Patents by Inventor Debabrata Dash

Debabrata Dash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902257
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data includes a plurality of characters. A portion of the anonymized data is selected as a search ID. A cross reference between a search key indicative of a portion of the received data and the corresponding search ID is stored.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: February 13, 2024
    Assignee: Lookout, Inc.
    Inventors: Pravin Kothari, Debabrata Dash
  • Patent number: 11799882
    Abstract: A method and system for network endpoint identification through network fingerprint based entity resolution. Particularly, embodiments disclosed herein may entail receiving a network fingerprint descriptive of at least a network endpoint; obtaining at least two network endpoint label sets each inferred from the network fingerprint by a different network fingerprint parser; reducing, through entity resolution and heuristics, the at least two network endpoint label sets into a de-duplicated network endpoint label set; and resolving, through a voting algorithm, the de-duplicated network endpoint label set to obtain a unified network endpoint label that best identifies the network endpoint.
    Type: Grant
    Filed: May 26, 2022
    Date of Patent: October 24, 2023
    Assignee: ARISTA NETWORKS, INC.
    Inventors: Arunabh Ghosh, Debabrata Dash
  • Publication number: 20230254225
    Abstract: Embodiments of the present disclosure include techniques for generating hybrid network activity records. A stream of packet data is received. A flow in the stream of packet data is identified. Deep packet inspection operations are performed on a first subset of packets in the flow to extract a first set of data. Flow stat operations are performed on a second subset of packets in the flow to extract a second set of data. Based on the first and second sets of data, a set of network activity records are generated.
    Type: Application
    Filed: February 6, 2022
    Publication date: August 10, 2023
    Inventors: Keith Eric Amidon, Jeevan Madhu Kamisetty, Debabrata Dash
  • Patent number: 11228566
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data includes a plurality of characters. An order indicator data indicative of the order of the received data is generated. The received data is anonymized to derive an anonymized data. The anonymized data and the order indicator data is transmitted to the destination computer over a network. In one embodiment, a portion of the anonymized data is selected as a search ID. A cross reference between a search key indicative of a portion of the received data and the corresponding search ID is stored.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: January 18, 2022
    Assignee: Ciphercloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash
  • Patent number: 11108796
    Abstract: System and method to identify a security entity in a computing environment is disclosed. Communication between a user computer and at least one destination computer by a security appliance is monitored by a security appliance. A virtual identifier is assigned to a subset of the communication within a defined time period. At least one security entity is identified based on a subset of the selective information. The assigned virtual identifier associated with at least one security entity.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: August 31, 2021
    Assignee: AWAKE SECURITY LLC
    Inventors: Daniel Wang, Debabrata Dash, Gary Golomb
  • Patent number: 10984010
    Abstract: A data storage system includes a column store and a row store. The data storage system may generate a query summary. The data storage system determines query summary fields comprised of a subset of fields from a schema used to store data in the row store. The data storage system searches the column store or the row store for query results in the query summary fields. A query summary field is generated from the query results in the query summary fields.
    Type: Grant
    Filed: December 23, 2016
    Date of Patent: April 20, 2021
    Assignee: Micro Focus LLC
    Inventors: Debabrata Dash, Wenting Tang, Marylou Orayani, Bradley W. Cleveland, Masaki Utsumiya
  • Patent number: 10630742
    Abstract: A system and method for content messaging includes observing, by the server, synchronization of a database cluster accessible to the server with a first local database at a first client, the database cluster including a message after the synchronization, the message including content and instructions for processing the content, and processing, by the server, the content of the message according to the instructions for processing the content, in response to observing the synchronization.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: April 21, 2020
    Assignee: KODIAK NETWORKS, INC.
