Patents by Inventor Anand Kashyap

Anand Kashyap has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230155989
    Abstract: A system disclosed herein may receive, from an application associated with a client identification, a request to perform a cryptographic operation with a specified application key, identify a gateway associated with the client identification, identify a respective characteristic of each self-encrypting key management service of a plurality of self-encrypting key management services that correspond to the gateway, identify a self-encrypting key management service with a characteristic satisfying a threshold criterion, and send the request to the identified self-encrypting key management service.
    Type: Application
    Filed: December 27, 2022
    Publication date: May 18, 2023
    Inventors: Ambuj KUMAR, Anand KASHYAP, Jethro Gideon BEEKMAN, Faisal FARUQUI
  • Patent number: 11627117
    Abstract: An encrypted search query may be received from a requesting client system at a secure enclave of a processing device. The encrypted search query may be decrypted to form a decrypted search query. One or more index entries of a metadata index that correspond to the decrypted search query may be identified, such that each identified index entry is associated with a content reference that identifies a content item located outside the secure enclave. The index entries that correspond to the decrypted search query may include one or more index entries having one or more associated index metadata items that correspond to the decrypted search query. One or more secure search results may be generated, such that each secure search result corresponds to one of the index entries and comprises the content reference associated with the corresponding index entry. The secure search results may be sent to the requesting client system.
    Type: Grant
    Filed: August 18, 2020
    Date of Patent: April 11, 2023
    Assignee: Fortanix, Inc.
    Inventors: Anand Kashyap, Ambuj Kumar, Nehal Bandi
  • Patent number: 11627116
    Abstract: Encrypted first data and encrypted second data may be received, where each data is from different client servers. A request to perform an operation with the first data and the second data may be received. Whether the operation is authorized to be performed with the first data and the second data at an enclave may be verified. In response to verifying that the operation is authorized to be performed with the first data and the second data at the enclave, the encrypted first data and the encrypted second data may be decrypted to the first data and the second data, respectively. Furthermore, the operation may be performed with the first data and the second data at the enclave.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: April 11, 2023
    Assignee: Fortanix, Inc.
    Inventors: Ambuj Kumar, Anand Kashyap, Nehal Bandi
  • Patent number: 11399013
    Abstract: A request to perform an operation associated with a service instance may be received by a processing device. The service instance may have an associated service instance identifier. A proxy instance associated with the service instance may be identified. The proxy instance may perform operations within a secure enclave associated with the processing device. The proxy instance within the secure enclave associated with the processing device may be used to verify that the secure enclave associated with the processing device contains the service instance associated with the service instance identifier. When the verification is successful, the proxy instance within the secure enclave associated with the processing device may be used to send a request to the service instance to perform the operation.
    Type: Grant
    Filed: April 20, 2020
    Date of Patent: July 26, 2022
    Assignee: Fortanix, Inc.
    Inventors: Nehal Bandi, Anand Kashyap
  • Patent number: 11349822
    Abstract: A request may be received from an application for a performance of an operation associated with a cryptographic key that is stored at a secure enclave. A plugin of the secure enclave may be identified from the request for performance of the operation. The operation associated with the cryptographic key may be performed by using the plugin of the secure enclave to generate an output within the secure enclave. The output generated within the secure enclave and based on the plugin may be provided to the application.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: May 31, 2022
    Assignee: Fortanix, Inc.
    Inventors: Anand Kashyap, Ambuj Kumar, Jethro Gideon Beekman, Jeffrey Seyfried
  • Publication number: 20220060451
    Abstract: An encrypted search query may be received from a requesting client system at a secure enclave of a processing device. The encrypted search query may be decrypted to form a decrypted search query. One or more index entries of a metadata index that correspond to the decrypted search query may be identified, such that each identified index entry is associated with a content reference that identifies a content item located outside the secure enclave. The index entries that correspond to the decrypted search query may include one or more index entries having one or more associated index metadata items that correspond to the decrypted search query. One or more secure search results may be generated, such that each secure search result corresponds to one of the index entries and comprises the content reference associated with the corresponding index entry. The secure search results may be sent to the requesting client system.
