Patents by Inventor Anshu Sharma
Anshu Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240331577Abstract: Polymorphic encryption is described to protect data in a vault. In one example, a method includes associating operations with at least a portion of the fields of a data set to form a plurality of operation field combinations, attaching an encryption scheme to each operation field combination, to enable the attached operation on values in the field when the values are encrypted without decrypting the values, associating a role with at least one operation field combination, encrypting the values in the at least a portion of the plurality of different fields in accordance with the attached encryption scheme, and providing access through the role to perform an operation that is associated with the role on a stored encrypted value in a field that is associated with an operation field combination that is associated with the role.Type: ApplicationFiled: June 13, 2024Publication date: October 3, 2024Inventors: Anshu Sharma, Prakash Khot, Pradeep Reddy, Roshmik Saha
-
Publication number: 20240331576Abstract: Polymorphic encryption is described in a way to restrict access and enhance security of a secure data access system. In one example, a data vault has a first copy of a value being encrypted according to a first encryption scheme to enable a first operation on the first copy when the first copy is encrypted without decrypting the first copy and a second copy being encrypted according to a second encryption scheme. A governance layer has at least a first policy configured to enable the first operation, the governance layer configured to permit the first operation for an authenticated user. An interface layer has roles supporting a selected policy, the interface layer further comprising a user interface to receive user credentials, to link the credentials to a role and to send an authentication of the user and the role to the governance layer.Type: ApplicationFiled: June 13, 2024Publication date: October 3, 2024Inventors: Anshu Sharma, Prakash Khot, Pradeep Reddy, Roshmik Saha
-
Patent number: 12027073Abstract: Polymorphic encryption is described in a way to restrict access and enhance security of a data vault. In an example, the data vault has a primary partition with a first subset of records having an encrypted value for each of at least a portion of the fields encrypted according to a first encryption scheme. A secondary partition has a second subset of the records encrypted according to a second encryption scheme that is different from the first encryption scheme. The first encryption scheme is configured to permit a first set of operations on the values when the values are encrypted and the second encryption scheme is configured to permit a second set of operations on the values when the values are encrypted.Type: GrantFiled: June 30, 2021Date of Patent: July 2, 2024Assignee: SKYFLOW, INC.Inventors: Anshu Sharma, Prakash Khot, Pradeep Reddy, Roshmik Saha
-
Patent number: 11750647Abstract: A method and apparatus are described for user protection from external e-mail attack. Some embodiments pertain to receiving a first e-mail at an e-mail client, receiving a detection of a suspicious element in the first e-mail from a detection system, flagging the first e-mail as suspicious with a first flag and a first warning level in response to receiving the detection, flagging a second e-mail with a second flag and a second warning level, displaying the first and second flags with explanatory text in a mailbox view of the e-mail client without opening the first and second e-mail for display to the user, the suspicious element not being selectable in the mailbox view, and sorting the first and the second e-mail with other e-mails of the mailbox view based on the flag warning levels.Type: GrantFiled: October 23, 2020Date of Patent: September 5, 2023Assignee: Barracuda Networks, Inc.Inventors: Deepak Kumar, Anshu Sharma
-
Publication number: 20230005391Abstract: Polymorphic encryption is described in a way to restrict access and enhance security of a data vault. In an example, the data vault has a primary partition with a first subset of records having an encrypted value for each of at least a portion of the fields encrypted according to a first encryption scheme. A secondary partition has a second subset of the records encrypted according to a second encryption scheme that is different from the first encryption scheme. The first encryption scheme is configured to permit a first set of operations on the values when the values are encrypted and the second encryption scheme is configured to permit a second set of operations on the values when the values are encrypted.Type: ApplicationFiled: June 30, 2021Publication date: January 5, 2023Inventors: Anshu Sharma, Prakash Khot, Pradeep Reddy, Roshmik Saha
-
Patent number: 11546375Abstract: External messaging attacks are detected using trust relationships. A profile is built for each target within an organization using extracted header data from multiple prior messages. Trust scores are derived for each sender of a message for each target profile, each trust score is derived from a degree and a quantity of communication between the respective sender and the target in the extracted header data. Incoming messages are received and a target and a sender of each incoming message is determined. A trust score is retrieved for the sender from the profile of the target for each incoming message, labels are generated for each of incoming message based on the respective trust score, and the respective label is applied to be visible to the target in association with the message for each respective message.Type: GrantFiled: September 23, 2019Date of Patent: January 3, 2023Assignee: Barracuda Networks, Inc.Inventors: Deepak Kumar, Anshu Sharma
-