    Inventors: Krishnakant M. Patel, Debabrata Dash, Ravi Ayyasamy, Pratap Chandana, Bharat Ram Setti, Sayyad Gaffar
  • Patent number: 10362062
    Abstract: System and method to evaluate a plurality of security entities in a network environment is disclosed. Communication between a user computer and a destination computer is monitored by a security appliance. Selective information from the communication is extracted by the security appliance. The selective information is indicative of a value for one or more attributes of the plurality of security entities. A first value indicative of occurrence of each of the values for each of the attributes is generated. A second value indicative of occurrence of each of the values for each of the attributes for each of the security entity is generated. A third value is calculated based on the first value and the second value for each of the attribute value for each of the security entity, wherein the third value is indicative of significance of the value of the attribute for the security entity.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: July 23, 2019
    Assignee: Awake Security, Inc.
    Inventors: Debabrata Dash, Chunsheng Victor Fang, Gary Golomb
  • Patent number: 10237287
    Abstract: System and method for detecting a likely threat from a malicious attack is disclosed. Communication between a user computer and a destination computer is monitored by a security appliance. Selective information from the communication is extracted. One or more weak signals of a threat is detected based on the selective information. One or more weak signals are evaluated for a likely threat based on a threshold value. A corrective action is initiated for the likely threat, based on the evaluation.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: March 19, 2019
    Assignee: Awake Security, Inc.
    Inventors: Keith Amidon, Michael Callahan, Debabrata Dash, Gary Golomb
  • Patent number: 10218717
    Abstract: System and method for detecting a likely threat from a malicious attack is disclosed. Communication between a user computer and a destination computer is monitored by a security appliance. Selective information from the communication is extracted. Selective information is associated to one or more attributes of a security entity. A knowledge graph is generated for a plurality of security entities based on the associated selective information.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: February 26, 2019
    Assignee: AWAKE SECURITY, INC.
    Inventors: Keith Amidon, Michael Callahan, Manasa Chalasani, Debabrata Dash, Gary Golomb
  • Patent number: 10218733
    Abstract: System and method for evaluating communication between a plurality of computing devices is disclosed. A plurality of communication between a user computer and at least one a destination computer is monitored by a security appliance. Selective information from the plurality of communication is extracted by the security appliance. Extracted selective information between a pair of communication is compared for a match. An activity record is generated for the user computer and at least one destination computer, based on the match.
    Type: Grant
    Filed: June 11, 2017
    Date of Patent: February 26, 2019
    Assignee: AWAKE SECURITY, INC.
    Inventors: Keith Amidon, Debabrata Dash, Gary Golomb, David Pearson
  • Patent number: 9973891
    Abstract: A system and method for geofencing includes sending, by the location management server, location data collection criteria and location data reporting criteria to a first location-aware client; and receiving, by the location management server, location data from the first location-aware client, the location data collected by the first location-aware client according to the location data collection criteria, the location data received from the first location-aware client according to the location data reporting criteria.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: May 15, 2018
    Assignee: KODIAK NETWORKS INC.
    Inventors: Krishnakant M Patel, Debabrata Dash, Ravi Ayyasamy, Pratap Chandana, Bharat Ram Setti, Sayyad Gaffar, Rohit Ashok Nerlikar, Ramu Kandula
  • Patent number: 9853986
    Abstract: Systems and methods for processing log data are provided. A set of data chunks is determined. Each data chunk is associated with a set of events, which are grouped according to a primary time dimension field of each event of the set of events. A metadata structure is determined for each of the data chunks. The metadata structure includes comprises a range of the primary time dimension field of all of the events in the data chunk and a range of a secondary time dimension field of all of the events in the data chunk. A subset of the data chunks is selected. A data chunk associated with at least one event of the plurality of events is generated according to the secondary time dimension field of the at least one event.
    Type: Grant
    Filed: January 26, 2012
    Date of Patent: December 26, 2017
    Assignee: EntIT Software LLC
    Inventors: Debabrata Dash, Wenting Tang, Marylou Orayani
  • Patent number: 9852311
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data includes a plurality of characters and defines a clear data. A modified clear data with number of characters greater than the clear data is formed using the clear data, a delimiter data and a pad data. The modified clear data is anonymized to derive an anonymized data. The anonymized data is transmitted to the destination computer over a network. In one embodiment, a portion of the pad data is selected as a seed value to generate an initialization vector to anonymize the clear data.
