Patents by Inventor Dipto Chakravarty
Dipto Chakravarty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10785213Abstract: Techniques are disclosed relating to authenticating a client computer system to a server computer system. In some embodiments, a client computer system sends, to a server computer system, authentication information for an initial access request for one or more resources. This information may include authentication credentials and attributes that collectively identify the client computer system. In some embodiments, the client computer system receives, from the server computer system, an authentication response that indicates an initial authentication of the client computer system. In some embodiments, the authentication response includes a cryptographic key. While the initial authentication is valid, in some embodiments, the client computer system repeatedly re-authenticates for subsequent access requests. Each of the subsequent access request may include a single-use password generated using a cryptographic key and the attributes of the client computer system.Type: GrantFiled: March 27, 2018Date of Patent: September 22, 2020Assignee: CA TECHNOLOGIES, INC.Inventors: Dhiraj Girdhar, Dipto Chakravarty, Sandeep Kumar Ramnani
-
Publication number: 20200036527Abstract: Techniques are disclosed relating to user authentication based on password-specific cryptographic keys. In some embodiments, a user device receives, from an authentication server, an authentication challenge that includes an item of challenge information. Further, in some embodiments, the user device receives user input indicative of a password and then performs a cryptographic function on the password to generate a password-specific cryptographic key. The computing device may access an initial seed value that was previously provided by the authentication server and generate an updated cryptographic key based on the initial seed value and the password-specific key. Further, in various embodiments, the user device generates authentication information based on the updated cryptographic key and the item of challenge information. The user device may then send an authentication response, including the authentication information, to the authentication server.Type: ApplicationFiled: July 24, 2018Publication date: January 30, 2020Inventors: Dhiraj Girdhar, Dipto Chakravarty
-
Publication number: 20190306154Abstract: Techniques are disclosed relating to authenticating a client computer system to a server computer system. In some embodiments, a client computer system sends, to a server computer system, authentication information for an initial access request for one or more resources. This information may include authentication credentials and attributes that collectively identify the client computer system. In some embodiments, the client computer system receives, from the server computer system, an authentication response that indicates an initial authentication of the client computer system. In some embodiments, the authentication response includes a cryptographic key. While the initial authentication is valid, in some embodiments, the client computer system repeatedly re-authenticates for subsequent access requests. Each of the subsequent access request may include a single-use password generated using a cryptographic key and the attributes of the client computer system.Type: ApplicationFiled: March 27, 2018Publication date: October 3, 2019Inventors: Dhiraj Girdhar, Dipto Chakravarty, Sandeep Kumar Ramnani
-
Patent number: 10380548Abstract: The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.Type: GrantFiled: June 12, 2017Date of Patent: August 13, 2019Assignee: Oracle International CorporationInventors: Dipto Chakravarty, John Melvin Antony, Usman Choudhary, David Capuano, Srinivasa Phanindra Mallapragada
-
Patent number: 10171470Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: July 31, 2017Date of Patent: January 1, 2019Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20170353464Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: July 31, 2017Publication date: December 7, 2017Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20170278066Abstract: The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.Type: ApplicationFiled: June 12, 2017Publication date: September 28, 2017Applicant: Oracle International CorporationInventors: Dipto Chakravarty, John Melvin Antony, Usman Choudhary, David Capuano, Srinivasa Phanindra Mallapragada
-
Patent number: 9723007Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: September 28, 2015Date of Patent: August 1, 2017Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 9715675Abstract: The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.Type: GrantFiled: December 22, 2006Date of Patent: July 25, 2017Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Dipto Chakravarty, John Melvin Antony, Usman Choudhary, David Capuano, Srinivasa Phanindra Mallapragada
-
Patent number: 9654387Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.Type: GrantFiled: March 17, 2014Date of Patent: May 16, 2017Assignee: Micro Focus Software Inc.Inventors: Stephen R Carter, Dipto Chakravarty
-
Publication number: 20160021113Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: September 28, 2015Publication date: January 21, 2016Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 9172701Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: December 27, 2012Date of Patent: October 27, 2015Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20150263895Abstract: The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.Type: ApplicationFiled: May 29, 2015Publication date: September 17, 2015Inventors: Dipto CHAKRAVARTY, Usman CHOUDHARY, John Paul GASSNER, Frank Anthony PELLEGRINO, William Matthew WEINER, Yuriy FUKSENKO, Robert PRICE
-
Patent number: 9047145Abstract: The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.Type: GrantFiled: June 14, 2011Date of Patent: June 2, 2015Assignee: NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC.Inventors: Dipto Chakravarty, Usman Choudhary, John Paul Gassner, Frank Anthony Pellegrino, William Matthew Weiner, Yuriy Fuksenko, Robert Price
-
Publication number: 20140192644Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.Type: ApplicationFiled: March 17, 2014Publication date: July 10, 2014Applicant: Novell, Inc.Inventors: Stephen R. Carter, Dipto Chakravarty
-
Publication number: 20140189775Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: December 27, 2012Publication date: July 3, 2014Applicant: Novell, Inc.Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 8693327Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.Type: GrantFiled: May 3, 2011Date of Patent: April 8, 2014Assignee: Novell, Inc.Inventors: Stephen R Carter, Dipto Chakravarty
-
Publication number: 20120281557Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.Type: ApplicationFiled: May 3, 2011Publication date: November 8, 2012Inventors: Stephen R. Carter, Dipto Chakravarty
-
Patent number: 8185488Abstract: A system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events. Moreover, extensibility may be provided by enabling a user to define rules to be triggered when events occur in a predetermined pattern, and actions to be executed when a predetermined rule triggers a correlated event. Further, to plug a new correlation engine into the system, adapters may be deployed to handle input and output, while the user-defined rules may be validating according to semantic requirements of the new correlation engine.Type: GrantFiled: April 17, 2008Date of Patent: May 22, 2012Assignee: EMC CorporationInventors: Dipto Chakravarty, Usman Choudhary, John Melvin Antony, Michael Howard Cooper, Jason Lee Arrington, Cheryl Witt
-
Publication number: 20110296015Abstract: The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.Type: ApplicationFiled: June 14, 2011Publication date: December 1, 2011Applicant: CPTN Holdings LLCInventors: Dipto Chakravarty, Usman Choudhary, John Paul Gassner, Frank Anthony Pellegrino, William Matthew Weiner, Yuriy Fuksenko, Robert Price