Publication number: 20210092154Abstract: External messaging attacks are detected using trust relationships. A profile is built for each target within an organization using extracted header data from multiple prior messages. Trust scores are derived for each sender of a message for each target profile, each trust score is derived from a degree and a quantity of communication between the respective sender and the target in the extracted header data. Incoming messages are received and a target and a sender of each incoming message is determined. A trust score is retrieved for the sender from the profile of the target for each incoming message, labels are generated for each of incoming message based on the respective trust score, and the respective label is applied to be visible to the target in association with the message for each respective message.Type: ApplicationFiled: September 23, 2019Publication date: March 25, 2021Applicant: Prekari, Inc.Inventors: Deepak Kumar, Anshu Sharma
-
Publication number: 20210044620Abstract: A method and apparatus are described for user protection from external e-mail attack. Some embodiments pertain to receiving a first e-mail at an e-mail client, receiving a detection of a suspicious element in the first e-mail from a detection system, flagging the first e-mail as suspicious with a first flag and a first warning level in response to receiving the detection, flagging a second e-mail with a second flag and a second warning level, displaying the first and second flags with explanatory text in a mailbox view of the e-mail client without opening the first and second e-mail for display to the user, the suspicious element not being selectable in the mailbox view, and sorting the first and the second e-mail with other e-mails of the mailbox view based on the flag warning levels.Type: ApplicationFiled: October 23, 2020Publication date: February 11, 2021Inventors: Deepak Kumar, Anshu Sharma
-
Patent number: 10834129Abstract: A method and apparatus are described for user protection from external e-mail attack. Some embodiments pertain to receiving an e-mail, detecting a suspicious element in the e-mail, disabling the suspicious element of the e-mail, flagging the suspicious element of the e-mail, displaying the e-mail in an e-mail user interface with the disabled element and the flag, receiving a user command to enable the disabled element of the displayed e-mail, and enabling the disabled element.Type: GrantFiled: November 5, 2018Date of Patent: November 10, 2020Assignee: Prekari, Inc.Inventors: Deepak Kumar, Anshu Sharma
-
Publication number: 20200145458Abstract: A method and apparatus are described for user protection from external e-mail attack. Some embodiments pertain to receiving an e-mail, detecting a suspicious element in the e-mail, disabling the suspicious element of the e-mail, flagging the suspicious element of the e-mail, displaying the e-mail in an e-mail user interface with the disabled element and the flag, receiving a user command to enable the disabled element of the displayed e-mail, and enabling the disabled element.Type: ApplicationFiled: November 5, 2018Publication date: May 7, 2020Applicant: Prekari, Inc.Inventors: Deepak Kumar, Anshu Sharma
-
Patent number: 10503728Abstract: Methods and systems are described for shared data sets with user-specific changes in an on-line services environment. In one embodiment, a method includes, receiving a request for data stored in a shared database from a user, identifying the requesting user, retrieving the requested data from the shared database, determining whether there are user-specific changes for the retrieved data, changing the retrieved data using the user-specific changes, and supplying the requested data to the user.Type: GrantFiled: January 23, 2013Date of Patent: December 10, 2019Assignee: salesforce.com, inc.Inventor: Anshu Sharma
-
Patent number: 9275082Abstract: A user-extensible common schema is described in the context of a shared database. In one example, an apparatus includes a shared database organized around a common schema. First and second applications provides access to the shared database using the common schema, the first and second applications having first and second schema extensions having first and second sets of additional objects, defined by the first and second applications, respectively. The first and second applications present views of and operations on the shared database that are extended by the respective schema extension.Type: GrantFiled: January 23, 2013Date of Patent: March 1, 2016Assignee: salesforce.com, inc.Inventor: Anshu Sharma
-
Patent number: 9141983Abstract: Methods and systems are described for shared data sets combined with purchased data sets in an on-line services environment. In one embodiment, a method includes, identifying a user, associating the user with data in a shared database, and receiving a purchased dataset from the identified user. The method further includes adding the purchased dataset to a delta table associated with the shared database based on determined record relationships and field relationship, and providing access to the purchased dataset to the user through requests for data in the shared database.Type: GrantFiled: January 23, 2013Date of Patent: September 22, 2015Assignee: salesforce.com, inc.Inventor: Anshu Sharma
-
Publication number: 20130232165Abstract: Methods and systems are described for shared data sets in an on-line services environment. In one embodiment, a method includes, receiving a request for data stored in a shared database from a user, identifying the requesting user, retrieving the requested data from the shared database, determining whether there are user-specific changes for the retrieved data, changing the retrieved data using the user-specific changes, and supplying the requested data to the user.Type: ApplicationFiled: February 1, 2012Publication date: September 5, 2013Applicant: salesforce.com, inc.Inventor: Anshu Sharma