Patents by Inventor Sanjai Narain
Sanjai Narain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10574525Abstract: A first controller in a distributed network obtains, concurrently with a second controller in the distributed network, a system requirement and a message from a logical bus. The first controller and the second controller are communicatively coupled to the logical bus, and the first controller is communicatively coupled to a first portion of the network components and the second controller is communicatively coupled to a second portion. A processor associated with the first controller solves, concurrently with the second controller, the system requirement and the solving includes applying a solver to generate new configurations of the network components. The new configurations generated by the first controller are identical to the new configurations generated by the second controller. The first controller extracts configurations relevant to the first portion of the network components and applies the configurations to the first portion of the network components.Type: GrantFiled: June 30, 2016Date of Patent: February 25, 2020Assignee: Perspecta Labs Inc.Inventors: Sanjai Narain, Brian Coan, Jon Kirsch
-
Patent number: 10419290Abstract: A method, computer system, and computer program product include identifying, by one or more processors, a node in a network, where the node includes an incorrect configuration, where the incorrect configuration is a configuration utilized by a first communications protocol for communication with the node, and where the node includes another configuration utilized by a second communications protocol, for communication with the node. The one or more processors utilize the second communications protocol and the other configuration to access the node over the network and reconfigure the node to update the incorrect configuration to a new configuration.Type: GrantFiled: June 30, 2016Date of Patent: September 17, 2019Assignee: Perspecta Labs Inc.Inventor: Sanjai Narain
-
Patent number: 10250444Abstract: A method, system, and computer program product configure elements of a hybrid network. The method may include a processor obtaining at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network; the components include a first component type and a second component type. After obtaining the requirement, the processor generates a plan to configure a component of the first component type and a component of the second component type. The processor configures the component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection. The processor configures the component of the second component type according to a second portion of the plan by transmitting this portion to a controller of components of the second component type in the hybrid network. The controller configures the component upon receipt of the portion.Type: GrantFiled: June 30, 2016Date of Patent: April 2, 2019Assignee: Perspecta Labs Inc.Inventor: Sanjai Narain
-
Patent number: 9967141Abstract: In a method, computer system, and computer program product include for re-configuring a network, program code identifies relationships between nodes on a network, where each relationship of the relationships includes a first node running a routing protocol and a second node running the routing protocol, where the first node and the second node are physically connected, and where the nodes include at least one controller and a plurality of routers. The program code performs, starting at the at least one controller a reverse breadth search of the relationships to determine for each router, a number of relationships comprising a path from the controller to the router. The program code, for example, program code that is executed on the at least one controller, reconfigures the routers in descending order of magnitude of the number of relationships comprising the path from each router of the plurality of routers to the controller.Type: GrantFiled: June 30, 2016Date of Patent: May 8, 2018Assignee: Vencore Labs, Inc.Inventors: Sanjai Narain, Samuel Gordon
-
Patent number: 9736183Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.Type: GrantFiled: July 28, 2014Date of Patent: August 15, 2017Assignee: VENCORE LABS, INC.Inventors: Sanjai Narain, Gary Levin
-
Publication number: 20170141955Abstract: A method, computer system, and computer program product include identifying, by one or more processors, a node in a network, where the node includes an incorrect configuration, where the incorrect configuration is a configuration utilized by a first communications protocol for communication with the node, and where the node includes another configuration utilized by a second communications protocol, for communication with the node. The one or more processors utilize the second communications protocol and the other configuration to access the node over the network and reconfigure the node to update the incorrect configuration to a new configuration.Type: ApplicationFiled: June 30, 2016Publication date: May 18, 2017Inventor: Sanjai Narain
-
Publication number: 20170005862Abstract: In a method, computer system, and computer program product include for re-configuring a network, program code identifies relationships between nodes on a network, where each relationship of the relationships includes a first node running a routing protocol and a second node running the routing protocol, where the first node and the second node are physically connected, and where the nodes include at least one controller and a plurality of routers. The program code performs, starting at the at least one controller a reverse breadth search of the relationships to determine for each router, a number of relationships comprising a path from the controller to the router. The program code, for example, program code that is executed on the at least one controller, reconfigures the routers in descending order of magnitude of the number of relationships comprising the path from each router of the plurality of routers to the controller.Type: ApplicationFiled: June 30, 2016Publication date: January 5, 2017Inventors: Sanjai Narain, Samuel Gordon
-
Publication number: 20170006067Abstract: A method, system, and computer program product configure elements of a hybrid network. The method may include a processor obtaining at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network; the components include a first component type and a second component type. After obtaining the requirement, the processor generates a plan to configure a component of the first component type and a component of the second component type. The processor configures the component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection. The processor configures the component of the second component type according to a second portion of the plan by transmitting this portion to a controller of components of the second component type in the hybrid network. The controller configures the component upon receipt of the portion.Type: ApplicationFiled: June 30, 2016Publication date: January 5, 2017Inventor: Sanjai Narain
-
