Patents by Inventor Premkumar Jonnala
Premkumar Jonnala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9075594Abstract: In one embodiment, a method includes a first device providing a first power to a second device using a first set of conductors out of a plurality of conductors. The method includes the first device providing, in response to receiving a notification, a second power to the second device using the first and a second set of conductors out of a plurality of conductors. The notification indicates that the second device can be supplied with a second power using the first set of conductors and a second set of conductors out of the plurality of conductors, and can also specify the configuration for enabling the second power.Type: GrantFiled: November 9, 2011Date of Patent: July 7, 2015Assignee: Cisco Technology, Inc.Inventors: Vaibhav S. Katkade, Premkumar Jonnala, Anoop Vetteth
-
Publication number: 20150113524Abstract: The invention provides a system, a method and a computer program product that facilitate access to one or more applications by a computing device. The invention includes determining one or more contexts associated with at least one of the computing device and a user of the computing device, such that the one or more contexts describe at least one of an environment and an activity of the at least one of the user and the computing device. Thereafter at least one contextual tag corresponding to the one or more contexts is generated. Subsequently, the one or more applications associated with the at least one contextual tag are identified and the computing device is enabled to access the one or more applications.Type: ApplicationFiled: December 31, 2014Publication date: April 23, 2015Inventors: PREMKUMAR JONNALA, KEERTIKIRAN GOKUL
-
Publication number: 20150113141Abstract: The invention provides a system, a method and a computer program product that facilitate access to one or more applications by a computing device. The invention includes determining one or more contexts associated with at least one of the computing device and a user of the computing device, such that the one or more contexts describe at least one of an environment and an activity of the at least one of the user and the computing device. Thereafter at least one contextual tag corresponding to the one or more contexts is generated. Subsequently, the one or more applications associated with the at least one contextual tag are identified and the computing device is enabled to access the one or more applications.Type: ApplicationFiled: December 31, 2014Publication date: April 23, 2015Inventors: PREMKUMAR JONNALA, Keertikiran Gokul
-
Publication number: 20140379776Abstract: The invention provides a system, a method and a computer program product that facilitate access to one or more applications by a computing device. The invention includes determining one or more contexts associated with at least one of the computing device and a user of the computing device, such that the one or more contexts describe at least one of an environment and an activity of the at least one of the user and the computing device. Thereafter at least one contextual tag corresponding to the one or more contexts is generated. Subsequently, the one or more applications associated with the at least one contextual tag are identified and the computing device is enabled to access the one or more applications.Type: ApplicationFiled: August 26, 2014Publication date: December 25, 2014Inventors: KEERTIKIRAN GOKUL, Premkumar Jonnala
-
Publication number: 20140289800Abstract: Protocol status information is used to perform traffic filtering by dropping messages that are not consistent with the protocol status information. In one embodiment, a method involves comparing message information and protocol status information. The message information is associated with a first message. The protocol status information is obtained in response to one or more second messages, which are conveyed according to a protocol used to assign network addresses to clients. The method also involves determining whether to discard the first message, based on an outcome of the comparison of the message information and the protocol status information. For example, it can be determined that the first message should be discarded, if the message information does not match the protocol status information.Type: ApplicationFiled: June 4, 2014Publication date: September 25, 2014Inventors: Dehua Huang, Adam J. Sweeney, Pradeep S. Sudame, Silviu Dobrota, Premkumar Jonnala
-
Patent number: 8788823Abstract: Protocol status information is used to perform traffic filtering by dropping messages that are not consistent with the protocol status information. In one embodiment, a method involves comparing message information and protocol status information. The message information is associated with a first message. The protocol status information is obtained in response to one or more second messages, which are conveyed according to a protocol used to assign network addresses to clients. The method also involves determining whether to discard the first message, based on an outcome of the comparison of the message information and the protocol status information. For example, it can be determined that the first message should be discarded, if the message information does not match the protocol status information.Type: GrantFiled: October 22, 2004Date of Patent: July 22, 2014Assignee: Cisco Technology, Inc.Inventors: Dehua Huang, Adam J. Sweeney, Pradeep S. Sudame, Silviu Dobrota, Premkumar Jonnala
