Search

Prashanth B Patil

from San Jose, CA
Age ~45

Prashanth Patil Phones & Addresses

  • 1938 Los Gatos Almaden Rd, San Jose, CA 95124
  • Jacksonville, FL
  • St Augustine, FL
  • Santa Clara, CA
  • Sunnyvale, CA
  • Tempe, AZ
  • Chandler, AZ
  • Long Beach, CA
  • 1074 Reed Ave APT 62, Sunnyvale, CA 94086

Resumes

Resumes

Prashanth Patil Photo 1

Manufacturing Test Engineer Ii At Lab126

View page
Position:
Manufacturing Test Engineer II at Lab126
Location:
Cupertino, California
Industry:
Consumer Electronics
Work:
Lab126 - Cupertino, CA since May 2013
Manufacturing Test Engineer II

ProTek Devices - Tempe, Arizona Mar 2011 - May 2013
Product Engineer

ProTek Devices - Tempe, Arizona Mar 2007 - May 2013
Test Engineer

MMD Components - Rancho Santa Margarita, CA Dec 2006 - Feb 2007
Design Engineer
Education:
California State University-Long Beach 2007
Master's degree, Electrical Engineering
Siddaganga Institute of Technology 1998 - 2002
Bachelor's degree, Instrumentation Technology

Publications

Us Patents

Systems And Methods For Protecting A Service Mesh From External Attacks On Exposed Software Vulnerabilities

View page
US Patent:
20200358802, Nov 12, 2020
Filed:
May 8, 2019
Appl. No.:
16/406585
Inventors:
- San Jose CA, US
Prashanth Patil - San Jose CA, US
Ram Mohan Ravindranath - Bangalore, IN
International Classification:
H04L 29/06
H04L 29/08
G06F 9/50
Abstract:
Systems and method handling software vulnerabilities in service meshes can include receiving information on software vulnerabilities from external feeds. From a services catalog which maintains data associated with service instances supported by a service mesh, one or more vulnerable service instances supported by the service mesh are identified. Notifications are provided to sidecar proxies associated with vulnerable service instances. The notifications include criteria such as criticality levels and categories associated with the software vulnerabilities. Based on destination policies for the vulnerable service instances, instructions are provided to the sidecar proxies to trip circuit breakers associated with the vulnerable service instances and thus prevent further access and cascading impact of the software vulnerabilities. The software vulnerabilities are reported to an orchestration system for the service mesh and a fix or different version of the vulnerable service instance is installed where possible.

Verifying Accuracy Of Ml Pipelines Using Third Party Co-Ordination

View page
US Patent:
20200287919, Sep 10, 2020
Filed:
Mar 6, 2019
Appl. No.:
16/293937
Inventors:
- San Jose CA, US
Prashanth Patil - San Jose CA, US
Rajesh Indira Viswambharan - Bangalore, IN
International Classification:
H04L 29/06
G06N 20/00
G06F 16/28
H04L 12/741
Abstract:
Systems, methods, computer-readable media, and devices are disclosed for verifying traffic classification. At a first node, a classification to a received packet is designated according to a local model. The classification of the packet by the first node is verified by sending packet information describing the packet to a distributed network comprising multiple nodes, where the packet information includes attributes of the packet. The classification of the packet is verified from receiving results from a second node that, based on the attributes, independently classifies the packet. Based on the verified classification, decentralized information for classifying packets is updated.

Secure Communication Session Resumption In A Service Function Chain

View page
US Patent:
20200177631, Jun 4, 2020
Filed:
Feb 3, 2020
Appl. No.:
16/780047
Inventors:
- San Jose CA, US
Prashanth Patil - San Jose CA, US
Carlos M. Pignataro - Cary NC, US
International Classification:
H04L 29/06
H04L 9/08
Abstract:
A method for resuming a Transport Layer Security (TLS) session in a Service Function Chain comprising a plurality of Service Function nodes coupled to a Service Function Forwarder. A request is received at a first Service Function node to establish a TLS session, and a Pre-Shared Key (PSK) and a PSK identifier that uniquely correspond to the first Service Function node and the TLS session are generated. The PSK identifier is forwarded to one or more of the Service Function Forwarder and the plurality of Service Function nodes. A request to resume the TLS session is received from a client device that previously disconnected. It is determined that the connection request contains the PSK identifier, a second Service Function node is selected, and the TLS session is re-established between the client device and the second Service Function node using the same PSK as the prior TLS session.

