Patents by Inventor Sajeesh Mathew
Sajeesh Mathew has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250023787Abstract: In an example, a validation system comprises processing circuitry having access to a storage device and is configured to obtain flow records indicative of packet flows among workloads deployed to a cluster of one or more computing devices configured with a network policy, wherein each flow record of the flow records indicates a corresponding packet flow was allowed or denied by the cluster; receive an updated network policy; determine whether a corresponding packet flow for a flow record of the flow records has a discrepancy with the updated network policy; and in response to determining the corresponding packet flow for the flow record of the flow records has a discrepancy with the updated network policy, output an indication of an error.Type: ApplicationFiled: September 23, 2024Publication date: January 16, 2025Inventors: Prasad Miriyala, FNU Nadeem, Sayali Mane, Ankur Tandon, Sajeesh Mathew, Pranav Cherukupalli, Khushi Vaidya
-
Publication number: 20240422167Abstract: A network controller for a software-defined networking (SDN) architecture system may receive a request to generate an access control policy for a role in a container orchestration system, where the request specifies a plurality of functions. The network controller may execute the plurality of functions and may log execution of the plurality of functions in an audit log. The network controller may parse the audit log to determine a plurality of resources of the container orchestration system accessed from executing the plurality of functions and, for each resource of the plurality of resources, a respective one or more types of operations performed on the respective resource. The network controller may create, based at least in part on the parsed audit log, the access control policy for the role that permits a role to perform, on each of the plurality of resources, the respective one or more types of operations.Type: ApplicationFiled: August 26, 2024Publication date: December 19, 2024Inventors: Prasad Miriyala, Sajeesh Mathew, Akhilesh Pathodia, Tashi Garg
-
Patent number: 12159176Abstract: A container orchestration platform manages a plurality of instances of resources including a first custom resource and a second custom resource. An API server of the container orchestration platform receives a request to delete an instance of the second custom resource; determines whether instance data associated with the instance of the second custom resource has a backreference identifying an instance of the first custom resource, the backreference indicating the instance of the first custom resource is dependent on the instance of the second custom resource; and in response to determining that the instance data has the backreference to the instance of the first custom resource, bypasses deletion of the instance of the second custom resource.Type: GrantFiled: September 30, 2021Date of Patent: December 3, 2024Assignee: Juniper Networks, Inc.Inventors: Yuvaraja Mariappan, Thayumanavan Sridhar, Sajeesh Mathew, Raj Yavatkar, Senthilnathan Murugappan, Raja Kommula, Kiran K N
-
Patent number: 12143385Abstract: In some examples, an access control policy controller in a computer network may receive a request to create an access control policy that permits a role to perform one or more functions in the computer network. The access control policy controller may determine one or more operations performed on one or more objects in the computer network to perform the one or more functions based at least in part on tracking performance of the one or more functions in the computer network. The access control policy controller may create the access control policy for the role that permits the role to perform the one or more operations on the one or more objects in the computer network.Type: GrantFiled: February 9, 2023Date of Patent: November 12, 2024Assignee: JUNIPER NETWORKS, INC.Inventors: Prasad Miriyala, Sajeesh Mathew, Kannan Varadhan
-
Patent number: 12107859Abstract: In some examples, an access control policy controller in a computer network may receive a request to create an access control policy that permits a role to perform one or more functions in the computer network. The access control policy controller may determine one or more operations performed on one or more objects in the computer network to perform the one or more functions based at least in part on tracking performance of the one or more functions in the computer network. The access control policy controller may create the access control policy for the role that permits the role to perform the one or more operations on the one or more objects in the computer network.Type: GrantFiled: February 9, 2023Date of Patent: October 1, 2024Assignee: JUNIPER NETWORKS, INC.Inventors: Prasad Miriyala, Sajeesh Mathew, Kannan Varadhan
-
Patent number: 12101227Abstract: In an example, a validation system comprises processing circuitry having access to a storage device and is configured to obtain flow records indicative of packet flows among workloads deployed to a cluster of one or more computing devices configured with a network policy, wherein each flow record of the flow records indicates a corresponding packet flow was allowed or denied by the cluster; receive an updated network policy; determine whether a corresponding packet flow for a flow record of the flow records has a discrepancy with the updated network policy; and in response to determining the corresponding packet flow for the flow record of the flow records has a discrepancy with the updated network policy, output an indication of an error.Type: GrantFiled: May 5, 2023Date of Patent: September 24, 2024Assignee: JUNIPER NETWORKS, INC.Inventors: Prasad Miriyala, FNU Nadeem, Sayali Mane, Ankur Tandon, Sajeesh Mathew, Pranav Cherukupalli, Khushi Vaidya
-
