Patents by Inventor Pratyush Moghe
Pratyush Moghe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902248Abstract: A method for rapid deployment by a service provider of a data lake in association with a cloud computing service. In response to a request to provision the data lake, a new cloud account is created. Within the new cloud account, a service provider access role and associated permissions are created. The new cloud account is then associated, by cross-trust, with an account in the cloud computing service that is one of: a service provider deployment account, and a customer account. A private data cloud is then associated with the service provider deployment account or the customer account, as the case may be. The private data cloud is uniquely associated with the new cloud account and the data lake. A firewall service enabling secure access between the data lake and an external enterprise network is provisioned. The data lake is then provisioned in the private data cloud to complete the rapid deployment.Type: GrantFiled: July 14, 2021Date of Patent: February 13, 2024Assignee: Cazena, Inc.Inventors: Pratyush Moghe, John Piekos, Brett Russ, Venkat Chandra, Brian LaChance, Justin Bradfield, Durgesh Mankekar, Lovantheran Chetty
-
Patent number: 11888702Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The platform provides a way for the enterprise to translate its workloads into clusters of compute resources that meet its service level requirements.Type: GrantFiled: February 1, 2022Date of Patent: January 30, 2024Assignee: Cazena, Inc.Inventors: Pratyush Moghe, Peter Thomas Smith, Craig Steven Harris, Mineharu Takahara, Lovantheran Chetty, Daniel Dietterich
-
Publication number: 20220407781Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The platform provides a way for the enterprise to translate its workloads into clusters of compute resources that meet its service level requirements.Type: ApplicationFiled: February 1, 2022Publication date: December 22, 2022Inventors: Pratyush Moghe, Peter Thomas Smith, Craig Steven Harris, Mineharu Takahara, Lovantheran Chetty, Daniel Dietterich
-
Publication number: 20220245167Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The lifecycle of data analytics from movement to warehousing, however, is provided by the platform.Type: ApplicationFiled: April 19, 2022Publication date: August 4, 2022Inventor: Pratyush Moghe
-
Patent number: 11308114Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The lifecycle of data analytics from movement to warehousing, however, is provided by the platform.Type: GrantFiled: December 23, 2014Date of Patent: April 19, 2022Assignee: Cazena, Inc.Inventor: Pratyush Moghe
-
Patent number: 11240117Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The platform provides a way for the enterprise to translate its workloads into clusters of compute resources that meet its service level requirements.Type: GrantFiled: April 1, 2019Date of Patent: February 1, 2022Assignee: Cazena, Inc.Inventors: Pratyush Moghe, Peter Thomas Smith, Craig Steven Harris, Mineharu Takahara, Lovantheran Chetty, Daniel Dietterich
-
Publication number: 20220021652Abstract: A method for rapid deployment by a service provider of a data lake in association with a cloud computing service. In response to a request to provision the data lake, a new cloud account is created. Within the new cloud account, a service provider access role and associated permissions are created. The new cloud account is then associated, by cross-trust, with an account in the cloud computing service that is one of: a service provider deployment account, and a customer account. A private data cloud is then associated with the service provider deployment account or the customer account, as the case may be. The private data cloud is uniquely associated with the new cloud account and the data lake. A firewall service enabling secure access between the data data lake and an external enterprise network is provisioned. The data lake is then provisioned in the private data cloud to complete the rapid deployment.Type: ApplicationFiled: July 14, 2021Publication date: January 20, 2022Inventors: Pratyush Moghe, John Piekos, Brett Russ, Venkat Chandra, Brian LaChance, Justin Bradfield, Durgesh Mankekar, Lovantheran Chetty
-
Publication number: 20190230000Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The platform provides a way for the enterprise to translate its workloads into clusters of compute resources that meet its service level requirements.Type: ApplicationFiled: April 1, 2019Publication date: July 25, 2019Inventors: Pratyush Moghe, Peter Thomas Smith, Craig Steven Harris, Mineharu Takahara, Lovantheran Chetty, Daniel Dietterich
-