Distributed Denial Of Service Mitigation For Web Conferencing

View page
US Patent:
20190387020, Dec 19, 2019
Filed:
Aug 26, 2019
Appl. No.:
16/551280
Inventors:
- San Jose CA, US
Ram Mohan Ravindranath - Karnataka, IN
Prashanth Patil - San Jose CA, US
Carlos M. Pignataro - Cary NC, US
International Classification:
H04L 29/06
H04L 9/32
Abstract:
A web conferencing operator can enable participants to share multimedia content in real-time despite one or more of the participants operating from behind a middlebox via network address translation (NAT) traversal protocols and tools, such as STUN, TURN, and/or ICE. In NAT traversal, participants share a transport addresses that the participants can use to establish a joint media session. However, connectivity checks during NAT traversal can expose a media distribution device hosted by the web conferencing operator to various vulnerabilities, such as distributed denial of service (DDoS) attacks. The web conferencing operator can minimize the effects of a DDoS attack during the connectivity checks at scale and without significant performance degradation by configuring the middlebox to validate incoming requests for the connectivity checks without persistent signaling between the web conference operator and the middlebox.

Engagement And Disengagement Of Transport Layer Security Proxy Services With Encrypted Handshaking

View page
US Patent:
20190356694, Nov 21, 2019
Filed:
May 21, 2018
Appl. No.:
15/984637
Inventors:
- San Jose CA, US
Prashanth Patil - San Jose CA, US
Flemming Andreasen - Marlboro NJ, US
Hari Shankar - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques are presented herein for engagement and disengagement of Transport Layer Security proxy services with encrypted handshaking. In one embodiment, a first initial message of a first encrypted handshaking procedure for a first secure communication session between a first device and a second device is intercepted at a proxy device. The first initial message includes first key exchange information for encrypting the first encrypted handshaking procedure. A copy of the first initial message is stored at the proxy device. A second initial message of a second encrypted handshaking procedure for a second secure communication session between the proxy device and the second device is sent from the proxy device to the second device. The second initial message includes second key exchange information for encrypting the second encrypted handshaking procedure. The proxy device determines, based on the second encrypted handshaking procedure, whether to remain engaged or to disengage.

Network Service Header (Nsh) Metadata-Based End-To-End Multimedia Session Identification And Multimedia Service Optimization

View page
US Patent:
20190327111, Oct 24, 2019
Filed:
Jul 3, 2019
Appl. No.:
16/502572
Inventors:
- San Jose CA, US
Prashanth Patil - Mountain View CA, US
K. Tirumaleswar Reddy - Bangalore, IN
Carlos M. Pignataro - Raleigh NC, US
International Classification:
H04L 12/46
H04L 12/741
H04L 29/08
H04L 12/751
Abstract:
A network node in a service function chaining system receives multiple media streams of a media session between endpoints. Each media stream is encapsulated with a service header indicating a service function path and a session identifier. The network node determines that multiple service functions connected to the network node perform a particular service function in the service function path. The network node provides all of the media streams of the media session to a single service function instance to ensure that the media session is processed by the single service function.

Managing Network Congestion Using Segment Routing

View page
US Patent:
20190297017, Sep 26, 2019
Filed:
Mar 23, 2018
Appl. No.:
15/934247
Inventors:
- San Jose CA, US
Prashanth Patil - San Jose CA, US
Nagendra Kumar Nainar - Morrisville NC, US
Robert Edgar Barton - Richmond, CA
Jerome Henry - Pittsboro NC, US
Muthurajah Sivabalan - Kanata, CA
International Classification:
H04L 12/803
H04L 12/801
H04L 12/26
H04L 29/06
Abstract:
In one example embodiment, a first path computation element of a first segment routing domain includes a plurality of path computation clients. The first path computation element obtains, from at least one path computation client of the plurality of path computation clients, telemetry data indicating network traffic congestion for the at least one path computation client. Based on the telemetry data, the first path computation element determines that the at least one path computation client is experiencing at least a predetermined amount of network traffic congestion. In response to determining that the at least one path computation client is experiencing at least the predetermined amount of network traffic congestion, the first path computation element sends, to a second path computation element of a second segment routing domain, an indication of the network traffic congestion for the at least one path computation client.

Hierarchical Activation Of Behavioral Modules On A Data Plane For Behavioral Analytics

View page
US Patent:
20190260776, Aug 22, 2019
Filed:
Feb 19, 2018
Appl. No.:
15/898915
Inventors:
- San Jose CA, US
Subharthi Paul - San Jose CA, US
Prashanth Patil - San Jose CA, US
Jayaraman Iyer - Sunnyvale CA, US
Hari Shankar - San Jose CA, US
International Classification:
H04L 29/06
H04L 12/24
G06N 99/00
Abstract:
In one embodiment, a centralized controller maintains a plurality of hierarchical behavioral modules of a behavioral model, and distributes initial behavioral modules to data plane entities to cause them to apply the initial behavioral modules to data plane traffic. The centralized controller may then receive data from a particular data plane entity based on its having applied the initial behavioral modules to its data plane traffic. The centralized controller then distributes subsequent behavioral modules to the particular data plane entity to cause it to apply the subsequent behavioral modules to the data plane traffic, the subsequent behavioral modules selected based on the previously received data from the particular data plane entity. The centralized controller may then iteratively receive data from the particular data plane entity and distribute subsequently selected behavioral modules until an attack determination is made on the data plane traffic of the particular data plane entity.
Prashanth B Patil from San Jose, CA, age ~45 Get Report