Patents by Inventor Ramachandra Yalakanti
Ramachandra Yalakanti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10797952Abstract: Systems and methods to identify a plurality of different snapshot versions for a rollback to a previous configuration for subsets of network infrastructure devices is disclosed. A plurality of different network device configuration snapshots is identified and a set of snapshot checkpoints that each include a set of related parameter settings for each different network device are selected as a rollback configuration snapshot for that device. Each device may be associated with automated validation capabilities to validate a proposed rollback version. The computer system may iterate through a set of versions of snapshots and automatically initiate validation capabilities to validate a proposed rollback for the first logical grouping. Determination of a set of configurations may be based on a version control tag to restore a network to an operational state, never before seen in operation, that has a high degree of confidence, in part, because validation tests were successful.Type: GrantFiled: July 16, 2019Date of Patent: October 6, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Craig Mills, Charles F. Clark, Ryan Curcio, Ramachandra Yalakanti
-
Patent number: 10769218Abstract: A method that includes receiving, from a client device, a pre-selected period of time, and determining whether multiple data values corresponding to the pre-selected period of time exceeds a threshold permitted by a network service request is provided. The method includes determining an interval at which the network service request is made based on the pre-selected period of time, and constructing a query that requests the data values with a constraint, wherein the constraint reduces the data values corresponding to the pre-selected period of time to a subset of data values that preserve a data quality. The method also includes making the network service request using the query and displaying results received in a response to the network service request.Type: GrantFiled: June 15, 2018Date of Patent: September 8, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Ramachandra Yalakanti, Seetharam Pranihith Venuturupalli, Kevin Tajeran
-
Patent number: 10742515Abstract: A computer-implemented method includes receiving, at a client device, a plurality of monitors each including at least one resource related to a network device; automatically displaying, on the client device, a subset of the plurality of monitors including the at least one resource on a first time series chart based on a pre-determined risk factor; at least one of (1) selecting, using the client device, at least one monitor not included in the subset and included in the plurality of monitors, and (2) un-selecting, using the client device, at least one monitor included in the subset, and thereby obtain a customized set of monitors and resources; accessing, using the client device, a time series database associated to the network device to query for data related to resources included in the customized set of monitors; and displaying, on the client device, the customized set of monitors and the included resources on a second time series chart.Type: GrantFiled: June 18, 2018Date of Patent: August 11, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Ramachandra Yalakanti, Charles F. Clark, Kevin Tajeran, Seetharam Pranihith Venuturupalli
-
Publication number: 20190386885Abstract: A computer-implemented method includes receiving, at a client device, a plurality of monitors each including at least one resource related to a network device; automatically displaying, on the client device, a subset of the plurality of monitors including the at least one resource on a first time series chart based on a pre-determined risk factor; at least one of (1) selecting, using the client device, at least one monitor not included in the subset and included in the plurality of monitors, and (2) un-selecting, using the client device, at least one monitor included in the subset, and thereby obtain a customized set of monitors and resources; accessing, using the client device, a time series database associated to the network device to query for data related to resources included in the customized set of monitors; and displaying, on the client device, the customized set of monitors and the included resources on a second time series chart.Type: ApplicationFiled: June 18, 2018Publication date: December 19, 2019Inventors: Ramachandra Yalakanti, Charles F. Clark, Kevin Tajeran, Seetharam Pranihith Venuturupalli
-
Publication number: 20190384858Abstract: A method that includes receiving, from a client device, a pre-selected period of time, and determining whether multiple data values corresponding to the pre-selected period of time exceeds a threshold permitted by a network service request is provided. The method includes determining an interval at which the network service request is made based on the pre-selected period of time, and constructing a query that requests the data values with a constraint, wherein the constraint reduces the data values corresponding to the pre-selected period of time to a subset of data values that preserve a data quality. The method also includes making the network service request using the query and displaying results received in a response to the network service request.Type: ApplicationFiled: June 15, 2018Publication date: December 19, 2019Inventors: Ramachandra Yalakanti, Seetharam Pranihith Venuturupalli, Kevin Tajeran
-
Patent number: 9185122Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.Type: GrantFiled: October 10, 2008Date of Patent: November 10, 2015Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
-
Patent number: 9032478Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.Type: GrantFiled: January 29, 2009Date of Patent: May 12, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
-
Patent number: 8365292Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.Type: GrantFiled: January 17, 2012Date of Patent: January 29, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventor: Ramachandra Yalakanti
-
Publication number: 20120117654Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.Type: ApplicationFiled: January 17, 2012Publication date: May 10, 2012Inventor: Ramachandra Yalakanti
-
Patent number: 8122503Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.Type: GrantFiled: October 3, 2008Date of Patent: February 21, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventor: Ramachandra Yalakanti
-
Patent number: 8103756Abstract: A system on a computer network device for managing a network access device capability arranged to alert a computer network administrator if a network access device lacks the capability to implement a user access profile.Type: GrantFiled: October 31, 2006Date of Patent: January 24, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ramachandra Yalakanti, Chuck A. Black
-
Publication number: 20110289557Abstract: A method of managing security in a network is described. A data anomaly at a first location on a network is detected. A source of this data anomaly is identified. The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources. Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies.Type: ApplicationFiled: January 29, 2009Publication date: November 24, 2011Inventors: Rebecca M. Ballesteros, Sherry Krell, Adrian Cowham, John M. Green, Ramachandra Yalakanti
-
Publication number: 20090300156Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing security in a network are disclosed. A plurality of security policies associated with a plurality of network data anomalies are provided at a network management system. Each one of the plurality of security policies defines a network data anomaly specific mitigation response for each one of the plurality of network data anomalies. A first network data anomaly is detected at the network management system. A determination is made at the network management system regarding whether a first one of the plurality of security policies defines a first network data anomaly specific mitigation response to the first network data anomaly. A first mitigation command is issued from the network management system to at least one network system to implement the first network data anomaly specific mitigation response for a pre-defined period of time in accordance with the first security policy based on the determination.Type: ApplicationFiled: October 10, 2008Publication date: December 3, 2009Inventors: Ramachandra Yalakanti, Devon L. Dawson, Steve Britt
-
Publication number: 20090300762Abstract: Methods, systems and computer readable mediums storing computer executable programs for managing a potential security threat to a network are disclosed. Network data received at a network system within a network is monitored at a network management system. A determination is made at the network management system regarding whether the network data received at the network system poses a potential security threat to the network. A threat type associated with the potential security threat is identified at the network management system based on the determination. A threat assessment system operable to evaluate the identified threat type is identified at the network management system. A command is issued from the network management system to the network system to mirror network data received at the network system to the identified threat assessment system.Type: ApplicationFiled: October 3, 2008Publication date: December 3, 2009Inventor: Ramachandra Yalakanti
-
Publication number: 20080134308Abstract: Systems, methodologies, media, and other embodiments associated with network login security are described. One exemplary system embodiment includes a network edge logic configured to receive information related to a network login request, to gather information associated with the user, and, to gather information related to the user's system. The system further includes a server comprising an identity management agent configured to determine access rights to a network based on the user login request, gathered information associated with the user, gathered information related to the user's system, and, stored access profile information.Type: ApplicationFiled: December 5, 2006Publication date: June 5, 2008Inventors: Ramachandra Yalakanti, Charles A. Black
-
Publication number: 20080104196Abstract: A system on a computer network device for managing a network access device capability arranged to alert a computer network administrator if a network access device lacks the capability to implement a user access profile.Type: ApplicationFiled: October 31, 2006Publication date: May 1, 2008Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ramachandra Yalakanti, Chuck A. Black