Patents by Inventor Ratinder Paul Singh Ahuja

Ratinder Paul Singh Ahuja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190268353
    Abstract: Systems, methods, and apparatuses prevent malicious network traffic from accessing or being transmitted to trusted network resources in a network environment. In one embodiment, a management microservice initializes a security microservice on a computing device and configures a network interface as a secure channel for communications with the security microservice. When the management microservice authenticates the network interface, the management microservice enables a data channel interface for the security microservice, allowing the security microservice to receive network traffic from other security microservices. Prior to enabling the data channel interface, the security microservice does not have an active interface with any other security microservices, which prevents any traffic, including malicious network traffic from reaching areas of the security microservice during the initialization process.
    Type: Application
    Filed: February 23, 2018
    Publication date: August 29, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Samir Shah
  • Publication number: 20190253450
    Abstract: A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset.
    Type: Application
    Filed: April 25, 2019
    Publication date: August 15, 2019
    Applicant: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, Sven Schrecker
  • Publication number: 20190251082
    Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.
    Type: Application
    Filed: February 14, 2019
    Publication date: August 15, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah
  • Publication number: 20190230076
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Application
    Filed: March 27, 2019
    Publication date: July 25, 2019
    Applicant: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Publication number: 20190207954
    Abstract: Systems, methods, and apparatuses enable evaluating encrypted or obfuscated data packets being transmitted over a connection in a networked environment. In an embodiment, a security service utilizes one or more microservices operating as detectors to analyze characteristics of an encrypted or obfuscated network connection. Using the information from the detectors, the security service classifies the type of encryption protocol used on an encrypted connection and determines an extrapolated protocol state. Using the extrapolated protocol state with additional information received from the detectors, the security service determines a risk level associated with the connection and executes security actions on the connection based on the risk level.
    Type: Application
    Filed: January 2, 2018
    Publication date: July 4, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah, Xiaodong Ye
  • Patent number: 10320830
    Abstract: A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: June 11, 2019
    Assignee: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, Sven Schrecker
  • Patent number: 10313337
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: June 4, 2019
    Assignee: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Patent number: 10313362
    Abstract: Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to real-time configurable load determination. For example, a method is disclosed, which calls for receiving a request to perform a security service, performing the security service on data included with the request; calculating a service load associated with and during the performing the security service, and transmitting a response to the request, wherein the response includes the calculated service load.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: June 4, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20190158465
    Abstract: Systems, methods, and apparatuses enable deploying and executing a security policy on endpoints in a network. In an embodiment, a security orchestrator determines a set of endpoints in a network and determines transformed endpoints from the determined set of endpoints through an endpoint transformation process. The security orchestrator determines a connectivity vector for at least a first transformed endpoint and a second transformed endpoint, where the connectivity vector includes properties associated with the corresponding transformed endpoint. Using the properties from the connectivity vector of the first transformed endpoint, a security policy is generated and deployed to the first transformed endpoint. Based on a comparison of the connectivity vectors of the first and second transformed endpoints indicating a similarity between the first and second transformed endpoints, the security policy is further deployed to the second transformed endpoint.
    Type: Application
    Filed: November 17, 2017
    Publication date: May 23, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Jitendra Gaitonde, John Parker, Manoj Ahluwalia, Damodar Hegde, Neil Liberman, Rajiv Sreedhar
  • Publication number: 20190138728
    Abstract: Systems and methods are disclosed that relate to network security within a virtual network, and how to add microservices in a scalable virtual network. For example, one embodiment discloses a method of receiving a deployment request to deploy a security microservice in a security service, the deployment request including a deployment specification. The method further includes determining whether an interface microservice is available on one or more hosts by accessing one or more host records for the one or more hosts, and selecting a host on which to deploy the security microservice utilizing the deployment specification. When the interface microservice does not exist on the selected host, the method further includes initializing the interface microservice on the selected host, attaching the interface microservice to a hypervisor of the selected host, connecting the security microservice to the interface microservice of the selected host, and deploying the security microservice on the selected host.
