Patents by Inventor Ankur Panchbudhe
Ankur Panchbudhe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146760Abstract: Disclosed are implementations, including a method that includes monitoring dataflow streams in a network comprising multiple computing nodes, and determining network security characteristics for a dataflow stream, from the monitored dataflow streams, relating to security, authentication, and access events for accessing, via the dataflow stream, one or more of the multiple nodes. The method further includes determining potential violations by the dataflow stream of security policies defined for operation of the network, access functionality for the network, or identity attributes used by the network, based, at least in part, on the determined network security characteristics for the dataflow stream, and based on network-operation data comprising one or more of network security data, network identity data, and network access data. The network-operation data is stored in one or more data storage units in the network, and is configured to manage network access and operation for the multiple computing nodes.Type: ApplicationFiled: December 28, 2023Publication date: May 2, 2024Applicant: AuthMind Inc.Inventors: Shlomo YANAY, Ankur PANCHBUDHE
-
Patent number: 11895144Abstract: Disclosed are implementations, including a method that includes monitoring dataflow streams in a network comprising multiple computing nodes, and determining network security characteristics for a dataflow stream, from the monitored dataflow streams, relating to security, authentication, and access events for accessing, via the dataflow stream, one or more of the multiple nodes. The method further includes determining potential violations by the dataflow stream of security policies defined for operation of the network, access functionality for the network, or identity attributes used by the network, based, at least in part, on the determined network security characteristics for the dataflow stream, and based on network-operation data comprising one or more of network security data, network identity data, and network access data. The network-operation data is stored in one or more data storage units in the network, and is configured to manage network access and operation for the multiple computing nodes.Type: GrantFiled: May 21, 2021Date of Patent: February 6, 2024Assignee: AUTHMIND INC.Inventors: Shlomo Yanay, Ankur Panchbudhe
-
Publication number: 20210367966Abstract: Disclosed are implementations, including a method that includes monitoring dataflow streams in a network comprising multiple computing nodes, and determining network security characteristics for a dataflow stream, from the monitored dataflow streams, relating to security, authentication, and access events for accessing, via the dataflow stream, one or more of the multiple nodes. The method further includes determining potential violations by the dataflow stream of security policies defined for operation of the network, access functionality for the network, or identity attributes used by the network, based, at least in part, on the determined network security characteristics for the dataflow stream, and based on network-operation data comprising one or more of network security data, network identity data, and network access data. The network-operation data is stored in one or more data storage units in the network, and is configured to manage network access and operation for the multiple computing nodes.Type: ApplicationFiled: May 21, 2021Publication date: November 25, 2021Inventors: Shlomo Yanay, Ankur Panchbudhe
-
Patent number: 10503920Abstract: The embodiments herein relate to discrete data containers and, more particularly, to management of data stored in discrete data containers. Embodiments herein disclose methods and systems to update data present within a data container, when a user accessing the data, present within the data container, has updated the data. Embodiments herein disclose a method and system for enabling modifications of data present in data containers, wherein de-containerized data associated with a data container can be modified by at least one user and the modifications by the user can be reflected in real-time to the data in the data container.Type: GrantFiled: March 15, 2018Date of Patent: December 10, 2019Assignee: VAULTIZE TECHNOLOGIES PRIVATE LIMITEDInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Patent number: 10210337Abstract: Disclosed herein are a method and a system for discrete data containerization for Information Rights Management. The system identifies based on a user request, data to be containerized. Further, the system receives at least one rule based on the data and attributes, which is to be used for containerizing the data. Further, using the rule, the system containerizes the data, wherein the data is containerized at individual data level.Type: GrantFiled: December 15, 2014Date of Patent: February 19, 2019Assignee: ANOOSMAR TECHNOLOGIES PRIVATE LIMITEDInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Publication number: 20180205772Abstract: Disclosed herein are a method and a system for message collaboration. The system, when configured, monitors and identifies messages with attachments. Further, the system checks if all participants i.e. sender and recipients of the message have sufficient message collaboration support. If any of the recipients has no collaboration capability, or else of the message has no attachment, the message can be sent as it is. Otherwise, the system automatically converts the message to a collaboration session, and provides all participants option for viewing/editing/downloading/sharing the file/folder attachment, based on access permissions defined by sender of the message.Type: ApplicationFiled: March 12, 2018Publication date: July 19, 2018Applicant: Vaultize Technologies Private LimitedInventor: Ankur Panchbudhe
