Patents by Inventor Supreeth Hosur Nagesh Rao

Supreeth Hosur Nagesh Rao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10686804
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: June 16, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
  • Patent number: 10659324
    Abstract: An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
    Type: Grant
    Filed: June 3, 2016
    Date of Patent: May 19, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jackson Ngoc Ki Pang, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Supreeth Hosur Nagesh Rao, Sunil Kumar Gupta
  • Patent number: 10623284
    Abstract: An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and labelled according to the type of traffic they represent. If a flow represents malicious or otherwise undesirable traffic, it can be tagged accordingly. A request can then be made for a reputation score of an entity which can identify one or more nodes of the network.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: April 14, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Supreeth Hosur Nagesh Rao, Ashutosh Kulshreshtha, Omid Madani, Jackson Ngoc Ki Pang, Khawar Deen, Ellen Christine Scheib
  • Patent number: 10567247
    Abstract: An example method can include receiving a traffic report from a sensor and using the traffic report to detect intra-datacenter flows. These intra-datacenter flows can then be compared with a description of historical flows. The description of historical flows can identify characteristics of normal and malicious flows. Based on the comparison, the flows can be classified and tagged as normal, malicious, or anomalous. If the flows are tagged as malicious or anomalous, corrective action can be taken with respect to the flows. A description of the flows can then be added to the description of historical flows.
    Type: Grant
    Filed: May 3, 2016
    Date of Patent: February 18, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Navindra Yadav, Anubhav Gupta, Sunil Kumar Gupta, Varun Sagar Malhorta, Shashidhar Gandham
  • Publication number: 20190260653
    Abstract: An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and labelled according to the type of traffic they represent. If a flow represents malicious or otherwise undesirable traffic, it can be tagged accordingly. A request can then be made for a reputation score of an entity which can identify one or more nodes of the network.
    Type: Application
    Filed: May 6, 2019
    Publication date: August 22, 2019
    Inventors: Navindra Yadav, Supreeth Hosur Nagesh Rao, Ashutosh Kulshreshtha, Omid Madani, Jackson Ngoc Ki Pang, Khawar Deen, Ellen Ellen Scheib
  • Patent number: 10305757
    Abstract: An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and labelled according to the type of traffic they represent. If a flow represents malicious or otherwise undesirable traffic, it can be tagged accordingly. A request can then be made for a reputation score of an entity which can identify one or more nodes of the network.
    Type: Grant
    Filed: April 18, 2016
    Date of Patent: May 28, 2019
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Supreeth Hosur Nagesh Rao, Ashutosh Kulshreshtha, Omid Madani, Jackson Ngoc Ki Pang, Khawar Deen, Ellen Christine Scheib
  • Publication number: 20190081959
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 14, 2019
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, FNU Rachita Agasthy, Duane Thomas Barlow
  • Patent number: 10142353
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: November 27, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
  • Patent number: 10009240
    Abstract: A method provides for associating reputation scores with policies, stacks and hosts within a network and upon receiving information about a newly provisioned entity (such as a host or a stack), recommending a policy scheme for the newly provisioned entity that will result in a particular reputation score of the reputation scores. The method further includes implementing the policy scheme for the newly provisioned entity.
    Type: Grant
    Filed: June 3, 2016
    Date of Patent: June 26, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Supreeth Hosur Nagesh Rao, Ashutosh Kulshreshtha, Omid Madani, Jackson Ngoc Ki Pang, Navindra Yadav
  • Patent number: 9935851
    Abstract: Systems, methods, and computer-readable media for determining sensor placement and topology. In some embodiments, a system can receive messages from sensors deployed around a network, each of the messages reporting a respective flow captured by a reporting sensor from the sensors. Next, the system can identify flows reported in the messages and, for each of the flows, generate a respective list of sensors that reported that flow. Based on the respective list of sensors, the system can infer a respective placement of the sensors within the network and a topology of the sensors. For example, the system can determine that a first sensor is deployed in a virtual machine, a second sensor is deployed in a hypervisor hosting the virtual machine, and a third sensor is deployed in a network device configured to route traffic associated with the hypervisor.
    Type: Grant
    Filed: May 11, 2016
    Date of Patent: April 3, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Khawar Deen, Navindra Yadav
  • Publication number: 20160359897
    Abstract: An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and labelled according to the type of traffic they represent. If a flow represents malicious or otherwise undesirable traffic, it can be tagged accordingly. A request can then be made for a reputation score of an entity which can identify one or more nodes of the network.
