Patents by Inventor Ashish Kurmi

Ashish Kurmi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230291742
    Abstract: A method of dynamically adjusting access privileges of system identities. A set of access logs associated with a system are analyzed in order to generate a restricted access policy for an over privileged system identity. An initial access policy of the system identity is replaced with the restricted access policy and a continuous monitoring and access management (CMAM) service is initiated. Access logs are collected for a monitoring time window and an access denied error can be extracted from the access logs. The access denied error can be compared to an ignore list and/or the access denied error can be added to the ignore list. Authorization checks can be performed to determine if the action associated with the access denied error is authorized. If the action is authorized, the access policy is adjusted to allow for performance of the action.
    Type: Application
    Filed: May 19, 2023
    Publication date: September 14, 2023
    Inventor: Ashish Kurmi
  • Patent number: 11695775
    Abstract: A method of dynamically adjusting access privileges of system identities. A set of access logs associated with a system are analyzed in order to generate a restricted access policy for an over privileged system identity. An initial access policy of the system identity is replaced with the restricted access policy and a continuous monitoring and access management (CMAM) service is initiated. Access logs are collected for a monitoring time window and an access denied error can be extracted from the access logs. The access denied error can be compared to an ignore list and/or the access denied error can be added to the ignore list. Authorization checks can be performed to determine if the action associated with the access denied error is authorized. If the action is authorized, the access policy is adjusted to allow for performance of the action.
    Type: Grant
    Filed: November 9, 2021
    Date of Patent: July 4, 2023
    Assignee: Uber Technologies, Inc.
    Inventor: Ashish Kurmi
  • Patent number: 11568066
    Abstract: Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.
    Type: Grant
    Filed: August 13, 2021
    Date of Patent: January 31, 2023
    Assignee: Uber Technologies, Inc.
    Inventor: Ashish Kurmi
  • Publication number: 20220070173
    Abstract: A method of dynamically adjusting access privileges of system identities. A set of access logs associated with a system are analyzed in order to generate a restricted access policy for an over privileged system identity. An initial access policy of the system identity is replaced with the restricted access policy and a continuous monitoring and access management (CMAM) service is initiated. Access logs are collected for a monitoring time window and an access denied error can be extracted from the access logs. The access denied error can be compared to an ignore list and/or the access denied error can be added to the ignore list. Authorization checks can be performed to determine if the action associated with the access denied error is authorized. If the action is authorized, the access policy is adjusted to allow for performance of the action.
    Type: Application
    Filed: November 9, 2021
    Publication date: March 3, 2022
    Applicant: Uber Technologies, Inc.
    Inventor: Ashish Kurmi
  • Patent number: 11201871
    Abstract: A method of dynamically adjusting access privileges of system identities. A set of access logs associated with a system are analyzed in order to generate a restricted access policy for an over privileged system identity. An initial access policy of the system identity is replaced with the restricted access policy and a continuous monitoring and access management (CMAM) service is initiated. Access logs are collected for a monitoring time window and an access denied error can be extracted from the access logs. The access denied error can be compared to an ignore list and/or the access denied error can be added to the ignore list. Authorization checks can be performed to determine if the action associated with the access denied error is authorized. If the action is authorized, the access policy is adjusted to allow for performance of the action.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: December 14, 2021
    Assignee: Uber Technologies, Inc.
    Inventor: Ashish Kurmi
  • Publication number: 20210374258
    Abstract: Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.
    Type: Application
    Filed: August 13, 2021
    Publication date: December 2, 2021
    Inventor: Ashish Kurmi
  • Patent number: 11132449
    Abstract: Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: September 28, 2021
    Assignee: Uber Technologies, Inc.
    Inventor: Ashish Kurmi
  • Publication number: 20200204558
    Abstract: A method of dynamically adjusting access privileges of system identities. A set of access logs associated with a system are analyzed in order to generate a restricted access policy for an over privileged system identity. An initial access policy of the system identity is replaced with the restricted access policy and a continuous monitoring and access management (CMAM) service is initiated. Access logs are collected for a monitoring time window and an access denied error can be extracted from the access logs. The access denied error can be compared to an ignore list and/or the access denied error can be added to the ignore list. Authorization checks can be performed to determine if the action associated with the access denied error is authorized. If the action is authorized, the access policy is adjusted to allow for performance of the action.
    Type: Application
    Filed: December 19, 2018
    Publication date: June 25, 2020
    Inventor: Ashish Kurmi
  • Publication number: 20200193033
    Abstract: Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 18, 2020
    Inventor: Ashish Kurmi
  • Publication number: 20160006760
    Abstract: Embodiments are directed to detecting and preventing phishing attacks. In one scenario, a computer system accesses a message and analyzes content in the message to determine whether a link is present. The link has a link destination and at least some text that is designated for display in association with the link (i.e. the anchor), where the text designated for display indicates a specified destination. Then, upon determining that a link is present in the message, the computer system determines whether the link destination matches the destination specified by the text designated for display and, if it determines that the destination specified by the text designated for display does not match the link destination, the computer system flags the message to indicate that the message includes at least one suspicious link.
    Type: Application
    Filed: July 2, 2014
    Publication date: January 7, 2016
    Inventors: Nazim I. Lala, Ashish Kurmi, Richard Kenneth Mark, Shrikant Adhikarla