Patents by Inventor Krishna Kondaka

Krishna Kondaka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9077772
    Abstract: In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator restarts. The authenticator also maintains a persistent per-supplicant value for each supplicant of the authenticator, each per-supplicant value set to a current value of the authenticator epoch value each time the corresponding supplicant establishes a new security association with the authenticator. To communicate messages from the authenticator to a particular supplicant, each message uses a per-supplicant replay counter having a security association epoch counter and a message counter specific to the particular supplicant. In particular, the security association epoch counter for each message is set as a difference between the authenticator epoch value and the per-supplicant value for the particular supplicant when the message is communicated, while the message counter is incremented for each message communicated.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: July 7, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
  • Patent number: 8800010
    Abstract: In one embodiment, each security protocol supplicant in a computer network determines its group temporal key (GTK) state, and exchanges the GTK state with one or more neighbor supplicants in the computer network. Based on the exchange, a supplicant may determine whether any inconsistencies exist in its GTK state, and in response to any inconsistencies in the GTK state, may perform a GTK state synchronization with a security protocol authenticator by indicating to the authenticator what is needed to resolve the inconsistent GTK state at the particular supplicant. In another embodiment, the authenticator, which is configured to not store per-supplicant GTK state, may transmit beacons containing GTK identifiers (IDs) of GTKs currently enabled on the authenticator, and also responds to supplicants having inconsistent GTK states with one or more needed GTKs as indicated by the supplicants.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: August 5, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
  • Publication number: 20130283347
    Abstract: In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator restarts. The authenticator also maintains a persistent per-supplicant value for each supplicant of the authenticator, each per-supplicant value set to a current value of the authenticator epoch value each time the corresponding supplicant establishes a new security association with the authenticator. To communicate messages from the authenticator to a particular supplicant, each message uses a per-supplicant replay counter having a security association epoch counter and a message counter specific to the particular supplicant. In particular, the security association epoch counter for each message is set as a difference between the authenticator epoch value and the per-supplicant value for the particular supplicant when the message is communicated, while the message counter is incremented for each message communicated.
    Type: Application
    Filed: April 20, 2012
    Publication date: October 24, 2013
    Applicant: Cisco Technology, Inc.
    Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
  • Publication number: 20130283360
    Abstract: In one embodiment, each security protocol supplicant in a computer network determines its group temporal key (GTK) state, and exchanges the GTK state with one or more neighbor supplicants in the computer network. Based on the exchange, a supplicant may determine whether any inconsistencies exist in its GTK state, and in response to any inconsistencies in the GTK state, may perform a GTK state synchronization with a security protocol authenticator by indicating to the authenticator what is needed to resolve the inconsistent GTK state at the particular supplicant. In another embodiment, the authenticator, which is configured to not store per-supplicant GTK state, may transmit beacons containing GTK identifiers (IDs) of GTKs currently enabled on the authenticator, and also responds to supplicants having inconsistent GTK states with one or more needed GTKs as indicated by the supplicants.
    Type: Application
    Filed: April 20, 2012
    Publication date: October 24, 2013
    Applicant: Cisco Technology, Inc.
    Inventors: Jonathan W. Hui, Anjum Ahuja, Krishna Kondaka, Wei Hong
  • Patent number: 7860125
    Abstract: In an example embodiment, an apparatus comprising a physical layer processing device that comprises logic configured to process a packet received from a physical layer interface is disclosed. The physical layer processing device logic is further configured to determine a preamble portion of the packet and a data portion of the packet. The physical layer processing device logic is further configured to insert a timestamp into the preamble portion of the packet. The physical layer processing device logic forwards the packet with the timestamp inserted into the preamble.
    Type: Grant
    Filed: January 28, 2008
    Date of Patent: December 28, 2010
    Assignee: Cisco Techology, Inc.
    Inventors: Amrik Bains, Daniel C. Biederman, Darrell Rice Heflin, Norman William Finn, Krishna Kondaka, Peter Geoffrey Jones
  • Publication number: 20090190589
    Abstract: In an example embodiment, an apparatus comprising a physical layer processing device that comprises logic configured to process a packet received from a physical layer interface is disclosed. The physical layer processing device logic is further configured to determine a preamble portion of the packet and a data portion of the packet. The physical layer processing device logic is further configured to insert a timestamp into the preamble portion of the packet. The physical layer processing device logic forwards the packet with the timestamp inserted into the preamble.
    Type: Application
    Filed: January 28, 2008
    Publication date: July 30, 2009
    Inventors: Amrik Bains, Daniel C. Biederman, Darrell Rice Heflin, Norman William Finn, Krishna Kondaka, Peter Geoffrey Jones
  • Patent number: 6748429
    Abstract: Method for enabling the dynamic modification of cluster configurations, and apparatus including software to perform the method. To enable this dynamic modification, cluster configuration data is stored as a table in a cluster configuration repository that is accessible from all nodes in the cluster. Accordingly, the present invention enables the modification of the cluster configuration from any node in the cluster dynamically. When a reconfiguration command is given, the configuration table is changed and all the nodes in the cluster are notified of the changed configuration in parallel. Following the notification by the nodes of the changed cluster configuration, the changes to the cluster are implemented dynamically as specified by the command.
    Type: Grant
    Filed: January 10, 2000
    Date of Patent: June 8, 2004
    Assignee: Sun Microsystems, Inc.
    Inventors: Madhusudhan Talluri, Bart Smaalders, Sundeep Panicker, Krishna Kondaka
  • Patent number: 6411395
    Abstract: Apparatus and method for performing hierarchial type mask encoding and data transformation includes locating a data source, loading the data source into a temporary storage, encoding heuristics for buffer transformation, and delivery of data for transformation and scalar type encoding, reduction, compression, iteration, type extension and versioning if required.
    Type: Grant
    Filed: October 30, 1998
    Date of Patent: June 25, 2002
    Assignee: International Business Machines Corporation
    Inventors: Peter Carl Bahrs, Krishna Kondaka
  • Patent number: 6021259
    Abstract: Apparatus and method for performing hierarchial type mask encoding and data transformation includes locating a data source, loading the data source into a temporary storage, encoding hierarchical heuristics for buffer transformation, and delivery of data for transformation and scalar type encoding, reduction, compression, iteration, type extension and versioning if required.
    Type: Grant
    Filed: July 23, 1997
    Date of Patent: February 1, 2000
    Assignee: International Business Machines Corporation
    Inventors: Peter Carl Bahrs, Krishna Kondaka