Patents by Inventor Damodar K. Hegde

Damodar K. Hegde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240048564
    Abstract: Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.
    Type: Application
    Filed: August 4, 2023
    Publication date: February 8, 2024
    Applicant: Fortinet, Inc.
    Inventors: Rajiv Sreedhar, Manuel Nedbal, Manoj Ahluwalia, Damodar K. Hegde, Jitendra B. Gaitonde, Suresh Rajanna, Mark Lubeck, Gary Nool
  • Patent number: 11757888
    Abstract: Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.
    Type: Grant
    Filed: June 15, 2021
    Date of Patent: September 12, 2023
    Assignee: Fortinet, Inc.
    Inventors: Rajiv Sreedhar, Manuel Nedbal, Manoj Ahluwalia, Damodar K. Hegde, Jitendra B. Gaitonde, Suresh Rajanna, Mark Lubeck, Gary Nool
  • Publication number: 20230069738
    Abstract: Systems, devices, and methods are discussed for automatically determining a risk-based focus in determining zero trust network access policy on one or more network elements.
    Type: Application
    Filed: August 23, 2021
    Publication date: March 2, 2023
    Applicant: Fortinet, Inc
    Inventors: Rajiv Sreedhar, MANUEL NEDBAL, MANOJ AHLUWALIA, LATHA KRISHNAMURTHI, RAJESHWARI RAO, DAMODAR K. HEGDE, JITENDRA B. GAITONDE, Dave Karp, Mark Lubeck
  • Publication number: 20220400113
    Abstract: Systems, devices, and methods are discussed for determining zero trust network access policy from a policy from a perspective focused on one or more network elements.
    Type: Application
    Filed: June 15, 2021
    Publication date: December 15, 2022
    Applicant: Fortinet, Inc
    Inventors: Rajiv Sreedhar, Manuel Nedbal, Damodar K. Hegde, Jitendra B. Gaitonde, Manoj Ahluwalia
  • Publication number: 20220400116
    Abstract: Systems, devices, and methods are discussed for determining zero trust network access policy based upon intent defined groups of workloads.
    Type: Application
    Filed: August 9, 2021
    Publication date: December 15, 2022
    Applicant: Fortinet, Inc.
    Inventors: RAJIV SREEDHAR, MANUEL NEDBAL, DAMODAR K. HEGDE, JITENDRA B. GAITONDE, MANOJ AHLUWALIA, LATHA KRISHNAMURTHI, RAJESHWARI RAO
  • Publication number: 20220400114
    Abstract: Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.
    Type: Application
    Filed: June 15, 2021
    Publication date: December 15, 2022
    Applicant: Fortinet, Inc.
    Inventors: Rajiv Sreedhar, MANUEL NEDBAL, MANOJ AHLUWALIA, DAMODAR K. HEGDE, JITENDRA B. GAITONDE, SURESH RAJANNA, MARK LUBECK, GARY NOOL
  • Patent number: 9430564
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: August 30, 2016
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Publication number: 20140164314
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.
    Type: Application
    Filed: January 16, 2014
    Publication date: June 12, 2014
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Patent number: 8700561
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.
    Type: Grant
    Filed: December 27, 2011
    Date of Patent: April 15, 2014
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Patent number: 8667121
    Abstract: In one embodiment, a method is provided and includes capturing a plurality of packet streams, recreating a plurality of flows from the packet streams, and analyzing the flows to identify one or more incidents. The incidents identify one or more pieces of data. The incidents are filtered and the incidents are rendered on a display for an end user that initiated the filtering operation. In other embodiments, the display allows the end user to view a selected one of a group of attributes for the incidents. The display allows the end user to open a captured object associated with a specific incident. In still other embodiments, the display allows a user to filter the incidents using a selected one of a group of group options such as content, destination IP, destination location, destination port, filename, host IP, etc.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: March 4, 2014
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Joel Christener, Jitendra Gaitonde, Sirisha Ganti, Sridevi Haridasa, Damodar K. Hegde, Chaitra Jayaram, Rahila Kasim, Faizel Lakhani, Swati Patil, Harsimran S. Sandhu
  • Publication number: 20130246431
    Abstract: A method is provided in one example and includes receiving sets of metadata elements and corresponding category information representing objects of a data storage location that are classified based on a category. The method further includes generating a summary of a subset of the classified objects and initiating a protection task for objects of the subset. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the subset. Another protection task includes registering the objects of the subset. In other specific embodiments, the summary includes at least one of a total count and a total size of the objects in the subset. In yet other more specific embodiments, the method includes creating an Online Analytical Processing (OLAP) data structure to represent the sets of metadata elements and the corresponding category information with the summary of the subset being generated from the OLAP data.
    Type: Application
    Filed: December 27, 2011
    Publication date: September 19, 2013
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Publication number: 20130246925
    Abstract: In one embodiment, a method is provided and includes capturing a plurality of packet streams, recreating a plurality of flows from the packet streams, and analyzing the flows to identify one or more incidents. The incidents indentify one or more pieces of data. The incidents are filtered and the incidents are rendered on a display for an end user that initiated the filtering operation. In other embodiments, the display allows the end user to view a selected one of a group of attributes for the incidents. The display allows the end user to open a captured object associated with a specific incident. In still other embodiments, the display allows a user to filter the incidents using a selected one of a group of group options such as content, destination IP, destination location, destination port, filename, host IP, etc.
    Type: Application
    Filed: March 25, 2009
    Publication date: September 19, 2013
    Inventors: Ratinder Paul Singh Ahuja, Joel Christener, Jitendra Gaitonde, Sirisha Ganti, Sridevi Haridasa, Damodar K. Hegde, Chaitra Jayaram, Rahila Kasim, Faizel Lakhani, Swati Patil, Harsimran S. Sandhu
  • Publication number: 20130246335
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.
    Type: Application
    Filed: December 27, 2011
    Publication date: September 19, 2013
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Publication number: 20130246334
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing objects of an inventory and generating a first summary of a first subset of the objects. The method further includes receiving second sets of metadata elements and corresponding category information representing objects of the first subset that are classified based on a first category and generating a second summary of a second subset of the classified objects. In yet further embodiments, the method includes initiating a protection task for objects of the second subset of the classified objects. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the second subset or registering the objects of the second subset. In yet other embodiments, the second summary includes at least one of a total count and a total size of the objects in the second subset.
    Type: Application
    Filed: December 27, 2011
    Publication date: September 19, 2013
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Publication number: 20130246336
    Abstract: A method is provided in one example and includes crawling a storage location of a network environment to identify objects, fetching the identified objects, creating indexes corresponding to the identified objects, and classifying one or more objects of the identified objects based on a first category. The method further includes providing first sets of metadata elements and corresponding first category information representing the classified one or more objects of the identified objects, searching the indexes for a selected group of the classified one or more objects of the identified objects, and classifying one or more objects of the selected group based on a second category. In more specific embodiments, the method includes applying a remediation policy to the classified one or more objects of the selected group. In other more specific embodiments, the method includes registering the classified one or more objects of the selected group.
    Type: Application
    Filed: December 27, 2011
    Publication date: September 19, 2013
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar