Patents by Inventor Sanjay Kumar Hooda
Sanjay Kumar Hooda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250080474Abstract: Techniques that include a network that is configured in the first mode of a reactive mode to respond to a client attempting to access an endpoint of the network by providing information to be sent to a map server and by checking whether at least an IP address associated with the client corresponds to a registration produced for the client by a wireless controller. Further, the network is configured in a second mode of a proactive mode to determine based on a count maintained by a wireless controller of a number of client IP addresses whether to allow access or not to allow access to one or more clients to the network.Type: ApplicationFiled: August 31, 2023Publication date: March 6, 2025Inventors: Shree Narasimha Murthy, Sanjay Kumar Hooda, Sonal Prem Kumar Chhabria
-
Patent number: 12244560Abstract: This disclosure describes techniques to operate a control plane in a network fabric. The techniques include determining a stateless rule corresponding to communication between a first segment of the network fabric and a second segment of the network fabric. The techniques further include configuring the control plane to enforce the stateless rule.Type: GrantFiled: September 29, 2023Date of Patent: March 4, 2025Assignee: Cisco Technology, Inc.Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Satish Kumar Kondalam, Vikram Vikas Pendharkar, Anoop Vetteth, Solomon T Lucas
-
Publication number: 20250062988Abstract: Techniques are described herein for service chaining in fabric networks such that hardware resources can be preserved without service nodes needing additional capabilities. The techniques may include storing a first configuration associated with a first VRF instance of a service forwarding node that is connected to a first service of a service chain sequence. The first configuration may indicate an identifier and a type associated with a second service of the service chain sequence where traffic is to be sent after the first service. Additionally, the techniques may also include storing a second configuration associated with a second VRF instance of the service forwarding node that is connected to the second service. The second configuration may indicate that the second service is a last service of the service chain sequence. When traffic is received at the service forwarding node, the service forwarding node can determine whether the traffic is pre-service traffic or post-service traffic.Type: ApplicationFiled: November 5, 2024Publication date: February 20, 2025Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Vinay Saini, Victor Manuel Moreno
-
Patent number: 12224931Abstract: Techniques for a Software-Defined Networking (SDN) controller associated with a multisite network to implement jurisdictional data sovereignty polices in a multisite network, route network traffic flows between user sites and destination services over one or more provider sites, and/or perform a routing operation on the network traffic flow(s) based on the jurisdictional data sovereignty policies. The jurisdictional data sovereignty polices may be implemented using destination group tags (DGTs) and/or source group tags (SGTs). A secure access service edge (SASE) associated with the network controller may generate, store, and distribute the DGTs to provider sites and/or the SGTs to user sites. Based on the SGT and/or DGT associated with a network traffic flow, one or more services may be applied to the network traffic flow, and the network traffic flow may be routed through a particular region of a software-defined access (SDA) transit.Type: GrantFiled: August 29, 2022Date of Patent: February 11, 2025Assignee: Cisco Technology, Inc.Inventors: Prakash C. Jain, Vinay Saini, Sanjay Kumar Hooda
-
Publication number: 20250039144Abstract: Techniques and architecture are described for providing a service, e.g., a security service such as a firewall, across different virtual networks/VRFs/VPN IDs. The techniques and architecture provide modifications in enterprise computing fabrics by modifying pull-based overlay protocols such as, for example, locator/identifier separation protocol (LISP), border gateway protocol ethernet virtual private network (BGP EVPN), etc. A map request carries additional information to instruct a map-server that even though mapping (destination prefix and firewall service RLOC for the destination) is known within the map-server's own virtual network/VRF for firewall service insertion, the map-server still should do a lookup across virtual networks/VRFs and discover the final destination's DGT (destination group tag) and include that in the map reply.Type: ApplicationFiled: October 17, 2024Publication date: January 30, 2025Inventors: Sanjay Kumar Hooda, Prakash C. Jain
-
