Patents by Inventor Pratima Sethi

Pratima Sethi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9258282
    Abstract: The present disclosure provides protection of customer data traveling across a network. A reverse cryptographic map (also referred to herein as a reverse crypto map) can be defined for a customer, where the reverse crypto map indicates how customer data should be protected. A reverse crypto map for a customer is applied to an interface of an edge device that is coupled to that customer's private subnet (or customer-facing interface). A reverse crypto map can be configured by a network administrator on a provider edge device, or can be pushed from a key server as part of group policy. A provider edge device can protect customer data by encrypting and decrypting the customer data according to the reverse crypto map. A provider edge device can also be configured with virtual routing and forwarding (VRF) tables that can be used to forward the VPN traffic flow across a provider network.
    Type: Grant
    Filed: October 24, 2012
    Date of Patent: February 9, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Frederic R. P. Detienne, Pratima Sethi
  • Patent number: 9009302
    Abstract: Upon detection of a new traffic flow, a registration node can dynamically register the new traffic flow with a key server policy manager by sending a registration request on behalf of the new traffic flow. A registration request indicates the new traffic flow should be protected by a security group. A registration request may also include a request to dynamically generate a new security group to protect the traffic flow. The registration request is received by a key server policy manager, which performs authentication and authorization checks of the requesting registration node, and determines whether to accept or reject the registration request. If accepted, the key server policy manager registers the new traffic flow by including a description of the traffic flow in a group policy of an existing security group or a newly created security group, depending on the registration request.
    Type: Grant
    Filed: February 21, 2012
    Date of Patent: April 14, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Frederic R. P. Detienne, Pratima Sethi, Ijsbrand Wijnands
  • Publication number: 20140115325
    Abstract: The present disclosure provides protection of customer data traveling across a network. A reverse cryptographic map (also referred to herein as a reverse crypto map) can be defined for a customer, where the reverse crypto map indicates how customer data should be protected. A reverse crypto map for a customer is applied to an interface of an edge device that is coupled to that customer's private subnet (or customer-facing interface). A reverse crypto map can be configured by a network administrator on a provider edge device, or can be pushed from a key server as part of group policy. A provider edge device can protect customer data by encrypting and decrypting the customer data according to the reverse crypto map. A provider edge device can also be configured with virtual routing and forwarding (VRF) tables that can be used to forward the VPN traffic flow across a provider network.
    Type: Application
    Filed: October 24, 2012
    Publication date: April 24, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Frederic R. P. Detienne, Pratima Sethi
  • Patent number: 8625599
    Abstract: A system and method directed to carrying out dynamic secured group communication is provided. The method includes: obtaining a first packet that includes a first header; forming a frame that includes the first header in encrypted form; combining the first header and the frame to form a second packet and forming a second header; encapsulating the second packet with the second header to form a third packet, and communicating the third packet into the second network from the second source node for termination to the second-destination node. The first header includes a first source address of a first source node of a first network, and a first destination address of a first destination node of the first network. The second header includes a second source address of a second source node of a second network, and a second destination address of a second destination node of the second network.
    Type: Grant
    Filed: September 19, 2011
    Date of Patent: January 7, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Scott Fluhrer, Warren Scott Wainner, Sheela Rowles, Kavitha Kamarthy, Mohamed Khalid, Haseeb Niazi, Pratima Sethi
  • Publication number: 20130219035
    Abstract: Upon detection of a new traffic flow, a registration node can dynamically register the new traffic flow with a key server policy manager by sending a registration request on behalf of the new traffic flow. A registration request indicates the new traffic flow should be protected by a security group. A registration request may also include a request to dynamically generate a new security group to protect the traffic flow. The registration request is received by a key server policy manager, which performs authentication and authorization checks of the requesting registration node, and determines whether to accept or reject the registration request. If accepted, the key server policy manager registers the new traffic flow by including a description of the traffic flow in a group policy of an existing security group or a newly created security group, depending on the registration request.
    Type: Application
    Filed: February 21, 2012
    Publication date: August 22, 2013
    Inventors: Frederic R. P. Detienne, Pratima Sethi, Ijsbrand Wijnands
  • Patent number: 8503453
    Abstract: In one embodiment, a QoS manager process that receives, at an EzVPN server device, connection speed data from an EzVPN client device. In addition, the QoS manager process processes, at the EzVPN server device, the connection speed data to determine a QoS policy for a communications session between the EzVPN client device and the EzVPN server device. Furthermore, the QoS manager process applies, at the EzVPN server device, the QoS policy to the communications session between the EzVPN client device and the EzVPN server device as determined by the processing of the connection speed data.
    Type: Grant
    Filed: November 20, 2006
    Date of Patent: August 6, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Rajiv Asati, Mohamed Khalid, Aamer Akhter, Pratima Sethi
  • Publication number: 20120060029
    Abstract: A system and method directed to carrying out dynamic secured group communication is provided. The method includes: obtaining a first packet that includes a first header; forming a frame that includes the first header in encrypted form; combining the first header and the frame to form a second packet and forming a second header; encapsulating the second packet with the second header to form a third packet, and communicating the third packet into the second network from the second source node for termination to the second-destination node. The first header includes a first source address of a first source node of a first network, and a first destination address of a first destination node of the first network. The second header includes a second source address of a second source node of a second network, and a second destination address of a second destination node of the second network.
