Patents by Inventor Sanjai Narain

Sanjai Narain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10574525
    Abstract: A first controller in a distributed network obtains, concurrently with a second controller in the distributed network, a system requirement and a message from a logical bus. The first controller and the second controller are communicatively coupled to the logical bus, and the first controller is communicatively coupled to a first portion of the network components and the second controller is communicatively coupled to a second portion. A processor associated with the first controller solves, concurrently with the second controller, the system requirement and the solving includes applying a solver to generate new configurations of the network components. The new configurations generated by the first controller are identical to the new configurations generated by the second controller. The first controller extracts configurations relevant to the first portion of the network components and applies the configurations to the first portion of the network components.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: February 25, 2020
    Assignee: Perspecta Labs Inc.
    Inventors: Sanjai Narain, Brian Coan, Jon Kirsch
  • Patent number: 10419290
    Abstract: A method, computer system, and computer program product include identifying, by one or more processors, a node in a network, where the node includes an incorrect configuration, where the incorrect configuration is a configuration utilized by a first communications protocol for communication with the node, and where the node includes another configuration utilized by a second communications protocol, for communication with the node. The one or more processors utilize the second communications protocol and the other configuration to access the node over the network and reconfigure the node to update the incorrect configuration to a new configuration.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: September 17, 2019
    Assignee: Perspecta Labs Inc.
    Inventor: Sanjai Narain
  • Patent number: 10250444
    Abstract: A method, system, and computer program product configure elements of a hybrid network. The method may include a processor obtaining at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network; the components include a first component type and a second component type. After obtaining the requirement, the processor generates a plan to configure a component of the first component type and a component of the second component type. The processor configures the component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection. The processor configures the component of the second component type according to a second portion of the plan by transmitting this portion to a controller of components of the second component type in the hybrid network. The controller configures the component upon receipt of the portion.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: April 2, 2019
    Assignee: Perspecta Labs Inc.
    Inventor: Sanjai Narain
  • Patent number: 9967141
    Abstract: In a method, computer system, and computer program product include for re-configuring a network, program code identifies relationships between nodes on a network, where each relationship of the relationships includes a first node running a routing protocol and a second node running the routing protocol, where the first node and the second node are physically connected, and where the nodes include at least one controller and a plurality of routers. The program code performs, starting at the at least one controller a reverse breadth search of the relationships to determine for each router, a number of relationships comprising a path from the controller to the router. The program code, for example, program code that is executed on the at least one controller, reconfigures the routers in descending order of magnitude of the number of relationships comprising the path from each router of the plurality of routers to the controller.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: May 8, 2018
    Assignee: Vencore Labs, Inc.
    Inventors: Sanjai Narain, Samuel Gordon
  • Patent number: 9736183
    Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: August 15, 2017
    Assignee: VENCORE LABS, INC.
    Inventors: Sanjai Narain, Gary Levin
  • Publication number: 20170141955
    Abstract: A method, computer system, and computer program product include identifying, by one or more processors, a node in a network, where the node includes an incorrect configuration, where the incorrect configuration is a configuration utilized by a first communications protocol for communication with the node, and where the node includes another configuration utilized by a second communications protocol, for communication with the node. The one or more processors utilize the second communications protocol and the other configuration to access the node over the network and reconfigure the node to update the incorrect configuration to a new configuration.
    Type: Application
    Filed: June 30, 2016
    Publication date: May 18, 2017
    Inventor: Sanjai Narain
  • Publication number: 20170005862
    Abstract: In a method, computer system, and computer program product include for re-configuring a network, program code identifies relationships between nodes on a network, where each relationship of the relationships includes a first node running a routing protocol and a second node running the routing protocol, where the first node and the second node are physically connected, and where the nodes include at least one controller and a plurality of routers. The program code performs, starting at the at least one controller a reverse breadth search of the relationships to determine for each router, a number of relationships comprising a path from the controller to the router. The program code, for example, program code that is executed on the at least one controller, reconfigures the routers in descending order of magnitude of the number of relationships comprising the path from each router of the plurality of routers to the controller.
    Type: Application
    Filed: June 30, 2016
    Publication date: January 5, 2017
    Inventors: Sanjai Narain, Samuel Gordon
  • Publication number: 20170006067
    Abstract: A method, system, and computer program product configure elements of a hybrid network. The method may include a processor obtaining at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network; the components include a first component type and a second component type. After obtaining the requirement, the processor generates a plan to configure a component of the first component type and a component of the second component type. The processor configures the component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection. The processor configures the component of the second component type according to a second portion of the plan by transmitting this portion to a controller of components of the second component type in the hybrid network. The controller configures the component upon receipt of the portion.
    Type: Application
    Filed: June 30, 2016
    Publication date: January 5, 2017
    Inventor: Sanjai Narain
  • Publication number: 20170005870
    Abstract: A first controller in a distributed network obtains, concurrently with a second controller in the distributed network, a system requirement and a message from a logical bus. The first controller and the second controller are communicatively coupled to the logical bus, and the first controller is communicatively coupled to a first portion of the network components and the second controller is communicatively coupled to a second portion. A processor associated with the first controller solves, concurrently with the second controller, the system requirement and the solving includes applying a solver to generate new configurations of the network components. The new configurations generated by the first controller are identical to the new configurations generated by the second controller. The first controller extracts configurations relevant to the first portion of the network components and applies the configurations to the first portion of the network components.
