Patents by Inventor Bikram Kumar Gupta

Bikram Kumar Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210152521
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from a data source different from the appliance. Disclosed example firewalls further apply, based on evaluation of the first dynamic object and the second dynamic object, the firewall rule to first network traffic associated with a first device in communication with the network.
    Type: Application
    Filed: January 25, 2021
    Publication date: May 20, 2021
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Patent number: 10917787
    Abstract: Systems, devices and methods to protect a regional network (e.g., home network) by monitoring devices connected to and attempting to connect to the regional network. Monitoring includes assessing and addressing security concerns regarding devices attempting to or available to connect to the regional network as well as monitoring configurations and activity of connected devices. Devices to monitor include: computers, Personal Digital Assistants (PDAs), laptops, tablets, home appliances, smartphones, smart televisions, and any other type of device in the logical proximity of the regional network.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: February 9, 2021
    Assignee: MCAFEE, LLC
    Inventors: Bikram Kumar Gupta, Simon Hunt, Vinay Anand
  • Patent number: 10904216
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from an external data source. Disclosed example firewalls further determine, based on the first dynamic object and the second dynamic object, whether the firewall rule is to apply to first network traffic associated with a first device in communication with the network.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: January 26, 2021
    Assignee: McAfee, LLC
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Publication number: 20190349335
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from an external data source. Disclosed example firewalls further determine, based on the first dynamic object and the second dynamic object, whether the firewall rule is to apply to first network traffic associated with a first device in communication with the network.
    Type: Application
    Filed: July 29, 2019
    Publication date: November 14, 2019
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Patent number: 10367787
    Abstract: A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of devices. The dynamic objects may be updated from real-time data sources and non-real time inventories of data. Dynamic objects may be used for either or both of source and destination in a firewall rule. Where the dynamic object includes non-real time data, the dynamic object may be synchronized with the non-real time data inventory on a configurable basis. By using dynamic objects, the firewall can provide flexibility in the rules to allow control over user-owned and controlled devices.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: July 30, 2019
    Assignee: McAfee, LLC
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Publication number: 20170134957
    Abstract: A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.
    Type: Application
    Filed: November 9, 2015
    Publication date: May 11, 2017
    Applicant: MCAFEE, INC.
    Inventors: Bikram Kumar Gupta, Sudarshan Swamy, Srikant Vissamsetti
  • Publication number: 20160315911
    Abstract: A firewall provides improved network security by allowing the use of dynamic objects in firewall rules, where the dynamic objects evaluate to a variable set of devices. The dynamic objects may be updated from real-time data sources and non-real time inventories of data. Dynamic objects may be used for either or both of source and destination in a firewall rule. Where the dynamic object includes non-real time data, the dynamic object may be synchronized with the non-real time data inventory on a configurable basis. By using dynamic objects, the firewall can provide flexibility in the rules to allow control over user-owned and controlled devices.
    Type: Application
    Filed: December 20, 2013
    Publication date: October 27, 2016
    Inventors: Bikram Kumar GUPTA, Ananth RAMAN, Manuel NEDBAL, Elanthiraiyan A. Anbalagan
  • Publication number: 20160295410
    Abstract: Systems, devices and methods to protect a regional network (e.g., home network) by monitoring devices connected to and attempting to connect to the regional network. Monitoring includes assessing and addressing security concerns regarding devices attempting to or available to connect to the regional network as well as monitoring configurations and activity of connected devices. Devices to monitor include: computers, Personal Digital Assistants (PDAs), laptops, tablets, home appliances, smartphones, smart televisions, and any other type of device in the logical proximity of the regional network.
    Type: Application
    Filed: December 20, 2013
    Publication date: October 6, 2016
    Applicant: McAfee, Inc.
    Inventors: Bikram Kumar GUPTA, Simon HUNT, Vinay ANAND
  • Patent number: 9338657
    Abstract: A method is provided in one example embodiment and includes receiving a subscriber accounting start packet for a subscriber device in a mobile network environment. The method also includes extracting, from the subscriber accounting start packet, subscriber device information and a network address of the subscriber device. The method further includes mapping the network address to the subscriber device information, and then correlating the subscriber device information and a security event when the security event is detected in subscriber data network traffic associated with the subscriber device. In a specific embodiment, the subscriber device information includes at least one of an International Mobile Equipment Identity (IMEI), an International Mobile Subscriber Identity (IMSI), a Mobile Station International Subscriber Directory Number (MSISDN), and an access point name (APN).
    Type: Grant
    Filed: October 16, 2012
    Date of Patent: May 10, 2016
    Assignee: McAfee, Inc.
    Inventors: Bikram Kumar Gupta, Elanthiraiyan Ammoor Anbalagan, Sakthikumar Subramanian, Manish Gupta
  • Patent number: 9185093
    Abstract: A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: November 10, 2015
    Assignee: McAfee, Inc.
    Inventors: Bikram Kumar Gupta, Sudarshan Swamy, Srikant Vissamsetti
  • Publication number: 20150128267
    Abstract: Systems and methods for management of security events and their related forensic context are disclosed. Network forensics involves monitoring and analyzing data flows in a network to assist security analysts to review, analyze and remove a security threat. Security threats in a network environment are generally detected by one or more devices on the network. If a security threat is determined to be severe or significant enough, a security event corresponding to the security threat is often created and stored in the system. To assist in future review and analysis of security threats, timely and relevant context information about network security events may be obtained and stored along with each security event. The forensic context may be accessible to security administrators viewing the security events to provide detailed information about the circumstances surrounding a security event.
    Type: Application
    Filed: November 6, 2013
    Publication date: May 7, 2015
    Inventors: Bikram Kumar Gupta, Arun Shankar
  • Publication number: 20140189861
    Abstract: A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Inventors: Bikram Kumar Gupta, Sudarshan Swamy, Srikant Vissamsetti
  • Publication number: 20140105119
    Abstract: A method is provided in one example embodiment and includes receiving a subscriber accounting start packet for a subscriber device in a mobile network environment. The method also includes extracting, from the subscriber accounting start packet, subscriber device information and a network address of the subscriber device. The method further includes mapping the network address to the subscriber device information, and then correlating the subscriber device information and a security event when the security event is detected in subscriber data network traffic associated with the subscriber device. In a specific embodiment, the subscriber device information includes at least one of an International Mobile Equipment Identity (IMEI), an International Mobile Subscriber Identity (IMSI), a Mobile Station International Subscriber Directory Number (MSISDN), and an access point name (APN).
    Type: Application
    Filed: October 16, 2012
    Publication date: April 17, 2014
    Inventors: Bikram Kumar Gupta, Elanthiraiyan Ammoor Anbalagan, Sakthikumar Subramanian, Manish Gupta