-
Patent number: 8732697Abstract: The disclosure provides a system, a method and a computer program product that facilitate access to one or more applications by a computing device. The disclosure includes a step of determining one or more contexts associated with the computing device or a user of the computing device, such that the one or more contexts describe environment or activity of the user or the computing device. The disclosure also includes a step of generating at least one contextual tag corresponding to the one or more contexts, after which the one or more applications associated with the at least one contextual tag are identified and the computing device is enabled to access the one or more applications.Type: GrantFiled: July 28, 2011Date of Patent: May 20, 2014Inventors: Premkumar Jonnala, Keertikiran Gokul
-
Publication number: 20130117581Abstract: In one embodiment, a method includes a first device providing a first power to a second device using a first set of conductors out of a plurality of conductors. The method includes the first device providing, in response to receiving a notification, a second power to the second device using the first and a second set of conductors out of a plurality of conductors. The notification indicates that the second device can be supplied with a second power using the first set of conductors and a second set of conductors out of the plurality of conductors, and can also specify the configuration for enabling the second power.Type: ApplicationFiled: November 9, 2011Publication date: May 9, 2013Inventors: Vaibhav S. Katkade, Premkumar Jonnala, Anoop Vetteth
-
Patent number: 8266463Abstract: The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the corresponding PSE provides. This power negotiation allows the PDs provide fine-grained power consumption level to PSEs, and the PSEs are able to manage inline power efficiently using the negotiation protocol of the present invention. The PDs can ask the PSEs for more power when needed rather than having to constantly reserve the maximum amount of power they can consume at all times. Similarly, the PDs can release reservation of excess power when their respective power requirements decrease. The PSEs can limit the amount of power that can be consumed by the PD, thereby providing the ability for an administrator to control how much power a given PD can consume.Type: GrantFiled: March 24, 2008Date of Patent: September 11, 2012Assignee: CISCO TECHNOLOGY, Inc.Inventors: Premkumar Jonnala, Norman W. Finn, Qiang Wu, Ruchir M. Dave
-
Publication number: 20120204263Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: ApplicationFiled: April 16, 2012Publication date: August 9, 2012Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
-
Patent number: 8181240Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: GrantFiled: June 14, 2005Date of Patent: May 15, 2012Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
-
Publication number: 20120036507Abstract: The invention provides a system, a method and a computer program product that facilitate access to one or more applications by a computing device. The invention includes determining one or more contexts associated with at least one of the computing device and a user of the computing device, such that the one or more contexts describe at least one of an environment and an activity of the at least one of the user and the computing device. Thereafter at least one contextual tag corresponding to the one or more contexts is generated. Subsequently, the one or more applications associated with the at least one contextual tag are identified and the computing device is enabled to access the one or more applications.Type: ApplicationFiled: July 28, 2011Publication date: February 9, 2012Inventors: PREMKUMAR JONNALA, KEERTIKIRAN GOKUL
-
Patent number: 8082333Abstract: A DHCP proxy agent is provided to send on behalf of a static host a DHCP request so that an access layer security feature such as DHCP snooping/IPSG can be applied to the static host and/or in a mixed static IP and DHCP environment.Type: GrantFiled: November 10, 2008Date of Patent: December 20, 2011Assignee: Cisco Technology, Inc.Inventors: Dehua Huang, Premkumar Jonnala, Nagarani Chandika, Kyle Gordon Haight, Feng Zhu, Dan Mihai Florea, Bimohit Bawa
-
Patent number: 8078889Abstract: The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the corresponding PSE provides. This power negotiation allows the PDs provide fine-grained power consumption level to PSEs, and the PSEs are able to manage inline power efficiently using the negotiation protocol of the present invention. The PDs can ask the PSEs for more power when needed rather than having to constantly reserve the maximum amount of power they can consume at all times. Similarly, the PDs can release reservation of excess power when their respective power requirements decrease. The PSEs can limit the amount of power that can be consumed by the PD, thereby providing the ability for an administrator to control how much power a given PD can consume.Type: GrantFiled: March 24, 2008Date of Patent: December 13, 2011Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Norman W. Finn, Qiang Wu, Ruchir M. Dave
