Patents by Inventor Ahzam Ali

Ahzam Ali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10135841
    Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: November 20, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Lisa M. Beam, Lyubov Nesteroff, Natalia L. Shimuk, Amol Sood, Rene Chavez, Olga M. Towstopiat, Nadeem Khan, Ahzam Ali, Dharmendran Arumugam, Mayank Betala, Shrikanta Sharma
  • Publication number: 20170126728
    Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise.
    Type: Application
    Filed: December 30, 2015
    Publication date: May 4, 2017
    Inventors: Lisa M. Beam, Lyubov Nesteroff, Natalia L. Shimuk, Amol Sood, Rene Chavez, Olga M. Towstopiat, Nadeem Khan, Ahzam Ali, Dharmendran Arumugam, Mayank Betala, Shrikanta Sharma
  • Patent number: 8539545
    Abstract: An example network system includes a plurality of endpoint computing resources, a business policy graph of a network that includes a set of the plurality of endpoint computing resources configured as a security domain, a set of policy enforcement points (“PEPs”) configured to enforce network policies, and a network management module (“NMM”). The NMM is configured to receive an indication of a set of network policies to apply to the security domain, automatically determine a subset of PEPs of the set of PEPs are required to enforce the set of network policies based on physical network topology information readable by the NMM that includes information about the location of the endpoint computing resources and the set of PEPs within the network, and apply the network policies to the subset of PEPs in order to enforce the network policies against the set of endpoint computing resources of the security domain.
    Type: Grant
    Filed: July 22, 2010
    Date of Patent: September 17, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Anoop Kartha, Kamil Imtiaz, Ahzam Ali, Amarnath Bachhu Satyan, Firdousi Zackariya, Nadeem Khan, Sanjay Agarwal
  • Publication number: 20120060163
    Abstract: In some embodiments, an apparatus includes a memory, a processing device, a task division module implemented within at least one of the memory or the processing device, and a dynamic authentication module implemented within at least one of the memory or the processing device. The task division module is operable to receive a request associated with a task to be performed and to divide the task into multiple subtasks. The dynamic authentication module is operable to provide an access right to an operator from a set of operators assigned a subtask from the multiple subtasks. The access right for the operator is an access right to complete the subtask assigned to that operator from the set of operators.
    Type: Application
    Filed: September 7, 2010
    Publication date: March 8, 2012
    Inventors: Nadeem KHAN, Ahzam Ali
  • Publication number: 20120023546
    Abstract: An example network system includes a plurality of endpoint computing resources, a business policy graph of a network that includes a set of the plurality of endpoint computing resources configured as a security domain, a set of policy enforcement points (“PEPs”) configured to enforce network policies, and a network management module (“NMM”). The NMM is configured to receive an indication of a set of network policies to apply to the security domain, automatically determine a subset of PEPs of the set of PEPs are required to enforce the set of network policies based on physical network topology information readable by the NMM that includes information about the location of the endpoint computing resources and the set of PEPs within the network, and apply the network policies to the subset of PEPs in order to enforce the network policies against the set of endpoint computing resources of the security domain.
    Type: Application
    Filed: July 22, 2010
    Publication date: January 26, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Anoop V. Kartha, Kamil Imtiaz, Ahzam Ali, Amarnath Bachhu Satyan, Firdousi Zackariya, Nadeem Khan, Sanjay Agarwal