Patent number: 12074884Abstract: A network controller for a software-defined networking (SDN) architecture system may receive a request to generate an access control policy for a role in a container orchestration system, where the request specifies a plurality of functions. The network controller may execute the plurality of functions and may log execution of the plurality of functions in an audit log. The network controller may parse the audit log to determine a plurality of resources of the container orchestration system accessed from executing the plurality of functions and, for each resource of the plurality of resources, a respective one or more types of operations performed on the respective resource. The network controller may create, based at least in part on the parsed audit log, the access control policy for the role that permits a role to perform, on each of the plurality of resources, the respective one or more types of operations.Type: GrantFiled: June 24, 2022Date of Patent: August 27, 2024Assignee: JUNIPER NETWORKS, INC.Inventors: Prasad Miriyala, Sajeesh Mathew, Akhilesh Pathodia, Tashi Garg
-
Publication number: 20240223454Abstract: In an example, a validation system comprises processing circuitry having access to a storage device and is configured to obtain flow records indicative of packet flows among workloads deployed to a cluster of one or more computing devices configured with a network policy, wherein each flow record of the flow records indicates a corresponding packet flow was allowed or denied by the cluster; receive an updated network policy; determine whether a corresponding packet flow for a flow record of the flow records has a discrepancy with the updated network policy; and in response to determining the corresponding packet flow for the flow record of the flow records has a discrepancy with the updated network policy, output an indication of an error.Type: ApplicationFiled: May 5, 2023Publication date: July 4, 2024Inventors: Prasad Miriyala, FNU Nadeem, Sayali Mane, Ankur Tandon, Sajeesh Mathew, Pranav Cherukupalli, Khushi Vaidya
-
Publication number: 20230188526Abstract: In some examples, an access control policy controller in a computer network may receive a request to create an access control policy that permits a role to perform one or more functions in the computer network. The access control policy controller may determine one or more operations performed on one or more objects in the computer network to perform the one or more functions based at least in part on tracking performance of the one or more functions in the computer network. The access control policy controller may create the access control policy for the role that permits the role to perform the one or more operations on the one or more objects in the computer network.Type: ApplicationFiled: February 9, 2023Publication date: June 15, 2023Inventors: Prasad Miriyala, Sajeesh Mathew, Kannan Varadhan
-
Publication number: 20230104368Abstract: A network controller for a software-defined networking (SDN) architecture system may receive a request to generate an access control policy for a role in a container orchestration system, where the request specifies a plurality of functions. The network controller may execute the plurality of functions and may log execution of the plurality of functions in an audit log. The network controller may parse the audit log to determine a plurality of resources of the container orchestration system accessed from executing the plurality of functions and, for each resource of the plurality of resources, a respective one or more types of operations performed on the respective resource. The network controller may create, based at least in part on the parsed audit log, the access control policy for the role that permits a role to perform, on each of the plurality of resources, the respective one or more types of operations.Type: ApplicationFiled: June 24, 2022Publication date: April 6, 2023Inventors: Prasad Miriyala, Sajeesh Mathew, Akhilesh Pathodia, Tashi Garg
-
Publication number: 20230101973Abstract: A container orchestration platform manages a plurality of instances of resources including a first custom resource and a second custom resource. An API server of the container orchestration platform receives a request to delete an instance of the second custom resource; determines whether instance data associated with the instance of the second custom resource has a backreference identifying an instance of the first custom resource, the backreference indicating the instance of the first custom resource is dependent on the instance of the second custom resource; and in response to determining that the instance data has the backreference to the instance of the first custom resource, bypasses deletion of the instance of the second custom resource.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Inventors: Yuvaraja Mariappan, Thayumanavan Sridhar, Sajeesh Mathew, Raj Yavatkar, Senthilnathan Murugappan, Raja Kommula, Kiran K N
-
Patent number: 11595393Abstract: In some examples, an access control policy controller in a computer network may receive a request to create an access control policy that permits a role to perform one or more functions in the computer network. The access control policy controller may determine one or more operations performed on one or more objects in the computer network to perform the one or more functions based at least in part on tracking performance of the one or more functions in the computer network. The access control policy controller may create the access control policy for the role that permits the role to perform the one or more operations on the one or more objects in the computer network.Type: GrantFiled: March 31, 2020Date of Patent: February 28, 2023Assignee: Juniper Networks, Inc.Inventors: Prasad Miriyala, Sajeesh Mathew, Kannan Varadhan
-
Publication number: 20210306338Abstract: In some examples, an access control policy controller in a computer network may receive a request to create an access control policy that permits a role to perform one or more functions in the computer network. The access control policy controller may determine one or more operations performed on one or more objects in the computer network to perform the one or more functions based at least in part on tracking performance of the one or more functions in the computer network. The access control policy controller may create the access control policy for the role that permits the role to perform the one or more operations on the one or more objects in the computer network.Type: ApplicationFiled: March 31, 2020Publication date: September 30, 2021Applicant: Juniper Networks, Inc.Inventors: Prasad Miriyala, Sajeesh Mathew, Kannan Varadhan