Patents by Inventor Ajay Agrawal

Ajay Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12231434
    Abstract: A computer-implemented method includes detecting occurrence of an event in a cloud environment, obtaining an indication of an identity associated with the event, obtaining an indication of a usage time stamp representing usage time of a privilege in association with the identity for the event, and classifying the privilege into a classification group selected from a plurality of predefined classification groups. Each respective classification group groups a respective set of privileges defined in the cloud environment. The method includes obtaining a grant time stamp representing a grant time of at least one privilege, in the respective set of privileges in the classification group, to the identity and, based on the usage time stamp and the grant time stamp, generating an excessive privilege determination that indicates the classification group includes at least one excessive privilege. The method includes performing a computing action based on the excessive privilege determination.
    Type: Grant
    Filed: July 26, 2024
    Date of Patent: February 18, 2025
    Assignee: Normalyze, Inc.
    Inventors: Yang Zhang, Ajay Agrawal, Ravishankar Ganesh Ithal
  • Publication number: 20250039146
    Abstract: The technology disclosed relates to detection of data traffic in computing environments, such as cloud environments. Example systems and methods detect a plurality of workloads in a virtual network in a computing environment and deploy a plurality of probe agents to the plurality of workloads. Each respective probe agent detects network traffic on a respective workload of the plurality of workloads, scans a data packet that is at least one of sent or received by the respective workload, generates a data classification relative to the data packet, and generates a scan result that includes packet payload information and an indication of the data classification. The scan results are received from the plurality of probe agents and a computing action is performed based on scan results.
    Type: Application
    Filed: July 23, 2024
    Publication date: January 30, 2025
    Applicant: Normalyze, Inc.
    Inventors: Yang ZHANG, Ravishankar Ganesh ITHAL, Ajay Agrawal
  • Publication number: 20250039184
    Abstract: A computer-implemented method includes detecting occurrence of an event in a cloud environment, obtaining an indication of an identity associated with the event, obtaining an indication of a usage time stamp representing usage time of a privilege in association with the identity for the event, and classifying the privilege into a classification group selected from a plurality of predefined classification groups. Each respective classification group groups a respective set of privileges defined in the cloud environment. The method includes obtaining a grant time stamp representing a grant time of at least one privilege, in the respective set of privileges in the classification group, to the identity and, based on the usage time stamp and the grant time stamp, generating an excessive privilege determination that indicates the classification group includes at least one excessive privilege. The method includes performing a computing action based on the excessive privilege determination.
    Type: Application
    Filed: July 26, 2024
    Publication date: January 30, 2025
    Applicant: Normalyze, Inc.
    Inventors: Yang ZHANG, Ajay Agrawal, Ravishankar Ganesh ITHAL
  • Publication number: 20250036657
    Abstract: The disclosed technology receives a control input identifying a sampling criterion for classifying a data store storing a set of data objects in a computing environment as corresponding to a target data type and deploys one or more scanners configured to select a representative subset of data objects, from the set of data objects, based on the sampling criterion. A scanner result generated by the one or more scanners is received that represents detected instances, in the representative subset of data objects, of one or more pre-defined data patterns of the target data type. A classification result is generated based on a comparison of the number of detected instances of the one or more pre-defined data patterns to a threshold. The classification result represents a classification of the data store as having correspondence to the target data type. A computing action is performed based on the classification result.
    Type: Application
    Filed: June 26, 2024
    Publication date: January 30, 2025
    Applicant: Normalyze, Inc.
    Inventors: Yang ZHANG, Ajay Agrawal, Ravishankar Ganesh ITHAL
  • Patent number: 12197618
    Abstract: The technology disclosed relates to analysis of security posture of a cloud environment. A computing system is configured to automatically discover a plurality of databases in the cloud environment and configure an orchestration engine to deploy a plurality of log analyzer microservices on the plurality of databases. Each log analyzer microservice, of the plurality of log analyzer microservices, is configured to scan a respective database log that represents database activities on a respective database of the plurality of databases. Analysis results are received from the plurality of log analyzer microservices. The analysis results represent detection of at least one of a performance criterion or a security criterion in one or more databases of the plurality of databases. An action signal representing the analysis results is generated.
    Type: Grant
    Filed: December 18, 2023
    Date of Patent: January 14, 2025
    Assignee: Normalyze, Inc.
    Inventors: Ajay Agrawal, Yang Zhang
  • Publication number: 20240394401
    Abstract: The technology disclosed relates to analysis of security posture of a cloud environment. A computing system is configured to automatically discover a plurality of databases in the cloud environment and configure an orchestration engine to deploy a plurality of log analyzer microservices on the plurality of databases. Each log analyzer microservice, of the plurality of log analyzer microservices, is configured to scan a respective database log that represents database activities on a respective database of the plurality of databases. Analysis results are received from the plurality of log analyzer microservices. The analysis results represent detection of at least one of a performance criterion or a security criterion in one or more databases of the plurality of databases. An action signal representing the analysis results is generated.
    Type: Application
    Filed: December 18, 2023
    Publication date: November 28, 2024
    Applicant: Normalyze, Inc.
    Inventors: Ajay Agrawal, Yang ZHANG
  • Patent number: 12086043
    Abstract: The technology disclosed relates to resource activity management in a cloud environment. A computer-implemented method includes detecting a plurality of virtual networks in the cloud environment and deploying a plurality of sensors in the plurality of virtual networks using an orchestration engine of the cloud environment. Each sensor, of the plurality of sensors, includes an executable package configured to execute in a respective virtual network, of the plurality of virtual networks, independent of other sensors, of the plurality of sensors, to manage activities in the respective virtual network. The method includes identifying an activity management task to be performed in a particular virtual network of the plurality of virtual networks, sending a task command representing the activity management task to the sensor deployed in the particular virtual network, and receiving an execution result representing execution of the activity management task by the sensor deployed in the particular virtual network.
