1
Devendra Kalra, Karnamadakala Krishnamohan, Venkatasubbarao Ramamoorthy, Jeyendran Balakrishnan, Timothy J Burr, Kowsik Guruswamy: Method and apparatus that provides a scalable media delivery system. Adaptive Media Technologies, Pillsbury Madison & Sutro, September 14, 1999: US05953506 (320 worldwide citation)

The present invention provides an apparatus and method for encoding, storing, transmitting and decoding multimedia information in the form of scalable, streamed digital data. A base stream containing basic informational content and subsequent streams containing additive informational content are ini ...


2
Devendra Kalra, Karnamadakala Krishnamohan, Venkatasubbarao Ramamoorthy, Jeyendran Balakrishnan, Timothy J Burr, Kowsik Guruswamy: Method and apparatus that provides a scalable media delivery system. Oracle Corporation, Brian D Hickman, Hickman Palermo Truong & Becker, December 3, 2002: US06490627 (112 worldwide citation)

The present invention provides an apparatus and method for encoding, storing, transmitting and decoding multimedia information in the form of scalable, streamed digital data. A base stream containing basic informational content and subsequent streams containing additive informational content are ini ...


3
Nir Zuk, Kowsik Guruswamy: Multi-method gateway-based network security systems and methods. Juniper Networks, Harrity & Harrity, February 5, 2013: US08370936 (32 worldwide citation)

Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. Th ...


4
Devendra Kalra, Karnamadakala Krishnamohan, Venkatasubbarao Ramamoorthy, Jeyendran Balakrishnan, Timothy J Burr, Kowsik Guruswamy: Method and apparatus for storing base and additive streams of video. Oracle International Corporation, Hickman Palermo Truong & Becker, Christian A Nicholes, June 8, 2010: US07733956 (31 worldwide citation)

The present invention provides an apparatus and method for encoding, storing, transmitting and decoding multimedia information in the form of scalable, streamed digital data. A base stream containing basic informational content and subsequent streams containing additive informational content are ini ...


5
Nir Zuk, Yu Ming Mao, Kowsik Guruswamy: Intelligent integrated network security device for high-availability applications. Juniper Networks, Harrity & Harrity, June 8, 2010: US07734752 (21 worldwide citation)

Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be ...


6
Kowsik Guruswamy, Siu Wang Leung: Application-layer monitoring and profiling network traffic. Juniper Networks, Shumaker & Sieffert P A, August 3, 2010: US07769851 (16 worldwide citation)

An intrusion detection and prevention (IDP) device includes a flow analysis module, an analysis engine, a plurality of protocol-specific decoders and a profiler. The flow analysis module processes packet flows in a network to identify network elements associated with the packet flows. The analysis e ...


7
Kowsik Guruswamy: Portable program for generating attacks on communication protocols and channels. Mu Dynamics, K&L Gates, June 7, 2011: US07958560 (15 worldwide citation)

A security analyzer is capable of generating attacks to test the security of a device under analysis. The security analyzer further has the capability to generate a portable, executable program to generate specified attacks. In this way, others can recreate the attacks without requiring access to th ...


8
Kowsik Guruswamy, James Maze: Test driven deployment and monitoring of heterogeneous network systems. MU Dynamics, K&L Gates, June 7, 2011: US07958230 (15 worldwide citation)

A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of norm ...


9
Kowsik Guruswamy, Siyang Yang: Detection and prevention of encapsulated network attacks using an intermediate device. Juniper Networks, Shumaker & Sieffert P A, September 14, 2010: US07797411 (14 worldwide citation)

A network device is capable of recognizing and blocking network attacks associated with packet flows regardless of whether the packet flows are encapsulated within network tunnels. For example, the network device includes a filter module that receives packets associated with a network tunnel from an ...


10
Kowsik Guruswamy, Ajit Sancheti: Mechanism for characterizing soft failures in systems under attack. MU Dynamics, K&L Gates, May 31, 2011: US07954161 (14 worldwide citation)

A system and method to identify and characterize nonfatal failures of a device-under-analysis (DUA). A security analyzer executes attacks to test the security of the DUA. During the attacks, the security analyzer periodically sends an instrumentation command to the DUA and measures the time the DUA ...