Patent number: 12212540Abstract: Automated techniques for converting network devices from a Layer 2 (L2) network into a Layer 3 (L3) network in a hierarchical manner are described herein. The network devices may be configured to boot such that their ports are in an initialization mode in which the ports are unable to transmit locally generated DHCP packets. When a network device detects that a neighbor (or “peer”) device has acquired an IP address or has been configured by a network controller, then the port on which the neighbor device is detected can then be transitioned from the initialization mode into a forwarding mode. In the forwarding mode, the port can be used to transmit packets to obtain an IP address. Thus, the network devices are converted from an L2 device to an L3 device in a hierarchical order such that upstream devices are discovered and converted into L3 devices before downstream devices.Type: GrantFiled: November 17, 2023Date of Patent: January 28, 2025Assignee: Cisco Technology, Inc.Inventors: Rajeev Kumar, Sanjay Kumar Hooda, Ramesh Chandra Yeevani-Srinivas
-
Patent number: 12212544Abstract: Techniques and architecture are described for providing a service, e.g., a security service such as a firewall, across different virtual networks/VRFs/VPN IDs. The techniques and architecture provide modifications in enterprise computing fabrics by modifying pull-based overlay protocols such as, for example, locator/identifier separation protocol (LISP), border gateway protocol ethernet virtual private network (BGP EVPN), etc. A map request carries additional information to instruct a map-server that even though mapping (destination prefix and firewall service RLOC for the destination) is known within the map-server's own virtual network/VRF for firewall service insertion, the map-server still should do a lookup across virtual networks/VRFs and discover the final destination's DGT (destination group tag) and include that in the map reply.Type: GrantFiled: November 15, 2021Date of Patent: January 28, 2025Assignee: Cisco Technology, Inc.Inventors: Sanjay Kumar Hooda, Prakash C. Jain
-
Publication number: 20250030628Abstract: In one embodiment, a method by a first edge router includes receiving a request control message from a second edge router requesting a first identifier of a first group associated with a first host having a first Internet Protocol (IP) address, determining the first identifier of the first group based on the first IP address, sending a response control message to the second edge router including the first identifier of the first group, receiving a data packet destined to the first host from the second edge router, determining that a second group is a source group and the first group is a destination group of the data packet, applying one or more policies associated with a combination of the source group and the destination group to the data packet, and causing the data packet to be routed to the first host within the first site.Type: ApplicationFiled: October 3, 2024Publication date: January 23, 2025Inventors: Anubhav Gupta, Rex Fernando, Sanjay Kumar Hooda, Syam Sundar Appala, Samir Thoria
-
Patent number: 12192057Abstract: Systems, methods, and computer-readable storage media are provided for provisioning a common subnet across a number of subscribers and their respective virtual networks using dynamically generated network policies that provide isolation between the subscribers. The dynamic generation of the network policies is performed when a host (e.g. client) is detected (via a switch) as the host joins the computing network via virtual networks. This ability to configure a common subnet for all the subscriber virtual networks allows these subscribers to more easily access external shared services coming from a headquarter site while keeping the separation and segmentation of multiple subscriber virtual networks within a single subnet. This allows the Enterprise fabric to be more simple and convenient to deploy without making security compromises.Type: GrantFiled: May 29, 2024Date of Patent: January 7, 2025Assignee: Cisco Technology, Inc.Inventors: Sanjay Kumar Hooda, Muninder Singh Sambi, Victor Moreno, Prakash C. Jain, Tarunesh Ahuja, Satish Kondalam
-
Patent number: 12184539Abstract: In one embodiment, a method by an edge router configured to operate at a first site of a software-defined wide-area network includes receiving a data packet from a first host located in the first site, where the data packet is destined to a second host located in a second site, determining that an identifier of a second group to which the second host belongs is not available at the edge router, sending a request for an identifier of the second group to a network apparatus, where the request may comprise an address of the second host, receiving a response comprising the identifier of the second group from the network apparatus, determining that the second group is a destination group, applying one or more policies associated with the destination group to the data packet, and causing the data packet to be routed to the second host.Type: GrantFiled: April 19, 2023Date of Patent: December 31, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Anubhav Gupta, Rex Fernando, Sanjay Kumar Hooda, Syam Sundar Appala, Samir Thoria
-
