Patents by Inventor Ajay K. Arora
Ajay K. Arora has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230090586Abstract: One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.Type: ApplicationFiled: November 23, 2022Publication date: March 23, 2023Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20230082183Abstract: One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.Type: ApplicationFiled: November 17, 2022Publication date: March 16, 2023Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11599659Abstract: One example method of operation may include identifying a code segment accessed during a code access event, scanning code of the code segment to identify a degree of sensitivity of the code, appending a code access annotation to the code segment based on detected actions performed to the code during the code access event, and updating a code log to identify the code access annotation.Type: GrantFiled: February 17, 2021Date of Patent: March 7, 2023Assignee: BluBracket, Inc.Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11556642Abstract: One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.Type: GrantFiled: February 17, 2021Date of Patent: January 17, 2023Assignee: BluBracket, Inc.Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11550943Abstract: One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.Type: GrantFiled: February 17, 2021Date of Patent: January 10, 2023Assignee: BluBracket, Inc.Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256152Abstract: One example method of operation may include identifying a code access event associated with a code segment, determining whether one or more portions of the code segment require code access permissions, determining whether one or more credentials of a profile associated with the code access event have a required code access credential necessary to permit the code access event, and assigning limited access to the code segment and the profile based on the one or more credentials associated with the code access event.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256143Abstract: One example method of operation may include identifying a plurality of code access events over a period of time, determining whether any of the code access events included any sensitive code segments, determining whether any of the code access events which included the sensitive code segments were unauthorized, and performing one or more automated actions to restrict code access permissions of one or more user profiles.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256142Abstract: One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256089Abstract: One example operation may include selecting one or more terms to query one or more software repositories, querying the one or more of the software repositories for instances of the one or more query terms, identifying one or more domain names included in the one or more software repositories based on the query, and determining one or more relevancy scores corresponding to the one or more public software repositories based on a quantity of identified terms instances and domain names.Type: ApplicationFiled: April 30, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Payman Kamali, Paul Gerlich
-
Publication number: 20210255851Abstract: One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256123Abstract: One example method of operation may include identifying a code segment accessed during a code access event, scanning code of the code segment to identify a degree of sensitivity of the code, appending a code access annotation to the code segment based on detected actions performed to the code during the code access event, and updating a code log to identify the code access annotation.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 9253170Abstract: In some embodiments, a method includes obtaining an object code of an application executed on a mobile device. The application is created by an author different from an operator of a data source. The method includes loading dynamically at least one intercept point into the object code, wherein the intercept point is to detect a predetermined input gesture. The method further includes, responsive to an input gesture being received within a context of the application at the mobile device and the input gesture matching the predetermined input gesture: (1) overlaying a user interface within the context of the application, the user interface permitting selection of data items from the data source; (2) determining from a selection signal received at the mobile device, a selected data item; (3) responsive to the determining, loading the selected data item into the context of the application; and (4) removing the user interface overlay.Type: GrantFiled: September 9, 2014Date of Patent: February 2, 2016Assignee: AppSense LimitedInventors: Prakash Linga, Ajay K. Arora
-
Publication number: 20150200930Abstract: A non-transitory processor-readable medium stores code that represents instructions to be executed by a processor. The code includes code to receive an object code of a first application. The first application is defined by an author different from an author of a second application. The code also includes code to dynamically load at least two intercept points into the object code of the first application, using the second application. The code further includes code to, responsive to a read request for data by the first application, intercept the read request by at least one of the two intercept points. The code further includes code to determine, in response to intercepting the read request, whether or not access to read the data is authenticated. The code further includes code to send a signal to provide the data to the first application, based on the determining.Type: ApplicationFiled: September 9, 2014Publication date: July 16, 2015Applicant: AppSense LimitedInventors: Prakash LINGA, Ajay K. ARORA
-
Publication number: 20150200921Abstract: In some embodiments, a method includes obtaining an object code of an application executed on a mobile device. The application is created by an author different from an operator of a data source. The method includes loading dynamically at least one intercept point into the object code, wherein the intercept point is to detect a predetermined input gesture. The method further includes, responsive to an input gesture being received within a context of the application at the mobile device and the input gesture matching the predetermined input gesture: (1) overlaying a user interface within the context of the application, the user interface permitting selection of data items from the data source; (2) determining from a selection signal received at the mobile device, a selected data item; (3) responsive to the determining, loading the selected data item into the context of the application; and (4) removing the user interface overlay.Type: ApplicationFiled: September 9, 2014Publication date: July 16, 2015Applicant: APPSENSE LIMITEDInventors: Prakash Linga, Ajay K. Arora
-
Publication number: 20130239192Abstract: A non-transitory processor-readable medium stores code that represents instructions to be executed by a processor. The code includes code to receive an object code of a first application. The first application is defined by an author different from an author of a second application. The code also includes code to dynamically load at least two intercept points into the object code of the first application, using the second application. The code further includes code to, responsive to a read request for data by the first application, intercept the read request by at least one of the two intercept points. The code further includes code to determine, in response to intercepting the read request, whether or not access to read the data is authenticated. The code further includes code to send a signal to provide the data to the first application, based on the determining.Type: ApplicationFiled: March 8, 2013Publication date: September 12, 2013Applicant: RAPsphere, Inc.Inventors: Prakash Linga, Ajay K. Arora