Patents by Inventor Krishna Kondaka
Krishna Kondaka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9077772Abstract: In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator restarts. The authenticator also maintains a persistent per-supplicant value for each supplicant of the authenticator, each per-supplicant value set to a current value of the authenticator epoch value each time the corresponding supplicant establishes a new security association with the authenticator. To communicate messages from the authenticator to a particular supplicant, each message uses a per-supplicant replay counter having a security association epoch counter and a message counter specific to the particular supplicant. In particular, the security association epoch counter for each message is set as a difference between the authenticator epoch value and the per-supplicant value for the particular supplicant when the message is communicated, while the message counter is incremented for each message communicated.Type: GrantFiled: April 20, 2012Date of Patent: July 7, 2015Assignee: Cisco Technology, Inc.Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
-
Patent number: 8800010Abstract: In one embodiment, each security protocol supplicant in a computer network determines its group temporal key (GTK) state, and exchanges the GTK state with one or more neighbor supplicants in the computer network. Based on the exchange, a supplicant may determine whether any inconsistencies exist in its GTK state, and in response to any inconsistencies in the GTK state, may perform a GTK state synchronization with a security protocol authenticator by indicating to the authenticator what is needed to resolve the inconsistent GTK state at the particular supplicant. In another embodiment, the authenticator, which is configured to not store per-supplicant GTK state, may transmit beacons containing GTK identifiers (IDs) of GTKs currently enabled on the authenticator, and also responds to supplicants having inconsistent GTK states with one or more needed GTKs as indicated by the supplicants.Type: GrantFiled: April 20, 2012Date of Patent: August 5, 2014Assignee: Cisco Technology, Inc.Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
-
Publication number: 20130283347Abstract: In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator restarts. The authenticator also maintains a persistent per-supplicant value for each supplicant of the authenticator, each per-supplicant value set to a current value of the authenticator epoch value each time the corresponding supplicant establishes a new security association with the authenticator. To communicate messages from the authenticator to a particular supplicant, each message uses a per-supplicant replay counter having a security association epoch counter and a message counter specific to the particular supplicant. In particular, the security association epoch counter for each message is set as a difference between the authenticator epoch value and the per-supplicant value for the particular supplicant when the message is communicated, while the message counter is incremented for each message communicated.Type: ApplicationFiled: April 20, 2012Publication date: October 24, 2013Applicant: Cisco Technology, Inc.Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
-
Publication number: 20130283360Abstract: In one embodiment, each security protocol supplicant in a computer network determines its group temporal key (GTK) state, and exchanges the GTK state with one or more neighbor supplicants in the computer network. Based on the exchange, a supplicant may determine whether any inconsistencies exist in its GTK state, and in response to any inconsistencies in the GTK state, may perform a GTK state synchronization with a security protocol authenticator by indicating to the authenticator what is needed to resolve the inconsistent GTK state at the particular supplicant. In another embodiment, the authenticator, which is configured to not store per-supplicant GTK state, may transmit beacons containing GTK identifiers (IDs) of GTKs currently enabled on the authenticator, and also responds to supplicants having inconsistent GTK states with one or more needed GTKs as indicated by the supplicants.Type: ApplicationFiled: April 20, 2012Publication date: October 24, 2013Applicant: Cisco Technology, Inc.Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
-
Patent number: 7860125Abstract: In an example embodiment, an apparatus comprising a physical layer processing device that comprises logic configured to process a packet received from a physical layer interface is disclosed. The physical layer processing device logic is further configured to determine a preamble portion of the packet and a data portion of the packet. The physical layer processing device logic is further configured to insert a timestamp into the preamble portion of the packet. The physical layer processing device logic forwards the packet with the timestamp inserted into the preamble.Type: GrantFiled: January 28, 2008Date of Patent: December 28, 2010Assignee: Cisco Techology, Inc.Inventors: Amrik Bains, Daniel C. Biederman, Darrell Rice Heflin, Norman William Finn, Krishna Kondaka, Peter Geoffrey Jones
-
Publication number: 20090190589Abstract: In an example embodiment, an apparatus comprising a physical layer processing device that comprises logic configured to process a packet received from a physical layer interface is disclosed. The physical layer processing device logic is further configured to determine a preamble portion of the packet and a data portion of the packet. The physical layer processing device logic is further configured to insert a timestamp into the preamble portion of the packet. The physical layer processing device logic forwards the packet with the timestamp inserted into the preamble.Type: ApplicationFiled: January 28, 2008Publication date: July 30, 2009Inventors: Amrik Bains, Daniel C. Biederman, Darrell Rice Heflin, Norman William Finn, Krishna Kondaka, Peter Geoffrey Jones
-
Patent number: 6748429Abstract: Method for enabling the dynamic modification of cluster configurations, and apparatus including software to perform the method. To enable this dynamic modification, cluster configuration data is stored as a table in a cluster configuration repository that is accessible from all nodes in the cluster. Accordingly, the present invention enables the modification of the cluster configuration from any node in the cluster dynamically. When a reconfiguration command is given, the configuration table is changed and all the nodes in the cluster are notified of the changed configuration in parallel. Following the notification by the nodes of the changed cluster configuration, the changes to the cluster are implemented dynamically as specified by the command.Type: GrantFiled: January 10, 2000Date of Patent: June 8, 2004Assignee: Sun Microsystems, Inc.Inventors: Madhusudhan Talluri, Bart Smaalders, Sundeep Panicker, Krishna Kondaka
-
Patent number: 6411395Abstract: Apparatus and method for performing hierarchial type mask encoding and data transformation includes locating a data source, loading the data source into a temporary storage, encoding heuristics for buffer transformation, and delivery of data for transformation and scalar type encoding, reduction, compression, iteration, type extension and versioning if required.Type: GrantFiled: October 30, 1998Date of Patent: June 25, 2002Assignee: International Business Machines CorporationInventors: Peter Carl Bahrs, Krishna Kondaka
-
Patent number: 6021259Abstract: Apparatus and method for performing hierarchial type mask encoding and data transformation includes locating a data source, loading the data source into a temporary storage, encoding hierarchical heuristics for buffer transformation, and delivery of data for transformation and scalar type encoding, reduction, compression, iteration, type extension and versioning if required.Type: GrantFiled: July 23, 1997Date of Patent: February 1, 2000Assignee: International Business Machines CorporationInventors: Peter Carl Bahrs, Krishna Kondaka