Patents by Inventor Thamilarasu Kandasamy

Thamilarasu Kandasamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10404588
    Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.
    Type: Grant
    Filed: September 7, 2016
    Date of Patent: September 3, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
  • Patent number: 9794234
    Abstract: A Key Generation System (KGS) includes a key server, a first network element, and a second network element. The first and second network elements register with the key server and receive first and second KGS key seeds and first and second KGS identifiers, respectively. The first network element transmits the first KGS identifier to the second network element and obtains the second KGS identifier. The first network element computes a shared key based on the first KGS key seed and the second KGS identifier. The second network element receives the first KGS identifier from the first network element and computes the shared key based on the second KGS key seed and the first KGS identifier.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: October 17, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Padmakumar Ampady Vasudevan Pillai, Brian Eliot Weis, Thamilarasu Kandasamy
  • Patent number: 9674285
    Abstract: In an embodiment, a method comprises using a first hub device: establishing one or more secure connections with one or more spoke devices logically arranged as spokes with respect to a data processing system; generating and sending via a high-speed link a hub probe to a second hub device; in response to determining that the second hub device is nonresponsive, transmitting, to the one or more spoke devices a first communication indicating that the second hub device is nonresponsive; using a spoke device, receiving the first communication indicating that the second hub device is nonresponsive; determining whether the spoke device has established a secure connection with the second hub device; in response to determining that the spoke device has established the secure connection with the second hub device, selecting a third hub device, establishing a secure connection with the third hub device, and communicating with the third hub device.
    Type: Grant
    Filed: October 2, 2014
    Date of Patent: June 6, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Frederic Detienne, Mark Comeadow, Padmakumar Av, Thamilarasu Kandasamy
  • Publication number: 20170034137
    Abstract: A Key Generation System (KGS) includes a key server, a first network element, and a second network element. The first and second network elements register with the key server and receive first and second KGS key seeds and first and second KGS identifiers, respectively. The first network element transmits the first KGS identifier to the second network element and obtains the second KGS identifier. The first network element computes a shared key based on the first KGS key seed and the second KGS identifier. The second network element receives the first KGS identifier from the first network element and computes the shared key based on the second KGS key seed and the first KGS identifier.
    Type: Application
    Filed: July 28, 2015
    Publication date: February 2, 2017
    Inventors: Padmakumar Ampady Vasudevan Pillai, Brian Eliot Weis, Thamilarasu Kandasamy
  • Publication number: 20160380894
    Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.
    Type: Application
    Filed: September 7, 2016
    Publication date: December 29, 2016
    Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
  • Patent number: 9461914
    Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.
    Type: Grant
    Filed: April 7, 2014
    Date of Patent: October 4, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
  • Publication number: 20160098327
    Abstract: In an embodiment, a method comprises using a first hub device: establishing one or more secure connections with one or more spoke devices logically arranged as spokes with respect to a data processing system; generating and sending via a high-speed link a hub probe to a second hub device; in response to determining that the second hub device is nonresponsive, transmitting, to the one or more spoke devices a first communication indicating that the second hub device is nonresponsive; using a spoke device, receiving the first communication indicating that the second hub device is nonresponsive; determining whether the spoke device has established a secure connection with the second hub device; in response to determining that the spoke device has established the secure connection with the second hub device, selecting a third hub device, establishing a secure connection with the third hub device, and communicating with the third hub device.
    Type: Application
    Filed: October 2, 2014
    Publication date: April 7, 2016
    Inventors: FREDERIC DETIENNE, MARK COMEADOW, PADMAKUMAR AV, THAMILARASU KANDASAMY
  • Publication number: 20150288603
    Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.
    Type: Application
    Filed: April 7, 2014
    Publication date: October 8, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
  • Patent number: 9124564
    Abstract: Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: September 1, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Thamilarasu Kandasamy, Ly Loi, Rajeshwar Singh Jenwar
  • Publication number: 20150058913
    Abstract: Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information.
    Type: Application
    Filed: August 22, 2013
    Publication date: February 26, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Thamilarasu Kandasamy, Ly Loi, Rajeshwar Singh Jenwar