Patents by Inventor Parveen Kumar
Parveen Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160050116Abstract: Various embodiments of methods and systems for network infrastructure configuration based on network device configuration templates are provided. A network device configuration template is received where the network device configuration template corresponds to network device configuration data based on template elements. Template elements include variable placeholders, versions, Stock Keeping Units (SKUs), firmware, and target devices identified in the network device configuration template. Values for the template elements are referenced from a dataset storage component. The network device configuration data are classified into different classification units. The network device configuration data are merged with the network device configuration template that programmatically defines configuration of network devices. A network device configuration instance is generated based on evaluating the template elements and replacing template elements with values from the dataset storage.Type: ApplicationFiled: April 7, 2015Publication date: February 18, 2016Inventors: SANDEEP KOUSHIK SHESHADRI, PARVEEN KUMAR PATEL, VARUN VENKATESH, NISHEETH SRIVASTAVA
-
Publication number: 20160043951Abstract: Embodiments are directed to routing requests with different protocols to the same destination. In one scenario, a computer system receives a request that uses a specified protocol. The request includes a request source identifier and a request destination identifier. The computer system identifies, based on both the request source identifier and the request destination identifier, a destination to send the request to and generates a routing entry for the request that indicates which destination the first request was sent to. The computer system receives another request that uses a different protocol. This request includes a request source identifier and a request destination identifier of its own. The computer system determines that the request source identifier and request destination identifier of the subsequent request match those of the generated routing entry, and routes the subsequent request to the destination indicated in the routing entry.Type: ApplicationFiled: August 8, 2014Publication date: February 11, 2016Inventors: Nelamangala Krishnaswamy Srinivas, Narayanan Annamalai, Parveen Kumar Patel, Marios Zikos, Narasimhan Agrahara Venkataramaiah
-
Publication number: 20160026505Abstract: When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address.Type: ApplicationFiled: July 21, 2015Publication date: January 28, 2016Inventors: Ashwin Murthy, Parveen Kumar Patel, Deepak Bansal, Marios Zikos
-
Patent number: 9246998Abstract: Bypassing a load balancer that initially appeared in a multi-message flow from a source machine served by a source intermediary and a target machine served on a target intermediary. One or more original network messages (and perhaps just the first) of the flow arrive from the source intermediary at the load balancer, which selects which machine is to be a destination machine, and it turns out selects the destination machine serviced by the destination intermediary. In response to receiving this message, the destination intermediary instructs the source intermediary to transmit subsequent messages in the flow in a manner that bypasses the load balancer. To facilitate this, the source intermediary may modify addressing of subsequent flow messages from the source machine such that they are rerouted to the destination machine without addressing the load balancer.Type: GrantFiled: October 16, 2012Date of Patent: January 26, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Hemant Kumar, Parveen Kumar Patel, Deepak Bansal
-
Publication number: 20150372946Abstract: The obtaining of a lease on a resource in a circumstance in which multiple lease servers are capable of granting a lease to the resource. A computing entity attempts to obtain the lease on the resource by causing a lease request to be sent to each of at least most (and perhaps all) of the lease servers. In response, the computing entity receives one or more responses to the lease requests. If the computing entity receives grants of a lease from a majority of the lease servers that are capable of granting a lease to the resource, then it is determined that the computing entity acquired a lease on the resource. On the other hand, if the computing entity receives grants of a lease from less than a majority of the lease servers, it is determined that the computing entity failed to acquire the lease on the resource.Type: ApplicationFiled: June 23, 2014Publication date: December 24, 2015Inventors: Ashwin Murthy, Parveen Kumar Patel
-
Patent number: 9092271Abstract: When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address.Type: GrantFiled: August 5, 2014Date of Patent: July 28, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ashwin Murthy, Parveen Kumar Patel, Deepak Bansal, Marios Zikos
-
Patent number: 9082093Abstract: The present invention discloses a system and method for management of test or non-production environment. The method comprises planning the non-production environment design, wherein planning is based on plurality of inputs. The planning stage is preceded by engagement wherein engagement with functional groups takes place. The planned non-production environment design is analyzed based upon the requirements wherein analysis consists of reviewing plurality of non-production environment designs. This stage is followed by creation of non-production environment wherein non-production environment is built on analyzed design. After this stage the non-production environment is deployed. After deployment there is provision for on-going supports to test services via established Information Technology service management processes. Non-production environment services manage the on-going booking and allocation of the non-production environment through various in-house and third party tools.Type: GrantFiled: May 9, 2013Date of Patent: July 14, 2015Assignee: Infosys LimitedInventors: Parveen Kumar Sharma, Soumitro Mukherjee