Patent number: 12170614Abstract: Techniques are described herein for service chaining in fabric networks such that hardware resources can be preserved without service nodes needing additional capabilities. The techniques may include storing a first configuration associated with a first VRF instance of a service forwarding node that is connected to a first service of a service chain sequence. The first configuration may indicate an identifier and a type associated with a second service of the service chain sequence where traffic is to be sent after the first service. Additionally, the techniques may also include storing a second configuration associated with a second VRF instance of the service forwarding node that is connected to the second service. The second configuration may indicate that the second service is a last service of the service chain sequence. When traffic is received at the service forwarding node, the service forwarding node can determine whether the traffic is pre-service traffic or post-service traffic.Type: GrantFiled: December 19, 2023Date of Patent: December 17, 2024Assignee: Cisco Technology, Inc.Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Vinay Saini, Victor Manuel Moreno
-
Publication number: 20240406183Abstract: Techniques for propagating security group tag mapping between external interconnected sites that are not capable of carrying the SGT mappings. A system is disclosed that includes operations of subscribing at a first border of a first site, by a control plane, a first SGT mapping associated with a first data packet at the first site for storing the SGT mapping of the first data packet at the control plane. Then transmitting, the first data packet from the first border of the first site to a second border of the second site without attaching the first SGT mapping with the first data packet. Further, in response to a determination by the control plane that the first data packet has lost the associated first SGT mapping at the second border, identifying the SGT mapping with the first data packet at the second border to be re-associated with the first data packet.Type: ApplicationFiled: July 18, 2023Publication date: December 5, 2024Inventors: Marc Portoles Comeras, Sanjay Kumar Hooda, Balaji Pitta Venkatachalapathy, Kedar Sudhir Karmarkar, Prakash C. Jain
-
Publication number: 20240396945Abstract: Techniques for analyzing traffic originating from a host device in a wireless network to identify one or more virtual machines (VMs) running on the host device and connected to the network via the host device in bridge mode. When a VM is created in bridge mode behind a host device, the traffic originated by the VM will have the source Media Access Layer (MAC) address of the host device. According to techniques described herein, devices and/or components associated with the network may profile the traffic to identify an address of the VM, such as by analyzing dynamic host configuration protocol (DHCP) packets to determine the Internet Protocol (IP) address of the VM. Once the IP address and the MAC address of the VM is known, the components and/or devices may apply security policies to the VM that may be different than security policies applied to the host device.Type: ApplicationFiled: July 31, 2024Publication date: November 28, 2024Inventors: Shree Narasimha Murthy, Sanjay Kumar Hooda, Prakash C. Jain, Roberto Mitsuo Kobo, Rajagopal Venkatraman
-
Patent number: 12127020Abstract: Systems and methods for managing traffic in a hybrid environment include monitoring traffic load of a local network to determine whether the traffic load exceeds or is likely to exceed a maximum traffic load, where the maximum traffic load is a traffic load for which a service can be provided by the local network, based on a license. An excess traffic load is determined if the traffic load exceeds or is likely to exceed the maximum traffic load. One or more external networks which have a capacity to provide the service to the excess traffic load are determined, to which the excess traffic load is migrated. The local network includes one or more service instances for providing the service for up to the maximum traffic load, and the service to the excess traffic load is provided by one or more additional service instances in the one or more external networks.Type: GrantFiled: November 30, 2023Date of Patent: October 22, 2024Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Sanjay Kumar Hooda, Venkatesh Ramachandra Gota, Chandramouli Balasubramanian, Anand Oswal
-
Publication number: 20240348681Abstract: This disclosure describes techniques and mechanisms for providing hybrid cloud services for enterprise fabric. The techniques include enhancing an on-demand protocol (e.g., such as LISP) and allowing simplified security and/or firewall service insertion for datacenter servers providing those services. Accordingly, the techniques described herein provide hybrid cloud services that work in disaggregated, distributed, and consistent way, while avoiding complex datacenter network devices (e.g., such running overlay on TOR), replacing and moving the functionality to on demand protocol enabled servers, which intelligently receive the required mappings as well as registers and publishes the service information to intelligently interact with the network.Type: ApplicationFiled: June 26, 2024Publication date: October 17, 2024Inventors: Prakash C. Jain, Sanjay Kumar Hooda, Marc Portoles Comeras, Vinay Saini, Victor Manuel Moreno
-
