Patents by Inventor Preety Mordani
Preety Mordani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11888876Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.Type: GrantFiled: February 17, 2023Date of Patent: January 30, 2024Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
-
Patent number: 11770350Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.Type: GrantFiled: February 3, 2023Date of Patent: September 26, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
-
Publication number: 20230208863Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.Type: ApplicationFiled: February 17, 2023Publication date: June 29, 2023Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
-
Publication number: 20230188479Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.Type: ApplicationFiled: February 3, 2023Publication date: June 15, 2023Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
-
Patent number: 11606369Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.Type: GrantFiled: March 20, 2020Date of Patent: March 14, 2023Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
-
Patent number: 11575619Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.Type: GrantFiled: October 26, 2020Date of Patent: February 7, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
-
Publication number: 20220045971Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.Type: ApplicationFiled: October 26, 2020Publication date: February 10, 2022Inventors: Mingzhe Lu, Hongqing Li, Diana Leung, Madhu Gindi, Preety Mordani, Prabahar Radhakrishnan
-
Patent number: 11184238Abstract: The present disclosure is directed to unified feature operations, and includes methods comprising receiving, for each of one or more actions that have been defined and downloaded to a data plane, registration information for registering each of the one or more actions, wherein the registration information includes an action handle for identifying a registered action of one or more registered actions; receiving a query from an application module having a composite action comprising at least one custom action to determine if the at least one custom action corresponds to at least one registered action; and in response to determining that the at least one custom action corresponds to at least one registered action, transmitting to the application module at least one action handle corresponding to the at least one registered action, wherein the at least one action handle is used to create a composite action package in the data plane.Type: GrantFiled: October 26, 2020Date of Patent: November 23, 2021Assignee: Cisco Technology, Inc.Inventors: Mingzhe Lu, Hongqing Li, Preety Mordani, Prabahar Radhakrishnan
-
Publication number: 20210297429Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.Type: ApplicationFiled: March 20, 2020Publication date: September 23, 2021Inventors: Balaji Sundararajan, Gaurang Rajeev Mokashi, Preety Mordani, Vivek Agarwal
-
Patent number: 10439909Abstract: In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein.Type: GrantFiled: August 28, 2014Date of Patent: October 8, 2019Assignee: CISCO TECHNOLOGY, INC.Inventors: Preety Mordani, Rahul Patel, Yoshiyuki Tsuda
-
Patent number: 10009230Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.Type: GrantFiled: December 30, 2016Date of Patent: June 26, 2018Assignee: SYMANTEC CORPORATIONInventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
-
Patent number: 9973387Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.Type: GrantFiled: December 30, 2016Date of Patent: May 15, 2018Assignee: SYMANTEC CORPORATIONInventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
-
Patent number: 9577909Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.Type: GrantFiled: February 29, 2012Date of Patent: February 21, 2017Assignee: Symantec CorporationInventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
-
Publication number: 20150333999Abstract: In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein.Type: ApplicationFiled: August 28, 2014Publication date: November 19, 2015Applicant: CISCO TECHNOLOGY, INC.Inventors: Preety Mordani, Rahul Patel, Yoshiyuki Tsuda
-
Patent number: 9143422Abstract: In an embodiment, a method comprises receiving a request to obtain network performance data for a plurality of target nodes; determining geo-locations of the plurality of target nodes; based on the geo-locations, determining a set of the plurality of target nodes that are within a specified proximity radius; selecting one particular target node in the set; sending a probe packet, requesting network performance data, to the one particular target node in the set and not to all other target nodes in the set; applying, to all the target nodes in the set, network performance data that is received in response to the probe packet; wherein the method is performed by one or more processors.Type: GrantFiled: March 8, 2011Date of Patent: September 22, 2015Assignee: Cisco Technology, Inc.Inventors: S Scott Van de Houten, Pritam Shah, Sanjay Sreenath, Preety Mordani
-
Publication number: 20120233308Abstract: In an embodiment, a method comprises receiving a request to obtain network performance data for a plurality of target nodes; determining geo-locations of the plurality of target nodes; based on the geo-locations, determining a set of the plurality of target nodes that are within a specified proximity radius; selecting one particular target node in the set; sending a probe packet, requesting network performance data, to the one particular target node in the set and not to all other target nodes in the set; applying, to all the target nodes in the set, network performance data that is received in response to the probe packet; wherein the method is performed by one or more processors.Type: ApplicationFiled: March 8, 2011Publication date: September 13, 2012Inventors: S. Scott Van De Houten, Pritam Shah, Sanjay Sreenath, Preety Mordani
-
Publication number: 20120226820Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.Type: ApplicationFiled: February 29, 2012Publication date: September 6, 2012Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
-
Patent number: 8130747Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.Type: GrantFiled: August 6, 2007Date of Patent: March 6, 2012Assignee: Blue Coat Systems, Inc.Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen
-
Publication number: 20090040926Abstract: A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows.Type: ApplicationFiled: August 6, 2007Publication date: February 12, 2009Inventors: Qing Li, Preety Mordani, Yusheng Huang, Howard Chen