-
Publication number: 20180203981Abstract: Embodiments herein disclose a method and system for performing data containerization using rights management techniques. Embodiments herein disclose a method and system for containerizing data using information rights management, wherein the rights management associates a plurality of sets of rules with each of the data present in the data containers. The sets of rules are applied based on a plurality of factors such as if the data is present within a data container, the device being used to access the data and so on.Type: ApplicationFiled: March 12, 2018Publication date: July 19, 2018Applicant: Vaultize Technologies Private LimitedInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Publication number: 20180205737Abstract: The embodiments herein disclose a secure means for sharing data with at least one user using a secure means for identifying and providing access to the at least one user (if authorized). Embodiments disclosed herein disclose obtaining a unique identification means (such as an email address) of a user accessing data and providing access to the user by sending an encoded link over the email address provided. Embodiments disclosed herein enable tracking the access of the data by a user using the encoded link, wherein the encoded link comprises of an email address.Type: ApplicationFiled: March 12, 2018Publication date: July 19, 2018Applicant: Vaultize Technologies Private LimitedInventors: Ankur Panchbudhe, Yusuf Batterywala
-
Publication number: 20180205762Abstract: Disclosed herein are a method and a system for securing data in user devices. The system collects on a real time or periodic basis, certain trigger input (s) required for securing data in the user device. The trigger inputs may include but not limited to geolocation, network and network parameter information corresponding to the user device being monitored. Further, by processing the collected trigger input (s) the system identifies at least one action to be triggered to secure data in the user device. Further, the selected action (s) is executed at the user device, to secure the data in the user device.Type: ApplicationFiled: March 12, 2018Publication date: July 19, 2018Applicant: Vaultize Technologies Private LimitedInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Publication number: 20180204022Abstract: The embodiments herein relate to management of data and, more particularly, to management of rights and policies of data based on analysis of data. The embodiments herein disclose a method and system for managing data access and associated rights based on analysis of content of a data. Embodiments herein disclose a method and system for managing access and rights associated with at least one set of data, wherein the access and sights are based on content of the data. The method and system can perform analysis of the content of the data; assign access and rights to each set of data (based on the analysis of the content of the data) and control access to the data based on the access and rights associated with the data.Type: ApplicationFiled: March 13, 2018Publication date: July 19, 2018Applicant: Vaultize Technologies Private LimitedInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Publication number: 20180203980Abstract: The embodiments herein relate to managing data present in a network and, more particularly, to managing copies of data in a network. Embodiments herein check for copies of data in a plurality of devices by comparing a block of the data with a block of data. The block of data can be a portion of the overall data. On finding at least one copy of the data, embodiments herein can perform at least one task such as encrypting the data, wiping the data and so on, related to the copies and depending on at least one policy defined by an authorized person and/or entity (an administrator).Type: ApplicationFiled: March 13, 2018Publication date: July 19, 2018Applicant: Vaulitize Tecnologies Private LimitedInventor: Ankur PANCHBUDHE
-
Publication number: 20180204017Abstract: System and method to convert a data source into a secure container with dynamic rights based on data location. The embodiments herein relate to data management and, more particularly, to performing data management by containerizing the data. Embodiments herein disclose a method and system for associating dynamic rights with data present in a data container, wherein the rights can be applied based on the location where from where the data is accessed.Type: ApplicationFiled: March 13, 2018Publication date: July 19, 2018Applicant: Vaultize Technologies Private LimitedInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Publication number: 20180204018Abstract: The embodiments herein relate to discrete data containers and, more particularly, to management of data stored in discrete data containers. Embodiments herein disclose methods and systems to update data present within a data container, when a user accessing the data, present within the data container, has updated the data. Embodiments herein disclose a method and system for enabling modifications of data present in data containers, wherein de-containerized data associated with a data container can be modified by at least one user and the modifications by the user can be reflected in real-time to the data in the data container.Type: ApplicationFiled: March 15, 2018Publication date: July 19, 2018Applicant: ANOOSMAR TECHNOLOGIES PRIVATE LIMITEDInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Patent number: 9606881Abstract: A method, system and computer-readable medium for providing rapid failback of a computer system is described. The method, which operates during failback of a secondary computer to a primary computer, accesses a map to determine a location of a latest version of data corresponding to a read request, where the location may be within either a primary data storage or a secondary data storage. The system comprises a primary computer coupled to a primary data storage and a secondary computer coupled to a secondary data storage. The primary computer maintains a write log and the secondary computer maintains a map. The computer-readable medium contains instructions, which, when executed by a processor, performs the steps embodied by the method.Type: GrantFiled: October 8, 2013Date of Patent: March 28, 2017Assignee: Veritas Technologies LLCInventors: Anand Kekre, Angshuman Bezbaruah, Ankur Panchbudhe
