Patents by Inventor Deepak Gaikwad

Deepak Gaikwad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250047679
    Abstract: Systems and methods are provided for controlling access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including tracking determinations to grant or deny access to resources of the environment. A trust score is calculated for a resource based on users requesting access to the resource, hardware components requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score of the resource is adjusted upwards based on determinations to grant access to the resource and downwards based on determinations to deny access to the resource. Request for access to the resource are evaluated based on policies of the zero-trust environment that govern access to the resource, based in part on the adjusted trust score of the resource.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250045414
    Abstract: Methods and systems are included for evaluating trust in resources of a zero-trust computing environment. A request is received from a user for access to a resource of the zero-trust environment. A trust score is calculated for the resource based on: users requesting access to the resource, hardware components used to request access to the resource, software applications used to request access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The request from the user is evaluated based on policies of the zero-trust environment that govern access to the resource, where policies grant or deny access to the resource based in part on the calculated trust score of the resource.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250047710
    Abstract: Systems and methods provide controlled access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including identifying policies evaluated in response to requests for access to resources. Based on the tracked requests, policies are identified that were satisfied in granting access to resources and that were not satisfied in denying access to resources. Request for access to resources are evaluated based on a trust score for a resource that is calculated based on users requesting access to the resource, hardware requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score for the resource is adjusted upwards based on the policies satisfied in granting requested access, and adjusted downwards based on policies not satisfied in denying requested access.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250045415
    Abstract: Systems and methods control access to resources in a zero-trust computing environment. Requests for access to resources are tracked, including tracking determinations to grant or deny requested access. Based on the tracked requests, an identity tenant trust score is calculated based on users that request access to a resource and based on a number of such requests that are granted and denied. A hardware tenant trust score is calculated based on hardware that requests access to the resource and based on a number of such requests that are granted and denied. A software tenant trust score is calculated based on software applications that request access to the first resource and further and based on a number of such requests that are granted and denied. The identity tenant trust score, hardware tenant trust score and software tenant trust score are aggregated to generate a trust score for the resource.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250047676
    Abstract: System and methods provide a visualization for use in configuring controlled access to resources in a zero-trust computing environment. A request from a user for access to a resource of the zero-trust environment is received. When visualization of the request is enabled, a visualization of the request is initiated. An identity tenant trust score for the resource is calculated based on a record of users requesting access to the first resource. A hardware tenant trust score is calculated based on a record of hardware requesting access to the resource. A software tenant trust score is calculated based on a record of software requesting access to the resource. The visualization that is generated displays the identity tenant trust score, the hardware tenant trust score and the software tenant trust score associated with the request.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20240009214
    Abstract: The present invention relates to methods of treatment of infections caused by coronaviridae virus (including COV-ID-19) using ((((((R)-1-(6-amino-9h-purin-9-yl) propan-2-yl) oxy) methyl) (phenoxy) phosphoryl)oxy)methyl pivalate, its derivatives or metabolites thereof. The methods of the present invention can be used in patients with infections caused by coronaviridae virus (including COVID-19) administering ((((((R)-1-(6-amino-9h-purin-9-yl) propan-2-yl) oxy) methyl) (phenoxy) phosphoryl)oxy)methyl pivalate, its derivatives or metabolites in combination with one or more anti-viral drugs.
    Type: Application
    Filed: December 1, 2021
    Publication date: January 11, 2024
    Inventors: Kalpana JOSHI, Jeevan GHOSALKAR, Deepak GAIKWAD
  • Patent number: 11301443
    Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: April 12, 2022
    Assignee: Bank of America Corporation
    Inventor: Deepak Gaikwad
  • Patent number: 10915510
    Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).
    Type: Grant
    Filed: December 17, 2019
    Date of Patent: February 9, 2021
    Assignee: Bank of America Corporation
    Inventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
  • Publication number: 20200142871
    Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.
    Type: Application
    Filed: January 3, 2020
    Publication date: May 7, 2020
    Inventor: Deepak Gaikwad
  • Publication number: 20200125544
    Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).