-
Patent number: 9055095Abstract: A load balancer that is able to detect and mitigate a Denial of Service (DOS) attack. The load balancer is placed in the flow path of network data packets that are destined for one or more tenant addresses. The load balancer analyzes performance parameters regarding the network data packets that are destined for the one or more tenant addresses and are received at the load balancer. The performance parameters describe network data packet flow to the tenant addresses. The load balancer detects, based on the analysis of the performance parameters, that one or more of the tenant addresses are being subjected to a DOS attack. The load balancer performs a mitigation operation to isolate the one or more tenant addresses being subjected to the DOS attack.Type: GrantFiled: June 14, 2013Date of Patent: June 9, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ashwin Murthy, Naveen Reddy Karri, Parveen Kumar Patel, HongYu Wu, Marios Zikos, Yagya Narayanan Sethuraman, Deepak Bansal
-
Patent number: 8941464Abstract: An access control system for a secure facility includes an authorization system having an interface, in the form of an interrogator, for receiving the request signal indicative of a user seeking authorization for a predetermined action, such as gaining access through a door. In one example, an authorization system may include an interface for receiving a request signal indicative of a party seeking authorization for a predetermined action. A first processor, that is responsive to the request signal, determines if the authorization is to be granted. If so, the first processor may generate an authorization signal that includes information that is securely coded, and which is indicative of the determination. An operating device, physically spaced from the first processor, may receive the authorization signal, and may decode the securely coded information and subsequently initiating the action, if appropriate.Type: GrantFiled: June 26, 2012Date of Patent: January 27, 2015Assignee: Honeywell International Inc.Inventor: Parveen Kumar Goel
-
Publication number: 20140373146Abstract: A load balancer that is able to detect and mitigate a Denial of Service (DOS) attack. The load balancer is placed in the flow path of network data packets that are destined for one or more tenant addresses. The load balancer analyzes performance parameters regarding the network data packets that are destined for the one or more tenant addresses and are received at the load balancer. The performance parameters describe network data packet flow to the tenant addresses. The load balancer detects, based on the analysis of the performance parameters, that one or more of the tenant addresses are being subjected to a DOS attack. The load balancer performs a mitigation operation to isolate the one or more tenant addresses being subjected to the DOS attack.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Ashwin Murthy, Naveen Reddy Karri, Parveen Kumar Patel, HongYu Wu, Marios Zikos, Yagya Narayanan Sethuraman, Deepak Bansal
-
Publication number: 20140351395Abstract: When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address.Type: ApplicationFiled: August 5, 2014Publication date: November 27, 2014Inventors: Ashwin Murthy, Parveen Kumar Patel, Deepak Bansal, Marios Zikos
-
Patent number: 8805990Abstract: When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address.Type: GrantFiled: July 12, 2012Date of Patent: August 12, 2014Assignee: Microsoft CorporationInventors: Ashwin Murthy, Parveen Kumar Patel, Deepak Bansal, Marios Zikos
-
Publication number: 20140108655Abstract: Bypassing a load balancer that initially appeared in a multi-message flow from a source machine served by a source intermediary and a target machine served on a target intermediary. One or more original network messages (and perhaps just the first) of the flow arrive from the source intermediary at the load balancer, which selects which machine is to be a destination machine, and it turns out selects the destination machine serviced by the destination intermediary. In response to receiving this message, the destination intermediary instructs the source intermediary to transmit subsequent messages in the flow in a manner that bypasses the load balancer. To facilitate this, the source intermediary may modify addressing of subsequent flow messages from the source machine such that they are rerouted to the destination machine without addressing the load balancer.Type: ApplicationFiled: October 16, 2012Publication date: April 17, 2014Applicant: MICROSOFT CORPORATIONInventors: Hemant Kumar, Parveen Kumar Patel, Deepak Bansal
-
Publication number: 20140082048Abstract: A cloud computing environment providing a network service for a client computing entity. The network service is not an application level service, but rather a service that operates at or below the network layer in the protocol stack. For instance, the network service might be a network endpoint service such as a network address service (such as DNS) or a dynamic network service (such as DHCP), or a network traffic service such as a firewall service or a secure tunneling service (such as VPN). The service might also provide a pipeline of network services for network level traffic to and from the client computing entity. The cloud environment uses policy to determine which of a plurality of communication channels to use when exchanging cloud service data for the network service.Type: ApplicationFiled: September 14, 2012Publication date: March 20, 2014Applicant: MICROSOFT CORPORATIONInventors: Yousef A. Khalidi, Deepak Bansal, Changhoon Kim, Srikanth Kandula, David A. Maltz, Parveen Kumar Patel, Albert Gordon Greenberg
