Patents by Inventor Thamilarasu Kandasamy
Thamilarasu Kandasamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10404588Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: GrantFiled: September 7, 2016Date of Patent: September 3, 2019Assignee: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Patent number: 9794234Abstract: A Key Generation System (KGS) includes a key server, a first network element, and a second network element. The first and second network elements register with the key server and receive first and second KGS key seeds and first and second KGS identifiers, respectively. The first network element transmits the first KGS identifier to the second network element and obtains the second KGS identifier. The first network element computes a shared key based on the first KGS key seed and the second KGS identifier. The second network element receives the first KGS identifier from the first network element and computes the shared key based on the second KGS key seed and the first KGS identifier.Type: GrantFiled: July 28, 2015Date of Patent: October 17, 2017Assignee: Cisco Technology, Inc.Inventors: Padmakumar Ampady Vasudevan Pillai, Brian Eliot Weis, Thamilarasu Kandasamy
-
Patent number: 9674285Abstract: In an embodiment, a method comprises using a first hub device: establishing one or more secure connections with one or more spoke devices logically arranged as spokes with respect to a data processing system; generating and sending via a high-speed link a hub probe to a second hub device; in response to determining that the second hub device is nonresponsive, transmitting, to the one or more spoke devices a first communication indicating that the second hub device is nonresponsive; using a spoke device, receiving the first communication indicating that the second hub device is nonresponsive; determining whether the spoke device has established a secure connection with the second hub device; in response to determining that the spoke device has established the secure connection with the second hub device, selecting a third hub device, establishing a secure connection with the third hub device, and communicating with the third hub device.Type: GrantFiled: October 2, 2014Date of Patent: June 6, 2017Assignee: Cisco Technology, Inc.Inventors: Frederic Detienne, Mark Comeadow, Padmakumar Av, Thamilarasu Kandasamy
-
Publication number: 20170034137Abstract: A Key Generation System (KGS) includes a key server, a first network element, and a second network element. The first and second network elements register with the key server and receive first and second KGS key seeds and first and second KGS identifiers, respectively. The first network element transmits the first KGS identifier to the second network element and obtains the second KGS identifier. The first network element computes a shared key based on the first KGS key seed and the second KGS identifier. The second network element receives the first KGS identifier from the first network element and computes the shared key based on the second KGS key seed and the first KGS identifier.Type: ApplicationFiled: July 28, 2015Publication date: February 2, 2017Inventors: Padmakumar Ampady Vasudevan Pillai, Brian Eliot Weis, Thamilarasu Kandasamy
-
Publication number: 20160380894Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: ApplicationFiled: September 7, 2016Publication date: December 29, 2016Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Patent number: 9461914Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: GrantFiled: April 7, 2014Date of Patent: October 4, 2016Assignee: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Publication number: 20160098327Abstract: In an embodiment, a method comprises using a first hub device: establishing one or more secure connections with one or more spoke devices logically arranged as spokes with respect to a data processing system; generating and sending via a high-speed link a hub probe to a second hub device; in response to determining that the second hub device is nonresponsive, transmitting, to the one or more spoke devices a first communication indicating that the second hub device is nonresponsive; using a spoke device, receiving the first communication indicating that the second hub device is nonresponsive; determining whether the spoke device has established a secure connection with the second hub device; in response to determining that the spoke device has established the secure connection with the second hub device, selecting a third hub device, establishing a secure connection with the third hub device, and communicating with the third hub device.Type: ApplicationFiled: October 2, 2014Publication date: April 7, 2016Inventors: FREDERIC DETIENNE, MARK COMEADOW, PADMAKUMAR AV, THAMILARASU KANDASAMY
-
Publication number: 20150288603Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.Type: ApplicationFiled: April 7, 2014Publication date: October 8, 2015Applicant: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Scott Fluhrer, Lewis Chen, Brian Weis
-
Patent number: 9124564Abstract: Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information.Type: GrantFiled: August 22, 2013Date of Patent: September 1, 2015Assignee: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Ly Loi, Rajeshwar Singh Jenwar
-
Publication number: 20150058913Abstract: Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information.Type: ApplicationFiled: August 22, 2013Publication date: February 26, 2015Applicant: Cisco Technology, Inc.Inventors: Thamilarasu Kandasamy, Ly Loi, Rajeshwar Singh Jenwar