Patents by Inventor Deepak Kushwaha

Deepak Kushwaha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11533312
    Abstract: The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: December 20, 2022
    Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Mahesh Raghuvir Bhat, Arun Koshal, Vishal Sharma, Sagar Singha
  • Publication number: 20220318441
    Abstract: Disclosed herein is a method of provisioning a virtual experience. The method may include receiving a 2D floor plan data associated with a building, receiving at least one contextual data, analyzing each of the 2D floor plan data and the at least one contextual data using a machine learning model, determining at least one textual data embedded in the 2D floor plan data based on the analyzing, identifying a plurality of building objects based on the analyzing, identifying a plurality of amenity regions, identifying a plurality of utility objects, retrieving a plurality of virtual building objects, retrieving a plurality of virtual utility objects, generating an interactive 3D model data associated with the 2D floor plan data based on the analyzing, the plurality of virtual building objects and the plurality of virtual utility objects and transmitting the interactive 3D model data to a user device.
    Type: Application
    Filed: June 23, 2021
    Publication date: October 6, 2022
    Applicant: SY Interiors Pvt. Ltd
    Inventors: Sunder Jagannathan, Vivek Agarwal, Hitesh Singla, Deepak KUSHWAHA
  • Patent number: 11363068
    Abstract: A computer-implemented method and a system provide a complete traceability of changes incurred in a security policy corresponding to a resource. A policy tracing engine (PTE) monitors and determines events of interest occurring at the resource. The PTE determines administrator-initiated intent-based changes and dynamic event-based changes incurred in the security policy and assigns a unique policy identifier (UPI) to the security policy. The UPI is a combination of unique identifiers assigned to the intent-based change and the event-based change. The PTE recomputes and stores the security policy and the UP in a policy database. The PTE receives network access information including the UPI from the corresponding resource deployed with the security policy. The PTE generates a traceability report that provides a complete traceability of each policy action performed in a networked environment to a source of each change incurred in the security policy as identified by the UPI.
    Type: Grant
    Filed: November 4, 2019
    Date of Patent: June 14, 2022
    Assignee: COLORTOKENS, INC.
    Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha
  • Patent number: 11303678
    Abstract: A method and a system for automatically managing security policies at multiple resources are provided. A policy management engine receives and deploys a security policy configured for each resource with one or more configuration parameters on a security component of each resource. The policy management engine determines modifications made to the security policy at a corresponding resource and automatically corrects the security policy at the corresponding resource. The policy management engine generates and renders a notification including the security policy, the modifications, and detailed information of the modifications and the automatic correction of the security policy to an administrator device. The detailed information includes a description, a type, a timestamp, number of instances, etc.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: April 12, 2022
    Assignee: COLORTOKENS, INC.
    Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Binjith Payyappatt Satheendran, Ramprasath Rajagopalan
  • Patent number: 11095614
    Abstract: A hostname based access configuration system (HNACS) is provided for configuring a host-based firewall to implement firewall policies referencing hostnames. The HNACS defines a hostname based firewall policy (HNFP) referencing a host server using a corresponding hostname instead of an internet protocol (IP) address. The HNACS incorporates the HNFP onto the host-based firewall but renders the HNFP non-implementable on the computing device until a domain name system (DNS) query is generated. If the DNS query includes the hostname in the HNFP, the HNACS determines a mapping between the hostname specified in the DNS query and an IP address corresponding to the hostname (obtained via a DNS response corresponding to the DNS query). Based on the mapping, the HNFP is transformed via an implicit replacement of the hostname in the HNFP with the IP address of the host server, thereby rendering the HNFP executable on the host-based firewall.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: August 17, 2021
    Assignee: COLORTOKENS, INC.
    Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Natarajan Venkataraman, Puneet Tutliani
  • Publication number: 20210136117
    Abstract: A computer-implemented method and a system provide a complete traceability of changes incurred in a security policy corresponding to a resource. A policy tracing engine (PTE) monitors and determines events of interest occurring at the resource. The PTE determines administrator-initiated intent-based changes and dynamic event-based changes incurred in the security policy and assigns a unique policy identifier (UPI) to the security policy. The UPI is a combination of unique identifiers assigned to the intent-based change and the event-based change. The PTE recomputes and stores the security policy and the UP in a policy database. The PTE receives network access information including the UPI from the corresponding resource deployed with the security policy. The PTE generates a traceability report that provides a complete traceability of each policy action performed in a networked environment to a source of each change incurred in the security policy as identified by the UPI.
    Type: Application
    Filed: November 4, 2019
    Publication date: May 6, 2021
    Inventors: Jayaraghavendran KUPPANNAN, Deepak KUSHWAHA
  • Publication number: 20210051178
    Abstract: A method and a system for automatically managing security policies at multiple resources are provided. A policy management engine receives and deploys a security policy configured for each resource with one or more configuration parameters on a security component of each resource. The policy management engine determines modifications made to the security policy at a corresponding resource and automatically corrects the security policy at the corresponding resource. The policy management engine generates and renders a notification including the security policy, the modifications, and detailed information of the modifications and the automatic correction of the security policy to an administrator device. The detailed information includes a description, a type, a timestamp, number of instances, etc.
    Type: Application
    Filed: August 15, 2019
    Publication date: February 18, 2021
    Inventors: JAYARAGHAVENDRAN KUPPANNAN, Deepak Kushwaha, Binjith Payyappatt Satheendran, Ramprasath Rajagopalan
  • Publication number: 20210014233
    Abstract: The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa.
