Patents by Inventor Rahul Chandra Khali
Rahul Chandra Khali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11960382Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.Type: GrantFiled: November 18, 2022Date of Patent: April 16, 2024Assignee: Juniper Networks, Inc.Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
-
Patent number: 11950139Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.Type: GrantFiled: August 24, 2022Date of Patent: April 2, 2024Assignee: Juniper Networks, Inc.Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
-
Publication number: 20230086373Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.Type: ApplicationFiled: November 18, 2022Publication date: March 23, 2023Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
-
Patent number: 11606719Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.Type: GrantFiled: September 24, 2020Date of Patent: March 14, 2023Assignee: Juniper Networks, Inc.Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
-
Publication number: 20220400408Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.Type: ApplicationFiled: August 24, 2022Publication date: December 15, 2022Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
-
Patent number: 11526426Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.Type: GrantFiled: December 29, 2020Date of Patent: December 13, 2022Assignee: JUNIPER NETWORKS, INC.Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
-
Patent number: 11463914Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.Type: GrantFiled: September 24, 2020Date of Patent: October 4, 2022Assignee: Juniper Networks, Inc.Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
-
Publication number: 20220095165Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.Type: ApplicationFiled: September 24, 2020Publication date: March 24, 2022Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
-
Publication number: 20210397536Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.Type: ApplicationFiled: December 29, 2020Publication date: December 23, 2021Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
-
Patent number: 10812466Abstract: Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.Type: GrantFiled: May 5, 2015Date of Patent: October 20, 2020Assignee: McAfee, LLCInventors: Balbir Singh, Preet Mohinder, Manish Sharma, Rahul Chandra Khali
-
Publication number: 20160330193Abstract: Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.Type: ApplicationFiled: May 5, 2015Publication date: November 10, 2016Inventors: Balbir Singh, Preet Mohinder, Manish Sharma, Rahul Chandra Khali