Patents by Inventor Deepak Kushwaha
Deepak Kushwaha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11533312Abstract: The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa.Type: GrantFiled: July 10, 2019Date of Patent: December 20, 2022Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Mahesh Raghuvir Bhat, Arun Koshal, Vishal Sharma, Sagar Singha
-
Publication number: 20220318441Abstract: Disclosed herein is a method of provisioning a virtual experience. The method may include receiving a 2D floor plan data associated with a building, receiving at least one contextual data, analyzing each of the 2D floor plan data and the at least one contextual data using a machine learning model, determining at least one textual data embedded in the 2D floor plan data based on the analyzing, identifying a plurality of building objects based on the analyzing, identifying a plurality of amenity regions, identifying a plurality of utility objects, retrieving a plurality of virtual building objects, retrieving a plurality of virtual utility objects, generating an interactive 3D model data associated with the 2D floor plan data based on the analyzing, the plurality of virtual building objects and the plurality of virtual utility objects and transmitting the interactive 3D model data to a user device.Type: ApplicationFiled: June 23, 2021Publication date: October 6, 2022Applicant: SY Interiors Pvt. LtdInventors: Sunder Jagannathan, Vivek Agarwal, Hitesh Singla, Deepak KUSHWAHA
-
Patent number: 11363068Abstract: A computer-implemented method and a system provide a complete traceability of changes incurred in a security policy corresponding to a resource. A policy tracing engine (PTE) monitors and determines events of interest occurring at the resource. The PTE determines administrator-initiated intent-based changes and dynamic event-based changes incurred in the security policy and assigns a unique policy identifier (UPI) to the security policy. The UPI is a combination of unique identifiers assigned to the intent-based change and the event-based change. The PTE recomputes and stores the security policy and the UP in a policy database. The PTE receives network access information including the UPI from the corresponding resource deployed with the security policy. The PTE generates a traceability report that provides a complete traceability of each policy action performed in a networked environment to a source of each change incurred in the security policy as identified by the UPI.Type: GrantFiled: November 4, 2019Date of Patent: June 14, 2022Assignee: COLORTOKENS, INC.Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha
-
Patent number: 11303678Abstract: A method and a system for automatically managing security policies at multiple resources are provided. A policy management engine receives and deploys a security policy configured for each resource with one or more configuration parameters on a security component of each resource. The policy management engine determines modifications made to the security policy at a corresponding resource and automatically corrects the security policy at the corresponding resource. The policy management engine generates and renders a notification including the security policy, the modifications, and detailed information of the modifications and the automatic correction of the security policy to an administrator device. The detailed information includes a description, a type, a timestamp, number of instances, etc.Type: GrantFiled: August 15, 2019Date of Patent: April 12, 2022Assignee: COLORTOKENS, INC.Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Binjith Payyappatt Satheendran, Ramprasath Rajagopalan
-
Patent number: 11095614Abstract: A hostname based access configuration system (HNACS) is provided for configuring a host-based firewall to implement firewall policies referencing hostnames. The HNACS defines a hostname based firewall policy (HNFP) referencing a host server using a corresponding hostname instead of an internet protocol (IP) address. The HNACS incorporates the HNFP onto the host-based firewall but renders the HNFP non-implementable on the computing device until a domain name system (DNS) query is generated. If the DNS query includes the hostname in the HNFP, the HNACS determines a mapping between the hostname specified in the DNS query and an IP address corresponding to the hostname (obtained via a DNS response corresponding to the DNS query). Based on the mapping, the HNFP is transformed via an implicit replacement of the hostname in the HNFP with the IP address of the host server, thereby rendering the HNFP executable on the host-based firewall.Type: GrantFiled: May 14, 2019Date of Patent: August 17, 2021Assignee: COLORTOKENS, INC.Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Natarajan Venkataraman, Puneet Tutliani
-
