Patents by Inventor Shih-Chun Chang

Shih-Chun Chang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220038353
    Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
    Type: Application
    Filed: October 15, 2021
    Publication date: February 3, 2022
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Patent number: 11233821
    Abstract: Systems, methods, and computer-readable media for gathering network intrusion counter-intelligence. A system can maintain a decoy network environment at one or more machines. The system can identify a malicious user accessing network services through the network environment. Further, the system can receive network service access requests from the user at one or more machines in the network environment and subsequently direct the network service access requests from the malicious user to the decoy network environment based on an identification of the malicious user. The network services access requests can be satisfied with network service access responses generated in the decoy network environment. Subsequently, the system can maintain malicious user analytics based on the network service access requests of the malicious user that are directed to the decoy network environment.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: January 25, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Shih-Chun Chang, Shashi Gandham, Xiaofei Guo, Hoang Viet Nguyen, Xin Liu, Thanh Trung Ngo, Duan Tran, Xuan Loc Bui
  • Publication number: 20220014436
    Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
    Type: Application
    Filed: September 22, 2021
    Publication date: January 13, 2022
    Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
  • Publication number: 20210392059
    Abstract: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.
    Type: Application
    Filed: August 26, 2021
    Publication date: December 16, 2021
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Patent number: 11202132
    Abstract: An application and network analytics platform can capture telemetry from servers and network devices operating within a network. The application and network analytics platform can determine an application dependency map (ADM) for an application executing in the network. Using the ADM, the application and network analytics platform can resolve flows into flowlets of various granularities, and determine baseline metrics for the flowlets. The baseline metrics can include transmission times, processing times, and/or data sizes for the flowlets. The application and network analytics platform can compare new flowlets against the baselines to assess availability, load, latency, and other performance metrics for the application. In some implementations, the application and network analytics platform can automate remediation of unavailability, load, latency, and other application performance issues.
    Type: Grant
    Filed: November 11, 2020
    Date of Patent: December 14, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ashutosh Kulshreshtha, Omid Madani, Vimal Jeyakumar, Navindra Yadav, Ali Parandehgheibi, Andy Sloane, Kai Chang, Khawar Deen, Shih-Chun Chang, Hai Vu
  • Patent number: 11153184
    Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: October 19, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Patent number: 11146454
    Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
    Type: Grant
    Filed: March 16, 2020
    Date of Patent: October 12, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Rohit Prasad, Shashi Gandham, Hoang Nguyen, Abhishek Singh, Shih-Chun Chang, Navindra Yadav, Ali Parandehgheibi, Paul Mach, Rachita Agasthy, Ravi Prasad, Varun Malhotra, Michael Watts, Sunil Gupta
  • Patent number: 11121948
    Abstract: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: September 14, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Publication number: 20210160157
    Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
    Type: Application
    Filed: January 29, 2021
    Publication date: May 27, 2021
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Publication number: 20210152443
    Abstract: Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
    Type: Application
    Filed: January 29, 2021
    Publication date: May 20, 2021
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang, Hai Trong Vu
  • Patent number: 10972388
    Abstract: An example method includes a sensor detecting multiple packets of a flow during a specified total time period (e.g., a reporting time period). The total time period can be subdivided into multiple time periods. The sensor can analyze the detected packets to determine an amount of network utilization for each of the time periods. The sensor can then generate a flow summary based on the network utilization and the flow and send the flow summary to an analytics engine. Multiple other sensors can do similarly for their respective packets and flows. The analytics engine can receive the flow summaries from the various sensors and determine a correspondence between flow with high network utilization at a specific time period and a node or nodes. These nodes that experienced multiple flows with high network utilization for a certain period of time can be identified as experiencing a microburst.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: April 6, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Mohammadreza Alizadeh Attar, Shashi Gandham, Abhishek Singh, Shih-Chun Chang
  • Publication number: 20210067849
    Abstract: An application and network analytics platform can capture telemetry from servers and network devices operating within a network. The application and network analytics platform can determine an application dependency map (ADM) for an application executing in the network. Using the ADM, the application and network analytics platform can resolve flows into flowlets of various granularities, and determine baseline metrics for the flowlets. The baseline metrics can include transmission times, processing times, and/or data sizes for the flowlets. The application and network analytics platform can compare new flowlets against the baselines to assess availability, load, latency, and other performance metrics for the application. In some implementations, the application and network analytics platform can automate remediation of unavailability, load, latency, and other application performance issues.
