Patents by Inventor Shaun Jaikarran Bharrat

Shaun Jaikarran Bharrat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9491144
    Abstract: Methods and apparatus for supporting secure packet communications, e.g., sRTP/sRTCP, which are resistant to denial of service attacks are described. A received packet is identified to correspond to a particular stream being received, the stream having a current expected set of packet sequence numbers, e.g., a current window including a next expected packet sequence number and at least one packet sequence number in the expected packet window on each side of the expected packet sequence number. Unencrypted information from the received packet, e.g., a received packet sequence number, is used to determine at least one of: to drop the received packet, or to assign the packet to one of a plurality of policing levels. If the packet passes policing at its assigned policing level, the packet may undergo authentication and decryption to determine if it is a valid packet.
    Type: Grant
    Filed: September 1, 2015
    Date of Patent: November 8, 2016
    Assignee: SONUS NETWORKS, INC.
    Inventors: Shaun Jaikarran Bharrat, Shiping Li
  • Publication number: 20150372978
    Abstract: Methods and apparatus for supporting secure packet communications, e.g., sRTP/sRTCP, which are resistant to denial of service attacks are described. A received packet is identified to correspond to a particular stream being received, the stream having a current expected set of packet sequence numbers, e.g., a current window including a next expected packet sequence number and at least one packet sequence number in the expected packet window on each side of the expected packet sequence number. Unencrypted information from the received packet, e.g., a received packet sequence number, is used to determine at least one of: to drop the received packet, or to assign the packet to one of a plurality of policing levels. If the packet passes policing at its assigned policing level, the packet may undergo authentication and decryption to determine if it is a valid packet.
    Type: Application
    Filed: September 1, 2015
    Publication date: December 24, 2015
    Inventors: Shaun Jaikarran Bharrat, Shiping Li
  • Patent number: 9154460
    Abstract: Methods and apparatus for supporting secure packet communications, e.g., sRTP/sRTCP, which are resistant to denial of service attacks are described. A received packet is identified to correspond to a particular stream being received, the stream having a current expected set of packet sequence numbers, e.g., a current window including a next expected packet sequence number and at least one packet sequence number in the expected packet window on each side of the expected packet sequence number. Unencrypted information from the received packet, e.g., a received packet sequence number, is used to determine at least one of: to drop the received packet, or to assign the packet to one of a plurality of policing levels. If the packet passes policing at its assigned policing level, the packet may undergo authentication and decryption to determine if it is a valid packet.
    Type: Grant
    Filed: February 12, 2014
    Date of Patent: October 6, 2015
    Assignee: SONUS NETWORKS, INC.
    Inventors: Shaun Jaikarran Bharrat, Shiping Li
  • Patent number: 8699343
    Abstract: Described are methods and apparatuses, including computer program products, for limiting server overload via client control. A first set of a plurality of requests are transmitted to a server at a first transmission rate during a first period of time. The first transmission rate is limited to be less than or equal to a first transmission limit rate. An overload value is determined based on whether at least two or more requests of the first set of requests for service satisfy an overload criterion. A second transmission limit rate is determined based on the overload value and the first transmission limit rate. A second set of a plurality of requests is transmitted to the server at a second transmission rate during a second period of time. The second transmission rate is limited to be less than or equal to the second transmission limit rate.
    Type: Grant
    Filed: April 27, 2009
    Date of Patent: April 15, 2014
    Assignee: Sonus Networks, Inc.
    Inventors: Ahmed Abdelal, Wassim Matragi, Nui Chan, Shaun Jaikarran Bharrat
  • Patent number: 8335853
    Abstract: Methods and apparatuses, including computer program products, are described for transparent recovery of transport connections. The method includes collecting a state associated with a first connection between a first server and a remote server via a first network socket and transmitting the state from a first networking module to a second networking module. The method includes storing the state, opening a second network socket based on failure of the first networking module, intercepting outbound packets associated with a request to initiate a second connection between the first server and the remote server via the second socket, modifying the intercepted packets based on the state, and transmitting the modified packets to the remote server to elicit an acknowledgement to maintain the first connection. The method includes receiving packets associated with the acknowledgment from the remote server, and modifying the received packets to acknowledge the request to initiate the second connection.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: December 18, 2012
    Assignee: Sonus Networks, Inc.
    Inventor: Shaun Jaikarran Bharrat
  • Publication number: 20110271096
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for loosely-coupled encryption functionality for operating systems. A data packet is processed through one or more internet protocol stack layers to generate a processed data packet. Encryption information is determined that includes parameters for encrypting and decrypting data packets transmitted between the first computing device and the remote computer. A message comprising data indicative of the encryption information is transmitted to a second computing device, wherein an operating system being executed is unaware of a security nature of the transmission. A bypass encryption routine is executed to generate a unencrypted data packet, wherein the bypass encryption routine does not encrypt the processed data packet. The unencrypted data packet is transmitted to the second computing device.