Patent number: 10250451Abstract: A services platform acts as an intermediary between an existing enterprise analytic environment, and one or more underlying cloud service providers. The platform provides enterprise “big data-as-a-service,” by which an enterprise can seamlessly and easily provision new capacity for processing its analytic workload, and migrate data sources (e.g., data warehouse marts, enterprise data warehouses, analytic sandboxes, and the like) to the cloud for processing. The platform provides end-to-end enterprise class manageability of enterprise data assets, from data collection, aggregation, movement, staging and processing, all while providing service levels, security, access and governance. The platform integrates directly but seamlessly into the enterprise analytic stack, and existing analytics applications work as normal. The platform provides a way for the enterprise to translate its workloads into clusters of compute resources that meet its service level requirements.Type: GrantFiled: January 13, 2015Date of Patent: April 2, 2019Assignee: Cazena, Inc.Inventors: Pratyush Moghe, Peter Thomas Smith, Craig Steven Harris, Mineharu Takahara, Lovantheran Chetty, Daniel Dietterich
-
Patent number: 8880893Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.Type: GrantFiled: September 24, 2004Date of Patent: November 4, 2014Assignee: IBM International Group B.V.Inventors: Pratyush Moghe, Narain Gehani, Peter T. Smith
-
Patent number: 8286237Abstract: Method and apparatus to monitor and detect anomalies of information content flows, the method comprising the steps of capturing information access packets, filtering packets to extract information, decoding packets to determine information content, deriving content signatures, trending prototypical behavior, and detecting anomalies of information access, and said apparatus comprising a computing device comprising a network based device that captures the information and produces anomaly information.Type: GrantFiled: February 17, 2004Date of Patent: October 9, 2012Assignee: IBM International Group B.V.Inventor: Pratyush Moghe
-
Publication number: 20110035781Abstract: A system that comprises of a set of components that interact together to achieve large-scale distributed data auditing, searching, and analytics. Traditional systems require auditing data to be captured and centralized for analytics, which leads to scaling and bottleneck issues (both on network and processing side). Unlike these systems, the system described herein leverages the combination of distributed storage and intelligence, along with centralized policy intelligence and coordination, to allow for large-scale data auditing that scales. This architecture allows for data auditing in “billions” of events, unlike traditional architectures that struggled in the realm of “millions” of events.Type: ApplicationFiled: April 7, 2010Publication date: February 10, 2011Inventor: Pratyush Moghe
-
Publication number: 20110035804Abstract: Data auditing involves capturing, filtering, processing and analytics of real-time data transactions. As such, data auditing imposes a heavy burden of processing in the fast path, which cannot afford to slow down. Unfortunately, most processing incurred in traditional data auditing fast paths has been serial, leading to bottlenecks or scaling issues. This disclosure addresses this problem by developing a fast path where both lower and upper stacks of data auditing are analyzed and exploited for potential parallelism. A fully-parallelized analytics fast path could deliver 25-200% speed-up of throughput relative to a serial fast path, depending on the specific conditions.Type: ApplicationFiled: April 7, 2010Publication date: February 10, 2011Inventor: Pratyush Moghe
-
Patent number: 7870598Abstract: This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.Type: GrantFiled: August 18, 2008Date of Patent: January 11, 2011Assignee: Tizor Systems, Inc.Inventors: Pratyush Moghe, Narain Gehani
-
Patent number: 7673147Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, network re-routing, or the like) is then implemented.Type: GrantFiled: September 24, 2004Date of Patent: March 2, 2010Assignee: Tizor Systems, Inc.Inventors: Pratyush Moghe, Peter T. Smith
-
Publication number: 20080307493Abstract: This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.Type: ApplicationFiled: August 18, 2008Publication date: December 11, 2008Applicant: TIZOR SYSTEMS, INC.Inventors: Pratyush Moghe, Narain Gehani
-
Patent number: 7415719Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, deprovision, or the like) is then implemented.Type: GrantFiled: September 24, 2004Date of Patent: August 19, 2008Assignee: Tizor Systems, Inc.Inventors: Pratyush Moghe, Narain Gehani
-
Publication number: 20050091532Abstract: Method and apparatus to monitor and detect anomalies of information content flows, the method comprising the steps of capturing information access packets, filtering packets to extract information, decoding packets to determine information content, deriving content signatures, trending prototypical behavior, and detecting anomalies of information access, and said apparatus comprising a computing device comprising a network based device that captures the information and produces anomaly information.Type: ApplicationFiled: February 17, 2004Publication date: April 28, 2005Inventor: Pratyush Moghe
-
Publication number: 20050071642Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, network re-routing, or the like) is then implemented.Type: ApplicationFiled: September 24, 2004Publication date: March 31, 2005Inventors: Pratyush Moghe, Peter Smith
-
Publication number: 20050071643Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of“anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.Type: ApplicationFiled: September 24, 2004Publication date: March 31, 2005Inventor: Pratyush Moghe