Patents by Inventor Narain Gehani

Narain Gehani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8880893
    Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: November 4, 2014
    Assignee: IBM International Group B.V.
    Inventors: Pratyush Moghe, Narain Gehani, Peter T. Smith
  • Patent number: 7870598
    Abstract: This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    Type: Grant
    Filed: August 18, 2008
    Date of Patent: January 11, 2011
    Assignee: Tizor Systems, Inc.
    Inventors: Pratyush Moghe, Narain Gehani
  • Publication number: 20080307493
    Abstract: This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    Type: Application
    Filed: August 18, 2008
    Publication date: December 11, 2008
    Applicant: TIZOR SYSTEMS, INC.
    Inventors: Pratyush Moghe, Narain Gehani
  • Patent number: 7415719
    Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, deprovision, or the like) is then implemented.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: August 19, 2008
    Assignee: Tizor Systems, Inc.
    Inventors: Pratyush Moghe, Narain Gehani
  • Publication number: 20050071644
    Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, deprovision, or the like) is then implemented.
    Type: Application
    Filed: September 24, 2004
    Publication date: March 31, 2005
    Inventors: Pratyush Moghe, Narain Gehani