Patents by Inventor Preety Mordani

Preety Mordani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11888876
    Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
    Type: Grant
    Filed: February 17, 2023
    Date of Patent: January 30, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
  • Patent number: 11770350
    Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
    Type: Grant
    Filed: February 3, 2023
    Date of Patent: September 26, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
  • Publication number: 20230208863
    Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
    Type: Application
    Filed: February 17, 2023
    Publication date: June 29, 2023
    Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
  • Publication number: 20230188479
    Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
    Type: Application
    Filed: February 3, 2023
    Publication date: June 15, 2023
    Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
  • Patent number: 11606369
    Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
    Type: Grant
    Filed: March 20, 2020
    Date of Patent: March 14, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
  • Patent number: 11575619
    Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
    Type: Grant
    Filed: October 26, 2020
    Date of Patent: February 7, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
  • Publication number: 20220045971
    Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
    Type: Application
    Filed: October 26, 2020
    Publication date: February 10, 2022
    Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
  • Patent number: 11184238
    Abstract: The present disclosure is directed to unified feature operations, and includes methods comprising receiving, for each of one or more actions that have been defined and downloaded to a data plane, registration information for registering each of the one or more actions, wherein the registration information includes an action handle for identifying a registered action of one or more registered actions; receiving a query from an application module having a composite action comprising at least one custom action to determine if the at least one custom action corresponds to at least one registered action; and in response to determining that the at least one custom action corresponds to at least one registered action, transmitting to the application module at least one action handle corresponding to the at least one registered action, wherein the at least one action handle is used to create a composite action package in the data plane.
    Type: Grant
    Filed: October 26, 2020
    Date of Patent: November 23, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Mingzhe Lu, Hongqing Li, Preety Mordani, Prabahar Radhakrishnan
  • Publication number: 20210297429
    Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
    Type: Application
    Filed: March 20, 2020
    Publication date: September 23, 2021
    Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
  • Patent number: 10439909
    Abstract: In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: October 8, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Preety Mordani, Rahul Patel, Yoshiyuki Tsuda
  • Patent number: 10009230
    Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: June 26, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
  • Patent number: 9973387
    Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: May 15, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
  • Patent number: 9577909
    Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: February 21, 2017
    Assignee: Symantec Corporation
    Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
  • Publication number: 20150333999
    Abstract: In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein.
    Type: Application
    Filed: August 28, 2014
    Publication date: November 19, 2015
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Preety Mordani, Rahul Patel, Yoshiyuki Tsuda
  • Patent number: 9143422
    Abstract: In an embodiment, a method comprises receiving a request to obtain network performance data for a plurality of target nodes; determining geo-locations of the plurality of target nodes; based on the geo-locations, determining a set of the plurality of target nodes that are within a specified proximity radius; selecting one particular target node in the set; sending a probe packet, requesting network performance data, to the one particular target node in the set and not to all other target nodes in the set; applying, to all the target nodes in the set, network performance data that is received in response to the probe packet; wherein the method is performed by one or more processors.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: September 22, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: S Scott Van de Houten, Pritam Shah, Sanjay Sreenath, Preety Mordani
  • Publication number: 20120233308
    Abstract: In an embodiment, a method comprises receiving a request to obtain network performance data for a plurality of target nodes; determining geo-locations of the plurality of target nodes; based on the geo-locations, determining a set of the plurality of target nodes that are within a specified proximity radius; selecting one particular target node in the set; sending a probe packet, requesting network performance data, to the one particular target node in the set and not to all other target nodes in the set; applying, to all the target nodes in the set, network performance data that is received in response to the probe packet; wherein the method is performed by one or more processors.
    Type: Application
    Filed: March 8, 2011
    Publication date: September 13, 2012
    Inventors: S. Scott Van De Houten, Pritam Shah, Sanjay Sreenath, Preety Mordani
  • Publication number: 20120226820
    Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.
    Type: Application
    Filed: February 29, 2012
    Publication date: September 6, 2012
    Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
  • Patent number: 8130747
    Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.
    Type: Grant
    Filed: August 6, 2007
    Date of Patent: March 6, 2012
    Assignee: Blue Coat Systems, Inc.
    Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
  • Publication number: 20090040926
    Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.
    Type: Application
    Filed: August 6, 2007
    Publication date: February 12, 2009
    Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen