Patents by Inventor Steve Malmskog
Steve Malmskog has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230344841Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.Type: ApplicationFiled: July 5, 2023Publication date: October 26, 2023Inventors: Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni, Ariel Faigon, Krishna Narayanaswamy
-
Patent number: 11743275Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.Type: GrantFiled: May 27, 2021Date of Patent: August 29, 2023Assignee: Netskope, Inc.Inventors: Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni, Ariel Faigon, Krishna Narayanaswamy
-
Publication number: 20220156369Abstract: The technology disclosed relates to method and system of monitoring and controlling exfiltration of enterprise data stored on the cloud computing service (CCS). The method and system includes using a cross-application monitor to detect a could service application programming interface (API) in use and a function or activity being performed via the CCS API. The method and system determines the function or activity by parsing a data stream based on the CCS API and identifies a content of the enterprise data subject to content control by the application of a content inspection rule data subject to content control. The method and system selects a security action being applied to the enterprise data to prevent exfiltration based on the classification of the inspected data and policies applicable to the content subject to content control.Type: ApplicationFiled: January 31, 2022Publication date: May 19, 2022Applicant: Netskope, Inc.Inventors: Krishna NARAYANASWAMY, Steve MALMSKOG, Arjun SAMBAMOORTHY
-
Patent number: 11238153Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.Type: GrantFiled: September 11, 2018Date of Patent: February 1, 2022Assignee: Netskope, Inc.Inventors: Krishna Narayanaswamy, Steve Malmskog, Arjun Sambamoorthy
-
Publication number: 20210288983Abstract: The technology relates to machine responses to anomalies detected using machine learning based anomaly detection. In particular, to receiving evaluations of production events, prepared using activity models constructed on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, to responding to detected anomalies in near real-time streams of security-related events of tenants, the anomalies detected by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant.Type: ApplicationFiled: May 27, 2021Publication date: September 16, 2021Applicant: Netskope, Inc.Inventors: Jeevan TAMBULURI, Ravi ITHAL, Steve MALMSKOG, Abhay KULKARNI, Ariel FAIGON, Krishna NARAYANASWAMY
-
Patent number: 11025653Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.Type: GrantFiled: April 19, 2019Date of Patent: June 1, 2021Assignee: Netskope, Inc.Inventors: Ariel Faigon, Krishna Narayanaswamy, Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni
-
Publication number: 20190245876Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.Type: ApplicationFiled: April 19, 2019Publication date: August 8, 2019Applicant: Netskope, Inc.Inventors: Ariel FAIGON, Krishna NARAYANASWAMY, Jeevan TAMBULURI, Ravi ITHAL, Steve MALMSKOG, Abhay KULKARNI
-
Patent number: 10270788Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.Type: GrantFiled: September 2, 2016Date of Patent: April 23, 2019Assignee: Netskope, Inc.Inventors: Ariel Faigon, Krishna Narayanaswamy, Jeevan Tambuluri, Ravi Ithal, Steve Malmskog, Abhay Kulkarni
-
Publication number: 20190012478Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.Type: ApplicationFiled: September 11, 2018Publication date: January 10, 2019Applicant: Netskope, Inc.Inventors: Krishna NARAYANASWAMY, Steve MALMSKOG, Arjun SAMBAMOORTHY
-
Patent number: 10114966Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.Type: GrantFiled: August 25, 2015Date of Patent: October 30, 2018Assignee: netSkope, Inc.Inventors: Krishna Narayanaswamy, Steve Malmskog, Arjun Sambamoorthy
-
Publication number: 20180218167Abstract: A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API. The method also includes determining the function or the activity being performed via the CCS API by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. The method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.Type: ApplicationFiled: March 26, 2018Publication date: August 2, 2018Applicant: Netskope, Inc.Inventors: Krishna NARAYANASWAMY, Ravi ITHAL, Steve MALMSKOG, Shankaran GNANASHANMUGAM, Arjun SAMBAMOORTHY, Chetan ANAND, Prashanth ARUN
-
Patent number: 9928377Abstract: A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API. The method also includes determining the function or the activity being performed via the CCS API by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. The method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.Type: GrantFiled: August 25, 2015Date of Patent: March 27, 2018Assignee: netSkope, Inc.Inventors: Krishna Narayanaswamy, Ravi Ithal, Steve Malmskog, Shankaran Gnanashanmugam, Arjun Sambamoorthy, Chetan Anand, Prashanth Arun
-
Publication number: 20170353477Abstract: The technology disclosed relates to machine learning based anomaly detection. In particular, it relates to constructing activity models on per-tenant and per-user basis using an online streaming machine learner that transforms an unsupervised learning problem into a supervised learning problem by fixing a target label and learning a regressor without a constant or intercept. Further, it relates to detecting anomalies in near real-time streams of security-related events of one or more tenants by transforming the events in categorized features and requiring a loss function analyzer to correlate, essentially through an origin, the categorized features with a target feature artificially labeled as a constant. It further includes determining an anomaly score for a production event based on calculated likelihood coefficients of categorized feature-value pairs and a prevalencist probability value of the production event comprising the coded features-value pairs.Type: ApplicationFiled: September 2, 2016Publication date: December 7, 2017Applicant: Netskope, Inc.Inventors: Ariel FAIGON, Krishna NARAYANASWAMY, Jeevan TAMBULURI, Ravi ITHAL, Steve MALMSKOG, Abhay KULKARNI