Publication number: 20170005870Abstract: A first controller in a distributed network obtains, concurrently with a second controller in the distributed network, a system requirement and a message from a logical bus. The first controller and the second controller are communicatively coupled to the logical bus, and the first controller is communicatively coupled to a first portion of the network components and the second controller is communicatively coupled to a second portion. A processor associated with the first controller solves, concurrently with the second controller, the system requirement and the solving includes applying a solver to generate new configurations of the network components. The new configurations generated by the first controller are identical to the new configurations generated by the second controller. The first controller extracts configurations relevant to the first portion of the network components and applies the configurations to the first portion of the network components.Type: ApplicationFiled: June 30, 2016Publication date: January 5, 2017Inventors: Sanjai Narain, Brian Coan, Jon Kirsch
-
Publication number: 20160323313Abstract: There is set forth herein in on embodiment a method wherein configurations are changed. In one embodiment, configurations are changed in such a way that end-to-end requirements continue to be satisfied, the change is at minimum cost, and that at least one variable from a critical set of variables is changed.Type: ApplicationFiled: May 30, 2014Publication date: November 3, 2016Applicant: TT GOVERNMENT SOLUTIONS, INC.Inventors: Sanjai NARAIN, Dana CHEE
-
Publication number: 20140337917Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.Type: ApplicationFiled: July 28, 2014Publication date: November 13, 2014Applicant: TT GOVERNMENT SOLUTIONS, INC.Inventors: Sanjai Narain, Gary Levin
-
Patent number: 8826366Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.Type: GrantFiled: July 15, 2010Date of Patent: September 2, 2014Assignee: TT Government Solutions, Inc.Inventors: Sanjai Narain, Gary Levin
-
Patent number: 8805770Abstract: A method for solving the reconfiguration planning problem transforms the requirement that an invariant is always preserved into a constraint on the times at which the configuration parameters change. The method then solves this constraint to obtain the required reconfiguration plan. When this constraint is strengthened with a synthesis constraint, it is ensured that any final configuration that is computed is also reachable. An extension of the method allows parameters to take on multiple intermediate values.Type: GrantFiled: May 20, 2011Date of Patent: August 12, 2014Assignee: TT Government Solutions, Inc.Inventors: Sanjai Narain, Gary Levin
-
Patent number: 8725902Abstract: Changing a network configuration to restore compliance to one requirement may invalidate the network compliance with another requirement. A method changes a configuration to restore compliance to all requirements at minimum cost. The requirements are a hybrid of symbolic, arithmetic and bit-vector constraints, so traditional optimization techniques such as linear programming, that work only for purely arithmetic constraints, do not apply. The requirements are represented as SMT (satisfiability-modulo-theory) constraints on configuration variables, and then a weighted Max-SAT solver is used to compute the optimal configuration changes in order to minimize the cost.Type: GrantFiled: June 25, 2012Date of Patent: May 13, 2014Assignee: TT Government Solutions, Inc.Inventors: Sanjai Narain, Konstantine Arkoudas
-
Patent number: 8554796Abstract: A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database.Type: GrantFiled: July 16, 2010Date of Patent: October 8, 2013Assignee: TT Government Solutions, Inc.Inventors: Sanjai Narain, Gary Levin
-
Publication number: 20120331115Abstract: Changing a network configuration to restore compliance to one requirement may invalidate the network compliance with another requirement. A method changes a configuration to restore compliance to all requirements at minimum cost. The requirements are a hybrid of symbolic, arithmetic and bit-vector constraints, so traditional optimization techniques such as linear programming, that work only for purely arithmetic constraints, do not apply. The requirements are represented as SMT (satisfiability-modulo-theory) constraints on configuration variables, and then a weighted Max-SAT solver is used to compute the optimal configuration changes in order to minimize the cost.Type: ApplicationFiled: June 25, 2012Publication date: December 27, 2012Applicant: Telcordia Technologies, Inc.Inventors: Sanjai Narain, Konstantine Arkoudas
-
Patent number: 8315966Abstract: A system and method provides a solution to the problem of applying end-to-end requirements of connectivity, security, reliability and performance to configure a network and ultimately assign network components to the network. All requirements are modeled as constraints and a constraint solver does the resolution. Not every constraint to be solved is solved by the model-finder. Instead, we “factor away” subsets of a constraint that can be efficiently solved via a special-purpose constraint solver, such as an SQL/Prolog engine, linear programming system, or even an algorithm, leaving behind a constraint that truly requires the power of model-finding, and that is often efficiently solvable by existing model-finders. Such constraints are compiled into quantifier-free constraints that are Boolean combinations of constraints of two forms x=y and x=c where x, y are variables and c is a constant. Such constraints can be efficiently solved by modern SAT-based model-finders.Type: GrantFiled: November 10, 2008Date of Patent: November 20, 2012Assignee: Telcordia Technologies, Inc.Inventors: Sanjai Narain, Gary Levin, Vikram Kaul, Rajesh Talpade
-
Publication number: 20120130939Abstract: A method for solving the reconfiguration planning problem transforms the requirement that an invariant is always preserved into a constraint on the times at which the configuration parameters change. The method then solves this constraint to obtain the required reconfiguration plan. When this constraint is strengthened with a synthesis constraint, it is ensured that any final configuration that is computed is also reachable. An extension of the method allows parameters to take on multiple intermediate values.Type: ApplicationFiled: May 20, 2011Publication date: May 24, 2012Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Sanjai Narain, Gary Levin
-
Publication number: 20120016909Abstract: A method is provided for analyzing the semantic content of network configuration files, comprising the steps of accessing configuration files associated with corresponding network components, the files containing commands that define the configuration of those components; transforming the commands into a structural database based, at least in part, on a non-grammatical analysis of the commands, wherein the structure of the commands is represented as the structural database; and constructing a semantic database of the configuration files by querying the structural database.Type: ApplicationFiled: July 16, 2010Publication date: January 19, 2012Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Sanjai Narain, Gary Levin
-
Publication number: 20120017260Abstract: A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.Type: ApplicationFiled: July 15, 2010Publication date: January 19, 2012Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Sanjai Narain, Gary Levin