Patents by Inventor Debabrata Dash

Debabrata Dash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9619482
    Abstract: A method and system for anonymizing data to be stored in a destination computing device is disclosed. A first data store is provided in a first user computing device, the first data store including a file folder designated as a first sync folder. A destination data store is provided in a destination computing device, the destination data store including a file folder designated as a destination sync folder. A file stored in the first sync folder is also stored in the destination sync folder and the file stored in the destination sync folder is anonymized before transmission of the file to the destination computing device over a network for storage in the destination sync folder.
    Type: Grant
    Filed: December 14, 2014
    Date of Patent: April 11, 2017
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash, Sushil Nair
  • Patent number: 9535961
    Abstract: A data storage system includes a column store and a row store. The data storage system may generate a query summary. The data storage system determines query summary fields comprised of a subset of fields from a schema used to store data in the row store. The data storage system searches the column store or the row store for query results in the query summary fields. A query summary field is generated from the query results in the query summary fields.
    Type: Grant
    Filed: November 18, 2011
    Date of Patent: January 3, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Debabrata Dash, Wenting Tang, Marylou Orayani, Bradley W. Cleveland, Masaki Utsumiya
  • Patent number: 9413526
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data is anonymized using the anonymization module, to derive an anonymized data, using a data encryption key. The anonymized data is transmitted to the destination computer over a network. In some embodiments, the data encryption key is encrypted and decrypted prior to anonymization.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: August 9, 2016
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash, Malakondayya Gorantla
  • Patent number: 9356993
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data includes a plurality of characters. An initialization vector is generated using a seed value, the seed value having a corresponding seed value identifier. The data is anonymized using an anonymization module, to derive an anonymized data, using the generated initialization vector. The anonymized data and the seed value identifier is transmitted to the destination computer over a network.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 31, 2016
    Assignee: Ciphercloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash
  • Patent number: 9338220
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. The data includes a plurality of fields. One or more fields are selectively extracted. A hash using the extracted fields is computed. The computed hash is stored. Anonymization of the data is performed, using an anonymization module. Anonymized data is transmitted to the destination computing device over a network.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 10, 2016
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash
  • Patent number: 9323818
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. An anonymization strategy module is executed on a computing device to store anonymization strategy for data anonymization in a data store. A logic configured to receive data from a user computer, to be stored in the destination computing device. An anonymization module is executed on the computing device to selectively anonymize data to be stored in the destination computing device, based on the anonymization strategy for the data to be stored. Anonymized data is transmitted to the destination computing device for storage, over a network.
    Type: Grant
    Filed: April 7, 2014
    Date of Patent: April 26, 2016
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash, Yuh-Wen Soung, Theron Tock
  • Patent number: 9300637
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Data to be transmitted is received from a user computer. The data includes one or more characters. The data is replaced with a token representative of the data. The token is transmitted to the destination computing device over a network.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 29, 2016
    Assignee: CipherCloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash
  • Patent number: 9292696
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Data to be transmitted is received from a user computer. The data includes a plurality of fields of data. One or more fields of data are selected for anonymization. The selected one or more fields are anonymized. The data with one or more fields anonymized is transmitted to the destination computing device.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 22, 2016
    Assignee: CipherCloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash, Viswa Soubramanien
  • Publication number: 20140359771
    Abstract: Systems and methods for processing log data are provided. A set of data chunks is determined. Each data chunk is associated with a set of events, which are grouped according to a primary time dimension field of each event of the set of events. A metadata structure is determined for each of the data chunks. The metadata structure includes comprises a range of the primary time dimension field of all of the events in the data chunk and a range of a secondary time dimension field of all of the events in the data chunk. A subset of the data chunks is selected. A data chunk associated with at least one event of the plurality of events is generated according to the secondary time dimension field of the at least one event.
    Type: Application
    Filed: January 26, 2012
    Publication date: December 4, 2014
    Inventors: Debabrata Dash, Wenting Tang, Marylou Orayani
  • Publication number: 20140330816
    Abstract: A data storage system (122) includes a column store (281) and a row store (282). The data storage system (122) may generate a query summary. The data storage system (122) determines query summary fields comprised of a subset of fields from a schema used to store data in the row store (282). The data storage system (122) searches the column store (281) or the row store (282) for query results in the query summary fields. A query summary field is generated from the query results in the query summary fields.
    Type: Application
    Filed: November 18, 2011
    Publication date: November 6, 2014
    Inventors: Debabrata Dash, Wenting Tang, Marylou Orayani, Bradley W. Cleveland, Masaki Utsumiya
  • Patent number: 8694646
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. Anonymized data is transmitted to the destination computing device over a network.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: April 8, 2014
    Assignee: Ciphercloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash, Yuh-wen Soung, Theron Tock
  • Patent number: 8560679
    Abstract: A selected time interval of previously stored events generated by a number of computer network devices are replayed and cross-correlated according to rules. Meta-events are generated when the events satisfy conditions associated with one or more of the rules. The rules used during replay may differ from prior rules used at a time when the events occurred within a computer network that included the computer network devices. In this way, new rules can be tested against true event data streams to determine whether or not the rules should be used in a live environment (i.e., the efficacy of the rules can be tested and/or debugged against actual event data).
