Patents by Inventor Damodar K. Hegde
Damodar K. Hegde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240048564Abstract: Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.Type: ApplicationFiled: August 4, 2023Publication date: February 8, 2024Applicant: Fortinet, Inc.Inventors: Rajiv Sreedhar, Manuel Nedbal, Manoj Ahluwalia, Damodar K. Hegde, Jitendra B. Gaitonde, Suresh Rajanna, Mark Lubeck, Gary Nool
-
Patent number: 11757888Abstract: Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.Type: GrantFiled: June 15, 2021Date of Patent: September 12, 2023Assignee: Fortinet, Inc.Inventors: Rajiv Sreedhar, Manuel Nedbal, Manoj Ahluwalia, Damodar K. Hegde, Jitendra B. Gaitonde, Suresh Rajanna, Mark Lubeck, Gary Nool
-
Publication number: 20230069738Abstract: Systems, devices, and methods are discussed for automatically determining a risk-based focus in determining zero trust network access policy on one or more network elements.Type: ApplicationFiled: August 23, 2021Publication date: March 2, 2023Applicant: Fortinet, IncInventors: Rajiv Sreedhar, MANUEL NEDBAL, MANOJ AHLUWALIA, LATHA KRISHNAMURTHI, RAJESHWARI RAO, DAMODAR K. HEGDE, JITENDRA B. GAITONDE, Dave Karp, Mark Lubeck
-
Publication number: 20220400113Abstract: Systems, devices, and methods are discussed for determining zero trust network access policy from a policy from a perspective focused on one or more network elements.Type: ApplicationFiled: June 15, 2021Publication date: December 15, 2022Applicant: Fortinet, IncInventors: Rajiv Sreedhar, Manuel Nedbal, Damodar K. Hegde, Jitendra B. Gaitonde, Manoj Ahluwalia
-
Publication number: 20220400116Abstract: Systems, devices, and methods are discussed for determining zero trust network access policy based upon intent defined groups of workloads.Type: ApplicationFiled: August 9, 2021Publication date: December 15, 2022Applicant: Fortinet, Inc.Inventors: RAJIV SREEDHAR, MANUEL NEDBAL, DAMODAR K. HEGDE, JITENDRA B. GAITONDE, MANOJ AHLUWALIA, LATHA KRISHNAMURTHI, RAJESHWARI RAO
-
Publication number: 20220400114Abstract: Systems, devices, and methods are discussed for forward testing rule sets at a granularity that is less than all activity on the network. In some cases, the granularity is that of an individual application.Type: ApplicationFiled: June 15, 2021Publication date: December 15, 2022Applicant: Fortinet, Inc.Inventors: Rajiv Sreedhar, MANUEL NEDBAL, MANOJ AHLUWALIA, DAMODAR K. HEGDE, JITENDRA B. GAITONDE, SURESH RAJANNA, MARK LUBECK, GARY NOOL
-
Patent number: 9430564Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.Type: GrantFiled: January 16, 2014Date of Patent: August 30, 2016Assignee: McAfee, Inc.Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Publication number: 20140164314Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.Type: ApplicationFiled: January 16, 2014Publication date: June 12, 2014Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Patent number: 8700561Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.Type: GrantFiled: December 27, 2011Date of Patent: April 15, 2014Assignee: McAfee, Inc.Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Patent number: 8667121Abstract: In one embodiment, a method is provided and includes capturing a plurality of packet streams, recreating a plurality of flows from the packet streams, and analyzing the flows to identify one or more incidents. The incidents identify one or more pieces of data. The incidents are filtered and the incidents are rendered on a display for an end user that initiated the filtering operation. In other embodiments, the display allows the end user to view a selected one of a group of attributes for the incidents. The display allows the end user to open a captured object associated with a specific incident. In still other embodiments, the display allows a user to filter the incidents using a selected one of a group of group options such as content, destination IP, destination location, destination port, filename, host IP, etc.Type: GrantFiled: March 25, 2009Date of Patent: March 4, 2014Assignee: McAfee, Inc.Inventors: Ratinder Paul Singh Ahuja, Joel Christener, Jitendra Gaitonde, Sirisha Ganti, Sridevi Haridasa, Damodar K. Hegde, Chaitra Jayaram, Rahila Kasim, Faizel Lakhani, Swati Patil, Harsimran S. Sandhu
-
Publication number: 20130246431Abstract: A method is provided in one example and includes receiving sets of metadata elements and corresponding category information representing objects of a data storage location that are classified based on a category. The method further includes generating a summary of a subset of the classified objects and initiating a protection task for objects of the subset. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the subset. Another protection task includes registering the objects of the subset. In other specific embodiments, the summary includes at least one of a total count and a total size of the objects in the subset. In yet other more specific embodiments, the method includes creating an Online Analytical Processing (OLAP) data structure to represent the sets of metadata elements and the corresponding category information with the summary of the subset being generated from the OLAP data.Type: ApplicationFiled: December 27, 2011Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Publication number: 20130246925Abstract: In one embodiment, a method is provided and includes capturing a plurality of packet streams, recreating a plurality of flows from the packet streams, and analyzing the flows to identify one or more incidents. The incidents indentify one or more pieces of data. The incidents are filtered and the incidents are rendered on a display for an end user that initiated the filtering operation. In other embodiments, the display allows the end user to view a selected one of a group of attributes for the incidents. The display allows the end user to open a captured object associated with a specific incident. In still other embodiments, the display allows a user to filter the incidents using a selected one of a group of group options such as content, destination IP, destination location, destination port, filename, host IP, etc.Type: ApplicationFiled: March 25, 2009Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Joel Christener, Jitendra Gaitonde, Sirisha Ganti, Sridevi Haridasa, Damodar K. Hegde, Chaitra Jayaram, Rahila Kasim, Faizel Lakhani, Swati Patil, Harsimran S. Sandhu
-
Publication number: 20130246335Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.Type: ApplicationFiled: December 27, 2011Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Publication number: 20130246334Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing objects of an inventory and generating a first summary of a first subset of the objects. The method further includes receiving second sets of metadata elements and corresponding category information representing objects of the first subset that are classified based on a first category and generating a second summary of a second subset of the classified objects. In yet further embodiments, the method includes initiating a protection task for objects of the second subset of the classified objects. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the second subset or registering the objects of the second subset. In yet other embodiments, the second summary includes at least one of a total count and a total size of the objects in the second subset.Type: ApplicationFiled: December 27, 2011Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Publication number: 20130246336Abstract: A method is provided in one example and includes crawling a storage location of a network environment to identify objects, fetching the identified objects, creating indexes corresponding to the identified objects, and classifying one or more objects of the identified objects based on a first category. The method further includes providing first sets of metadata elements and corresponding first category information representing the classified one or more objects of the identified objects, searching the indexes for a selected group of the classified one or more objects of the identified objects, and classifying one or more objects of the selected group based on a second category. In more specific embodiments, the method includes applying a remediation policy to the classified one or more objects of the selected group. In other more specific embodiments, the method includes registering the classified one or more objects of the selected group.Type: ApplicationFiled: December 27, 2011Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar