Patents by Inventor ARUN KOSHAL

ARUN KOSHAL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11533312
    Abstract: The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: December 20, 2022
    Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Mahesh Raghuvir Bhat, Arun Koshal, Vishal Sharma, Sagar Singha
  • Patent number: 11297032
    Abstract: Disclosed herein are a method, a device, and a non-transitory computer readable medium for detecting user migration from an enterprise network to a non-enterprise network by using DNS probing. The method includes detecting at least one of a change in state of network connection and change in operational state of a user migration computing device. A domain name system (DNS) query is generated in response to detecting the at least one of a change in state of network connection and change in operational state of a user migration computing device. Further, the DNS query is sent to at least one of a plurality of DNS servers. If an expected DNS response is received, it is determined that the user migration computing device is in the enterprise network. If expected DNS response is not received, that the user migration computing device is outside the enterprise network.
    Type: Grant
    Filed: February 8, 2019
    Date of Patent: April 5, 2022
    Assignee: COLORTOKENS, INC.
    Inventors: Arun Koshal, Vishal Sharma, Raghavendra Thantradi Nagappa, Sagar Singha
  • Patent number: 11063959
    Abstract: In secure and seamless remote access to enterprise applications with zero user intervention, a first set of policies is generated at a controller based on a user role. A user device associated with the user role is in an enterprise network. The first set of policies is pushed to the security agent in the user device associated with a user, an enterprise server, and a secure remote access gateway from the controller. Upon determining that the user device moves to a remote network, a secure connection is initiated by the security agent from the user device to the secure remote access gateway. Upon determining by the controller that the user is authenticated for the secure connection, a second set of policies is generated by the controller for the user device, the enterprise server and the secure remote access gateway. The second set of policies is pushed to the devices.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: July 13, 2021
    Assignee: COLORTOKENS, INC.
    Inventors: Arun Koshal, Vishal Sharma, Raghavendra Thantradi Nagappa, Sagar Singha
  • Publication number: 20210014233
    Abstract: The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa.
    Type: Application
    Filed: July 10, 2019
    Publication date: January 14, 2021
    Inventors: JAYARAGHAVENDRAN KUPPANNAN, DEEPAK KUSHWAHA, MAHESH RAGHUVIR BHAT, ARUN KOSHAL, VISHAL SHARMA, SAGAR SINGHA
  • Publication number: 20200259780
    Abstract: Disclosed herein are a method, a device, and a non-transitory computer readable medium for detecting user migration from an enterprise network to a non-enterprise network by using DNS probing. The method includes detecting at least one of a change in state of network connection and change in operational state of a user migration computing device. A domain name system (DNS) query is generated in response to detecting the at least one of a change in state of network connection and change in operational state of a user migration computing device. Further, the DNS query is sent to at least one of a plurality of DNS servers. If an expected DNS response is received, it is determined that the user migration computing device is in the enterprise network. If expected DNS response is not received, that the user migration computing device is outside the enterprise network.
    Type: Application
    Filed: February 8, 2019
    Publication date: August 13, 2020
    Inventors: ARUN KOSHAL, VISHAL SHARMA, RAGHAVENDRA THANTRADI NAGAPPA, SAGAR SINGHA
  • Publication number: 20200259795
    Abstract: A method and system to automatically access one or more resources for a device at a remote location has been described. Initially a determination is made whether the device is at the remote location. Based on a domain configuration including one or more domains accessible to the device at the remote location, a VPN adapter is generated at the device in the remote location. A route is automatically determined from the VPN adapter to the one or more resources, corresponding to the accessible domains, within a corporate network. Finally the one or more resources are accessed within the corporate network from the device at the remote location using the determined route.
    Type: Application
    Filed: February 8, 2019
    Publication date: August 13, 2020
    Inventors: ARUN KOSHAL, Vishal Sharma, Raghavendra Thantradi Nagappa, Sagar Singha
  • Publication number: 20200186538
    Abstract: In secure and seamless remote access to enterprise applications with zero user intervention, a first set of policies is generated at a controller based on a user role. A user device associated with the user role is in an enterprise network. The first set of policies is pushed to the security agent in the user device associated with a user, an enterprise server, and a secure remote access gateway from the controller. Upon determining that the user device moves to a remote network, a secure connection is initiated by the security agent from the user device to the secure remote access gateway. Upon determining by the controller that the user is authenticated for the secure connection, a second set of policies is generated by the controller for the user device, the enterprise server and the secure remote access gateway. The second set of policies is pushed to the devices.
    Type: Application
    Filed: December 6, 2018
    Publication date: June 11, 2020
    Inventors: ARUN KOSHAL, VISHAL SHARMA, RAGHAVENDRA THANTRADI NAGAPPA, SAGAR SINGHA