    Type: Application
    Filed: April 18, 2016
    Publication date: December 8, 2016
    Inventors: Navindra Yadav, Supreeth Hosur Nagesh Rao, Ashutosh Kulshreshtha, Omid Madani, Jackson Ngoc Ki Pang, Khawar Deen, Ellen Christine Scheib
  • Publication number: 20160359891
    Abstract: An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 8, 2016
    Inventors: Jackson Ngoc Ki Pang, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Supreeth Hosur Nagesh Rao, Sunil Kumar Gupta
  • Publication number: 20160359917
    Abstract: A method provides for associating reputation scores with policies, stacks and hosts within a network and upon receiving information about a newly provisioned entity (such as a host or a stack), recommending a policy scheme for the newly provisioned entity that will result in a particular reputation score of the reputation scores. The method further includes implementing the policy scheme for the newly provisioned entity.
    Type: Application
    Filed: June 3, 2016
    Publication date: December 8, 2016
    Inventors: Supreeth Hosur Nagesh Rao, Ashutosh Kulshreshtha, Omid Madani, Jackson Ngoc Ki Pang, Navindra Yadav
  • Publication number: 20160359872
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: April 20, 2016
    Publication date: December 8, 2016
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow, Andrew Sloane
  • Publication number: 20160359703
    Abstract: Systems, methods, and computer-readable media for determining sensor placement and topology. In some embodiments, a system can receive messages from sensors deployed around a network, each of the messages reporting a respective flow captured by a reporting sensor from the sensors. Next, the system can identify flows reported in the messages and, for each of the flows, generate a respective list of sensors that reported that flow. Based on the respective list of sensors, the system can infer a respective placement of the sensors within the network and a topology of the sensors. For example, the system can determine that a first sensor is deployed in a virtual machine, a second sensor is deployed in a hypervisor hosting the virtual machine, and a third sensor is deployed in a network device configured to route traffic associated with the hypervisor.
    Type: Application
    Filed: May 11, 2016
    Publication date: December 8, 2016
    Inventors: Shashidhar Gandham, Rohit Chandra Prasad, Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Khawar Deen, Navindra Yadav
  • Publication number: 20160359877
    Abstract: An example method can include receiving a traffic report from a sensor and using the traffic report to detect intra-datacenter flows. These intra-datacenter flows can then be compared with a description of historical flows. The description of historical flows can identify characteristics of normal and malicious flows. Based on the comparison, the flows can be classified and tagged as normal, malicious, or anomalous. If the flows are tagged as malicious or anomalous, corrective action can be taken with respect to the flows. A description of the flows can then be added to the description of historical flows.
    Type: Application
    Filed: May 3, 2016
    Publication date: December 8, 2016
    Inventors: Ashutosh Kulshreshtha, Supreeth Hosur Nagesh Rao, Navindra Yadav, Anubhav Gupta, Sunil Kumar Gupta, Varun Sagar Malhotra, Shashidhar Gandham
  • Patent number: 9367878
    Abstract: A system and method for recommending content to a user in a social network, including: logging user activity for the user in the social network; categorizing the user activity across all the user's networks, wherein each category is assigned a score based on relevance to the user; assigning weights to the user activities; calculating a social index score as a function of the weighted user activity categories; logging user content into categories; scoring the user content; and generating a content social index by weighting the content scores.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: June 14, 2016
    Assignee: YAHOO! INC.
    Inventor: Supreeth Hosur Nagesh Rao
  • Publication number: 20150356595
    Abstract: Described herein are solutions for determining quality of online ads and matching the ads to content so that the content is not devalued by the ads. Such solutions may also identify relationships between ads and their influence on user engagement with host content. The solutions may also define and provide the relationships to advertisers, in forms of historical scores and projected scores. The historical scores may include historical elasticity scores and the projected scores may include projected elasticity scores. The scores may be determined per ad and content pair. The solutions can use the scores to influence ad pricing.
    Type: Application
    Filed: June 5, 2014
    Publication date: December 10, 2015
    Applicant: YAHOO! INC.
    Inventors: Ram Sriharsha, Supreeth Hosur Nagesh Rao
  • Publication number: 20140229289
    Abstract: In one embodiment, a group of two or more individuals may be identified. A group profile associated with the group of two or more individuals may be obtained. One or more content items and/or one or more advertisements suitable for presenting to the group of two or more individuals may be identified based, at least in part, upon the group profile. The one or more content items and/or one or more advertisements may be provided for access by the group of two or more individuals.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Applicant: YAHOO! INC.
    Inventors: Supreeth Hosur Nagesh Rao, Shivakumar Ningappa, Sundeep Narravula, Rahul Chugh
  • Publication number: 20140114770
    Abstract: Techniques for providing offers for products/services associated with a topic to users based on a measure of conversion determined for the users are described. The measure of conversion for each user may be indicative of a probability that the user will purchase item(s) associated with a particular topic. The measure of conversion may be based on social activity associated with the user and social activity associated with other users that have formed a social connection with the user. Offers associated with the particular topic are presented to the user in response to determining that the measure of conversion of the user for the topic reaches a predetermined threshold and/or matches further criteria.
    Type: Application
    Filed: October 18, 2012
    Publication date: April 24, 2014
    Applicant: YAHOO! INC.
    Inventor: Supreeth Hosur Nagesh Rao