Patents by Inventor Ramana Rao

Ramana Rao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220114262
    Abstract: Provided are systems, methods, and computer-readable medium for identifying security risks in applications executing in a cloud environment. In various implementations, a security monitoring and management system can obtain application data from a service provider system. The application data can include a record of actions performed by an application during use of the application by users associated with a tenant. The application executes in a service platform provided for the tenant by the service provider system. In various implementations, the application data is analyzed to identify an event associated with a security risk, where the event is identified from one or more actions performed by the application. The system can determine an action to perform in response to identifying the event. In various examples, an agent executing on the service platform can add instrumentation codes used by the application, where the instrumentation provides the application data.
    Type: Application
    Filed: June 25, 2021
    Publication date: April 14, 2022
    Applicant: Oracle International Corporation
    Inventors: Gaurav Bhatia, Ganesh Kirti, Ramana Rao Satyasai Turlapati
  • Patent number: 11283680
    Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to determine a hit count for a concrete level rule implemented on a node and identify one or more components of a logical model, wherein each of the one or more components are associated with the concrete level rule. The network assurance appliance may attribute the hit count for the concrete level rule to each of the components of the logical model, determine a number of hardware level entries associated with the each of the one or more components, and generate a report comprising the one or more components of the logical model, the hit count attributed to each of the one or more components of the logical model, and the number of hardware level entries associated with the one or more components of the logical model.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: March 22, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ramana Rao Kompella, Chandra Nagarajan, John Thomas Monk, Purna Mani Kumar Ghantasala
  • Patent number: 11258657
    Abstract: Systems, methods, and computer-readable media for localizing faults in a network policy are disclosed. In some examples, a system or method can obtain TCAM rules across a network and use the TCAM rules to perform an equivalency check between the logical model and the hardware model of the network policy. One or more risk models are annotated with output from the equivalency check and the risk models are used to identify a set of policy objects of the network policy that are likely responsible for the faults.
    Type: Grant
    Filed: March 25, 2020
    Date of Patent: February 22, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Praveen Tammana, Chandra Nagarajan, Pavan Mamillapalli, Ramana Rao Kompella
  • Patent number: 11218508
    Abstract: Systems, methods, and computer-readable media for assurance of rules in a network. An example method can include creating a compliance requirement including a first endpoint group (EPG) selector, a second EPG selector, a traffic selector, and a communication operator, the first and second EPG selectors representing sets of EPGs and the communication operator defining a communication condition for traffic associated with the first and second EPG selectors and the traffic selector. The method can include creating, for each distinct pair of EPGs, a first respective data structure representing the distinct pair of EPGs, the communication operator, and the traffic selector; creating a second respective data structure representing a logical model of the network; determining whether the first respective data structure is contained in the second respective data structure to yield a containment check; and determining whether policies on the network comply with the compliance requirement based on the containment check.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: January 4, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Publication number: 20210368031
    Abstract: Systems, methods, and computer-readable media for receiving an indication of an equivalence failure, the equivalence failure corresponding to one or more models of network intents. The indication of the equivalence failure is analyzed and one or more constituent intents that caused the equivalence failure are identified, wherein the one or more constituent intents are associated with a model of the one or more models of network intents. The granularity of the equivalence failure and the identified one or more constituent intents is determined, and an event for external consumption is generated, the event based at least in part on the equivalence failure, the granularity of the equivalence failure, and the identified one or more constituent intents.
    Type: Application
    Filed: August 2, 2021
    Publication date: November 25, 2021
    Inventors: Advait Dixit, Ramana Rao Kompella
  • Patent number: 11178009
    Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.
    Type: Grant
    Filed: February 10, 2020
    Date of Patent: November 16, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Kartik Mohanram, Chandra Nagarajan, Sundar Iyer, Shadab Nazar, Ramana Rao Kompella
  • Publication number: 20210279615
    Abstract: In one embodiment, a device maintains a metamodel that describes a monitored system. The metamodel comprises a plurality of layers ranging from a sub-symbolic space to a symbolic space. The device tracks updates to the metamodel over time. The device updates the metamodel based in part on sub-symbolic time series data generated by the monitored system. The device receives, from a learning agent, a request for the updates to a particular layer of the metamodel associated with a specified time period. The device provides, to the learning agent, data indicative of one or more updates to the particular layer of the metamodel associated with the specified time period.
