Company Filing History:
Years Active: 2019-2022
Title: The Innovative Contributions of Jyoti Verma
Introduction
Jyoti Verma is a prominent inventor based in Saratoga, California. She has made significant contributions to the field of network policy architecture and security. With a total of three patents to her name, her work has had a substantial impact on how network traffic is managed and secured.
Latest Patents
One of Jyoti Verma's latest patents is focused on network policy architecture. This invention involves translating lower-level attributes of a first network policy to higher-level attributes, allowing for effective management of network traffic. The patent also includes a mechanism for comparing these attributes between different network policies to ensure that traffic is handled equivalently. If discrepancies are found, the first network policy can be dynamically updated to align with the second policy. Another notable patent addresses routing and forwarding information driven subscription against global security policy data. This invention enables network devices to subscribe to rapidly changing rules from a central threat repository, ensuring that only current attack vectors are applied in local access control lists. The mechanisms in place prevent outdated policies from persisting after device reboots or routing changes.
Career Highlights
Jyoti Verma is currently employed at Cisco Technology, Inc., where she continues to innovate in the field of network security and policy management. Her work at Cisco has positioned her as a key player in developing solutions that enhance network efficiency and security.
Collaborations
Throughout her career, Jyoti has collaborated with notable colleagues, including David A McGrew and Kenneth S Beck. These collaborations have further enriched her contributions to the field.
Conclusion
Jyoti Verma's innovative work in network policy architecture and security has made her a significant figure in the tech industry. Her patents reflect her commitment to improving network management and security protocols.