Patents by Inventor Ramachandra Yalakanti

Ramachandra Yalakanti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10797952
    Abstract: Systems and methods to identify a plurality of different snapshot versions for a rollback to a previous configuration for subsets of network infrastructure devices is disclosed. A plurality of different network device configuration snapshots is identified and a set of snapshot checkpoints that each include a set of related parameter settings for each different network device are selected as a rollback configuration snapshot for that device. Each device may be associated with automated validation capabilities to validate a proposed rollback version. The computer system may iterate through a set of versions of snapshots and automatically initiate validation capabilities to validate a proposed rollback for the first logical grouping. Determination of a set of configurations may be based on a version control tag to restore a network to an operational state, never before seen in operation, that has a high degree of confidence, in part, because validation tests were successful.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: October 6, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Craig Mills, Charles F. Clark, Ryan Curcio, Ramachandra Yalakanti
  • Patent number: 10769218
    Abstract: A method that includes receiving, from a client device, a pre-selected period of time, and determining whether multiple data values corresponding to the pre-selected period of time exceeds a threshold permitted by a network service request is provided. The method includes determining an interval at which the network service request is made based on the pre-selected period of time, and constructing a query that requests the data values with a constraint, wherein the constraint reduces the data values corresponding to the pre-selected period of time to a subset of data values that preserve a data quality. The method also includes making the network service request using the query and displaying results received in a response to the network service request.
    Type: Grant
    Filed: June 15, 2018
    Date of Patent: September 8, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ramachandra Yalakanti, Seetharam Pranihith Venuturupalli, Kevin Tajeran
  • Patent number: 10742515
    Abstract: A computer-implemented method includes receiving, at a client device, a plurality of monitors each including at least one resource related to a network device; automatically displaying, on the client device, a subset of the plurality of monitors including the at least one resource on a first time series chart based on a pre-determined risk factor; at least one of (1) selecting, using the client device, at least one monitor not included in the subset and included in the plurality of monitors, and (2) un-selecting, using the client device, at least one monitor included in the subset, and thereby obtain a customized set of monitors and resources; accessing, using the client device, a time series database associated to the network device to query for data related to resources included in the customized set of monitors; and displaying, on the client device, the customized set of monitors and the included resources on a second time series chart.
    Type: Grant
    Filed: June 18, 2018
    Date of Patent: August 11, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ramachandra Yalakanti, Charles F. Clark, Kevin Tajeran, Seetharam Pranihith Venuturupalli
  • Publication number: 20190386885
    Abstract: A computer-implemented method includes receiving, at a client device, a plurality of monitors each including at least one resource related to a network device; automatically displaying, on the client device, a subset of the plurality of monitors including the at least one resource on a first time series chart based on a pre-determined risk factor; at least one of (1) selecting, using the client device, at least one monitor not included in the subset and included in the plurality of monitors, and (2) un-selecting, using the client device, at least one monitor included in the subset, and thereby obtain a customized set of monitors and resources; accessing, using the client device, a time series database associated to the network device to query for data related to resources included in the customized set of monitors; and displaying, on the client device, the customized set of monitors and the included resources on a second time series chart.
    Type: Application
    Filed: June 18, 2018
    Publication date: December 19, 2019
    Inventors: Ramachandra Yalakanti, Charles F. Clark, Kevin Tajeran, Seetharam Pranihith Venuturupalli
  • Publication number: 20190384858
    Abstract: A method that includes receiving, from a client device, a pre-selected period of time, and determining whether multiple data values corresponding to the pre-selected period of time exceeds a threshold permitted by a network service request is provided. The method includes determining an interval at which the network service request is made based on the pre-selected period of time, and constructing a query that requests the data values with a constraint, wherein the constraint reduces the data values corresponding to the pre-selected period of time to a subset of data values that preserve a data quality. The method also includes making the network service request using the query and displaying results received in a response to the network service request.
    Type: Application
    Filed: June 15, 2018
    Publication date: December 19, 2019
    Inventors: Ramachandra Yalakanti, Seetharam Pranihith Venuturupalli, Kevin Tajeran
  • Patent number: 9185122
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.
    Type: Grant
    Filed: October 10, 2008
    Date of Patent: November 10, 2015
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
  • Patent number: 9032478
    Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
    Type: Grant
    Filed: January 29, 2009
    Date of Patent: May 12, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
  • Patent number: 8365292
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.
    Type: Grant
    Filed: January 17, 2012
    Date of Patent: January 29, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Ramachandra Yalakanti
  • Publication number: 20120117654
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.
    Type: Application
    Filed: January 17, 2012
    Publication date: May 10, 2012
    Inventor: Ramachandra Yalakanti
  • Patent number: 8122503
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.
    Type: Grant
    Filed: October 3, 2008
    Date of Patent: February 21, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Ramachandra Yalakanti
  • Patent number: 8103756
    Abstract: A system on a computer network device for managing a network access device capability arranged to alert a computer network administrator if a network access device lacks the capability to implement a user access profile.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: January 24, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ramachandra Yalakanti, Chuck A. Black
  • Publication number: 20110289557
    Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.
    Type: Application
    Filed: January 29, 2009
    Publication date: November 24, 2011
    Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
  • Publication number: 20090300156
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.
    Type: Application
    Filed: October 10, 2008
    Publication date: December 3, 2009
    Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
  • Publication number: 20090300762
    Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.
    Type: Application
    Filed: October 3, 2008
    Publication date: December 3, 2009
    Inventor: Ramachandra Yalakanti
  • Publication number: 20080134308
    Abstract: Systems, methodologies, media, and other embodiments associated with network login security are described. One exemplary system embodiment includes a network edge logic configured to receive information related to a network login request, to gather information associated with the user, and, to gather information related to the user's system. The system further includes a server comprising an identity management agent configured to determine access rights to a network based on the user login request, gathered information associated with the user, gathered information related to the user's system, and, stored access profile information.
    Type: Application
    Filed: December 5, 2006
    Publication date: June 5, 2008
    Inventors: Ramachandra Yalakanti, Charles A. Black
  • Publication number: 20080104196
    Abstract: A system on a computer network device for managing a network access device capability arranged to alert a computer network administrator if a network access device lacks the capability to implement a user access profile.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Ramachandra Yalakanti, Chuck A. Black