Patents by Inventor Amit Chopra

Amit Chopra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250080582
    Abstract: The disclosure provides an approach for adaptive computing security. Embodiments include receiving, by a security rule adaptation system, alert information about a plurality of alerts generated based on one or more security rules. Embodiments include receiving, by the security rule adaptation system, user feedback with respect to a subset of the plurality of alerts. Embodiments include modifying, by the security rule adaptation system, a security rule based on the alert information and the user feedback to produce an adapted security rule. Embodiments include providing, by the security rule adaptation system, the adapted security rule to a security component, wherein the security component uses the adapted rule to detect computing security threats.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Tejas BUDUKH, Amit CHOPRA, Shipeng XIE, Ranjani THIRUMALAI
  • Patent number: 12206706
    Abstract: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure wire,” and invokes an API exposed by a key management module to encrypt the frames using a group key associated with the secure wire, if any. Encryption may be performed for all frames from the vNIC, or according to a policy. In one embodiment, the encryption module may be located at a layer farthest from the vNIC, and encryption may be transparent to both the VM and a virtual switch. Unauthorized network entities which lack the group key cannot decipher the data of encrypted frames, even if they gain access to such frames.
    Type: Grant
    Filed: July 27, 2023
    Date of Patent: January 21, 2025
    Assignee: Nicira, Inc.
    Inventors: Amit Chopra, Uday Masurekar
  • Publication number: 20240163307
    Abstract: A method of evaluating alerts generated by security agents installed in endpoints includes: receiving a locality-sensitive hash (LSH) value associated with an alert generated by a security agent installed in one of the endpoints; performing a search for centroids that are within a threshold distance from the received LSH value, wherein the centroids are each an LSH value that is representative of one of a plurality of groups of alerts; and assigning a security risk indicator to the alert associated with the received LSH value based on results of the search and transmitting the security risk indicator to a security analytics platform of the endpoints.
    Type: Application
    Filed: November 15, 2022
    Publication date: May 16, 2024
    Inventors: Aditya CHOUDHARY, Jonathan James OLIVER, Ritika SINGHAL, Shugao XIA, Raghav BATTA, Amit CHOPRA
  • Publication number: 20240143746
    Abstract: Systems and methods are described for employing event context to improve threat detection. Systems and methods of embodiments of the disclosure measure both process deviation and path deviation to determine whether processes are benign or represent threats. Both a process deviation model and a path deviation model are deployed. The process deviation model determines the similarity of a process to past processes, and the path deviation model estimates whether processes have been called out of turn. In this manner, systems and methods of embodiments of the disclosure are able to detect both whether a process is in itself unusual, and whether it is called at an unusual time. This added context contributes to improved threat detection.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Applicant: VMware LLC
    Inventors: Raghav BATTA, Amit CHOPRA, Aditya CHOUDHARY, Lalit Prithviraj JAIN, Anjali MANGAL, Jonathan James OLIVER
  • Publication number: 20240069948
    Abstract: Mapping of applications by the most common file path in which they are installed or found to be running. Embodiments of the disclosure may determine the most commonly occurring hash values appearing in events generated by a virtualized network. These most commonly occurring hash values may correspond to the hash values of file paths associated with the greatest number of detected events. The database may then be queried to determine the most commonly occurring file path for each of these hash values. A table of such most commonly occurring file paths and their associated hash values may then be compiled and stored. Use of the most commonly occurring file path in lieu of an alert's actual file path may prevent undesired or malicious processes from going undetected by simply adopting a new file path that has yet to be recognized as being associated with undesired behavior.
    Type: Application
    Filed: August 26, 2022
    Publication date: February 29, 2024
    Applicant: VMware, Inc.
    Inventors: Alexander Julian THOMAS, Amit CHOPRA, Anjali MANGAL, Xiaosheng WU, Ereli ERAN
  • Publication number: 20240020381
    Abstract: An example method of classifying alerts generated by endpoints in a virtualized computing system includes: receiving, at an alert processing engine executing in the virtualized computing system, a stream of the alerts generated by security agents executing in the endpoints; extracting fields from the alerts at the alert processing engine; computing, at the alert processing engine, features from the alerts based on the fields; computing, at the alert processing engine, a plurality of model scores for each alert using the features as parametric input to a plurality of models; aggregating, by the alert processing engine, the plurality of model scores into a final score for each alert; and annotating each of the alerts with a respective final score.
    Type: Application
    Filed: July 18, 2022
    Publication date: January 18, 2024
    Inventors: Alexander Julian THOMAS, Taruj GOYAL, Xiaosheng WU, Deepak Chowdary METTEM, Anjali MANGAL, Amit CHOPRA
  • Publication number: 20230370496
    Abstract: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure wire,” and invokes an API exposed by a key management module to encrypt the frames using a group key associated with the secure wire, if any. Encryption may be performed for all frames from the vNIC, or according to a policy. In one embodiment, the encryption module may be located at a layer farthest from the vNIC, and encryption may be transparent to both the VM and a virtual switch. Unauthorized network entities which lack the group key cannot decipher the data of encrypted frames, even if they gain access to such frames.