    Type: Application
    Filed: August 18, 2020
    Publication date: February 24, 2022
    Inventors: Anand Kashyap, Ambuj Kumar, Nehal Bandi
  • Patent number: 11159309
    Abstract: A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: October 26, 2021
    Assignee: Fortanix, Inc.
    Inventors: Jeffrey Seyfried, Jethro Gideon Beekman, Anand Kashyap
  • Publication number: 20210328971
    Abstract: A request to perform an operation associated with a service instance may be received by a processing device. The service instance may have an associated service instance identifier. A proxy instance associated with the service instance may be identified. The proxy instance may perform operations within a secure enclave associated with the processing device. The proxy instance within the secure enclave associated with the processing device may be used to verify that the secure enclave associated with the processing device contains the service instance associated with the service instance identifier. When the verification is successful, the proxy instance within the secure enclave associated with the processing device may be used to send a request to the service instance to perform the operation.
    Type: Application
    Filed: April 20, 2020
    Publication date: October 21, 2021
    Inventors: Nehal Bandi, Anand Kashyap
  • Publication number: 20210312016
    Abstract: A request to execute an application at a secure cryptographic environment of a server may be received. A tag that has been assigned to the application may be received. An attribute of the server may be identified. A determination may be made as to whether the attribute of the server satisfies the tag that has been assigned to the application. In response to determining that the attribute of the server satisfies the tag that has been assigned to the application, an indication may be provided to execute the application at the secure cryptographic environment of the server.
    Type: Application
    Filed: April 7, 2020
    Publication date: October 7, 2021
    Inventors: Anand Kashyap, Ambuj Kumar
  • Publication number: 20210273921
    Abstract: Encrypted first data and encrypted second data may be received, where each data is from different client servers. A request to perform an operation with the first data and the second data may be received. Whether the operation is authorized to be performed with the first data and the second data at an enclave may be verified. In response to verifying that the operation is authorized to be performed with the first data and the second data at the enclave, the encrypted first data and the encrypted second data may be decrypted to the first data and the second data, respectively. Furthermore, the operation may be performed with the first data and the second data at the enclave.
    Type: Application
    Filed: March 2, 2020
    Publication date: September 2, 2021
    Inventors: Ambuj Kumar, Anand Kashyap, Nehal Bandi
  • Patent number: 10911538
    Abstract: Authentication information at a first portion of encrypted data may be identified. A cryptographic key may be derived based on a combination of an identification of the first portion of the received encrypted data and a master key. Additional authentication information may be generated based on a combination of the derived cryptographic key and another portion of the received encrypted data. The encrypted data may be verified by comparing the authentication information at the first portion of the received encrypted data with the generated additional authentication information. In response to verifying the received encrypted data, a second cryptographic key may be derived based on a combination of an identification of the another portion of the encrypted data and the master key. The other portion of the received encrypted data may be decrypted by using the second cryptographic key.
    Type: Grant
    Filed: April 11, 2017
    Date of Patent: February 2, 2021
    Assignee: Fortanix, Inc.
    Inventors: Ambuj Kumar, Anand Kashyap, Jethro Gideon Beekman, Faisal Faruqui, Andrew Leiserson
  • Publication number: 20200204357
    Abstract: A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.
    Type: Application
    Filed: December 20, 2018
    Publication date: June 25, 2020
    Inventors: Jeffrey Seyfried, Jethro Gideon Beekman, Anand Kashyap
  • Publication number: 20200204530
    Abstract: A request may be received from an application provided on a server associated with a self-encrypting key management application. The request may be to establish a connection between the self-encrypting key management application and the other application. In response to receiving the request, a hash value associated with the self-encrypting key management application and a digital signature associated with a processing device may be generated. A message may be provided based on the digital signature and the hash value to the other application. The connection may be established between the self-encrypting key management application and the other application in response to receiving an indication from the other application that the self-encrypting key management application has been authenticated based on the message.
    Type: Application
    Filed: March 2, 2020
    Publication date: June 25, 2020
    Inventors: Ambuj KUMAR, Anand KASHYAP, Jethro Gideon BEEKMAN, Faisal FARUQUI
  • Patent number: 10686769
    Abstract: A first connection between a first network server and a second network server may be established where the first connection is based on a connection key stored at a secure location of the first network server. A request for one or more cryptographic keys may be transmitted from the first network server to the second network server. The first network server may receive the one or more cryptographic keys from the second network server over the first connection. The one or more cryptographic keys from the second server may be stored at the secure location of the first network server that is storing the connection key used to establish the first connection.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: June 16, 2020
    Assignee: FORTANIX, INC.