-
Publication number: 20100121944Abstract: A DHCP proxy agent is provided to send on behalf of a static host a DHCP request so that an access layer security feature such as DHCP snooping/IPSG can be applied to the static host and/or in a mixed static IP and DHCP environment.Type: ApplicationFiled: November 10, 2008Publication date: May 13, 2010Inventors: DEHUA HUANG, Premkumar Jonnala, Nagarani Chandika, Kyle Gordon Haight, Feng Zhu, Dan Mihai Florea, Bimohit Bawa
-
Patent number: 7613127Abstract: A solution is provided wherein physical link parameters may be negotiated after a link is brought up by having the two devices involved in the link exchange identifiers when the link is initially brought up. These identifiers may be saved in the devices and then utilized upon receipt of subsequent physical link parameter negotiation packets to ensure that these packets are received by a partner who is connected via a physical link.Type: GrantFiled: March 7, 2005Date of Patent: November 3, 2009Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Keith McCloghrie, Norman William Finn
-
Patent number: 7551559Abstract: Users are allowed to specify per-interface rate limits for inter-layer binding protocol traffic. If the user-specified rate limit is exceeded on a given interface, inter-layer binding protocol messages received via that interface are caused to be dropped (e.g., by selectively dropping ILBP messages, or by simply shutting down the interface). If the rate is not exceeded, inter-layer binding protocol messages received via that interface can be validated (e.g., by comparing an inter-layer binding included in the body of an inter-layer binding protocol message to protocol status information obtained by snooping protocol messages). If the inter-layer binding does not match the protocol status information, the inter-layer binding protocol message is dropped. If a match is found, the inter-layer binding protocol message is allowed to be forwarded normally. Such systems and methods may be used to inhibit various undesirable network behavior, such as man-in-the-middle attacks.Type: GrantFiled: October 22, 2004Date of Patent: June 23, 2009Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Adam J. Sweeney, Dehua Huang, Silviu Dobrota, Pradeep S. Sudame, Marco E. Foschiano
-
Publication number: 20080215902Abstract: The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the corresponding PSE provides. This power negotiation allows the PDs provide fine-grained power consumption level to PSEs, and the PSEs are able to manage inline power efficiently using the negotiation protocol of the present invention. The PDs can ask the PSEs for more power when needed rather than having to constantly reserve the maximum amount of power they can consume at all times. Similarly, the PDs can release reservation of excess power when their respective power requirements decrease. The PSEs can limit the amount of power that can be consumed by the PD, thereby providing the ability for an administrator to control how much power a given PD can consume.Type: ApplicationFiled: March 24, 2008Publication date: September 4, 2008Applicant: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Norman W. Finn, Qiang Wu, Ruchir M. Dave
-
Publication number: 20080215899Abstract: The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the corresponding PSE provides. This power negotiation allows the PDs provide fine-grained power consumption level to PSEs, and the PSEs are able to manage inline power efficiently using the negotiation protocol of the present invention. The PDs can ask the PSEs for more power when needed rather than having to constantly reserve the maximum amount of power they can consume at all times. Similarly, the PDs can release reservation of excess power when their respective power requirements decrease. The PSEs can limit the amount of power that can be consumed by the PD, thereby providing the ability for an administrator to control how much power a given PD can consume.Type: ApplicationFiled: March 24, 2008Publication date: September 4, 2008Applicant: CISCO TECHNOLOGY, INC.Inventors: Premkumar Jonnala, Norman W. Finn, Qiang Wu, Ruchir M. Dave
-
Patent number: 7392407Abstract: The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the corresponding PSE provides. This power negotiation allows the PDs provide fine-grained power consumption level to PSEs, and the PSEs are able to manage inline power efficiently using the negotiation protocol of the present invention. The PDs can ask the PSEs for more power when needed rather than having to constantly reserve the maximum amount of power they can consume at all times. Similarly, the PDs can release reservation of excess power when their respective power requirements decrease. The PSEs can limit the amount of power that can be consumed by the PD, thereby providing the ability for an administrator to control how much power a given PD can consume.Type: GrantFiled: February 9, 2005Date of Patent: June 24, 2008Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Norman W. Finn, Qiang Wu, Ruchir M. Dave