Patents by Inventor BRIJESH BHUPENDRA DESAI
BRIJESH BHUPENDRA DESAI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230205572Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.Type: ApplicationFiled: March 7, 2023Publication date: June 29, 2023Inventors: Yoganand RAJASEKARAN, Raquibur RAHMAN, Ayla KOL, Philip Ross MOYER, Brijesh Bhupendra DESAI, Zijun HAO, Mainul MIZAN, Kameshwar JAYARAMAN, Benjamin DU, PARUL MANEK, GANESH PANDEY
-
Patent number: 11665183Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: GrantFiled: November 17, 2021Date of Patent: May 30, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Patent number: 11630684Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.Type: GrantFiled: July 26, 2019Date of Patent: April 18, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Parul Manek, Ganesh Pandey
-
Publication number: 20230093731Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.Type: ApplicationFiled: November 28, 2022Publication date: March 23, 2023Inventors: Anuj DHAWAN, Brijesh Bhupendra DESAI, Kameshwar JAYARAMAN, Ayla KOL, Amit A. BAPAT, Qi CAO, Steven Jay LIEBERMAN, Ganesh PANDEY, Parul MANEK
-
Patent number: 11520918Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The of the service provider validates the DEP. The of the service provider stores the DEP based on the validation.Type: GrantFiled: February 3, 2021Date of Patent: December 6, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Anuj Dhawan, Brijesh Bhupendra Desai, Kameshwar Jayaraman, Ayla Kol, Amit A. Bapat, Qi Cao, Steven Jay Lieberman, Ganesh Pandey, Parul Manek
-
Publication number: 20220245268Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.Type: ApplicationFiled: February 3, 2021Publication date: August 4, 2022Inventors: Anuj Dhawan, Brijesh Bhupendra DESAI, Kameshwar JAYARAMAN, Ayla KOL, Amit A. BAPAT, Qi CAO, Steven Jay LIEBERMAN, Ganesh PANDEY, Parul MANEK
-
Publication number: 20220078200Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: ApplicationFiled: November 17, 2021Publication date: March 10, 2022Inventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Patent number: 11212300Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: GrantFiled: July 26, 2019Date of Patent: December 28, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Patent number: 11153321Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that is a user-facing system and receives requests to prepare for an incident investigation. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The request processing system does not access the workspace and the control message processing system is not available for external access by a user. Data and functionality are ingested into the workspace. The control message processing system performs investigation preparation tasks within the workspace. The results of the investigation tasks are surfaced for user access.Type: GrantFiled: July 26, 2019Date of Patent: October 19, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Publication number: 20210029128Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that is a user-facing system and receives requests to prepare for an incident investigation. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The request processing system does not access the workspace and the control message processing system is not available for external access by a user. Data and functionality are ingested into the workspace. The control message processing system performs investigation preparation tasks within the workspace. The results of the investigation tasks are surfaced for user access.Type: ApplicationFiled: July 26, 2019Publication date: January 28, 2021Inventors: Yoganand RAJASEKARAN, Raquibur RAHMAN, Ayla KOL, Philip Ross MOYER, Brijesh Bhupendra DESAI, Zijun HAO, Mainul MIZAN, Kameshwar JAYARAMAN, Benjamin DU, Ganesh PANDEY, Parul MANEK
-
Publication number: 20210029142Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: ApplicationFiled: July 26, 2019Publication date: January 28, 2021Inventors: Yoganand RAJASEKARAN, Raquibur RAHMAN, Ayla KOL, Philip Ross MOYER, Brijesh Bhupendra DESAI, Zijun HAO, Mainul MIZAN, Kameshwar JAYARAMAN, Benjamin DU, Ganesh PANDEY, Parul MANEK
-
Publication number: 20210026674Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.Type: ApplicationFiled: July 26, 2019Publication date: January 28, 2021Inventors: YOGANAND RAJASEKARAN, RAQUIBUR RAHMAN, AYLA KOL, PHILIP ROSS MOYER, BRIJESH BHUPENDRA DESAI, ZIJUN HAO, MAINUL MIZAN, KAMESHWAR JAYARAMAN, BENJAMIN DU, PARUL MANEK, GANESH PANDEY