    Type: Application
    Filed: July 2, 2018
    Publication date: May 9, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel, John Richard Guzik
  • Publication number: 20190140903
    Abstract: System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects a first microservice of a first hierarchy, configures the microservices of a second lower-level hierarchy to remove the first microservice from load balancing decisions to the first hierarchy, moves the first microservice to another server, configures data plane connectivity to the first microservice to reflect a change in server, and configures the microservices of the second hierarchy to include the first microservice in load balancing decisions to the first hierarchy.
    Type: Application
    Filed: October 30, 2018
    Publication date: May 9, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20190124096
    Abstract: Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment discloses a method of receiving, by a first security microservice, a first channel data encapsulation packet encapsulating a first encapsulation context and a first encapsulated data, performing a security service on the first encapsulated data using the first encapsulation context, transmitting by the first security microservice a second channel data encapsulation packet to a second security microservice, wherein the second channel encapsulation packet comprises a request for security services, receiving by the first security microservice a response from the second security microservice comprising a second security microservice context, a second security microservice timestamp, and a second security microservice load.
    Type: Application
    Filed: October 18, 2018
    Publication date: April 25, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 10218730
    Abstract: A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to systems and methods of stateless processing in a fault-tolerant microservice environment. In one example, a method is disclosed, which includes transmitting, by a first microservice, packet data and a context associated therewith; receiving the packet data and the context by a second microservice, the second microservice to: use the context to determine what security processing to perform, perform the security processing over the packet data, and transmit resulting data and the context to a third microservice; and receiving the resulting data and the context by the third microservice, the third microservice to: use the context to determine what security processing to perform, and perform the security processing over the resulting data.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: February 26, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 10212132
    Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: February 19, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah
  • Patent number: 10212133
    Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: February 19, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah
  • Publication number: 20180351988
    Abstract: A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset.
    Type: Application
    Filed: April 23, 2018
    Publication date: December 6, 2018
    Applicant: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, Sven Schrecker
  • Patent number: 10148504
    Abstract: System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects a first microservice of a first hierarchy, configures the microservices of a second lower-level hierarchy to remove the first microservice from load balancing decisions to the first hierarchy, moves the first microservice to another server, configures data plane connectivity to the first microservice to reflect a change in server, and configures the microservices of the second hierarchy to include the first microservice in load balancing decisions to the first hierarchy.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: December 4, 2018
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20180343281
    Abstract: Systems, methods, and apparatuses enable updating security policies in response to detecting attack activity or security threats. In an embodiment, security microservices detect attack activity sent between resources within an internal network. In response, the security microservices correlate the attack activity to externally accessible resources that were the initial entry point for the attack activity to the internal network. Based on this correlation, the security microservices update security policies bi-directionally to prevent the spread of future attack activity in the internal network between resources at a same level in the internal network and between resources at different levels in the internal network.
    Type: Application
    Filed: May 26, 2017
    Publication date: November 29, 2018
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 10142356
    Abstract: Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment discloses a method of receiving, by a first security microservice, a first channel data encapsulation packet encapsulating a first encapsulation context and a first encapsulated data, performing a security service on the first encapsulated data using the first encapsulation context, transmitting by the first security microservice a second channel data encapsulation packet to a second security microservice, wherein the second channel encapsulation packet comprises a request for security services, receiving by the first security microservice a response from the second security microservice comprising a second security microservice context, a second security microservice timestamp, and a second security microservice load.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: November 27, 2018
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20180324119
    Abstract: Systems, methods, and apparatuses enable a microservice-based application to dynamically update components of the system without disrupting messaging occurring between microservices in the system. Microservices of a microservice-based application store data indicating mappings between data object versions and message object versions and which is used update system components in a controlled manner. As used herein, a data object generally refers to any data generated by a microservice and that can be sent to one or more other microservices using a publish-subscribe messaging pattern or other messaging architecture. A message object refers to data used to encapsulate one or more data objects and used to send the data object from one component to another in the system.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 8, 2018
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel