Patents by Inventor Dipto Chakravarty

Dipto Chakravarty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10785213
    Abstract: Techniques are disclosed relating to authenticating a client computer system to a server computer system. In some embodiments, a client computer system sends, to a server computer system, authentication information for an initial access request for one or more resources. This information may include authentication credentials and attributes that collectively identify the client computer system. In some embodiments, the client computer system receives, from the server computer system, an authentication response that indicates an initial authentication of the client computer system. In some embodiments, the authentication response includes a cryptographic key. While the initial authentication is valid, in some embodiments, the client computer system repeatedly re-authenticates for subsequent access requests. Each of the subsequent access request may include a single-use password generated using a cryptographic key and the attributes of the client computer system.
    Type: Grant
    Filed: March 27, 2018
    Date of Patent: September 22, 2020
    Assignee: CA TECHNOLOGIES, INC.
    Inventors: Dhiraj Girdhar, Dipto Chakravarty, Sandeep Kumar Ramnani
  • Publication number: 20200036527
    Abstract: Techniques are disclosed relating to user authentication based on password-specific cryptographic keys. In some embodiments, a user device receives, from an authentication server, an authentication challenge that includes an item of challenge information. Further, in some embodiments, the user device receives user input indicative of a password and then performs a cryptographic function on the password to generate a password-specific cryptographic key. The computing device may access an initial seed value that was previously provided by the authentication server and generate an updated cryptographic key based on the initial seed value and the password-specific key. Further, in various embodiments, the user device generates authentication information based on the updated cryptographic key and the item of challenge information. The user device may then send an authentication response, including the authentication information, to the authentication server.
    Type: Application
    Filed: July 24, 2018
    Publication date: January 30, 2020
    Inventors: Dhiraj Girdhar, Dipto Chakravarty
  • Publication number: 20190306154
    Abstract: Techniques are disclosed relating to authenticating a client computer system to a server computer system. In some embodiments, a client computer system sends, to a server computer system, authentication information for an initial access request for one or more resources. This information may include authentication credentials and attributes that collectively identify the client computer system. In some embodiments, the client computer system receives, from the server computer system, an authentication response that indicates an initial authentication of the client computer system. In some embodiments, the authentication response includes a cryptographic key. While the initial authentication is valid, in some embodiments, the client computer system repeatedly re-authenticates for subsequent access requests. Each of the subsequent access request may include a single-use password generated using a cryptographic key and the attributes of the client computer system.
    Type: Application
    Filed: March 27, 2018
    Publication date: October 3, 2019
    Inventors: Dhiraj Girdhar, Dipto Chakravarty, Sandeep Kumar Ramnani
  • Patent number: 10380548
    Abstract: The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: August 13, 2019
    Assignee: Oracle International Corporation
    Inventors: Dipto Chakravarty, John Melvin Antony, Usman Choudhary, David Capuano, Srinivasa Phanindra Mallapragada
  • Patent number: 10171470
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: January 1, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20170353464
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: July 31, 2017
    Publication date: December 7, 2017
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20170278066
    Abstract: The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.
    Type: Application
    Filed: June 12, 2017
    Publication date: September 28, 2017
    Applicant: Oracle International Corporation
    Inventors: Dipto Chakravarty, John Melvin Antony, Usman Choudhary, David Capuano, Srinivasa Phanindra Mallapragada
  • Patent number: 9723007
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: August 1, 2017
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 9715675
    Abstract: The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: July 25, 2017
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Dipto Chakravarty, John Melvin Antony, Usman Choudhary, David Capuano, Srinivasa Phanindra Mallapragada
  • Patent number: 9654387
    Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: May 16, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Stephen R Carter, Dipto Chakravarty
  • Publication number: 20160021113
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: September 28, 2015
    Publication date: January 21, 2016
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 9172701
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: October 27, 2015
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20150263895
    Abstract: The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.
    Type: Application
    Filed: May 29, 2015
    Publication date: September 17, 2015
    Inventors: Dipto CHAKRAVARTY, Usman CHOUDHARY, John Paul GASSNER, Frank Anthony PELLEGRINO, William Matthew WEINER, Yuriy FUKSENKO, Robert PRICE
  • Patent number: 9047145
    Abstract: The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: June 2, 2015
    Assignee: NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC.
    Inventors: Dipto Chakravarty, Usman Choudhary, John Paul Gassner, Frank Anthony Pellegrino, William Matthew Weiner, Yuriy Fuksenko, Robert Price
  • Publication number: 20140192644
    Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
    Type: Application
    Filed: March 17, 2014
    Publication date: July 10, 2014
    Applicant: Novell, Inc.
    Inventors: Stephen R. Carter, Dipto Chakravarty
  • Publication number: 20140189775
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: December 27, 2012
    Publication date: July 3, 2014
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 8693327
    Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
    Type: Grant
    Filed: May 3, 2011
    Date of Patent: April 8, 2014
    Assignee: Novell, Inc.
    Inventors: Stephen R Carter, Dipto Chakravarty
  • Publication number: 20120281557
    Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
    Type: Application
    Filed: May 3, 2011
    Publication date: November 8, 2012
    Inventors: Stephen R. Carter, Dipto Chakravarty
  • Patent number: 8185488
    Abstract: A system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events. Moreover, extensibility may be provided by enabling a user to define rules to be triggered when events occur in a predetermined pattern, and actions to be executed when a predetermined rule triggers a correlated event. Further, to plug a new correlation engine into the system, adapters may be deployed to handle input and output, while the user-defined rules may be validating according to semantic requirements of the new correlation engine.
    Type: Grant
    Filed: April 17, 2008
    Date of Patent: May 22, 2012
    Assignee: EMC Corporation
    Inventors: Dipto Chakravarty, Usman Choudhary, John Melvin Antony, Michael Howard Cooper, Jason Lee Arrington, Cheryl Witt
  • Publication number: 20110296015
    Abstract: The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 1, 2011
    Applicant: CPTN Holdings LLC
    Inventors: Dipto Chakravarty, Usman Choudhary, John Paul Gassner, Frank Anthony Pellegrino, William Matthew Weiner, Yuriy Fuksenko, Robert Price