Patents by Inventor Deepak Gaikwad
Deepak Gaikwad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250047679Abstract: Systems and methods are provided for controlling access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including tracking determinations to grant or deny access to resources of the environment. A trust score is calculated for a resource based on users requesting access to the resource, hardware components requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score of the resource is adjusted upwards based on determinations to grant access to the resource and downwards based on determinations to deny access to the resource. Request for access to the resource are evaluated based on policies of the zero-trust environment that govern access to the resource, based in part on the adjusted trust score of the resource.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250045414Abstract: Methods and systems are included for evaluating trust in resources of a zero-trust computing environment. A request is received from a user for access to a resource of the zero-trust environment. A trust score is calculated for the resource based on: users requesting access to the resource, hardware components used to request access to the resource, software applications used to request access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The request from the user is evaluated based on policies of the zero-trust environment that govern access to the resource, where policies grant or deny access to the resource based in part on the calculated trust score of the resource.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250047710Abstract: Systems and methods provide controlled access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including identifying policies evaluated in response to requests for access to resources. Based on the tracked requests, policies are identified that were satisfied in granting access to resources and that were not satisfied in denying access to resources. Request for access to resources are evaluated based on a trust score for a resource that is calculated based on users requesting access to the resource, hardware requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score for the resource is adjusted upwards based on the policies satisfied in granting requested access, and adjusted downwards based on policies not satisfied in denying requested access.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250045415Abstract: Systems and methods control access to resources in a zero-trust computing environment. Requests for access to resources are tracked, including tracking determinations to grant or deny requested access. Based on the tracked requests, an identity tenant trust score is calculated based on users that request access to a resource and based on a number of such requests that are granted and denied. A hardware tenant trust score is calculated based on hardware that requests access to the resource and based on a number of such requests that are granted and denied. A software tenant trust score is calculated based on software applications that request access to the first resource and further and based on a number of such requests that are granted and denied. The identity tenant trust score, hardware tenant trust score and software tenant trust score are aggregated to generate a trust score for the resource.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250047676Abstract: System and methods provide a visualization for use in configuring controlled access to resources in a zero-trust computing environment. A request from a user for access to a resource of the zero-trust environment is received. When visualization of the request is enabled, a visualization of the request is initiated. An identity tenant trust score for the resource is calculated based on a record of users requesting access to the first resource. A hardware tenant trust score is calculated based on a record of hardware requesting access to the resource. A software tenant trust score is calculated based on a record of software requesting access to the resource. The visualization that is generated displays the identity tenant trust score, the hardware tenant trust score and the software tenant trust score associated with the request.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20240009214Abstract: The present invention relates to methods of treatment of infections caused by coronaviridae virus (including COV-ID-19) using ((((((R)-1-(6-amino-9h-purin-9-yl) propan-2-yl) oxy) methyl) (phenoxy) phosphoryl)oxy)methyl pivalate, its derivatives or metabolites thereof. The methods of the present invention can be used in patients with infections caused by coronaviridae virus (including COVID-19) administering ((((((R)-1-(6-amino-9h-purin-9-yl) propan-2-yl) oxy) methyl) (phenoxy) phosphoryl)oxy)methyl pivalate, its derivatives or metabolites in combination with one or more anti-viral drugs.Type: ApplicationFiled: December 1, 2021Publication date: January 11, 2024Inventors: Kalpana JOSHI, Jeevan GHOSALKAR, Deepak GAIKWAD
-
Patent number: 11301443Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.Type: GrantFiled: January 3, 2020Date of Patent: April 12, 2022Assignee: Bank of America CorporationInventor: Deepak Gaikwad
-
Patent number: 10915510Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).Type: GrantFiled: December 17, 2019Date of Patent: February 9, 2021Assignee: Bank of America CorporationInventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
-
Publication number: 20200142871Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.Type: ApplicationFiled: January 3, 2020Publication date: May 7, 2020Inventor: Deepak Gaikwad
-
Publication number: 20200125544Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).Type: ApplicationFiled: December 17, 2019Publication date: April 23, 2020Inventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
