Patents by Inventor Ramanathan Jagadeesan

Ramanathan Jagadeesan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220035937
    Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.
    Type: Application
    Filed: October 14, 2021
    Publication date: February 3, 2022
    Inventors: Jeffrey C. VENABLE, SR., Ramanathan JAGADEESAN
  • Patent number: 11151261
    Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.
    Type: Grant
    Filed: April 3, 2019
    Date of Patent: October 19, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey C. Venable, Sr., Ramanathan Jagadeesan
  • Patent number: 11120119
    Abstract: Systems, methods, and devices are disclosed for authenticating a product. An internal component of a product is identified by identifying an intrinsic attribute of the internal component, where the intrinsic attribute is received at a time subsequent to independently storing the intrinsic attribute in a database. A match is determined between the intrinsic attribute and the stored intrinsic attribute. The product is confirmed to be authentic when the match is verified.
    Type: Grant
    Filed: April 6, 2018
    Date of Patent: September 14, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: D. Brice Achkir, Ramanathan Jagadeesan
  • Patent number: 10863387
    Abstract: A method is provided in one example and includes receiving at least one first input indicating at least one network condition associated with a first user device having a user associated therewith. The first user device has a first bearer channel established between the first user device and a gateway, and the first bearer channel has a first quality of service level. The method further includes determining whether to modify the first user device to a second quality of service level based upon the received at least one first input, and sending a first request to a first network element instructing the first network element to modify the first user device to the second quality of service level.
    Type: Grant
    Filed: October 2, 2013
    Date of Patent: December 8, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Arun C. Alex, Gibson Soon Teck Ang, Kevin D. Shatzkamer, Ramanathan Jagadeesan, Fred Chen, Rajesh P. Velandy, Wenxing Zheng
  • Patent number: 10826762
    Abstract: A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: November 3, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Charles Calvin Byers, Anoop Nannra, Ramanathan Jagadeesan, John Parello, Biren Gandhi
  • Publication number: 20200320204
    Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.
    Type: Application
    Filed: April 3, 2019
    Publication date: October 8, 2020
    Inventors: Jeffrey C. VENABLE, SR., Ramanathan JAGADEESAN
  • Publication number: 20200044918
    Abstract: A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.
    Type: Application
    Filed: August 6, 2018
    Publication date: February 6, 2020
    Inventors: Charles Calvin BYERS, Anoop NANNRA, Ramanathan JAGADEESAN, John PARELLO, Biren GANDHI
  • Patent number: 10476682
    Abstract: In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. In various implementations, the method includes synchronizing a first clock of the first network node with respective clocks maintained by one or more of the plurality of network nodes. In various implementations, the method includes obtaining a transaction indicator including respective transaction data. For example, in some implementations, the method includes receiving a transaction request from a client device. In various implementations, the method includes synthesizing, by the first network node, a timestamp for the transaction based on the first clock.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: November 12, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Anoop Nannra, Judith Ying Priest, Ramanathan Jagadeesan
  • Publication number: 20190311108
    Abstract: Systems, methods, and devices are disclosed for authenticating a product. An internal component of a product is identified by identifying an intrinsic attribute of the internal component, where the intrinsic attribute is received at a time subsequent to independently storing the intrinsic attribute in a database. A match is determined between the intrinsic attribute and the stored intrinsic attribute. The product is confirmed to be authentic when the match is verified.
    Type: Application
    Filed: April 6, 2018
    Publication date: October 10, 2019
    Inventors: D. Brice Achkir, Ramanathan Jagadeesan
  • Patent number: 10311230
    Abstract: In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. In various implementations, the method includes determining a characteristic value based on information associated with the distributed ledger. In some implementations, the distributed ledger stores blocks of transactions that were added to the distributed ledger based on a consensus determination between the plurality of network nodes. In various implementations, the method includes determining whether a current transaction satisfies the characteristic value. In various implementations, the method include indicating whether there is an anomaly based on a function of the current transaction in relation to the characteristic value.
    Type: Grant
    Filed: December 24, 2016
    Date of Patent: June 4, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Ramanathan Jagadeesan, Judith Ying Priest, Anoop Nannra
  • Publication number: 20180254841
    Abstract: In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface. In various implementations, the method includes synchronizing a first clock of the first network node with respective clocks maintained by one or more of the plurality of network nodes. In various implementations, the method includes obtaining a transaction indicator including respective transaction data. For example, in some implementations, the method includes receiving a transaction request from a client device. In various implementations, the method includes synthesizing, by the first network node, a timestamp for the transaction based on the first clock.
    Type: Application
    Filed: March 1, 2017
    Publication date: September 6, 2018
    Inventors: Anoop Nannra, Judith Ying Priest, Ramanathan Jagadeesan
  • Publication number: 20180181751
    Abstract: In various implementations, a method of identifying anomalies is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes one or more processors, a non-transitory memory, and one or more network interfaces. In various implementations, the method includes determining a characteristic value based on information associated with the distributed ledger. In some implementations, the distributed ledger stores blocks of transactions that were added to the distributed ledger based on a consensus determination between the plurality of network nodes. In various implementations, the method includes determining whether a current transaction satisfies the characteristic value. In various implementations, the method include indicating whether there is an anomaly based on a function of the current transaction in relation to the characteristic value.
