Patents by Inventor Poornaprajna UDUPI

Poornaprajna UDUPI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10701035
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: June 30, 2020
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 10178074
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: January 8, 2019
    Assignee: NETFLIX, INC.
    Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
  • Publication number: 20180316647
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Application
    Filed: April 23, 2018
    Publication date: November 1, 2018
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 9954822
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: April 24, 2018
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Publication number: 20170207911
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Application
    Filed: March 31, 2017
    Publication date: July 20, 2017
    Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
  • Publication number: 20170201489
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Application
    Filed: March 28, 2017
    Publication date: July 13, 2017
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 9621588
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Grant
    Filed: September 24, 2014
    Date of Patent: April 11, 2017
    Assignee: NETFLIX, INC.
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Patent number: 9614818
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: April 4, 2017
    Assignee: NETFLIX, INC.
    Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
  • Patent number: 9485305
    Abstract: A technique for providing an API from a server to one of more endpoint devices including receiving a request for data from a endpoint device, retrieving one or more data resources from the data resources available within the server, based upon the request, manipulating the data within the retrieved data resources into a response optimized for the endpoint device, and transmitting the response to the endpoint device.
    Type: Grant
    Filed: May 9, 2013
    Date of Patent: November 1, 2016
    Assignee: NETFLIX, Inc.
    Inventors: Daniel Jacobson, Benjamin James Christensen, Ben Schmaus, Mikey Cohen, Poornaprajna Udupi, Jason Cacciatore, Ganapriya Poolavari
  • Publication number: 20160088020
    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
    Type: Application
    Filed: September 24, 2014
    Publication date: March 24, 2016
    Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
  • Publication number: 20150333904
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Application
    Filed: July 27, 2015
    Publication date: November 19, 2015
    Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
  • Patent number: 9094377
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Grant
    Filed: August 16, 2013
    Date of Patent: July 28, 2015
    Assignee: NETFLIX, INC.
    Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
  • Publication number: 20150052358
    Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
    Type: Application
    Filed: August 16, 2013
    Publication date: February 19, 2015
    Applicant: Netflix, Inc.
    Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
  • Publication number: 20130318154
    Abstract: A technique for providing an API from a server to one of more endpoint devices including receiving a request for data from a endpoint device, retrieving one or more data resources from the data resources available within the server, based upon the request, manipulating the data within the retrieved data resources into a response optimized for the endpoint device, and transmitting the response to the endpoint device.
    Type: Application
    Filed: May 9, 2013
    Publication date: November 28, 2013
    Applicant: NETFLIX, Inc.
    Inventors: Daniel JACOBSON, Benjamin James CHRISTENSEN, Ben SCHMAUS, Mikey COHEN, Poornaprajna UDUPI, Jason CACCIATORE, Ganapriya POOLAVARI