-
Publication number: 20160180107Abstract: Disclosed herein are a method and a system for data management. An administrator can configure data access permissions for each user to each file and file folders the user is attributed to. Further, when a user requests data access the system checks whether the user has permission to access that particular file/file folder. If the user is found to have permission to access that particular file/file folder, the system allows the user to access the file/file folder user with permitted read and edit settings. If the user is found to have no access to the requested file/file folder, then the system denies access to the user.Type: ApplicationFiled: December 17, 2014Publication date: June 23, 2016Applicant: ANOOSMAR TECHNOLOGIES PRIVATE LIMITEDInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Publication number: 20160171222Abstract: Disclosed herein are a method and a system for discrete data containerization for Information Rights Management. The system identifies based on a user request, data to be containerized. Further, the system receives at least one rule based on the data and attributes, which is to be used for containerizing the data. Further, using the rule, the system containerizes the data, wherein the data is containerized at individual data level.Type: ApplicationFiled: December 15, 2014Publication date: June 16, 2016Applicant: ANOOSMAR TECHNOLOGIES PRIVATE LIMITEDInventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala
-
Patent number: 9223661Abstract: A method and apparatus for automatically archiving data items from backup storage without having to first restore the data items is provided. In one embodiment, the method comprises processing at least one data item in backup storage using a mapping, wherein the mapping indicates at least one location of the at least one data item and ingesting the at least one data item into an archive database.Type: GrantFiled: August 6, 2012Date of Patent: December 29, 2015Assignee: Symantec CorporationInventors: Angshuman Bezbaruah, Ankur Panchbudhe, Srineet Sridharan, Niels S. van Ingen
-
Patent number: 9086819Abstract: The embodiments herein relate to data management and, more particularly, to global deduplication and encryption of data in data management systems. The user equipments (UE) are grouped under certain deduplication groups based on certain parameters such as rate of data exchange, frequency of data exchange, social closeness, work closeness, similarity of data and interests and so on, between those UEs. Further, specific deduplication and encryption parameters such as encryption method, encryption key, signature computation method, block computation method and so on are assigned to each group. Further, deduplication and encryption of data in each group is performed using the deduplication and encryption modes and parameters assigned to each group. The deduplication and encryption of data is performed in at least one of the UEs and/or a server. Further, the parameters used for deduplication and encryption are stored in specific databases and are encrypted for better security.Type: GrantFiled: July 25, 2012Date of Patent: July 21, 2015Assignee: Anoosmar Technologies Private LimitedInventors: Ankur Panchbudhe, Anand A. Kekre
-
Patent number: 9015849Abstract: A method and apparatus for preventing data leakage of e-discovery data items is provided. In one embodiment, the method for automatically configuring e-discovery data for data leakage prevention includes processing filtering information regarding at least one e-discovery data item that is selected for data leakage prevention and generating data leakage prevention information for the selected at least one e-discovery data item, wherein the data leakage prevention information is used to filter the at least one data item.Type: GrantFiled: September 16, 2008Date of Patent: April 21, 2015Assignee: Symantec CorporationInventors: Angshuman Bezbaruah, Prabhat Singh, Ankur Panchbudhe
-
Publication number: 20140032925Abstract: The embodiments herein relate to data management and, more particularly, to global deduplication and encryption of data in data management systems. The user equipments (UE) are grouped under certain deduplication groups based on certain parameters such as rate of data exchange, frequency of data exchange, social closeness, work closeness, similarity of data and interests and so on, between those UEs. Further, specific deduplication and encryption parameters such as encryption method, encryption key, signature computation method, block computation method and so on are assigned to each group. Further, deduplication and encryption of data in each group is performed using the deduplication and encryption modes and parameters assigned to each group. The deduplication and encryption of data is performed in at least one of the UEs and/or a server. Further, the parameters used for deduplication and encryption are stored in specific databases and are encrypted for better security.Type: ApplicationFiled: July 25, 2012Publication date: January 30, 2014Inventors: Ankur Panchbudhe, Anand A. Kekre