    Type: Application
    Filed: July 10, 2019
    Publication date: January 14, 2021
    Inventors: JAYARAGHAVENDRAN KUPPANNAN, DEEPAK KUSHWAHA, MAHESH RAGHUVIR BHAT, ARUN KOSHAL, VISHAL SHARMA, SAGAR SINGHA
  • Publication number: 20200366648
    Abstract: A hostname based access configuration system (HNACS) is provided for configuring a host-based firewall to implement firewall policies referencing hostnames. The HNACS defines a hostname based firewall policy (HNFP) referencing a host server using a corresponding hostname instead of an internet protocol (IP) address. The HNACS incorporates the HNFP onto the host-based firewall but renders the HNFP non-implementable on the computing device until a domain name system (DNS) query is generated. If the DNS query includes the hostname in the HNFP, the HNACS determines a mapping between the hostname specified in the DNS query and an IP address corresponding to the hostname (obtained via a DNS response corresponding to the DNS query). Based on the mapping, the HNFP is transformed via an implicit replacement of the hostname in the HNFP with the IP address of the host server, thereby rendering the HNFP executable on the host-based firewall.
    Type: Application
    Filed: May 14, 2019
    Publication date: November 19, 2020
    Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Natarajan Venkataraman, Puneet Tutliani
  • Publication number: 20200274781
    Abstract: Disclosed herein are a method, a view generating computing device, and a non-transitory computer readable medium for generating plurality of views on a user interface in a big data environment, the views corresponding to data flows from a plurality of source devices to the plurality of destination devices and vice-versa, The method includes receiving data flows from each of the plurality of source devices and each of the plurality of destination devices, the data flows indicative of the flow of data between a source device and corresponding destination device; receiving a request from a user interface associated with a user device; generating, a source view, a destination view, and a differential view; rendering the source view, the destination view, and the differential view on the user interface, wherein the source view, the destination view, and the differential view are viewed concurrently in real time m response to the generating.
    Type: Application
    Filed: February 25, 2019
    Publication date: August 27, 2020
    Inventors: Deepak Kushwaha, Puneet Tutliani
  • Patent number: 10298606
    Abstract: The disclosed apparatus may include a physical processing that (1) receives, at a network device, a packet that is destined for a computing device within a network, (2) performs pattern matching on the packet by (A) comparing at least a portion of the packet with a set of signatures that facilitate pattern matching in connection with network traffic and (B) determining, based at least in part on the comparison, that the portion of the packet matches at least one of the signatures, (3) parses, after performing the pattern matching, at least the portion of the packet to determine whether the packet is malicious based at least in part on the portion of the packet, and then (4) upon determining that the portion of the packet is malicious, performs at least one security action in connection with the packet. Various other apparatuses, systems, and methods are also disclosed.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: May 21, 2019
    Assignee: Juniper Networks, Inc
    Inventors: Deepak Kushwaha, Mohit Joshi, Puneet Tutliani
  • Patent number: 10091235
    Abstract: The disclosed computer-implemented method may include (1) detecting a request from a computing device of a member of an organization in connection with a communication session between the computing device and at least one additional computing device, (2) identifying, within the request, a URL that the computing device is attempting to access, (3) computing a unique identifier that represents the URL, (4) comparing the unique identifier against a database that includes unique identifiers that represent URLs embedded in emails received by members of the organization, (5) determining, based at least in part on the comparison, that the URL was included in an email received by the member of the organization, and then in response, (6) elevating a threat level of the communication session between the computing device and the additional computing device. Various other methods, systems, and apparatuses are also disclosed.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: October 2, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Deepak Kushwaha, Mohit Joshi, Puneet Tutliani
  • Publication number: 20180198809
    Abstract: The disclosed apparatus may include a physical processing that (1) receives, at a network device, a packet that is destined for a computing device within a network, (2) performs pattern matching on the packet by (A) comparing at least a portion of the packet with a set of signatures that facilitate pattern matching in connection with network traffic and (B) determining, based at least in part on the comparison, that the portion of the packet matches at least one of the signatures, (3) parses, after performing the pattern matching, at least the portion of the packet to determine whether the packet is malicious based at least in part on the portion of the packet, and then (4) upon determining that the portion of the packet is malicious, performs at least one security action in connection with the packet. Various other apparatuses, systems, and methods are also disclosed.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 12, 2018
    Inventors: Deepak Kushwaha, Mohit Joshi, Puneet Tutliani
  • Patent number: 9912641
    Abstract: The disclosed computer-implemented method may include (1) detecting an online communication session established between a plurality of computing devices, (2) identifying at least one application involved in the online communication session established between the plurality of computing devices, (3) determining a security mode for a security proxy that inspects the online communication session based at least in part on the application involved in the online communication session, and then (4) configuring the security proxy to inspect the online communication session in accordance with the determined security mode. Various other systems, methods, and apparatuses are also disclosed.
    Type: Grant
    Filed: July 3, 2014
    Date of Patent: March 6, 2018
    Assignee: Juniper Networks, Inc.
    Inventor: Deepak Kushwaha
  • Publication number: 20160006698
    Abstract: The disclosed computer-implemented method may include (1) detecting an online communication session established between a plurality of computing devices, (2) identifying at least one application involved in the online communication session established between the plurality of computing devices, (3) determining a security mode for a security proxy that inspects the online communication session based at least in part on the application involved in the online communication session, and then (4) configuring the security proxy to inspect the online communication session in accordance with the determined security mode. Various other systems, methods, and apparatuses are also disclosed.
    Type: Application
    Filed: July 3, 2014
    Publication date: January 7, 2016
    Inventor: Deepak Kushwaha