    Type: Grant
    Filed: March 30, 2014
    Date of Patent: December 26, 2017
    Assignee: Ciphercloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash, Yevgeniy Kaganovich, Jing Liu
  • Patent number: 9722973
    Abstract: A method and system for a distributed anonymization system is disclosed. A master anonymization system is provided. A slave anonymization system is configured to communicate with the master anonymization system, wherein the master anonymization system permits the slave anonymization system to perform one or more functions. The slave anonymization system is configured receives a request from a user computer that requires slave anonymization system to perform a function. The performance of the function requires either storage of data to a data store in a destination computing device or retrieval of data from the data store in the destination computing device, wherein the data is stored or retrieved in an anonymized form. The slave anonymization system verifies if the function to be performed is a permitted function. If it is a permitted function, the function is performed.
    Type: Grant
    Filed: July 11, 2013
    Date of Patent: August 1, 2017
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash
  • Patent number: 9703967
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. The data includes a plurality of numbers and defines a clear data in a first base encoding scheme, with one or more predefined characteristics. The clear data is converted to a modified clear data in a second base encoding scheme. The modified clear data is anonymized using an anonymization module, to derive an interim anonymized data in the second base encoding scheme. A converted interim anoymized data in the first base encoding scheme is designated as the anonymized data, if the converted interim anonymized data meets the predefined characteristics of the clear data. The anonymized data is transmitted to the destination computer over a network.
    Type: Grant
    Filed: March 30, 2014
    Date of Patent: July 11, 2017
    Assignee: Ciphercloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash, Yevgeniy Kaganovich, Jing Liu
  • Patent number: 9667741
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. A context sensing word is appended to the anonymized data. The anonymized data and the context sensing word are transmitted to the destination computing device. In one embodiment, the data includes a plurality of normal words and a plurality of stop words. A compacted stop word representative of each of the stop word and their relative position in the data is created. Anonymized normal words and anonymized compacted stop word is transmitted to the destination computing device.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 30, 2017
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash, Malakondayya Gorantla
  • Publication number: 20170118262
    Abstract: A system and method for content messaging includes observing, by the server, synchronization of a database cluster accessible to the server with a first local database at a first client, the database cluster including a message after the synchronization, the message including content and instructions for processing the content, and processing, by the server, the content of the message according to the instructions for processing the content, in response to observing the synchronization.
    Type: Application
    Filed: October 21, 2016
    Publication date: April 27, 2017
    Inventors: Krishnakant M. Patel, Debabrata Dash, Ravi Ayyasamy, Pratap Chandana, Bharat Ram Setti, Sayyad Gaffar
  • Publication number: 20170118592
    Abstract: A system and method for geofencing includes sending, by the location management server, location data collection criteria and location data reporting criteria to a first location-aware client; and receiving, by the location management server, location data from the first location-aware client, the location data collected by the first location-aware client according to the location data collection criteria, the location data received from the first location-aware client according to the location data reporting criteria.
    Type: Application
    Filed: October 21, 2016
    Publication date: April 27, 2017
    Inventors: Krishnakant M. Patel, Debabrata Dash, Ravi Ayyasamy, Pratap Chandana, Bharat Ram Setti, Sayyad Gaffar, Rohit Ashok Nerlikar, Ramu Kandula
  • Publication number: 20170109416
    Abstract: A data storage system includes a column store and a row store. The data storage system may generate a query summary. The data storage system determines query summary fields comprised of a subset of fields from a schema used to store data in the row store. The data storage system searches the column store or the row store for query results in the query summary fields. A query summary field is generated from the query results in the query summary fields.
    Type: Application
    Filed: December 23, 2016
    Publication date: April 20, 2017
    Inventors: Debabrata Dash, Wenting Tang, Marylou Orayani, Bradley W. Cleveland, Masaki Utsumiya