Publication number: 20210136117Abstract: A computer-implemented method and a system provide a complete traceability of changes incurred in a security policy corresponding to a resource. A policy tracing engine (PTE) monitors and determines events of interest occurring at the resource. The PTE determines administrator-initiated intent-based changes and dynamic event-based changes incurred in the security policy and assigns a unique policy identifier (UPI) to the security policy. The UPI is a combination of unique identifiers assigned to the intent-based change and the event-based change. The PTE recomputes and stores the security policy and the UP in a policy database. The PTE receives network access information including the UPI from the corresponding resource deployed with the security policy. The PTE generates a traceability report that provides a complete traceability of each policy action performed in a networked environment to a source of each change incurred in the security policy as identified by the UPI.Type: ApplicationFiled: November 4, 2019Publication date: May 6, 2021Inventors: Jayaraghavendran KUPPANNAN, Deepak KUSHWAHA
-
Publication number: 20210051178Abstract: A method and a system for automatically managing security policies at multiple resources are provided. A policy management engine receives and deploys a security policy configured for each resource with one or more configuration parameters on a security component of each resource. The policy management engine determines modifications made to the security policy at a corresponding resource and automatically corrects the security policy at the corresponding resource. The policy management engine generates and renders a notification including the security policy, the modifications, and detailed information of the modifications and the automatic correction of the security policy to an administrator device. The detailed information includes a description, a type, a timestamp, number of instances, etc.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Inventors: JAYARAGHAVENDRAN KUPPANNAN, Deepak Kushwaha, Binjith Payyappatt Satheendran, Ramprasath Rajagopalan
-
Publication number: 20210014233Abstract: The present disclosure envisages enforcing micro-segmentation policies on a user computer that intermittently migrates between a secured enterprise network and an unsecured network, for instance, a public network. The present disclosure envisages switching between appropriate micro-segmentation policies, in-line with the change in the current location of the user device, the change triggered by the user device migrating from the enterprise network to an unsecured network or vice-versa.Type: ApplicationFiled: July 10, 2019Publication date: January 14, 2021Inventors: JAYARAGHAVENDRAN KUPPANNAN, DEEPAK KUSHWAHA, MAHESH RAGHUVIR BHAT, ARUN KOSHAL, VISHAL SHARMA, SAGAR SINGHA
-
Publication number: 20200366648Abstract: A hostname based access configuration system (HNACS) is provided for configuring a host-based firewall to implement firewall policies referencing hostnames. The HNACS defines a hostname based firewall policy (HNFP) referencing a host server using a corresponding hostname instead of an internet protocol (IP) address. The HNACS incorporates the HNFP onto the host-based firewall but renders the HNFP non-implementable on the computing device until a domain name system (DNS) query is generated. If the DNS query includes the hostname in the HNFP, the HNACS determines a mapping between the hostname specified in the DNS query and an IP address corresponding to the hostname (obtained via a DNS response corresponding to the DNS query). Based on the mapping, the HNFP is transformed via an implicit replacement of the hostname in the HNFP with the IP address of the host server, thereby rendering the HNFP executable on the host-based firewall.Type: ApplicationFiled: May 14, 2019Publication date: November 19, 2020Inventors: Jayaraghavendran Kuppannan, Deepak Kushwaha, Natarajan Venkataraman, Puneet Tutliani
-
Publication number: 20200274781Abstract: Disclosed herein are a method, a view generating computing device, and a non-transitory computer readable medium for generating plurality of views on a user interface in a big data environment, the views corresponding to data flows from a plurality of source devices to the plurality of destination devices and vice-versa, The method includes receiving data flows from each of the plurality of source devices and each of the plurality of destination devices, the data flows indicative of the flow of data between a source device and corresponding destination device; receiving a request from a user interface associated with a user device; generating, a source view, a destination view, and a differential view; rendering the source view, the destination view, and the differential view on the user interface, wherein the source view, the destination view, and the differential view are viewed concurrently in real time m response to the generating.Type: ApplicationFiled: February 25, 2019Publication date: August 27, 2020Inventors: Deepak Kushwaha, Puneet Tutliani