    Type: Application
    Filed: July 27, 2023
    Publication date: November 16, 2023
    Inventors: Amit Chopra, Uday Masurekar
  • Patent number: 11750481
    Abstract: A method for visualizing network flows of a network is provided. The method monitors network flows between a group of machines in a network. The method associates identifiers with the monitored network flows. The method aggregates the monitored network flows into a set of groups based on the associated identifiers. The method displays a set of flow records for the each group of the set of groups.
    Type: Grant
    Filed: February 21, 2022
    Date of Patent: September 5, 2023
    Assignee: NICIRA, INC.
    Inventors: Kaushal Bansal, Uday Masurekar, Srinivas Nimmagadda, Jingmin Zhou, Abhishek Goliya, Amit Chopra, Kausum Kumar
  • Patent number: 11743292
    Abstract: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure wire,” and invokes an API exposed by a key management module to encrypt the frames using a group key associated with the secure wire, if any. Encryption may be performed for all frames from the vNIC, or according to a policy. In one embodiment, the encryption module may be located at a layer farthest from the vNIC, and encryption may be transparent to both the VM and a virtual switch. Unauthorized network entities which lack the group key cannot decipher the data of encrypted frames, even if they gain access to such frames.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: August 29, 2023
    Assignee: NICIRA, INC.
    Inventors: Amit Chopra, Uday Masurekar
  • Patent number: 11526372
    Abstract: Certain embodiments described herein are generally directed to handling a hypervisor restart event in a distributed network system. Embodiments include receiving, by a central controller, a session identifier from a first hypervisor. Embodiments further include comparing, by the central controller, the session identifier to a stored session identifier associated with the first hypervisor. Embodiments further include determining, by the central controller based on the session identifier not matching the stored session identifier associated with the first hypervisor, that the first hypervisor has restarted. Embodiments further include updating, by the central controller, the stored session identifier associated with the first hypervisor to match the session identifier. Embodiments further include identifying, by the central controller, a second hypervisor that is associated with the first hypervisor.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: December 13, 2022
    Assignee: NICIRA, INC.
    Inventors: Bin Qian, Amit Chopra, Dexiang Wang, Chen Li, Feng Pan, Jianjun Shen, Aayush Saxena, Yang Ping
  • Publication number: 20220376907
    Abstract: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure wire,” and invokes an API exposed by a key management module to encrypt the frames using a group key associated with the secure wire, if any. Encryption may be performed for all frames from the vNIC, or according to a policy. In one embodiment, the encryption module may be located at a layer farthest from the vNIC, and encryption may be transparent to both the VM and a virtual switch. Unauthorized network entities which lack the group key cannot decipher the data of encrypted frames, even if they gain access to such frames.
    Type: Application
    Filed: August 8, 2022
    Publication date: November 24, 2022
    Inventors: Amit Chopra, Uday Masurekar
  • Publication number: 20220360566
    Abstract: A novel method of providing virtual private access to a software defined data center (SDDC) is provided. The SDDC uses distributed VPN tunneling to allow external access to application services hosted in the SDDC. The SDDC includes host machines for providing computing and networking resources and a VPN gateway for providing external access to those resources. The host machines that host the VMs running the applications that VPN clients are interested in connecting performs the VPN encryption and decryption. The VPN gateway does not perform any encryption and decryption operations. The packet structure is such that the VPN gateway can read the IP address of the VM without decrypting the packet.
    Type: Application
    Filed: July 18, 2022
    Publication date: November 10, 2022
    Inventors: Sandesh Sawant, Amit Chopra, Vinayak Shashikant Naik, Jayant Jain, Anirban Sengupta, Uday Masurekar
  • Patent number: 11411995
    Abstract: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure wire,” and invokes an API exposed by a key management module to encrypt the frames using a group key associated with the secure wire, if any. Encryption may be performed for all frames from the vNIC, or according to a policy. In one embodiment, the encryption module may be located at a layer farthest from the vNIC, and encryption may be transparent to both the VM and a virtual switch. Unauthorized network entities which lack the group key cannot decipher the data of encrypted frames, even if they gain access to such frames.
    Type: Grant
    Filed: August 2, 2020
    Date of Patent: August 9, 2022
    Assignee: NICIRA, INC.