Patent number: 12107721Abstract: In one embodiment, dynamic user private networks are virtually segmented within a shared virtual network. A network control system maintains the dynamic logical segmentation of the shared virtual network. User entities (e.g., user devices and/or services) are communicatively coupled to respective personal virtual networks via endpoints of access devices. Each of these endpoints is associated with a corresponding user private network. Responsive in real-time to automated processing of a received electronic particular user request, the network control system automatically modifies the dynamic logical segmentation of the shared virtual network to move a particular user entity on the shared virtual network to newly being on the first dynamic user private network without being disconnected from the shared virtual network. One embodiment uses different user private network identifiers (UPN-IDs) associated with endpoints and received packets to identify their respective user private network.Type: GrantFiled: January 30, 2024Date of Patent: October 1, 2024Assignee: Cisco Technology, Inc.Inventors: Shyamsundar N. Maniyar, Sanjay Kumar Hooda, Shree N. Murthy, Sonal Prem Kumar Chhabria, Akshay Dorwat
-
Patent number: 12107734Abstract: Systems, methods, and computer-readable storage media are provided for provisioning a common subnet across a number of subscribers and their respective virtual networks using dynamically generated network policies that provide isolation between the subscribers. The dynamic generation of the network policies is performed when a host (e.g. client) is detected (via a switch) as the host joins the computing network via virtual networks. This ability to configure a common subnet for all the subscriber virtual networks allows these subscribers to more easily access external shared services coming from a headquarter site while keeping the separation and segmentation of multiple subscriber virtual networks within a single subnet. This allows the Enterprise fabric to be more simple and convenient to deploy without making security compromises.Type: GrantFiled: July 27, 2023Date of Patent: October 1, 2024Assignee: Cisco Technology, Inc.Inventors: Sanjay Kumar Hooda, Muninder Singh Sambi, Victor Moreno, Prakash C. Jain, Tarunesh Ahuja, Satish Kondalam
-
Publication number: 20240314036Abstract: Systems, methods, and computer-readable storage media are provided for provisioning a common subnet across a number of subscribers and their respective virtual networks using dynamically generated network policies that provide isolation between the subscribers. The dynamic generation of the network policies is performed when a host (e.g. client) is detected (via a switch) as the host joins the computing network via virtual networks. This ability to configure a common subnet for all the subscriber virtual networks allows these subscribers to more easily access external shared services coming from a headquarter site while keeping the separation and segmentation of multiple subscriber virtual networks within a single subnet. This allows the Enterprise fabric to be more simple and convenient to deploy without making security compromises.Type: ApplicationFiled: May 29, 2024Publication date: September 19, 2024Inventors: Sanjay Kumar Hooda, Muninder Singh Sambi, Victor Moreno, Prakash C. Jain, Tarunesh Ahuja, Satish Kondalam
-
Patent number: 12095765Abstract: Cloud delivered access may be provided. A network device may provide a client device with a pre-authentication virtual network and a pre-authentication address. Next, a policy may be received in response to the client device authenticating. The client device may then be moved to a post-authentication virtual network based on the policy. A post-authentication address may then be obtained for the client device in response to moving the client device to a post-authentication virtual network. Traffic for the client device may then be translated to the post-authentication address.Type: GrantFiled: February 2, 2023Date of Patent: September 17, 2024Inventors: Muninder Sambi, Anand Oswal, Sanjay Kumar Hooda
-
Patent number: 12069098Abstract: Techniques for analyzing traffic originating from a host device in a wireless network to identify one or more virtual machines (VMs) running on the host device and connected to the network via the host device in bridge mode. When a VM is created in bridge mode behind a host device, the traffic originated by the VM will have the source Media Access Layer (MAC) address of the host device. According to techniques described herein, devices and/or components associated with the network may profile the traffic to identify an address of the VM, such as by analyzing dynamic host configuration protocol (DHCP) packets to determine the Internet Protocol (IP) address of the VM. Once the IP address and the MAC address of the VM is known, the components and/or devices may apply security policies to the VM that may be different than security policies applied to the host device.Type: GrantFiled: October 22, 2021Date of Patent: August 20, 2024Assignee: Cisco Technology, Inc.Inventors: Shree Murthy, Sanjay Kumar Hooda, Prakash C. Jain, Roberto Kobo, Rajagopal Venkatraman