    Type: Application
    Filed: December 17, 2019
    Publication date: April 23, 2020
    Inventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
  • Patent number: 10572458
    Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).
    Type: Grant
    Filed: November 1, 2016
    Date of Patent: February 25, 2020
    Assignee: Bank of America Corporation
    Inventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
  • Patent number: 10528535
    Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.
    Type: Grant
    Filed: November 14, 2016
    Date of Patent: January 7, 2020
    Assignee: Bank of America Corporation
    Inventor: Deepak Gaikwad
  • Publication number: 20180137153
    Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.
    Type: Application
    Filed: November 14, 2016
    Publication date: May 17, 2018
    Inventor: Deepak Gaikwad
  • Publication number: 20180121472
    Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).
    Type: Application
    Filed: November 1, 2016
    Publication date: May 3, 2018
    Inventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
  • Patent number: 9606892
    Abstract: Methods and apparatus for monitoring workfiles are disclosed. An authorized user or system programmer may input workfile threshold values and other monitoring information into a configuration file. A server reads the configuration file and starts traces to monitor workfile usage in a system. The server may continuously monitor the system to determine whether workfile usage in the system reaches workfile threshold values set in the configuration file. The server may list SQL queries using workfiles and then alert the system programmer when the threshold values are reached and is capable of reclaiming disk space by dropping and recreating overgrown workfiles with their original definitions.
    Type: Grant
    Filed: January 9, 2014
    Date of Patent: March 28, 2017
    Assignee: Bank of America Corporation
    Inventor: Deepak Gaikwad
  • Publication number: 20150195180
    Abstract: Methods and apparatus for monitoring workfiles are disclosed. An authorized user or system programmer may input workfile threshold values and other monitoring information into a configuration file. A server reads the configuration file and starts traces to monitor workfile usage in a system. The server may continuously monitor the system to determine whether workfile usage in the system reaches workfile threshold values set in the configuration file. The server may list SQL queries using workfiles and then alert the system programmer when the threshold values are reached and is capable of reclaiming disk space by dropping and recreating overgrown workfiles with their original definitions.
    Type: Application
    Filed: January 9, 2014
    Publication date: July 9, 2015
    Applicant: Bank of America Corporation
    Inventor: Deepak Gaikwad
  • Publication number: 20150031647
    Abstract: The present invention relates to a taste-masked dispersible tablet comprising a drug, a cation exchange resin, and other pharmaceutically acceptable excipients, such that the said drug and the said cation exchange resin are present in an un-complexed form in the tablet. It further relates to a process for the preparation of the same.
    Type: Application
    Filed: February 21, 2013
    Publication date: January 29, 2015
    Applicant: RANBAXY LABORATORIES LIMITED
    Inventors: Vinod Kumar Arora, Jatin Khurana, Deepak Gaikwad
  • Patent number: 8300890
    Abstract: A first set of unknown pixels is determined for which being located in the foreground portion does not in-and-of-itself determine the pixel to be part of the foreground. A second set of unknown pixels is determined for which being in a current background portion does not in-and-of-itself determine the pixel to be part of the background. A determination is made for the first and second set of unknown pixels whether the pixel is part of the background or foreground based on temporal data. Extracting an image of the foreground that does not include the current background based on the determination of whether the pixel is part of the foreground, the current background, and temporal data. In an embodiment, the system can use multiple types of sensors to determine whether an entity is a likely security risk.
    Type: Grant
    Filed: June 25, 2009
    Date of Patent: October 30, 2012
    Assignee: Intellivision Technologies Corporation
    Inventors: Deepak Gaikwad, Radhika Walimbe, Chandan Gope, Vaidhi Nathan
  • Publication number: 20080253685
    Abstract: Multiple images taken from different locations or angles and viewpoints are joined and stitched. After the stitching and joining a much larger video or image scenery may be produced than any one image or video form which the final scenery was produced or an image of a different perspective than any of the input images may be produced.
    Type: Application
    Filed: February 25, 2008
    Publication date: October 16, 2008
    Inventors: Alexander Kuranov, Deepak Gaikwad, Vaidhi Nathan, Sergey Egorov, Tejashree Dhoble