1
Anand K Antur, Sanjay Sawhney, Hemant Puri, Naveen S Bisht: Method and apparatus for configuring and managing firewalls and security devices. Townsend and Townsend and Crew, April 3, 2001: US06212558 (216 worldwide citation)

A method for configuring a plurality of network security devices, includes the steps of providing a network directory services server providing network directory services to a plurality of network servers, each of the plurality of network servers coupled to one of the plurality of network security d ...


2
Aseem Vaid, Sanjay Sawhney, Anand K Antur, Naveen S Bisht: Method and apparatus for quality of service management. Ukiah Software, Townsend and Townsend and Crew, April 4, 2000: US06047322 (125 worldwide citation)

A novel method for a network of computers to improve quality of services using a combination of a bandwidth management tool in a firewall. The method includes the steps of providing a network directory services server providing network directory services to a plurality of network servers, each of th ...


3
Anand K Antur, Sanjay Sawhney, Hemant Puri, Naveen S Bisht: Method and apparatus for reconfiguring and managing firewalls and security devices. Townsend and Townsend and Crew, June 5, 2001: US06243815 (108 worldwide citation)

A method for reconfiguring network security devices coupled to a network directory services server, the network directory services server providing network directory services to the network security devices, includes the steps of storing configuration data for a first network security device at a pr ...


4
Aseem Vaid, Sanjay Sawhney: Method and apparatus for quality of service management. Ukiah Software, Townsend and Townsend and Crew, September 12, 2000: US06119235 (74 worldwide citation)

A method for managing quality of service in a firewall server (110), the firewall server (11) coupling a data source to a data receiver, includes the steps of estimating a bit rate over a round-trip-time between the data source and the data receiver, receiving a receive acknowlegment signal from the ...


5
Aseem Vaid, Sanjay Sawhney: Firewall system for quality of service management. Novell, Cesari and McKenna, January 22, 2002: US06341309 (54 worldwide citation)

A novel system for a network of computers to improve quality of services using a combination of a bandwidth mangement tool in a firewall. The present system includes, among other elements, a plurality of computers, which are each coupled to each other to form an internal network of computers (e.g., ...


6
Bruce Montague, Sanjay Sawhney, Matthew Conover, Tzi cker Chiueh: Security driver for hypervisors and operating systems of virtualized datacenters. Symantec Corporation, Rory D Rankin, Meyertons Hood Kivlin Kowert & Goetzel P C, February 26, 2013: US08387046 (31 worldwide citation)

A system and method for efficient security protocols in a virtualized datacenter environment are contemplated. In one embodiment, a system is provided comprising a hypervisor coupled to one or more protected virtual machines (VMs) and a security VM. Within a private communication channel, a split ke ...


7
Hemant Puri, Anand Kashyap, Sanjay Sawhney: Systems and methods for monitoring a mobile-computing device using geo-location information. Symantec Corporation, Advantedge Law Group, February 7, 2012: US08111154 (18 worldwide citation)

A computer-implemented method for monitoring a mobile-computing device using geo-location information is disclosed. The method may include a learning phase. During the learning phase, a user may be located within a first range of physical locations during a recurring time period. The method may incl ...


8
Sanjay Sawhney, Hemant Puri, Hans Van Rietschote: Systems and methods for using cloud-based storage to optimize data-storage operations. Symantec Corporation, Advantedge Law Group, February 5, 2013: US08370312 (15 worldwide citation)

A computer-implemented method for using cloud-based storage to optimize data-storage operations may include: 1) receiving a request from a client device for instructions or directions for storing a data object, 2) accessing a data-placement policy that contains criteria for identifying storage syste ...


9
Sanjay Sawhney, Matthew Conover, Bruce Montague: Systems and methods for providing network access control in virtual environments. Symantec Corporation, ALG Intellectual Property, January 20, 2015: US08938782 (14 worldwide citation)

A computer-implemented method for providing network access control in virtual environments. The method may include: 1) injecting a transient security agent into a virtual machine that is running on a host machine; 2) receiving, from the transient security agent, an indication of whether the virtual ...


10
Kevin Roundy, Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu, Zhi Kai Li, Darren Shou, Sanjay Sawhney, Acar Tamersoy, Elias Khalil: Systems and methods for using event-correlation graphs to detect attacks on computing systems. Symantec Corporation, ALG Intellectual Property, September 22, 2015: US09141790 (10 worldwide citation)

A computer-implemented method for using event-correlation graphs to detect attacks on computing systems may include (1) detecting a suspicious event involving a first actor within a computing system, (2) constructing an event-correlation graph that includes a first node that represents the first act ...