Patents by Inventor Steve Malmskog

Steve Malmskog has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230344841
    Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.
    Type: Application
    Filed: July 5, 2023
    Publication date: October 26, 2023
    Inventors: Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni, Ariel Faigon, Krishna Narayanaswamy
  • Patent number: 11743275
    Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.
    Type: Grant
    Filed: May 27, 2021
    Date of Patent: August 29, 2023
    Assignee: Netskope, Inc.
    Inventors: Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni, Ariel Faigon, Krishna Narayanaswamy
  • Publication number: 20220156369
    Abstract: The technology disclosed relates to method and system of monitoring and controlling exfiltration of enterprise data stored on the cloud computing service (CCS). The method and system includes using a cross-application monitor to detect a could service application programming interface (API) in use and a function or activity being performed via the CCS API. The method and system determines the function or activity by parsing a data stream based on the CCS API and identifies a content of the enterprise data subject to content control by the application of a content inspection rule data subject to content control. The method and system selects a security action being applied to the enterprise data to prevent exfiltration based on the classification of the inspected data and policies applicable to the content subject to content control.
    Type: Application
    Filed: January 31, 2022
    Publication date: May 19, 2022
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Steve MALMSKOG, Arjun SAMBAMOORTHY
  • Patent number: 11238153
    Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.
    Type: Grant
    Filed: September 11, 2018
    Date of Patent: February 1, 2022
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Steve Malmskog, Arjun Sambamoorthy
  • Publication number: 20210288983
    Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.
    Type: Application
    Filed: May 27, 2021
    Publication date: September 16, 2021
    Applicant: Netskope, Inc.
    Inventors: Jeevan TAMBULURI, Ravi ITHAL, Steve MALMSKOG, Abhay KULKARNI, Ariel FAIGON, Krishna NARAYANASWAMY
  • Patent number: 11025653
    Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: June 1, 2021
    Assignee: Netskope, Inc.
    Inventors: Ariel Faigon, Krishna Narayanaswamy, Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni
  • Publication number: 20190245876
    Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.
    Type: Application
    Filed: April 19, 2019
    Publication date: August 8, 2019
    Applicant: Netskope, Inc.
    Inventors: Ariel FAIGON, Krishna NARAYANASWAMY, Jeevan TAMBULURI, Ravi ITHAL, Steve MALMSKOG, Abhay KULKARNI
  • Patent number: 10270788
    Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: April 23, 2019
    Assignee: Netskope, Inc.
    Inventors: Ariel Faigon, Krishna Narayanaswamy, Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni
  • Publication number: 20190012478
    Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.
    Type: Application
    Filed: September 11, 2018
    Publication date: January 10, 2019
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Steve MALMSKOG, Arjun SAMBAMOORTHY
  • Patent number: 10114966
    Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: October 30, 2018
    Assignee: netSkope, Inc.
    Inventors: Krishna Narayanaswamy, Steve Malmskog, Arjun Sambamoorthy
  • Publication number: 20180218167
    Abstract: A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API. The method also includes determining the function or the activity being performed via the CCS API by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. The method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.
    Type: Application
    Filed: March 26, 2018
    Publication date: August 2, 2018
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ravi ITHAL, Steve MALMSKOG, Shankaran GNANASHANMUGAM, Arjun SAMBAMOORTHY, Chetan ANAND, Prashanth ARUN
  • Patent number: 9928377
    Abstract: A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API. The method also includes determining the function or the activity being performed via the CCS API by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. The method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: March 27, 2018
    Assignee: netSkope, Inc.
    Inventors: Krishna Narayanaswamy, Ravi Ithal, Steve Malmskog, Shankaran Gnanashanmugam, Arjun Sambamoorthy, Chetan Anand, Prashanth Arun
  • Publication number: 20170353477
    Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.
    Type: Application
    Filed: September 2, 2016
    Publication date: December 7, 2017
    Applicant: Netskope, Inc.
    Inventors: Ariel FAIGON, Krishna NARAYANASWAMY, Jeevan TAMBULURI, Ravi ITHAL, Steve MALMSKOG, Abhay KULKARNI
  • Publication number: 20160275303
    Abstract: A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API. The method also includes determining the function or the activity being performed via the CCS API by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. The method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.
    Type: Application
    Filed: August 25, 2015
    Publication date: September 22, 2016
    Applicant: netSkope, Inc.
    Inventors: Krishna Narayanaswamy, Ravi Ithal, Steve Malmskog, Shankaran Gnanashanmugam, Arjun Sambamoorthy, Chetan Anand, Prashanth Arun
  • Publication number: 20160277368
    Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.
    Type: Application
    Filed: August 25, 2015
    Publication date: September 22, 2016
    Applicant: netSkope, Inc.
    Inventors: Krishna Narayanaswamy, Steve Malmskog, Arjun Sambamoorthy
  • Patent number: 8959569
    Abstract: A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information.
    Type: Grant
    Filed: March 18, 2011
    Date of Patent: February 17, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Krishna Narayanaswamy, Roger A. Chickering, Steve Malmskog
  • Publication number: 20120240182
    Abstract: A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information.
    Type: Application
    Filed: March 18, 2011
    Publication date: September 20, 2012
    Applicant: Juniper Networks, Inc.
    Inventors: Krishna NARAYANASWAMY, Roger A. CHICKERING, Steve MALMSKOG
  • Patent number: 8271636
    Abstract: A networking system, device, and method are provided. The networking device typically includes a user-defined ruleset including HTTP request rules and HTTP response rules. The networking device may further include a request processor configured to receive an incoming HTTP request from the client, apply HTTP request rules to the incoming HTTP request, to thereby produce a modified HTTP request, and send the modified HTTP request to the server. The networking device may further include a response processor configured to receive an HTTP response to the modified HTTP request from the server, apply the HTTP response rules to the HTTP response, to thereby produce a modified HTTP response, and send the modified HTTP response to the client.
    Type: Grant
    Filed: September 10, 2009
    Date of Patent: September 18, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Israel L'Heureux, Steve Malmskog
  • Publication number: 20090327827
    Abstract: A networking system, device, and method are provided. The networking device typically includes a user-defined ruleset including HTTP request rules and HTTP response rules. The networking device may further include a request processor configured to receive an incoming HTTP request from the client, apply HTTP request rules to the incoming HTTP request, to thereby produce a modified HTTP request, and send the modified HTTP request to the server. The networking device may further include a response processor configured to receive an HTTP response to the modified HTTP request from the server, apply the HTTP response rules to the HTTP response, to thereby produce a modified HTTP response, and send the modified HTTP response to the client.
    Type: Application
    Filed: September 10, 2009
    Publication date: December 31, 2009
    Applicant: Juniper Networks, Inc.
    Inventors: Israel L'Heureux, Steve Malmskog
  • Patent number: 7610400
    Abstract: A networking system, device, and method are provided. The networking device typically includes a user-defined ruleset including HTTP request rules and HTTP response rules. The networking device may further include a request processor configured to receive an incoming HTTP request from the client, apply HTTP request rules to the incoming HTTP request, to thereby produce a modified HTTP request, and send the modified HTTP request to the server. The networking device may further include a response processor configured to receive an HTTP response to the modified HTTP request from the server, apply the HTTP response rules to the HTTP response, to thereby produce a modified HTTP response, and send the modified HTTP response to the client.
    Type: Grant
    Filed: November 23, 2004
    Date of Patent: October 27, 2009
    Assignee: Juniper Networks, Inc.
    Inventors: Israel L'Heureux, Steve Malmskog