-
Patent number: 10298606Abstract: The disclosed apparatus may include a physical processing that (1) receives, at a network device, a packet that is destined for a computing device within a network, (2) performs pattern matching on the packet by (A) comparing at least a portion of the packet with a set of signatures that facilitate pattern matching in connection with network traffic and (B) determining, based at least in part on the comparison, that the portion of the packet matches at least one of the signatures, (3) parses, after performing the pattern matching, at least the portion of the packet to determine whether the packet is malicious based at least in part on the portion of the packet, and then (4) upon determining that the portion of the packet is malicious, performs at least one security action in connection with the packet. Various other apparatuses, systems, and methods are also disclosed.Type: GrantFiled: January 6, 2017Date of Patent: May 21, 2019Assignee: Juniper Networks, IncInventors: Deepak Kushwaha, Mohit Joshi, Puneet Tutliani
-
Patent number: 10091235Abstract: The disclosed computer-implemented method may include (1) detecting a request from a computing device of a member of an organization in connection with a communication session between the computing device and at least one additional computing device, (2) identifying, within the request, a URL that the computing device is attempting to access, (3) computing a unique identifier that represents the URL, (4) comparing the unique identifier against a database that includes unique identifiers that represent URLs embedded in emails received by members of the organization, (5) determining, based at least in part on the comparison, that the URL was included in an email received by the member of the organization, and then in response, (6) elevating a threat level of the communication session between the computing device and the additional computing device. Various other methods, systems, and apparatuses are also disclosed.Type: GrantFiled: June 7, 2016Date of Patent: October 2, 2018Assignee: Juniper Networks, Inc.Inventors: Deepak Kushwaha, Mohit Joshi, Puneet Tutliani
-
Publication number: 20180198809Abstract: The disclosed apparatus may include a physical processing that (1) receives, at a network device, a packet that is destined for a computing device within a network, (2) performs pattern matching on the packet by (A) comparing at least a portion of the packet with a set of signatures that facilitate pattern matching in connection with network traffic and (B) determining, based at least in part on the comparison, that the portion of the packet matches at least one of the signatures, (3) parses, after performing the pattern matching, at least the portion of the packet to determine whether the packet is malicious based at least in part on the portion of the packet, and then (4) upon determining that the portion of the packet is malicious, performs at least one security action in connection with the packet. Various other apparatuses, systems, and methods are also disclosed.Type: ApplicationFiled: January 6, 2017Publication date: July 12, 2018Inventors: Deepak Kushwaha, Mohit Joshi, Puneet Tutliani
-
Patent number: 9912641Abstract: The disclosed computer-implemented method may include (1) detecting an online communication session established between a plurality of computing devices, (2) identifying at least one application involved in the online communication session established between the plurality of computing devices, (3) determining a security mode for a security proxy that inspects the online communication session based at least in part on the application involved in the online communication session, and then (4) configuring the security proxy to inspect the online communication session in accordance with the determined security mode. Various other systems, methods, and apparatuses are also disclosed.Type: GrantFiled: July 3, 2014Date of Patent: March 6, 2018Assignee: Juniper Networks, Inc.Inventor: Deepak Kushwaha
-
Publication number: 20160006698Abstract: The disclosed computer-implemented method may include (1) detecting an online communication session established between a plurality of computing devices, (2) identifying at least one application involved in the online communication session established between the plurality of computing devices, (3) determining a security mode for a security proxy that inspects the online communication session based at least in part on the application involved in the online communication session, and then (4) configuring the security proxy to inspect the online communication session in accordance with the determined security mode. Various other systems, methods, and apparatuses are also disclosed.Type: ApplicationFiled: July 3, 2014Publication date: January 7, 2016Inventor: Deepak Kushwaha