    Type: Application
    Filed: April 29, 2010
    Publication date: November 3, 2011
    Applicant: Sonus Networks, Inc.
    Inventors: Shaun Jaikarran Bharrat, Damascene M. Joachimpillai
  • Publication number: 20110271005
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for load balancing among VOIP servers. An identity table includes an identity entry for a plurality of servers, each identity entry comprising a FQDN and load balancing information. A persistence table stores persistence entries indicative of a persistent connection between a client and a server. Updated load balancing information determined by the first server is received. The identity table is updated based on the updated load balancing information. A service request is received from a client. If the client is not associated with a persistence entry, a second server is selected from the plurality of servers based on load balancing information for each identity entry in the identity table. A persistence entry is stored indicative of a persistent connection between the client and the selected second server, the persistence entry comprising a FQDN and an identifier for the client.
    Type: Application
    Filed: April 30, 2010
    Publication date: November 3, 2011
    Applicant: Sonus Networks, Inc.
    Inventors: Shaun Jaikarran Bharrat, Tolga Asveren, Justin Hart
  • Publication number: 20110271097
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for loosely-coupled encryption functionality for operating systems. A data packet is processed through one or more internet protocol stack layers to generate a processed data packet. Modified encryption information is determined that does not comprise a desired security policy for the data packet and comprises null parameter(s) and is based on encryption information that comprises the desired security policy. A message comprising data indicative of the encryption information is transmitted. An operating system is unaware of a security nature of the transmission. A null-encryption routine is executed to generate an unencrypted data packet, wherein the null-encryption routine does not encrypt the processed data packet. The unencrypted data packet is transmitted to the second computing device.
    Type: Application
    Filed: April 29, 2010
    Publication date: November 3, 2011
    Applicant: Sonus Networks, Inc.
    Inventors: Damascene M. Joachimpillai, Shaun Jaikarran Bharrat, Aby Kuriakose, Vivian Lu, Xiang Yu
  • Publication number: 20110153834
    Abstract: Methods and apparatuses, including computer program products, are described for transparent recovery of transport connections. The method includes collecting a state associated with a first connection between a first server and a remote server via a first network socket and transmitting the state from a first networking module to a second networking module. The method includes storing the state, opening a second network socket based on failure of the first networking module, intercepting outbound packets associated with a request to initiate a second connection between the first server and the remote server via the second socket, modifying the intercepted packets based on the state, and transmitting the modified packets to the remote server to elicit an acknowledgement to maintain the first connection. The method includes receiving packets associated with the acknowledgment from the remote server, and modifying the received packets to acknowledge the request to initiate the second connection.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 23, 2011
    Applicant: Sonus Networks, Inc.
    Inventor: Shaun Jaikarran Bharrat
  • Patent number: 7940657
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for identifying attackers on a network. A data packet is filtered by a multi-tiered filtering and transmission system. Data packets matching the first tier filter are discarded. Data packets matching the second tier filter are transmitted to an output module based on a criterion. Data packets in the third tier filter are hashed into bins and data packets matching an entry in the bin are transmitted to the output module based on a criterion for the bin. Data packets in the fourth tier transmission system are transmitted to the output module based on a criterion. Data packets that do not meet the criterion for transmission to the output module are transmitted to an attack identification module which analyzes the data packets to identify attacks.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: May 10, 2011
    Assignee: Sonus Networks, Inc.
    Inventors: John A. Perreault, Shaun Jaikarran Bharrat, Mark Duffy, Gary Robert McCarthy, Jian Yang, Shiping Li
  • Publication number: 20110083175
    Abstract: Methods and apparatuses, including computer program products, are described for policing and prioritizing of data services. Each packet in a data stream is directed to a substream policer of a plurality of substream policers. Each packet is allowed through the substream policer based on rate parameters associated with the substream policer. The packets allowed by the substream policer are directed to an aggregate policer. Each packet allowed through the substream policer is allowed through the aggregate policer based on rate parameters associated with the aggregate policer. The substream policer and the aggregate policer are charged for each packet allowed by both the substream policer and the aggregate policer. The substream policer and the aggregate policer are not charged for each packet not allowed by either the substream policer or the aggregate policer.
    Type: Application
    Filed: October 6, 2009
    Publication date: April 7, 2011
    Applicant: Sonus Networks, Inc.