-
Patent number: 10572458Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).Type: GrantFiled: November 1, 2016Date of Patent: February 25, 2020Assignee: Bank of America CorporationInventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
-
Patent number: 10528535Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.Type: GrantFiled: November 14, 2016Date of Patent: January 7, 2020Assignee: Bank of America CorporationInventor: Deepak Gaikwad
-
Publication number: 20180137153Abstract: Some aspects as disclosed herein are directed to, for example, a system and method of configuring one or more configurable database work file limits and performing one or more actions in response to reaching or approaching the work file limits. The method may comprise determining, by a computing device, a user identifier associated with a user and an application identifier associated with an application. The computing device may determine, based on the user identifier and the application identifier, a workfile storage usage threshold associated with the user and the application. The computing device may determine whether a workfile storage usage associated with the user and the application approaches or exceeds the workfile storage usage limit.Type: ApplicationFiled: November 14, 2016Publication date: May 17, 2018Inventor: Deepak Gaikwad
-
Publication number: 20180121472Abstract: Some aspects disclosed herein are directed to, for example, a system and method of detecting database application incompatibilities. Systems and methods described herein may format traces, collect data, store the data, and/or provide one or more user interface which allows an end user to quickly and easily identify affected statements, such as structured query language (SQL) statements, for remediation action(s).Type: ApplicationFiled: November 1, 2016Publication date: May 3, 2018Inventors: Deepak Gaikwad, Lai Fai Wong, Muthuraj Kumaresan
-
Patent number: 9606892Abstract: Methods and apparatus for monitoring workfiles are disclosed. An authorized user or system programmer may input workfile threshold values and other monitoring information into a configuration file. A server reads the configuration file and starts traces to monitor workfile usage in a system. The server may continuously monitor the system to determine whether workfile usage in the system reaches workfile threshold values set in the configuration file. The server may list SQL queries using workfiles and then alert the system programmer when the threshold values are reached and is capable of reclaiming disk space by dropping and recreating overgrown workfiles with their original definitions.Type: GrantFiled: January 9, 2014Date of Patent: March 28, 2017Assignee: Bank of America CorporationInventor: Deepak Gaikwad
-
Publication number: 20150195180Abstract: Methods and apparatus for monitoring workfiles are disclosed. An authorized user or system programmer may input workfile threshold values and other monitoring information into a configuration file. A server reads the configuration file and starts traces to monitor workfile usage in a system. The server may continuously monitor the system to determine whether workfile usage in the system reaches workfile threshold values set in the configuration file. The server may list SQL queries using workfiles and then alert the system programmer when the threshold values are reached and is capable of reclaiming disk space by dropping and recreating overgrown workfiles with their original definitions.Type: ApplicationFiled: January 9, 2014Publication date: July 9, 2015Applicant: Bank of America CorporationInventor: Deepak Gaikwad
-
Publication number: 20150031647Abstract: The present invention relates to a taste-masked dispersible tablet comprising a drug, a cation exchange resin, and other pharmaceutically acceptable excipients, such that the said drug and the said cation exchange resin are present in an un-complexed form in the tablet. It further relates to a process for the preparation of the same.Type: ApplicationFiled: February 21, 2013Publication date: January 29, 2015Applicant: RANBAXY LABORATORIES LIMITEDInventors: Vinod Kumar Arora, Jatin Khurana, Deepak Gaikwad
-
Patent number: 8300890Abstract: A first set of unknown pixels is determined for which being located in the foreground portion does not in-and-of-itself determine the pixel to be part of the foreground. A second set of unknown pixels is determined for which being in a current background portion does not in-and-of-itself determine the pixel to be part of the background. A determination is made for the first and second set of unknown pixels whether the pixel is part of the background or foreground based on temporal data. Extracting an image of the foreground that does not include the current background based on the determination of whether the pixel is part of the foreground, the current background, and temporal data. In an embodiment, the system can use multiple types of sensors to determine whether an entity is a likely security risk.Type: GrantFiled: June 25, 2009Date of Patent: October 30, 2012Assignee: Intellivision Technologies CorporationInventors: Deepak Gaikwad, Radhika Walimbe, Chandan Gope, Vaidhi Nathan
-
Publication number: 20080253685Abstract: Multiple images taken from different locations or angles and viewpoints are joined and stitched. After the stitching and joining a much larger video or image scenery may be produced than any one image or video form which the final scenery was produced or an image of a different perspective than any of the input images may be produced.Type: ApplicationFiled: February 25, 2008Publication date: October 16, 2008Inventors: Alexander Kuranov, Deepak Gaikwad, Vaidhi Nathan, Sergey Egorov, Tejashree Dhoble