum KUMAR, Nafisa MANDLIWALA, Venkatakrishnan RAJAGOPALAN
  • Publication number: 20210026677
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance and providing visual representations of the data to a user. Some embodiments provide a visual representation of the collected data that allows a user to select a set of machines and flows and initiate recommendation generation based on the selected machines and flows. The recommendation generation, in some embodiments, includes identifying flows for which rules have not been defined and filtering the identified rules to remove flows for which rules should not be defined. Some embodiments use the identified rues to identify services and groups associated with the rules and generate recommendations for rules, groups and services based on the identified flows, groups and services. The recommendations, in some embodiments, are implemented as a single PATCH API.
    Type: Application
    Filed: August 28, 2019
    Publication date: January 28, 2021
    Inventors: Sunitha Krishna, Kausum Kumar, Rajiv Mordani, Ashish Shendure, Ashish Patel, Farzad Ghannadian
  • Publication number: 20210029166
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance and providing visual representations of the data to a user. Some embodiments provide a visual representation of the collected data that allows a user to select a set of machines and flows and initiate recommendation generation based on the selected machines and flows. The recommendation generation, in some embodiments, includes identifying flows for which rules have not been defined and filtering the identified rules to remove flows for which rules should not be defined. Some embodiments use the identified rues to identify services and groups associated with the rules and generate recommendations for rules, groups and services based on the identified flows, groups and services. The recommendations, in some embodiments, are implemented as a single PATCH API.
    Type: Application
    Filed: August 28, 2019
    Publication date: January 28, 2021
    Inventors: Sunitha Krishna, Kausum Kumar, Rajiv Mordani, Radha Popuri, Kavya Kambi Ravi, Ankur Saran, Farzad Ghannadian
  • Publication number: 20210006542
    Abstract: Behavior-based security in a datacenter includes monitoring user actions made by users in the datacenter. Behavior-based risk scores are computer for users based on their monitored actions. One or more firewall rules are generated for users based on their behavior-based risk scores. The firewall rules regulate the actions of the users.
    Type: Application
    Filed: July 2, 2019
    Publication date: January 7, 2021
    Inventors: Sirisha Myneni, Rajiv Mordani, Kausum Kumar
  • Patent number: 10628144
    Abstract: Some embodiments provide a simplified mechanism to deploy and control a multi-segmented application by using application-based manifests that express how application segments of the multi-segment application are to be defined or modified, and how the communication profiles between these segments. In some embodiments, these manifests are application specific. Also, in some embodiments, deployment managers in a software defined datacenter (SDDC) provide these manifests as templates to administrators, who can use these templates to express their intent when they are deploying multi-segment applications in the datacenter. Application-based manifests can also be used to control previously deployed multi-segmented applications in the SDDC. Using such manifests would enable the administrators to be able to manage fine grained micro-segmentation rules based on endpoint and network attributes.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: April 21, 2020
    Assignee: VMWARE, INC.
    Inventors: Sirisha Myneni, Arijit Chanda, Laxmikant Vithal Gunda, Arnold Poon, Farzad Ghannadian, Kausum Kumar
  • Publication number: 20200120069
    Abstract: The technology disclosed herein enables the enforcement of firewall policies based on high level identification strings. In a particular embodiment, a method provides receiving a first reply from a first identification system directed to a requestor system. In response to determining that the first identification system comprises an identification system trusted by the firewall, the method provides inspecting at least one packet included in the first reply to identify a first network address therein associated with a first high level identification string. The method further provides updating a data structure comprising allowed network addresses with the first network address and, after updating the data structure with the first network address, allowing at least one packet from the requestor system directed to a first destination at the first network address to traverse the firewall system based on the data structure.
    Type: Application
    Filed: December 13, 2019
    Publication date: April 16, 2020
    Inventors: Jayant Jain, Kausum Kumar, Anirban Sengupta, Rick Lund, Jingmin Zhou
  • Publication number: 20200065080
    Abstract: Some embodiments provide a simplified mechanism to deploy and control a multi-segmented application by using application-based manifests that express how application segments of the multi-segment application are to be defined or modified, and how the communication profiles between these segments. In some embodiments, these manifests are application specific. Also, in some embodiments, deployment managers in a software defined datacenter (SDDC) provide these manifests as templates to administrators, who can use these templates to express their intent when they are deploying multi-segment applications in the datacenter. Application-based manifests can also be used to control previously deployed multi-segmented applications in the SDDC. Using such manifests would enable the administrators to be able to manage fine grained micro-segmentation rules based on endpoint and network attributes.
    Type: Application
    Filed: August 24, 2018
    Publication date: February 27, 2020
    Inventors: Sirisha Myneni, Arijit Chanda, Laxmikant Vithal Gunda, Arnold Poon, Farzad Ghannadian, Kausum Kumar
  • Publication number: 20200065166
    Abstract: Some embodiments provide a simplified mechanism to deploy and control a multi-segmented application by using application-based manifests that express how application segments of the multi-segment application are to be defined or modified, and how the communication profiles between these segments. In some embodiments, these manifests are application specific. Also, in some embodiments, deployment managers in a software defined datacenter (SDDC) provide these manifests as templates to administrators, who can use these templates to express their intent when they are deploying multi-segment applications in the datacenter. Application-based manifests can also be used to control previously deployed multi-segmented applications in the SDDC. Using such manifests would enable the administrators to be able to manage fine grained micro-segmentation rules based on endpoint and network attributes.