-
Publication number: 20160275303Abstract: A computer-implemented method is described to monitor and control enterprise information stored on a cloud computing service (CCS). The method includes using a cross-application monitor to detect a cloud computing service (CCS) application programming interface (API) in use and a function or an activity being performed via the CCS API. The method also includes determining the function or the activity being performed via the CCS API by parsing a data stream based on the CCS API and identifying content being transmitted to the CCS. The method further includes applying a content inspection rule to find strings and interrelated strings in the content that are subject to content control and triggering a security action responsive to finding the strings and interrelated strings subject to content control in the parsed stream.Type: ApplicationFiled: August 25, 2015Publication date: September 22, 2016Applicant: netSkope, Inc.Inventors: Krishna Narayanaswamy, Ravi Ithal, Steve Malmskog, Shankaran Gnanashanmugam, Arjun Sambamoorthy, Chetan Anand, Prashanth Arun
-
Publication number: 20160277368Abstract: The technology disclosed relates to securely encrypting a document. In particular, it relates to accessing a key-manager with a triplet of organization identifier, application identifier and region identifier and in response receiving a triplet-key and a triplet-key identifier that uniquely identifies the triplet-key. Also, for a document that has a document identifier (ID), the technology disclosed relates to deriving a per-document key from a combination of the triplet-key, the document ID and a salt. Further, the per-document key is used to encrypt the document.Type: ApplicationFiled: August 25, 2015Publication date: September 22, 2016Applicant: netSkope, Inc.Inventors: Krishna Narayanaswamy, Steve Malmskog, Arjun Sambamoorthy
-
Patent number: 8959569Abstract: A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information.Type: GrantFiled: March 18, 2011Date of Patent: February 17, 2015Assignee: Juniper Networks, Inc.Inventors: Krishna Narayanaswamy, Roger A. Chickering, Steve Malmskog
-
Publication number: 20120240182Abstract: A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information.Type: ApplicationFiled: March 18, 2011Publication date: September 20, 2012Applicant: Juniper Networks, Inc.Inventors: Krishna NARAYANASWAMY, Roger A. CHICKERING, Steve MALMSKOG
-
Patent number: 8271636Abstract: A networking system, device, and method are provided. The networking device typically includes a user-defined ruleset including HTTP request rules and HTTP response rules. The networking device may further include a request processor configured to receive an incoming HTTP request from the client, apply HTTP request rules to the incoming HTTP request, to thereby produce a modified HTTP request, and send the modified HTTP request to the server. The networking device may further include a response processor configured to receive an HTTP response to the modified HTTP request from the server, apply the HTTP response rules to the HTTP response, to thereby produce a modified HTTP response, and send the modified HTTP response to the client.Type: GrantFiled: September 10, 2009Date of Patent: September 18, 2012Assignee: Juniper Networks, Inc.Inventors: Israel L'Heureux, Steve Malmskog
-
Publication number: 20090327827Abstract: A networking system, device, and method are provided. The networking device typically includes a user-defined ruleset including HTTP request rules and HTTP response rules. The networking device may further include a request processor configured to receive an incoming HTTP request from the client, apply HTTP request rules to the incoming HTTP request, to thereby produce a modified HTTP request, and send the modified HTTP request to the server. The networking device may further include a response processor configured to receive an HTTP response to the modified HTTP request from the server, apply the HTTP response rules to the HTTP response, to thereby produce a modified HTTP response, and send the modified HTTP response to the client.Type: ApplicationFiled: September 10, 2009Publication date: December 31, 2009Applicant: Juniper Networks, Inc.Inventors: Israel L'Heureux, Steve Malmskog
-
Patent number: 7610400Abstract: A networking system, device, and method are provided. The networking device typically includes a user-defined ruleset including HTTP request rules and HTTP response rules. The networking device may further include a request processor configured to receive an incoming HTTP request from the client, apply HTTP request rules to the incoming HTTP request, to thereby produce a modified HTTP request, and send the modified HTTP request to the server. The networking device may further include a response processor configured to receive an HTTP response to the modified HTTP request from the server, apply the HTTP response rules to the HTTP response, to thereby produce a modified HTTP response, and send the modified HTTP response to the client.Type: GrantFiled: November 23, 2004Date of Patent: October 27, 2009Assignee: Juniper Networks, Inc.Inventors: Israel L'Heureux, Steve Malmskog