    Type: Application
    Filed: December 24, 2016
    Publication date: June 28, 2018
    Inventors: Ramanathan Jagadeesan, Judith Ying Priest, Anoop Nannra
  • Publication number: 20150289167
    Abstract: A method is provided in one example and includes receiving at least one first input indicating at least one network condition associated with a first user device having a user associated therewith. The first user device has a first bearer channel established between the first user device and a gateway, and the first bearer channel has a first quality of service level. The method further includes determining whether to modify the first user device to a second quality of service level based upon the received at least one first input, and sending a first request to a first network element instructing the first network element to modify the first user device to the second quality of service level.
    Type: Application
    Filed: October 2, 2013
    Publication date: October 8, 2015
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Arun C. Alex, Gibson Soon Teck Ang, Kevin D. Shatzkamer, Ramanathan Jagadeesan, Fred Chen, Rajesh P. Velandy, Wenxing Zheng
  • Publication number: 20150278296
    Abstract: A method is provided in one example and includes receiving data from a mobile network entity, parsing the data to determine a first identity and first attribute information associated with the first identity, determining whether the first identity exists in a database, storing the first identity in the database if the first identity does not exist in the database, and storing the first attribute information in association with the first identity in the database. The method further includes determining whether there is at least one identity related to the first identity in the database, and updating each of the related identities with the first attribute information when it is determined that there is at least one identity.
    Type: Application
    Filed: October 2, 2013
    Publication date: October 1, 2015
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Arun C. Alex, Rajesh P. Velandy, Kevin D. Shatzkamer, Ramanathan Jagadeesan, Fred Chen, Wenxing Zheng
  • Patent number: 8126160
    Abstract: Particular embodiments provide for attenuating one or more microphone signals in a teleconferencing system upon detecting a non-audible signal. A far end voice signal is received from a sound source. A non-audible signal is added to the far end voice signal to create a composite signal, which is provided to one or more speakers. The speakers output the composite signal and the non-audible signal are detected in the composite signal after the composite signal is received at one or more microphones. The non-audible signal allows an attenuator to attenuate a microphone signal including the composite signal from a particular microphone in response to the detected non-audible signal to reduce far end echo.
    Type: Grant
    Filed: September 22, 2008
    Date of Patent: February 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: James C. Frauenthal, Ramanathan Jagadeesan, Michael A. Ramalho
  • Patent number: 7983199
    Abstract: A push-to-talk conference call is conducted over a packet switched network. Participants send a request and receive approval before being allowed to talk during the conference call. In one implementation, only one of the participants is enabled to transmit audio packets while other participants are only allowed to receive audio packets.
    Type: Grant
    Filed: September 6, 2002
    Date of Patent: July 19, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Bich Nguyen, Ramanathan Jagadeesan, Rakendu Devdhar, Andrew Chung, Dana Blair, Ilya Slain
  • Patent number: 7920492
    Abstract: Devices, softwares and methods are provided for redundantly encoding a data stream into frames for network transmission as packets. A main encoder encodes a data stream into main frames, while a redundant encoder encodes it into redundant frames. The redundant frames have a redundant-coding delay from the main frames that is adjustable to accommodate many different sets of network conditions.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: April 5, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Ramanathan Jagadeesan, Bich Nguyen
  • Patent number: 7904941
    Abstract: A content monitoring system applies policies to data transfers, and adapts the policies based on violations. Each policy includes a rule that detects violations and actions performed when the rule is violated. Policies may be adapted by, for example: enabling an inactive policy; modifying a parameter within a rule or an action; generating a new policy by combining a policy macro with the violating content block or with associated meta-data, for example, a user ID or IP address. An optional rolling buffer can be used to hold the most recent transfers, and newly adapted policies can be reapplied to the buffered content. Some content blocks are reassembled from a stream of terminal control protocol (TCP) packets that are transferred across a network barrier point. Other content blocks come from writes to removable media. Some content must be decoded, for example, a word processor file.
    Type: Grant
    Filed: November 22, 2005
    Date of Patent: March 8, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Ramanathan Jagadeesan, Bich Nguyen
  • Patent number: 7542455
    Abstract: Systems and methods are provided to facilitate efficient routing of unlicensed mobile access (UMA) communications. In one implementation, a method of providing a communication link between a first mobile station and a second mobile station through a customer premises equipment (CPE) device includes intercepting a call setup request provided by the first mobile station and received at a security gateway of the CPE device. An address associated with the second mobile station may be extracted from the call setup request and the address may be compared with a plurality of records maintained by the CPE device. A call setup request may be forwarded to the second mobile station if the address corresponds to at least one of the records. The first and second mobile stations may be in communication with the CPE device over a wireless local access network (WLAN) in accordance with an unlicensed mobile communication standard.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: June 2, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Grayson, Bich Nguyen, Ramanathan Jagadeesan
  • Patent number: 7490125
    Abstract: The invention relates to a system and method for coordinating multiple session multimodal interaction. The system and method includes a capability discovery module adapted to discover multimodal capability between at least one client and a multimodal device. The system and method includes an association module adapted to associate multiple independent sessions. The system and method includes a synchronization module adapted to synchronize at least one session with other sessions. And the system and method integrate the at least one client with other devices.
    Type: Grant
    Filed: June 10, 2003
    Date of Patent: February 10, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Ramanathan Jagadeesan, Wai-Yip Tung, Bich Nguyen, Alex Yiu-Man Chan, David Lee