Patents by Inventor Sachin Purushottam Joglekar

Sachin Purushottam Joglekar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9575979
    Abstract: Techniques are described for automatically determining application composition and application ownership of an application that may include a plurality of files deployed to a plurality of host devices. The determination of application composition may be based on analyzing various types of metadata that may provide evidence of associations between deployed files, such as metadata describing the deployment of files to host devices, metadata describing the files tracked within a source control system, or other types of metadata. The determination of application ownership may also be based on analyzing the various types of metadata that provide evidence of associations between files and individuals or groups of individuals within an organization.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: February 21, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Jon Arron McClintock, Shailendra Batra, Thibault Candebat, Scott Gerard Carmack, Sachin Purushottam Joglekar, Alun Mark Jones, William Frederick Kruse, Narasimha Rao Lakkakula, Sunu Aby Mathew
  • Patent number: 9553865
    Abstract: Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web page comprises a data integrity token for the web page element. It is also determined if a value of the data integrity token matches an expected value. If the web page comprises the data integrity token and if the value matches the expected value, the web page comprising the web page element is sent to the client. If the web page does not comprise the data integrity token or if the value does not match the expected value, a protective operation is performed.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: January 24, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Brian Evan Maher, Sachin Purushottam Joglekar, Jesper Mikael Johansson
  • Publication number: 20150319189
    Abstract: Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web page comprises a data integrity token for the web page element. It is also determined if a value of the data integrity token matches an expected value. If the web page comprises the data integrity token and if the value matches the expected value, the web page comprising the web page element is sent to the client. If the web page does not comprise the data integrity token or if the value does not match the expected value, a protective operation is performed.
    Type: Application
    Filed: May 11, 2015
    Publication date: November 5, 2015
    Applicant: Amazon Technologies, Inc.
    Inventors: BRIAN EVAN MAHER, SACHIN PURUSHOTTAM JOGLEKAR, JESPER MIKAEL JOHANSSON
  • Patent number: 9032519
    Abstract: Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web page comprises a data integrity token for the web page element. It is also determined if a value of the data integrity token matches an expected value. If the web page comprises the data integrity token and if the value matches the expected value, the web page comprising the web page element is sent to the client. If the web page does not comprise the data integrity token or if the value does not match the expected value, a protective operation is performed.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: May 12, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Brian Evan Maher, Sachin Purushottam Joglekar, Jesper Mikael Johansson
  • Patent number: 9015820
    Abstract: Systems and methods for authenticating a request submitted from a client device through a third party content provider to an electronic entity are described. In one embodiment, a method includes providing a trusted script to the third party content provider, passing a trust token to the third party content provider and to the client device, and, in response to a request submitted from the client device through the third party content provider, validating the trust token associated with the request with the token passed to the client device, and processing the request. The trusted script is configured to create a trusted window on the third party Web page displayed on the client computing device, receive a trust token from the electronic entity through the trusted window, and associate the trust token with requests submitted from the client computing device through the third party content provider to the electronic entity.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: April 21, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Amit Bhosle, Scott G. Carmack, Dhanvi Harsha Kapila, Shilpi Gupta, Mehul Jain, Sachin Purushottam Joglekar, Ashish Agrawal
  • Patent number: 8707419
    Abstract: The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: April 22, 2014
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Krishna Sobhan Bhaskar Kokkiligadda, Mukesh Kumar Singh, Samrat Saha
  • Patent number: 8582567
    Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
    Type: Grant
    Filed: August 9, 2006
    Date of Patent: November 12, 2013
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Kumar Singh, Raghavendra Venkata Thodime
  • Patent number: 8407342
    Abstract: A method and system are provided for use in detecting and preventing attacks in a communications network. In one example, the method includes calculating first and second traffic volumes based on messages received at a first time and a second time, respectively. An average acceleration is calculated based on the first and second traffic volumes, and the method identifies whether the average acceleration has crossed a threshold. The messages are serviced only if the average acceleration has not crossed the threshold.
    Type: Grant
    Filed: March 21, 2011
    Date of Patent: March 26, 2013
    Assignee: Avaya Inc.
    Inventors: Krishna Kurapati, Sachin Purushottam Joglekar
  • Publication number: 20090144820
    Abstract: The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium.
    Type: Application
    Filed: June 27, 2007
    Publication date: June 4, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Krishna Sobhan Bhaskar Kokkiligadda, Mukesh Kumar Singh, Samrat Saha