-
Publication number: 20140019602Abstract: Load balancing for single-address tenants. When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address.Type: ApplicationFiled: July 12, 2012Publication date: January 16, 2014Applicant: Microsoft CorporationInventors: Ashwin Murthy, Parveen Kumar Patel, Deepak Bansal, Marios Zikos
-
Patent number: 8598982Abstract: Described herein are systems and methods for commissioning access control devices. In overview, a carrier substrate such as a smartcard is used to commission a plurality of access control devices. Measures are implemented such that the individual access control devices are uniquely commissioned. That is, no two devices apply identical commissioning data, hi some embodiments this is achieved by, as part of the commissioning process at a given access control device, modifying one or more aspects of the data carried by the carrier substrate.Type: GrantFiled: May 21, 2008Date of Patent: December 3, 2013Assignee: Honeywell International Inc.Inventors: Neelendra Bhandari, Priteshkumar D Joshi, Chandrakanth C Reddy, Parveen Kumar Goel
-
Publication number: 20130305210Abstract: The present invention discloses a system and method for management of test or non-production environment. The method comprises planning the non-production environment design, wherein planning is based on plurality of inputs. The planning stage is preceded by engagement wherein engagement with functional groups takes place. The planned non-production environment design is analyzed based upon the requirements wherein analysis consists of reviewing plurality of non-production environment designs. This stage is followed by creation of non-production environment wherein non-production environment is built on analyzed design. After this stage the non-production environment is deployed. After deployment there is provision for on-going supports to test services via established Information Technology service management processes. Non-production environment services manage the on-going booking and allocation of the non-production environment through various in-house and third party tools.Type: ApplicationFiled: May 9, 2013Publication date: November 14, 2013Inventors: Parveen Kumar SHARMA, Soumitro MUKHERJEE
-
Publication number: 20130159487Abstract: The movement of a Virtual IP (VIP) address from cluster node to cluster node is coordinated via a load balancer. All or a subset of the nodes in a load balancer cluster may be configured as possible hosts for the VIP. The load balancer directs VIP traffic to the Dedicated IP (DIP) address for the cluster node that responds affirmatively to periodic health probe messages. In this way, a VIP failover is executed when a first node stops responding to probe messages, and a second node starts to respond to the periodic health probe messages. In response to an affirmative probe response from a new node, the load balancer immediately directs the VIP traffic to the new node's DIP. The probe messages may be configured to identify which nodes are currently responding affirmatively to probes to assist the nodes in determining when to execute a failover.Type: ApplicationFiled: March 9, 2012Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Parveen Kumar Patel, David A. Dion, Corey Sanders, Santosh Balasubramanian, Deepak Bansal, Vladimir Petter, Daniel Brown Benediktson
-
Publication number: 20130138813Abstract: Individual role instance reachability and load balancing are simultaneously provided for role instances of an application running in a hosting environment. Instance endpoints may be assigned to each role instance. Each instance endpoint may comprise a combination of an IP address, a transport protocol, and a unique port number. Additionally, a load balanced endpoint may be assigned to the group of role instances. The load balanced endpoint may comprise a combination of an IP address, transport protocol, and another unique port number. When application messages are issued to the data center, the messages are routed in accordance with endpoints used by the messages. For an instance endpoint, the message is routed to a role instance corresponding with the instance endpoint without load balancing. For the load balanced endpoint, the message is routed to any one of the role instances using load balancing.Type: ApplicationFiled: November 28, 2011Publication date: May 30, 2013Applicant: MICROSOFT CORPORATIONInventors: PARVEEN KUMAR PATEL, DEEPAK BANSAL, MURALI KRISHNA SANGUBHATLA, WEI ZHAO, XINYAN ZAN, NISHEETH SRIVASTAVA
-
Patent number: 8351350Abstract: Described herein are systems and methods for configuring access control devices. In overview, some embodiments provide for a method whereby a smartcard is used to configure a disconnected access control device. A user presents this smartcard to a connected access control device which, in response to the presentation of this card, allows the user to download to the smartcard one or more aspects of configuration data for a specified disconnected access control device. The user subsequently presents the smartcard to the relevant disconnected access control device, which uploads and selectively applies the one or more aspects of configuration data.Type: GrantFiled: May 21, 2008Date of Patent: January 8, 2013Assignee: Honeywell International Inc.Inventors: Neelendra Bhandari, Priteshkumar D Joshi, Chandrakanth C Reddy, Parveen Kumar Goel