    Inventors: Shaun Jaikarran Bharrat, Justin Scott Hart, Jian Yang
  • Publication number: 20110038259
    Abstract: Methods and apparatuses, including computer program products, are described for priority policing of requests with deferred determination of priority level. The method includes directing each packet in a data stream to a policer. The method also includes determining whether to allow, reject, or conditionally pass each packet through the policer based on parameters associated with the policer. The method also includes directing each packet conditionally passed by the policer to a classifier associated with the policer. The method also includes determining, by the classifier, a priority value of each packet received from the policer. The method also includes directing, by the classifier, each prioritized packet to the policer. The method also includes determining whether to allow or reject each prioritized packet through the policer based on the priority value.
    Type: Application
    Filed: February 9, 2010
    Publication date: February 17, 2011
    Applicant: Sonus Networks, Inc.
    Inventors: Shaun Jaikarran Bharrat, Kevin John Pilotte, Tolga Asveren, Vijay Subramanian, Vince Hung-Kwan Choy
  • Patent number: 7804774
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for scalable filtering and policing mechanism for protecting user traffic in a network. A data packet is filtered by a multi-tiered filtering and transmission system. Data packets matching the first tier filter are discarded. Data packets matching the second tier filter are transmitted to an output module based on a criterion. Data packets in the third tier filter are hashed into bins and data packets matching an entry in the bin are transmitted to the output module based on a criterion for the bin. Data packets in the fourth tier transmission system are transmitted to the output module based on a criterion. Data packets that do not meet the criterion for transmission to the output module are transmitted to an attack identification module which analyzes the data packets to identify attacks.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: September 28, 2010
    Assignee: Sonus Networks, Inc.
    Inventors: Jian Yang, Shiping Li, Mark Duffy, Shaun Jaikarran Bharrat
  • Patent number: 7672336
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for filtering and policing for defending against denial of service attacks on a network. A data packet is filtered by a multi-tiered filtering and transmission system. Data packets matching the first tier filter are discarded. Data packets matching the second tier filter are transmitted to an output module based on a criterion. Data packets in the third tier filter are hashed into bins and data packets matching an entry in the bin are transmitted to the output module based on a criterion for the bin. Data packets in the fourth tier transmission system are transmitted to the output module based on a criterion. Data packets that do not meet the criterion for transmission to the output module are transmitted to an attack identification module which analyzes the data packets to identify attacks.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: March 2, 2010
    Assignee: Sonus Networks, Inc.
    Inventors: Shaun Jaikarran Bharrat, Mark Duffy, Ronald V. Grippo, Shiping Li, John A. Perreault, Jian Yang
  • Publication number: 20080134327
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for filtering and policing for defending against denial of service attacks on a network. A data packet is filtered by a multi-tiered filtering and transmission system. Data packets matching the first tier filter are discarded. Data packets matching the second tier filter are transmitted to an output module based on a criterion. Data packets in the third tier filter are hashed into bins and data packets matching an entry in the bin are transmitted to the output module based on a criterion for the bin. Data packets in the fourth tier transmission system are transmitted to the output module based on a criterion. Data packets that do not meet the criterion for transmission to the output module are transmitted to an attack identification module which analyzes the data packets to identify attacks.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 5, 2008
    Applicant: Sonus Networks
    Inventors: Shaun Jaikarran Bharrat, Mark Duffy, Ronald V. Grippo, Shiping Li, John A. Perreault, Jian Yang
  • Publication number: 20080134329
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for identifying attackers on a network. A data packet is filtered by a multi-tiered filtering and transmission system. Data packets matching the first tier filter are discarded. Data packets matching the second tier filter are transmitted to an output module based on a criterion. Data packets in the third tier filter are hashed into bins and data packets matching an entry in the bin are transmitted to the output module based on a criterion for the bin. Data packets in the fourth tier transmission system are transmitted to the output module based on a criterion. Data packets that do not meet the criterion for transmission to the output module are transmitted to an attack identification module which analyzes the data packets to identify attacks.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 5, 2008
    Applicant: Sonus Networks
    Inventors: John A. Perreault, Shaun Jaikarran Bharrat, Mark Duffy, Gary Robert McCarthy, Jian Yang, Shiping Li
  • Publication number: 20080134328
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for scalable filtering and policing mechanism for protecting user traffic in a network. A data packet is filtered by a multi-tiered filtering and transmission system. Data packets matching the first tier filter are discarded. Data packets matching the second tier filter are transmitted to an output module based on a criterion. Data packets in the third tier filter are hashed into bins and data packets matching an entry in the bin are transmitted to the output module based on a criterion for the bin. Data packets in the fourth tier transmission system are transmitted to the output module based on a criterion. Data packets that do not meet the criterion for transmission to the output module are transmitted to an attack identification module which analyzes the data packets to identify attacks.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 5, 2008
    Applicant: Sonus Networks
    Inventors: Jian Yang, Shiping Li, Mark Duffy, Shaun Jaikarran Bharrat