    Type: Application
    Filed: August 24, 2018
    Publication date: February 27, 2020
    Inventors: Sirisha Myneni, Arijit Chanda, Laxmikant Vithal Gunda, Arnold Poon, Farzad Ghannadian, Kausum Kumar
  • Publication number: 20200014662
    Abstract: A system and method for performing firewall operations on an edge service gateway virtual machine that monitors traffic for a network. The method includes detecting, from a directory service executing on a computing device, a login event on the computing device, obtaining, from the detected login event, login event information comprising an identifier that identifies a user associated with the login event, storing the login event information as one or more context attributes in an attribute table, and applying a firewall rule to a data message that corresponds to the one or more context attributes.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Arijit Chanda, Sirisha Myneni, Arnold Poon, Kausum Kumar, Dhivya Srinivasan
  • Patent number: 10530750
    Abstract: The technology disclosed herein enables the enforcement of firewall policies based on high level identification strings. In a particular embodiment, a method provides receiving a first reply from a first identification system directed to a requestor system. In response to determining that the first identification system comprises an identification system trusted by the firewall, the method provides inspecting at least one packet included in the first reply to identify a first network address therein associated with a first high level identification string. The method further provides updating a data structure comprising allowed network addresses with the first network address and, after updating the data structure with the first network address, allowing at least one packet from the requestor system directed to a first destination at the first network address to traverse the firewall system based on the data structure.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: January 7, 2020
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Kausum Kumar, Anirban Sengupta, Rick Lund, Jingmin Zhou
  • Publication number: 20190342346
    Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.
    Type: Application
    Filed: July 20, 2019
    Publication date: November 7, 2019
    Inventors: Jayant Jain, Anirban Sengupta, Srinivas Nimmagadda, Alok S. Tiagi, Kausum Kumar
  • Patent number: 10051002
    Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.
    Type: Grant
    Filed: November 1, 2015
    Date of Patent: August 14, 2018
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Anirban Sengupta, Srinivas Nimmagadda, Alok S. Tiagi, Kausum Kumar
  • Publication number: 20180176102
    Abstract: A method for visualizing network flows of a network is provided. The method monitors network flows between a group of machines in a network. The method associates identifiers with the monitored network flows. The method aggregates the monitored network flows into a set of groups based on the associated identifiers. The method displays a set of flow records for the each group of the set of groups.
    Type: Application
    Filed: September 25, 2017
    Publication date: June 21, 2018
    Inventors: Kaushal Bansal, Uday Masurekar, Srinivas Nimmagadda, Jingmin Zhou, Abhishek Goliya, Amit Chopra, Kausum Kumar
  • Publication number: 20180167363
    Abstract: The technology disclosed herein enables the enforcement of firewall policies based on high level identification strings. In a particular embodiment, a method provides receiving a first reply from a first identification system directed to a requestor system. In response to determining that the first identification system comprises an identification system trusted by the firewall, the method provides inspecting at least one packet included in the first reply to identify a first network address therein associated with a first high level identification string. The method further provides updating a data structure comprising allowed network addresses with the first network address and, after updating the data structure with the first network address, allowing at least one packet from the requestor system directed to a first destination at the first network address to traverse the firewall system based on the data structure.
    Type: Application
    Filed: December 14, 2016
    Publication date: June 14, 2018
    Inventors: Jayant Jain, Kausum Kumar, Anirban Sengupta, Rick Lund, Jingmin Zhou
  • Patent number: 9906561
    Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.
    Type: Grant
    Filed: November 1, 2015
    Date of Patent: February 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Anirban Sengupta, Srinivas Nimmagadda, Alok S. Tiagi, Kausum Kumar
  • Patent number: 9906562
    Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.
    Type: Grant
    Filed: November 1, 2015
    Date of Patent: February 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Anirban Sengupta, Srinivas Nimmagadda, Alok S. Tiagi, Kausum Kumar
  • Patent number: 9906560
    Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.
    Type: Grant
    Filed: November 1, 2015
    Date of Patent: February 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Anirban Sengupta, Srinivas Nimmagadda, Alok S. Tiagi, Kausum Kumar
  • Patent number: 9894103
    Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.
    Type: Grant
    Filed: November 1, 2015
    Date of Patent: February 13, 2018
    Assignee: NICIRA, INC.
    Inventors: Leung Tao Kwok, Sulay Shah, Craig Newell, Adam Rykowski, Sridhar Kommireddy, Utkarsh Singh, Sagar Date, Kausum Kumar, Anirban Sengupta, Srinivas Nimmagadda, Jayant Jain, Uday Masurekar, Ravishankar Chamarajnagar