    Type: Application
    Filed: November 11, 2020
    Publication date: March 4, 2021
    Inventors: Ashutosh Kulshreshtha, Omid Madani, Vimal Jeyakumar, Navindra Yadav, Ali Parandehgheibi, Andy Sloane, Kai Chang, Khawar Deen, Shih-Chun Chang, Hai Vu
  • Patent number: 10873794
    Abstract: An application and network analytics platform can capture telemetry from servers and network devices operating within a network. The application and network analytics platform can determine an application dependency map (ADM) for an application executing in the network. Using the ADM, the application and network analytics platform can resolve flows into flowlets of various granularities, and determine baseline metrics for the flowlets. The baseline metrics can include transmission times, processing times, and/or data sizes for the flowlets. The application and network analytics platform can compare new flowlets against the baselines to assess availability, load, latency, and other performance metrics for the application. In some implementations, the application and network analytics platform can automate remediation of unavailability, load, latency, and other application performance issues.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: December 22, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ashutosh Kulshreshtha, Omid Madani, Vimal Jeyakumar, Navindra Yadav, Ali Parandehgheibi, Andy Sloane, Kai Chang, Khawar Deen, Shih-Chun Chang, Hai Vu
  • Publication number: 20200389361
    Abstract: The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. The agent enforcer is configured to implementing network policies on the system, access data associated with the implementation of the network policies on the system, and transmit, via an interprocess communication, the data to the agent controller. The agent controller is configured to generate a report including the data and transmit the report to a network policy system.
    Type: Application
    Filed: August 21, 2020
    Publication date: December 10, 2020
    Inventors: Hai Vu, Shih-Chun Chang, Varun Malhotra, Shashi Gandham, Navindra Yadav, Allen Chen, Praneeth Vallem, Rohit Prasad
  • Patent number: 10862776
    Abstract: Managing a network environment to identify spoofed packets is disclosed. A method includes analyzing, via a first capture agent, packets processed by a first environment in a network associated with a first host, and analyzing, via a second capture agent, packets processed by a second environment in the network associated with a second host. The method includes collecting the first data and the second data at a collector and generating a topological map of the network and a history of network activity associated with the first environment and the second environment. The method includes extracting network data from a packet and comparing the extracted network data with stored network data in the database. When the comparison indicates that the extracted network data does not match the stored network data (i.e., the reported source does not match an expected source for the packet), determining that the packet is a spoofed packet.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: December 8, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
  • Publication number: 20200358676
    Abstract: Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
    Type: Application
    Filed: July 28, 2020
    Publication date: November 12, 2020
    Inventors: Abhishek Ranjan Singh, Shih-Chun Chang, Varun Sagar Malhotra, Hai Trong Vu, Jackson Ngoc Ki Pang
  • Publication number: 20200304523
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: June 11, 2020
    Publication date: September 24, 2020
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
  • Patent number: 10764141
    Abstract: The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. The agent enforcer is configured to implementing network policies on the system, access data associated with the implementation of the network policies on the system, and transmit, via an interprocess communication, the data to the agent controller. The agent controller is configured to generate a report including the data and transmit the report to a network policy system.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: September 1, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Hai Vu, Shih-Chun Chang, Varun Malhotra, Shashi Gandham, Navindra Yadav, Allen Chen, Praneeth Vallem, Rohit Prasad
  • Patent number: 10735283
    Abstract: Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: August 4, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Abhishek Ranjan Singh, Shih-Chun Chang, Varun Sagar Malhotra, Hai Trong Vu, Jackson Ngoc Ki Pang
  • Publication number: 20200244554
    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
    Type: Application
    Filed: April 10, 2020
    Publication date: July 30, 2020
    Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang