Patents by Inventor Ramanathan Jagadeesan
Ramanathan Jagadeesan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12019762Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.Type: GrantFiled: October 14, 2021Date of Patent: June 25, 2024Assignee: Cisco Technology, Inc.Inventors: Jeffrey C. Venable, Sr., Ramanathan Jagadeesan
-
Publication number: 20220035937Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.Type: ApplicationFiled: October 14, 2021Publication date: February 3, 2022Inventors: Jeffrey C. VENABLE, SR., Ramanathan JAGADEESAN
-
Patent number: 11151261Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.Type: GrantFiled: April 3, 2019Date of Patent: October 19, 2021Assignee: Cisco Technology, Inc.Inventors: Jeffrey C. Venable, Sr., Ramanathan Jagadeesan
-
Patent number: 11120119Abstract: Systems, methods, and devices are disclosed for authenticating a product. An internal component of a product is identified by identifying an intrinsic attribute of the internal component, where the intrinsic attribute is received at a time subsequent to independently storing the intrinsic attribute in a database. A match is determined between the intrinsic attribute and the stored intrinsic attribute. The product is confirmed to be authentic when the match is verified.Type: GrantFiled: April 6, 2018Date of Patent: September 14, 2021Assignee: Cisco Technology, Inc.Inventors: D. Brice Achkir, Ramanathan Jagadeesan
-
Patent number: 10863387Abstract: A method is provided in one example and includes receiving at least one first input indicating at least one network condition associated with a first user device having a user associated therewith. The first user device has a first bearer channel established between the first user device and a gateway, and the first bearer channel has a first quality of service level. The method further includes determining whether to modify the first user device to a second quality of service level based upon the received at least one first input, and sending a first request to a first network element instructing the first network element to modify the first user device to the second quality of service level.Type: GrantFiled: October 2, 2013Date of Patent: December 8, 2020Assignee: Cisco Technology, Inc.Inventors: Arun C. Alex, Gibson Soon Teck Ang, Kevin D. Shatzkamer, Ramanathan Jagadeesan, Fred Chen, Rajesh P. Velandy, Wenxing Zheng
-
Patent number: 10826762Abstract: A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.Type: GrantFiled: August 6, 2018Date of Patent: November 3, 2020Assignee: Cisco Technology, Inc.Inventors: Charles Calvin Byers, Anoop Nannra, Ramanathan Jagadeesan, John Parello, Biren Gandhi
-
Publication number: 20200320204Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.Type: ApplicationFiled: April 3, 2019Publication date: October 8, 2020Inventors: Jeffrey C. VENABLE, SR., Ramanathan JAGADEESAN
-
Publication number: 20200044918Abstract: A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.Type: ApplicationFiled: August 6, 2018Publication date: February 6, 2020Inventors: Charles Calvin BYERS, Anoop NANNRA, Ramanathan JAGADEESAN, John PARELLO, Biren GANDHI
-
Patent number: 10476682Abstract: In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. In various implementations, the method includes synchronizing a first clock of the first network node with respective clocks maintained by one or more of the plurality of network nodes. In various implementations, the method includes obtaining a transaction indicator including respective transaction data. For example, in some implementations, the method includes receiving a transaction request from a client device. In various implementations, the method includes synthesizing, by the first network node, a timestamp for the transaction based on the first clock.Type: GrantFiled: March 1, 2017Date of Patent: November 12, 2019Assignee: Cisco Technology, Inc.Inventors: Anoop Nannra, Judith Ying Priest, Ramanathan Jagadeesan
-
Publication number: 20190311108Abstract: Systems, methods, and devices are disclosed for authenticating a product. An internal component of a product is identified by identifying an intrinsic attribute of the internal component, where the intrinsic attribute is received at a time subsequent to independently storing the intrinsic attribute in a database. A match is determined between the intrinsic attribute and the stored intrinsic attribute. The product is confirmed to be authentic when the match is verified.Type: ApplicationFiled: April 6, 2018Publication date: October 10, 2019Inventors: D. Brice Achkir, Ramanathan Jagadeesan
-
Patent number: 10311230Abstract: In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. In various implementations, the method includes determining a characteristic value based on information associated with the distributed ledger. In some implementations, the distributed ledger stores blocks of transactions that were added to the distributed ledger based on a consensus determination between the plurality of network nodes. In various implementations, the method includes determining whether a current transaction satisfies the characteristic value. In various implementations, the method include indicating whether there is an anomaly based on a function of the current transaction in relation to the characteristic value.Type: GrantFiled: December 24, 2016Date of Patent: June 4, 2019Assignee: Cisco Technology, Inc.Inventors: Ramanathan Jagadeesan, Judith Ying Priest, Anoop Nannra
-
Publication number: 20180254841Abstract: In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. In various implementations, the method includes synchronizing a first clock of the first network node with respective clocks maintained by one or more of the plurality of network nodes. In various implementations, the method includes obtaining a transaction indicator including respective transaction data. For example, in some implementations, the method includes receiving a transaction request from a client device. In various implementations, the method includes synthesizing, by the first network node, a timestamp for the transaction based on the first clock.Type: ApplicationFiled: March 1, 2017Publication date: September 6, 2018Inventors: Anoop Nannra, Judith Ying Priest, Ramanathan Jagadeesan
-