    Inventors: Amit Chopra, Uday Masurekar
  • Patent number: 11394692
    Abstract: A novel method of providing virtual private access to a software defined data center (SDDC) is provided. The SDDC uses distributed VPN tunneling to allow external access to application services hosted in the SDDC. The SDDC includes host machines for providing computing and networking resources and a VPN gateway for providing external access to those resources. The host machines that host the VMs running the applications that VPN clients are interested in connecting performs the VPN encryption and decryption. The VPN gateway does not perform any encryption and decryption operations. The packet structure is such that the VPN gateway can read the IP address of the VM without decrypting the packet.
    Type: Grant
    Filed: February 9, 2020
    Date of Patent: July 19, 2022
    Assignee: NICIRA, INC.
    Inventors: Sandesh Sawant, Amit Chopra, Vinayak Shashikant Naik, Jayant Jain, Anirban Sengupta, Uday Masurekar
  • Publication number: 20220173985
    Abstract: A method for visualizing network flows of a network is provided. The method monitors network flows between a group of machines in a network. The method associates identifiers with the monitored network flows. The method aggregates the monitored network flows into a set of groups based on the associated identifiers. The method displays a set of flow records for the each group of the set of groups.
    Type: Application
    Filed: February 21, 2022
    Publication date: June 2, 2022
    Inventors: Kaushal Bansal, Uday Masurekar, Srinivas Nimmagadda, Jingmin Zhou, Abhishek Goliya, Amit Chopra, Kausum Kumar
  • Patent number: 11343183
    Abstract: Example methods are provided to perform traffic forwarding between geographically dispersed first site and second site and to support traffic forwarding via a trunk interface. In one example, the method may include receiving, by a first edge device at the first site, network traffic having a plurality of packets via a trunk interface of the first edge device from a virtual tunnel endpoint, the virtual tunnel endpoint having decapsulated the packets prior to communicating the packets through the trunk interface. The method may further include reading an overlay network identifier from each of the packets to identify a source overlay network of the received network traffic from the multiple overlay networks; modifying each of the packets to include a virtual local area network (VLAN) identifier; and forwarding modified network traffic to a second edge device at the second site to identify the destination network based on the VLAN identifier.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: May 24, 2022
    Assignee: NICIRA INC.
    Inventors: Qin Li, Shailesh Urhekar, Amit Chopra, Ayyappan Veeraiyan, Uday Masurekar
  • Patent number: 11258655
    Abstract: A method for managing alarms in a virtual machine environment includes receiving alarm data related to a process and storing the alarm data in a database, where the alarm data comprises one or more features. The method further includes retrieving intended state information for the process and comparing the one more features of the alarm data to the intended state information to determine whether the alarm is an outlier. The method also includes computing a normal score for the alarm if the alarm is not an outlier, and computing an abnormal score for the alarm if the alarm is an outlier. The method also includes sending a notification for the alarm and the computed score.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: February 22, 2022
    Assignee: VMware, Inc.
    Inventors: Zhen Mo, Dexiang Wang, Bin Zan, Vijay Ganti, Amit Chopra, Ruimin Sun
  • Patent number: 11258681
    Abstract: A method for visualizing network flows of a network is provided. The method monitors network flows between a group of machines in a network. The method associates identifiers with the monitored network flows. The method aggregates the monitored network flows into a set of groups based on the associated identifiers. The method displays a set of flow records for the each group of the set of groups.
    Type: Grant
    Filed: September 25, 2017
    Date of Patent: February 22, 2022
    Assignee: NICIRA, INC.
    Inventors: Kaushal Bansal, Uday Masurekar, Srinivas Nimmagadda, Jingmin Zhou, Abhishek Goliya, Amit Chopra, Kausum Kumar
  • Patent number: 11102208
    Abstract: A computer security system provides for auto-populating process-connection whitelists using process wildcarding and connection wildcarding. Process wildcarding involves grouping process-connection requests together in a process* group without regard to the presence of distinct process arguments; in contrast, some process-connection requests may be separated both by process and by argument into process?argument groups. The process-connection requests may then be analyzed on a group-by-group basis to determine which processes can be mapped to wildcarded connection in a respective process-connection whitelist.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: August 24, 2021
    Assignee: Nicira, Inc.
    Inventors: Amit Chopra, Daniel G. Wing, Vijay Ganti, Christopher Corde, Amit Patil, Peixiao Lin, Sanjay Sanghavi
  • Patent number: 11075949
    Abstract: Certain embodiments described herein are generally directed to allocating security parameter index (“SPI”) values to a plurality of endpoints in a network. The SPI values may be derived using an SPI derivation formula and a plurality of parameters. In some embodiments, the SPI values may be derived by an endpoint and in other embodiments by a server. Using the SPI derivation formula and the plurality of parameters enables endpoints and servers to instantaneously derive SPI values without the need for servers to store them.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: July 27, 2021
    Assignee: Nicira, Inc.
    Inventors: Amit Chopra, Chen Li, Ganesan Chandrashekhar, Jinqiang Yang, Sanal Pillai, Bin Qian