    Type: Application
    Filed: June 30, 2016
    Publication date: January 5, 2017
    Inventors: Sanjai Narain, Brian Coan, Jon Kirsch
  • Publication number: 20160323313
    Abstract: There is set forth herein in on embodiment a method wherein configurations are changed. In one embodiment, configurations are changed in such a way that end-to-end requirements continue to be satisfied, the change is at minimum cost, and that at least one variable from a critical set of variables is changed.
    Type: Application
    Filed: May 30, 2014
    Publication date: November 3, 2016
    Applicant: TT GOVERNMENT SOLUTIONS, INC.
    Inventors: Sanjai NARAIN, Dana CHEE
  • Publication number: 20140337917
    Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.
    Type: Application
    Filed: July 28, 2014
    Publication date: November 13, 2014
    Applicant: TT GOVERNMENT SOLUTIONS, INC.
    Inventors: Sanjai Narain, Gary Levin
  • Patent number: 8826366
    Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.
    Type: Grant
    Filed: July 15, 2010
    Date of Patent: September 2, 2014
    Assignee: TT Government Solutions, Inc.
    Inventors: Sanjai Narain, Gary Levin
  • Patent number: 8805770
    Abstract: A method for solving the reconfiguration planning problem transforms the requirement that an invariant is always preserved into a constraint on the times at which the configuration parameters change. The method then solves this constraint to obtain the required reconfiguration plan. When this constraint is strengthened with a synthesis constraint, it is ensured that any final configuration that is computed is also reachable. An extension of the method allows parameters to take on multiple intermediate values.
    Type: Grant
    Filed: May 20, 2011
    Date of Patent: August 12, 2014
    Assignee: TT Government Solutions, Inc.
    Inventors: Sanjai Narain, Gary Levin
  • Patent number: 8725902
    Abstract: Changing a network configuration to restore compliance to one requirement may invalidate the network compliance with another requirement. A method changes a configuration to restore compliance to all requirements at minimum cost. The requirements are a hybrid of symbolic, arithmetic and bit-vector constraints, so traditional optimization techniques such as linear programming, that work only for purely arithmetic constraints, do not apply. The requirements are represented as SMT (satisfiability-modulo-theory) constraints on configuration variables, and then a weighted Max-SAT solver is used to compute the optimal configuration changes in order to minimize the cost.
    Type: Grant
    Filed: June 25, 2012
    Date of Patent: May 13, 2014
    Assignee: TT Government Solutions, Inc.
    Inventors: Sanjai Narain, Konstantine Arkoudas
  • Patent number: 8554796
    Abstract: A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database.
    Type: Grant
    Filed: July 16, 2010
    Date of Patent: October 8, 2013
    Assignee: TT Government Solutions, Inc.
    Inventors: Sanjai Narain, Gary Levin
  • Publication number: 20120331115
    Abstract: Changing a network configuration to restore compliance to one requirement may invalidate the network compliance with another requirement. A method changes a configuration to restore compliance to all requirements at minimum cost. The requirements are a hybrid of symbolic, arithmetic and bit-vector constraints, so traditional optimization techniques such as linear programming, that work only for purely arithmetic constraints, do not apply. The requirements are represented as SMT (satisfiability-modulo-theory) constraints on configuration variables, and then a weighted Max-SAT solver is used to compute the optimal configuration changes in order to minimize the cost.
    Type: Application
    Filed: June 25, 2012
    Publication date: December 27, 2012
    Applicant: Telcordia Technologies, Inc.
    Inventors: Sanjai Narain, Konstantine Arkoudas
  • Patent number: 8315966
    Abstract: A system and method provides a solution to the problem of applying end-to-end requirements of connectivity, security, reliability and performance to configure a network and ultimately assign network components to the network. All requirements are modeled as constraints and a constraint solver does the resolution. Not every constraint to be solved is solved by the model-finder. Instead, we “factor away” subsets of a constraint that can be efficiently solved via a special-purpose constraint solver, such as an SQL/Prolog engine, linear programming system, or even an algorithm, leaving behind a constraint that truly requires the power of model-finding, and that is often efficiently solvable by existing model-finders. Such constraints are compiled into quantifier-free constraints that are Boolean combinations of constraints of two forms x=y and x=c where x, y are variables and c is a constant. Such constraints can be efficiently solved by modern SAT-based model-finders.
    Type: Grant
    Filed: November 10, 2008
    Date of Patent: November 20, 2012
    Assignee: Telcordia Technologies, Inc.
    Inventors: Sanjai Narain, Gary Levin, Vikram Kaul, Rajesh Talpade
  • Publication number: 20120130939
    Abstract: A method for solving the reconfiguration planning problem transforms the requirement that an invariant is always preserved into a constraint on the times at which the configuration parameters change. The method then solves this constraint to obtain the required reconfiguration plan. When this constraint is strengthened with a synthesis constraint, it is ensured that any final configuration that is computed is also reachable. An extension of the method allows parameters to take on multiple intermediate values.
    Type: Application
    Filed: May 20, 2011
    Publication date: May 24, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Sanjai Narain, Gary Levin
  • Publication number: 20120016909
    Abstract: A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database.
    Type: Application
    Filed: July 16, 2010
    Publication date: January 19, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Sanjai Narain, Gary Levin
  • Publication number: 20120017260
    Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.
    Type: Application
    Filed: July 15, 2010
    Publication date: January 19, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Sanjai Narain, Gary Levin