    Inventors: Anand Kashyap, Andrew Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman
  • Patent number: 10609006
    Abstract: A cryptographic key may be received or generated at a self-encrypting key management service application where the cryptographic key is received from another application provided on a server associated with the self-encrypting key management service application. The cryptographic key may be stored at a secure enclave corresponding to the self-encrypting key management service application. A request for a performance of a cryptographic operation associated with the cryptographic key may be received from the other application provided on the server. The cryptographic key at the secure enclave corresponding to the self-encrypting key management service application may be retrieved. The cryptographic operation may be performed with the cryptographic key to generate an output that is provided to the other application.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: March 31, 2020
    Assignee: Fortanix, Inc.
    Inventors: Ambuj Kumar, Anand Kashyap, Jethro Gideon Beekman, Faisal Faruqui
  • Publication number: 20190158474
    Abstract: A request may be received from an application for a performance of an operation associated with a cryptographic key that is stored at a secure enclave. A plugin of the secure enclave may be identified from the request for performance of the operation. The operation associated with the cryptographic key may be performed by using the plugin of the secure enclave to generate an output within the secure enclave. The output generated within the secure enclave and based on the plugin may be provided to the application.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Anand Kashyap, Ambuj Kumar, Jethro Gideon Beekman, Jeffrey Seyfried
  • Publication number: 20190044929
    Abstract: A first connection between a first network server and a second network server may be established where the first connection is based on a connection key stored at a secure location of the first network server. A request for one or more cryptographic keys may be transmitted from the first network server to the second network server. The first network server may receive the one or more cryptographic keys from the second network server over the first connection. The one or more cryptographic keys from the second server may be stored at the secure location of the first network server that is storing the connection key used to establish the first connection.
    Type: Application
    Filed: August 7, 2017
    Publication date: February 7, 2019
    Inventors: Anand Kashyap, Andrew Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman
  • Patent number: 10169584
    Abstract: The disclosed computer-implemented method for identifying non-malicious files on computing devices within organizations may include (1) identifying a file on at least one computing device within multiple computing devices managed by an organization, (2) identifying a source of the file based on examining a relationship between the file and the organization, (3) determining that the source of the file is trusted within the organization, and then (4) concluding, based on the source of the file being trusted within the organization, that the file is not malicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: January 1, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin Liu, Anand Kashyap, Leylya Yumer, Christopher Gates
  • Patent number: 10104097
    Abstract: The disclosed computer-implemented method for preventing targeted malware attacks may include (1) identifying at least one candidate risk factor for targets of previous targeted malware attacks that were directed to the targets based on characteristics of the targets, (2) calculating a degree of association between the candidate risk factor and the previous targeted malware attacks by comparing rates of targeted malware attacks between a group that possesses the risk factor and a group that does not possess the risk factor, (3) identifying a candidate target of a targeted malware attack that possesses the candidate risk factor, and (4) adjusting a security policy assigned to the candidate target of the targeted malware attack based on the calculated degree of association between the candidate risk factor and the previous targeted malware attacks. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: October 16, 2018
    Assignee: Symantec Corporation
    Inventors: Leylya Yumer, Olivier Thonnard, Anand Kashyap
  • Publication number: 20180295115
    Abstract: Authentication information at a first portion of encrypted data may be identified. A cryptographic key may be derived based on a combination of an identification of the first portion of the received encrypted data and a master key. Additional authentication information may be generated based on a combination of the derived cryptographic key and another portion of the received encrypted data. The encrypted data may be verified by comparing the authentication information at the first portion of the received encrypted data with the generated additional authentication information. In response to verifying the received encrypted data, a second cryptographic key may be derived based on a combination of an identification of the another portion of the encrypted data and the master key. The other portion of the received encrypted data may be decrypted by using the second cryptographic key.
    Type: Application
    Filed: April 11, 2017
    Publication date: October 11, 2018
    Inventors: Ambuj Kumar, Anand Kashyap, Jethro Gideon Beekman, Faisal Faruqui, Andrew Leiserson