Publication number: 20180181751Abstract: In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. In various implementations, the method includes determining a characteristic value based on information associated with the distributed ledger. In some implementations, the distributed ledger stores blocks of transactions that were added to the distributed ledger based on a consensus determination between the plurality of network nodes. In various implementations, the method includes determining whether a current transaction satisfies the characteristic value. In various implementations, the method include indicating whether there is an anomaly based on a function of the current transaction in relation to the characteristic value.Type: ApplicationFiled: December 24, 2016Publication date: June 28, 2018Inventors: Ramanathan Jagadeesan, Judith Ying Priest, Anoop Nannra
-
Publication number: 20150289167Abstract: A method is provided in one example and includes receiving at least one first input indicating at least one network condition associated with a first user device having a user associated therewith. The first user device has a first bearer channel established between the first user device and a gateway, and the first bearer channel has a first quality of service level. The method further includes determining whether to modify the first user device to a second quality of service level based upon the received at least one first input, and sending a first request to a first network element instructing the first network element to modify the first user device to the second quality of service level.Type: ApplicationFiled: October 2, 2013Publication date: October 8, 2015Applicant: CISCO TECHNOLOGY, INC.Inventors: Arun C. Alex, Gibson Soon Teck Ang, Kevin D. Shatzkamer, Ramanathan Jagadeesan, Fred Chen, Rajesh P. Velandy, Wenxing Zheng
-
Publication number: 20150278296Abstract: A method is provided in one example and includes receiving data from a mobile network entity, parsing the data to determine a first identity and first attribute information associated with the first identity, determining whether the first identity exists in a database, storing the first identity in the database if the first identity does not exist in the database, and storing the first attribute information in association with the first identity in the database. The method further includes determining whether there is at least one identity related to the first identity in the database, and updating each of the related identities with the first attribute information when it is determined that there is at least one identity.Type: ApplicationFiled: October 2, 2013Publication date: October 1, 2015Applicant: CISCO TECHNOLOGY, INC.Inventors: Arun C. Alex, Rajesh P. Velandy, Kevin D. Shatzkamer, Ramanathan Jagadeesan, Fred Chen, Wenxing Zheng
-
Patent number: 8126160Abstract: Particular embodiments provide for attenuating one or more microphone signals in a teleconferencing system upon detecting a non-audible signal. A far end voice signal is received from a sound source. A non-audible signal is added to the far end voice signal to create a composite signal, which is provided to one or more speakers. The speakers output the composite signal and the non-audible signal are detected in the composite signal after the composite signal is received at one or more microphones. The non-audible signal allows an attenuator to attenuate a microphone signal including the composite signal from a particular microphone in response to the detected non-audible signal to reduce far end echo.Type: GrantFiled: September 22, 2008Date of Patent: February 28, 2012Assignee: Cisco Technology, Inc.Inventors: James C. Frauenthal, Ramanathan Jagadeesan, Michael A. Ramalho
-
Patent number: 7983199Abstract: A push-to-talk conference call is conducted over a packet switched network. Participants send a request and receive approval before being allowed to talk during the conference call. In one implementation, only one of the participants is enabled to transmit audio packets while other participants are only allowed to receive audio packets.Type: GrantFiled: September 6, 2002Date of Patent: July 19, 2011Assignee: Cisco Technology, Inc.Inventors: Bich Nguyen, Ramanathan Jagadeesan, Rakendu Devdhar, Andrew Chung, Dana Blair, Ilya Slain
-
Patent number: 7920492Abstract: Devices, softwares and methods are provided for redundantly encoding a data stream into frames for network transmission as packets. A main encoder encodes a data stream into main frames, while a redundant encoder encodes it into redundant frames. The redundant frames have a redundant-coding delay from the main frames that is adjustable to accommodate many different sets of network conditions.Type: GrantFiled: May 15, 2006Date of Patent: April 5, 2011Assignee: Cisco Technology, Inc.Inventors: Ramanathan Jagadeesan, Bich Nguyen
-
Patent number: 7904941Abstract: A content monitoring system applies policies to data transfers, and adapts the policies based on violations. Each policy includes a rule that detects violations and actions performed when the rule is violated. Policies may be adapted by, for example: enabling an inactive policy; modifying a parameter within a rule or an action; generating a new policy by combining a policy macro with the violating content block or with associated meta-data, for example, a user ID or IP address. An optional rolling buffer can be used to hold the most recent transfers, and newly adapted policies can be reapplied to the buffered content. Some content blocks are reassembled from a stream of terminal control protocol (TCP) packets that are transferred across a network barrier point. Other content blocks come from writes to removable media. Some content must be decoded, for example, a word processor file.Type: GrantFiled: November 22, 2005Date of Patent: March 8, 2011Assignee: Cisco Technology, Inc.Inventors: Ramanathan Jagadeesan, Bich Nguyen
-
Patent number: 7542455Abstract: Systems and methods are provided to facilitate efficient routing of unlicensed mobile access (UMA) communications. In one implementation, a method of providing a communication link between a first mobile station and a second mobile station through a customer premises equipment (CPE) device includes intercepting a call setup request provided by the first mobile station and received at a security gateway of the CPE device. An address associated with the second mobile station may be extracted from the call setup request and the address may be compared with a plurality of records maintained by the CPE device. A call setup request may be forwarded to the second mobile station if the address corresponds to at least one of the records. The first and second mobile stations may be in communication with the CPE device over a wireless local access network (WLAN) in accordance with an unlicensed mobile communication standard.Type: GrantFiled: April 18, 2006Date of Patent: June 2, 2009Assignee: Cisco Technology, Inc.Inventors: Mark Grayson, Bich Nguyen, Ramanathan Jagadeesan