Patents by Inventor Rahul Chandra Khali

Rahul Chandra Khali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960382
    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: April 16, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
  • Patent number: 11950139
    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
    Type: Grant
    Filed: August 24, 2022
    Date of Patent: April 2, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
  • Publication number: 20230086373
    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
    Type: Application
    Filed: November 18, 2022
    Publication date: March 23, 2023
    Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
  • Patent number: 11606719
    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
    Type: Grant
    Filed: September 24, 2020
    Date of Patent: March 14, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
  • Publication number: 20220400408
    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
    Type: Application
    Filed: August 24, 2022
    Publication date: December 15, 2022
    Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
  • Patent number: 11526426
    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
    Type: Grant
    Filed: December 29, 2020
    Date of Patent: December 13, 2022
    Assignee: JUNIPER NETWORKS, INC.
    Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
  • Patent number: 11463914
    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
    Type: Grant
    Filed: September 24, 2020
    Date of Patent: October 4, 2022
    Assignee: Juniper Networks, Inc.
    Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
  • Publication number: 20220095165
    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.
    Type: Application
    Filed: September 24, 2020
    Publication date: March 24, 2022
    Inventors: Digambar Yashwant Sawant, Bhagat Singh Mariappan, Harmeet Singh, Rahul Chandra Khali, Prateek Halwe
  • Publication number: 20210397536
    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.
    Type: Application
    Filed: December 29, 2020
    Publication date: December 23, 2021
    Inventors: Prateek Halwe, Amit Arora, Harmeet Singh, Rahul Chandra Khali
  • Patent number: 10812466
    Abstract: Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.
    Type: Grant
    Filed: May 5, 2015
    Date of Patent: October 20, 2020
    Assignee: McAfee, LLC
    Inventors: Balbir Singh, Preet Mohinder, Manish Sharma, Rahul Chandra Khali
  • Publication number: 20160330193
    Abstract: Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.
    Type: Application
    Filed: May 5, 2015
    Publication date: November 10, 2016
    Inventors: Balbir Singh, Preet Mohinder, Manish Sharma, Rahul Chandra Khali