    Type: Grant
    Filed: February 18, 2011
    Date of Patent: October 15, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Hugh S. Njemanze, Debabrata Dash, Shijie Wang
  • Patent number: 8528077
    Abstract: Events are received from a plurality of security devices (which may be similar or different devices, e.g., intrusion detection systems configured to monitor network traffic) and divided into a plurality of event flows. Comparing the event flows (e.g., using statistical correlation methods) then generates one or more meta-events. The received events may be divided into different event flows on the basis of the security device which generated the events. The meta-events may be generated by evaluating a perimeter defense device through comparison of the different event flows. In some cases, various ones of the security devices may be inside or outside a perimeter defined by the perimeter defense device.
    Type: Grant
    Filed: April 9, 2004
    Date of Patent: September 3, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kenny Tidwell, Debabrata Dash
  • Publication number: 20120260306
    Abstract: First stage meta-events are generated based on analyzing time attributes of base events received from a network component. Second stage meta-events are generated based on a number of the first stage meta-events that have a time attribute falling within a time period. An amount of time that has passed since a most-recent second stage meta-event was generated is determined, and if a threshold time period does not exceed the amount of time that has passed since the most-recent second stage meta-event was detected, a third stage meta-event is determined.
    Type: Application
    Filed: April 10, 2012
    Publication date: October 11, 2012
    Inventors: Hugh S. Njemanze, Pravin S. Kothari, Debabrata Dash, Shijie Wang
  • Patent number: 8176527
    Abstract: A rules engine with support for time-based rules is disclosed. A method performed by the rules engine, comprises receiving security events generated by a number of network devices. The security events are aggregated. One or more time-based rules are provided to a RETE engine. The aggregated security events are provided to the RETE engine at specific times associated with the time-based rules. The security events are cross-correlated with the one or more time-based rules; and one or more first stage meta-events are reported.
    Type: Grant
    Filed: December 2, 2002
    Date of Patent: May 8, 2012
    Assignee: Hewlett-Packard Development Company, L. P.
    Inventors: Hugh S. Njemanze, Pravin S. Kothari, Debabrata Dash, Shijie Wang
  • Patent number: 8099782
    Abstract: A network system can have a plurality of distributed software agents configured to collect events from network devices. In one embodiment, the agents are configured to aggregate the events. In one embodiment of the present invention, an agent includes a device interface to receive an event from a network device, a plurality of aggregation profiles, and an agent aggregate module to select one of the plurality of aggregation profiles, and increment an event count of an aggregate event representing the received event using the selected aggregation profile.
    Type: Grant
    Filed: November 17, 2009
    Date of Patent: January 17, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Debabrata Dash, Hector Aguilar-Macias
  • Publication number: 20110145711
    Abstract: A selected time interval of previously stored events generated by a number of computer network devices are replayed and cross-correlated according to rules. Meta-events are generated when the events satisfy conditions associated with one or more of the rules. The rules used during replay may differ from prior rules used at a time when the events occurred within a computer network that included the computer network devices. In this way, new rules can be tested against true event data streams to determine whether or not the rules should be used in a live environment (i.e., the efficacy of the rules can be tested an tor debugged against actual event data).
    Type: Application
    Filed: February 18, 2011
    Publication date: June 16, 2011
    Inventors: Hugh S. Njemanze, Debabrata Dash, Shijie Wang
  • Patent number: 7899901
    Abstract: A selected time interval of previously stored security events generated by a number of computer network devices are replayed and cross-correlated according to rules defining security incidents. Meta-events are generated when the security events satisfy conditions associated with one or more of the rules. The rules used during replay may differ from prior rules used at a time when the security events occurred within a computer network that included the computer network devices. In this way, new rules can be tested against true security event data streams to determine whether or not the rules should be used in a live environment (i.e., the efficacy of the rules can be tested and/or debugged against actual security event data).
    Type: Grant
    Filed: December 2, 2002
    Date of Patent: March 1, 2011
    Assignee: ArcSight, Inc.
    Inventors: Hugh S. Njemanze, Debabrata Dash, Shijie Wang
  • Patent number: 7861299
    Abstract: A network security system is provided that receives information from various sensors and can analyze the received information. In one embodiment of the present invention, such a system receives a security event from a software agent. The received security event includes a target address and an event signature, as generated by the software agent. The event signature can be used to determine a set of vulnerabilities exploited by the received security event, and the target address can be used to identify a target asset within the network. By accessing a model of the target asset, a set of vulnerabilities exposed by the target asset can be retrieved. Then, a threat can be detected by comparing the set of vulnerabilities exploited by the security event to the set of vulnerabilities exposed by the target asset.
    Type: Grant
    Filed: August 9, 2007
    Date of Patent: December 28, 2010
    Assignee: ArcSight, Inc.
    Inventors: Kenny C. Tidwell, Kumar Saurabh, Debabrata Dash, Hugh S. Njemanze, Pravin S. Kothari
  • Patent number: 7644438
    Abstract: A network security system can have a plurality of distributed software agents configured to collect security events from network devices. In one embodiment, the agents are configured to aggregate the security events. In one embodiment of the present invention, an agent includes a device interface to receive a security event from a network device, a plurality of aggregation profiles, and an agent aggregate module to select one of the plurality of aggregation profiles, and increment an event count of an aggregate event representing the received security event using the selected aggregation profile.
    Type: Grant
    Filed: October 27, 2004
    Date of Patent: January 5, 2010
    Assignee: ArcSight, Inc.
    Inventors: Debabrata Dash, Hector Aguilar-Macias