    Type: Grant
    Filed: June 13, 2023
    Date of Patent: September 10, 2024
    Assignee: Normalyze, Inc.
    Inventors: Nimish Salve, Ajay Agrawal, Yang Zhang
  • Publication number: 20240259434
    Abstract: The technology disclosed relates to endpoint data loss prevention (DLP). In particular, the technology disclosed relates to enforcing data loss prevention policies at an endpoint without needing to perform content sensitivity scan at the endpoint.
    Type: Application
    Filed: April 10, 2024
    Publication date: August 1, 2024
    Inventors: Krishna Narayanaswamy, Ajay Agrawal
  • Patent number: 11985170
    Abstract: The technology disclosed relates to endpoint data loss prevention (DLP). In particular, the technology disclosed relates to enforcing data loss prevention policies at an endpoint without needing to perform content sensitivity scan at the endpoint.
    Type: Grant
    Filed: June 2, 2022
    Date of Patent: May 14, 2024
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Ajay Agrawal
  • Patent number: 11886610
    Abstract: The technology disclosed relates to analysis of security posture of a cloud environment. In particular, the disclosed technology relates to a system and method that detects a triggering criterion and, in response to the triggering criterion, automatically discovers a plurality of databases in the cloud environment. An orchestration engine is configured to deploy a plurality of log analyzer microservices on the plurality of databases, each log analyzer microservice, of the plurality of log analyzer microservices, being configured to scan a respective database log that represents database activities on a respective database of the plurality of databases. Analysis results are received from the plurality of log analyzer microservices, the analysis results represent detection of at least one of a performance criterion or a security criterion in one or more databases of the plurality of databases. An action signal representing the analysis results is generated.
    Type: Grant
    Filed: June 8, 2023
    Date of Patent: January 30, 2024
    Assignee: Normalyze, Inc.
    Inventors: Ajay Agrawal, Yang Zhang
  • Patent number: 11451587
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Grant
    Filed: January 8, 2020
    Date of Patent: September 20, 2022
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Ajay Agrawal
  • Publication number: 20220294831
    Abstract: The technology disclosed relates to endpoint data loss prevention (DLP). In particular, the technology disclosed relates to enforcing data loss prevention policies at an endpoint without needing to perform content sensitivity scan at the endpoint.
    Type: Application
    Filed: June 2, 2022
    Publication date: September 15, 2022
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ajay AGRAWAL
  • Patent number: 11425169
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: August 23, 2022
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, Ajay Agrawal
  • Publication number: 20220114513
    Abstract: A method (200) for configuring a workflow is described. The method (200) comprises initiating (202), by a workflow engine (122), a task in the workflow and identifying (210), by a rule engine (124), at least one upcoming task in the workflow based on data associated with at least one parameter of the task. The method (200) further comprises determining (212), by a task engine (126), at least one additional parameter of the identified at least one upcoming task and obtaining (214), by the task engine (126), data associated with the at least one additional parameter. The method (200) further comprises completing (216), by the task engine (126), the task based on the data associated with the at least one additional parameter.
    Type: Application
    Filed: January 13, 2020
    Publication date: April 14, 2022
    Applicant: SIRIONLABS PTE. LTD.
    Inventors: Aditya Gupta, Neha Sharma, Ravi Verma, Rahul Raman, Ajay Agrawal
  • Publication number: 20200145463
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Application
    Filed: January 8, 2020
    Publication date: May 7, 2020
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ajay AGRAWAL
  • Publication number: 20190268379
    Abstract: The technology disclosed presents an improved endpoint data loss prevention (DLP) solution, referred to herein as “small-footprint endpoint DLP (sf-EDLP),” which enforces security policies at endpoints by relying on previously generated sensitivity metadata, rather than by performing content sensitivity scans at the endpoints. Since content sensitivity scans are computationally intensive and time consuming, sf-EDLP leads to a significantly simpler implementation, reduced runtime computation, and a smaller memory footprint; making it suitable for computationally constrained environments such as modern mobile devices.
    Type: Application
    Filed: May 9, 2019
    Publication date: August 29, 2019
    Applicant: Netskope, Inc.
    Inventors: Krishna NARAYANASWAMY, Ajay AGRAWAL
  • Publication number: 20110158149
    Abstract: Multimedia gateway for use in a networked home environment is disclosed. In one embodiment, in a method for delivering broadcast multimedia content in a networked home environment, a radio frequency (RF) signal is received. The RF signal is then converted into an IP stream. It is determined whether the IP stream is an IP data stream or an IP video stream and based on the outcome of the determination, the IP stream is sent to one or more televisions, one or more computing devices, and/or one or more telephones.
    Type: Application
    Filed: December 29, 2010
    Publication date: June 30, 2011
    Inventors: Satish Mugulavalli, Ajay Agrawal, Venkatesh Diwakar Tanjore
  • Patent number: 7930284
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: July 2, 2010
    Date of Patent: April 19, 2011
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Publication number: 20100269161
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Application
    Filed: July 2, 2010
    Publication date: October 21, 2010
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H. Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley
  • Patent number: 7769737
    Abstract: A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: August 3, 2010
    Assignee: eBay Inc.
    Inventors: Scott Leahy, Jeffrey Taylor, Chris Lalonde, Ajay Agrawal, Kevin H Embree, Jeffrey L. King, Andy Brown, Mathew Gene Henley