    Type: Application
    Filed: September 19, 2011
    Publication date: March 8, 2012
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Scott Fluhrer, Warren Scott Wainner, Sheela Rowles, Kavitha Kamarthy, Mohamed Khalid, Haseeb Niazi, Pratima Sethi
  • Patent number: 8036221
    Abstract: A system and method directed to carrying out dynamic secured group communication is provided. The method includes obtaining a first packet that includes a first header. The first header includes a first source address of a first source node of a first network, and a first destination address of a first destination node of the first network. The method also includes forming a frame that includes the first header in encrypted form, combining the first header and the frame to form a second packet, and forming a second header. This second header includes a second source address of a second source node of a second network, and a second destination address of a second destination node of the second network. The method further includes encapsulating the second packet with the second header to form a third packet, and communicating the third packet into the second network from the second source node for termination to the second-destination node.
    Type: Grant
    Filed: September 15, 2008
    Date of Patent: October 11, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Scott Fluhrer, Warren Scott Wainner, Sheela Rowles, Kavitha Kamarthy, Mohamed Khalid, Haseeb Naizi, Pratima Sethi
  • Patent number: 7844719
    Abstract: Network devices can detect whether a tunnel is available (e.g., usable to convey traffic in both directions) by implementing a tunnel detection protocol that uses a combination of idle timers and multiple types of probes. In this protocol, the device at one end of the tunnel is configured as an active device, while the device at the other end of the tunnel is configured as a passive device. The tunnel detection protocol is asymmetric; the active device sends probes to the passive device, but the passive device does not send probes to the active device. By using at least two types of probes, the active device can inform the passive device about the availability of the path from the passive device to the active device. Since the passive device does not need to send probes or process probe replies, control plane processing on the passive device can be reduced.
    Type: Grant
    Filed: February 13, 2008
    Date of Patent: November 30, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Frederic R. P. Detienne, Pratima Sethi
  • Publication number: 20090034557
    Abstract: A system and method directed to carrying out dynamic secured group communication is provided. The method includes obtaining a first packet that includes a first header. The first header includes a first source address of a first source node of a first network, and a first destination address of a first destination node of the first network. The method also includes forming a frame that includes the first header in encrypted form, combining the first header and the frame to form a second packet, and forming a second header. This second header includes a second source address of a second source node of a second network, and a second destination address of a second destination node of the second network. The method further includes encapsulating the second packet with the second header to form a third packet, and communicating the third packet into the second network from the second source node for termination to the second-destination node.
    Type: Application
    Filed: September 15, 2008
    Publication date: February 5, 2009
    Applicant: Cisco Technology, Inc.
    Inventors: Scott Fluhrer, Warren Scott Wainner, Sheela Rowles, Kavitha Kamarthy, Mohamed Khalid, Haseeb Naizi, Pratima Sethi
  • Publication number: 20080195733
    Abstract: Network devices can detect whether a tunnel is available (e.g., usable to convey traffic in both directions) by implementing a tunnel detection protocol that uses a combination of idle timers and multiple types of probes. In this protocol, the device at one end of the tunnel is configured as an active device, while the device at the other end of the tunnel is configured as a passive device. The tunnel detection protocol is asymmetric; the active device sends probes to the passive device, but the passive device does not send probes to the active device. By using at least two types of probes, the active device can inform the passive device about the availability of the path from the passive device to the active device. Since the passive device does not need to send probes or process probe replies, control plane processing on the passive device can be reduced.
    Type: Application
    Filed: February 13, 2008
    Publication date: August 14, 2008
    Inventors: Frederic R. P. Detienne, Pratima Sethi
  • Publication number: 20080117821
    Abstract: In one embodiment, a QoS manager process that receives, at an EzVPN server device, connection speed data from an EzVPN client device. In addition, the QoS manager process processes, at the EzVPN server device, the connection speed data to determine a QoS policy for a communications session between the EzVPN client device and the EzVPN server device. Furthermore, the QoS manager process applies, at the EzVPN server device, the QoS policy to the communications session between the EzVPN client device and the EzVPN server device as determined by the processing of the connection speed data.
    Type: Application
    Filed: November 20, 2006
    Publication date: May 22, 2008
    Inventors: Rajiv Asati, Mohamed Khalid, Aamer Akhter, Pratima Sethi
  • Patent number: 7376828
    Abstract: A method and apparatus for using a service provider network that supports point-to-point channels is disclosed. One or more encryption parameters are associated with a channel from among a set of one or more predefined point-to-point channels provided by the service provider to connect customer points for a customer different than the service provider. Payloads for a particular flow of one or more data packets directed through the channel are encrypted at a first customer point, using the set of encryption parameters associated with the particular channel, to generate a set of one or more encrypted payloads. The encrypted payloads are inserted in the particular flow sent through the channel of the service provider network. The encrypted payloads are decrypted at a second customer point connected to the first customer point by the channel.
    Type: Grant
    Filed: July 1, 2002
    Date of Patent: May 20, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Eric Voit, Pratima Sethi, Jan Vilhuber
  • Publication number: 20070206597
    Abstract: A system transmits, to a hub from a first spoke, first routing information associated with the first spoke. The system receives, at the first spoke, from the hub, second routing information associated with a plurality of spokes in communication with the hub. The plurality of spokes includes a second spoke. The system resolves, at the first spoke, a next hop determination for the packet based on the second routing information received from the hub. The system routes the packet from the first spoke to the second spoke using the next hop determination.
    Type: Application
    Filed: May 1, 2006
    Publication date: September 6, 2007
    Inventors: Rajiv Asati, Mohamed Khalid, Brian Weis, Pratima Sethi
  • Publication number: 20070002768
    Abstract: A method and system for learning network information through a plurality of network devices is provided. The plurality of network devices are configured for IPsec. The method enables negotiation between the network devices to set up a security association and provide network information between the configured network devices. This network information includes a plurality of sub-network routes.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Kousik Nandy, Manikchand Bafna, Pratima Sethi, Shashidhar Patil