    Type: Application
    Filed: February 11, 2021
    Publication date: September 9, 2021
    Inventors: Hugo Latapie, Ozkan Kilic, Ramana Rao V. R. Kompella, Myungjin Lee, Simon Matthew Young
  • Patent number: 11102337
    Abstract: Systems, methods, and computer-readable media for receiving an indication of an equivalence failure, the equivalence failure corresponding to one or more models of network intents. The indication of the equivalence failure is analyzed and one or more constituent intents that caused the equivalence failure are identified, wherein the one or more constituent intents are associated with a model of the one or more models of network intents. The granularity of the equivalence failure and the identified one or more constituent intents is determined, and an event for external consumption is generated, the event based at least in part on the equivalence failure, the granularity of the equivalence failure, and the identified one or more constituent intents.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: August 24, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Advait Dixit, Ramana Rao Kompella
  • Publication number: 20210258281
    Abstract: Systems, methods, and computer-readable media relate to providing a network management service. A system is configured to request first network information from a first component of a network using a public IP address for the first component, wherein the first network information includes private IP addresses for a second component in the network and translate, based on a mapping information for a private IP address space to a public IP address space, the private IP address for a second component to a public IP address for the second component. The system is further configured to request second network information from the second component using the public IP address and provide a network management service for the network based on the second network information.
    Type: Application
    Filed: May 3, 2021
    Publication date: August 19, 2021
    Inventors: Vivek Balamurugan, Chandra Nagarajan, Divjyot Sethi, Chaitanya Velpula, Manvesh Vyas, Ramana Rao Kompella, Pradhap Muthuraman
  • Patent number: 11055417
    Abstract: Provided are systems, methods, and computer-readable medium for identifying security risks in applications executing in a cloud environment. In various implementations, a security monitoring and management system can obtain application data from a service provider system. The application data can include a record of actions performed by an application during use of the application by users associated with a tenant. The application executes in a service platform provided for the tenant by the service provider system. In various implementations, the application data is analyzed to identify an event associated with a security risk, where the event is identified from one or more actions performed by the application. The system can determine an action to perform in response to identifying the event. In various examples, an agent executing on the service platform can add instrumentation codes used by the application, where the instrumentation provides the application data.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: July 6, 2021
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Gaurav Bhatia, Ganesh Kirti, Ramana Rao Satyasai Turlapati
  • Patent number: 11044273
    Abstract: Systems, methods, and computer-readable media for configuring and verifying compliance requirements in a network.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: June 22, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Publication number: 20210168167
    Abstract: Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy.
    Type: Application
    Filed: February 12, 2021
    Publication date: June 3, 2021
    Applicant: Oracle International Corporation
    Inventors: Ganesh Kirti, Rohit Gupta, Kamalendu Biswas, Ramana Rao Satyasai Turlapati
  • Patent number: 11019027
    Abstract: Systems, methods, and computer-readable media relate to providing a network management service. A system is configured to request first network information from a first component of a network using a public IP address for the first component, wherein the first network information includes private IP addresses for a second component in the network and translate, based on a mapping information for a private IP address space to a public IP address space, the private IP address for a second component to a public IP address for the second component. The system is further configured to request second network information from the second component using the public IP address and provide a network management service for the network based on the second network information.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: May 25, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Vivek Balamurugan, Chandra Nagarajan, Divjyot Sethi, Chaitanya Velpula, Manvesh Vyas, Ramana Rao Kompella, Pradhap Muthuraman
  • Publication number: 20210152607
    Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.
    Type: Application
    Filed: January 25, 2021
    Publication date: May 20, 2021
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Publication number: 20210144069
    Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.
    Type: Application
    Filed: January 20, 2021
    Publication date: May 13, 2021
    Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
  • Publication number: 20210092023
    Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
    Type: Application
    Filed: December 4, 2020
    Publication date: March 25, 2021
    Inventors: Divjyot Sethi, Chandra Nagarajan, Advait Dixit, John Thomas Monk, Gabriel Cheukbun Ng, Ramana Rao Kompella, Sundar Iyer
  • Patent number: 10958679
    Abstract: Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: March 23, 2021
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Ganesh Kirti, Rohit Gupta, Kamalendu Biswas, Ramana Rao Satyasai Turlapati
  • Patent number: 10929384
    Abstract: Embodiments of the present disclosure include systems and methods for validating a target data table based on a source data table. A distributed memory comprises a plurality of computing systems, each storing at least a portion of the source data table and the target data table in local memory. Processing engines can be efficiently executed on each of the plurality of computing systems to perform comparison functions based on in-memory data. A checksum comparison engine is configured to compare source and target checksums. A data aggregation engine is configured to produce column-based aggregation summaries. A rule generation engine is configured to generate validation rules for checking by a validation engine.
    Type: Grant
    Filed: August 16, 2018
    Date of Patent: February 23, 2021
    Assignee: Walmart Apollo, LLC
    Inventors: Karthikeyan Karunanithi, Venkat Ramana Rao Rapolu, Sandeep George Moolayil, Azad Krishna Tripathi, Suraj Kumar Baghel, Surya Janjam
  • Patent number: 10911495
    Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: February 2, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
  • Patent number: 10904101
    Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: January 26, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan