Patents by Inventor Ganesh Kirti
Ganesh Kirti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10063654Abstract: Systems and methods for contextual and cross application threat detection in cloud applications in accordance with embodiments of the invention are disclosed. In one embodiment, a method for detecting threat activity in a cloud application using past activity data from cloud applications includes receiving activity data concerning actions performed by a user account associated with a user within a monitored cloud application, receiving external contextual data about the user that does not concern actions performed using the user account within the monitored cloud application, where the external contextual data is retrieved from outside of the monitored cloud application, deriving a baseline user profile using the activity data and external contextual data and associating the baseline user profile with the user account, and determining the likelihood of anomalous activity using the baseline user profile.Type: GrantFiled: June 24, 2015Date of Patent: August 28, 2018Assignee: Oracle International CorporationInventors: Ganesh Kirti, Kamalendu Biswas, Prakash Gurumurthy, Raja S. Alomari, Sumedha Nalin Perera
-
Publication number: 20170295199Abstract: Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy.Type: ApplicationFiled: June 23, 2017Publication date: October 12, 2017Applicant: Oracle International CorporationInventors: Ganesh Kirti, Rohit Gupta, Kamalendu Biswas, Ramana Rao Satyasai Turlapati
-
Publication number: 20170251013Abstract: Techniques for discovery and management of applications in a computing environment of an organization are disclosed. A security management system discovers use of applications within a computing environment to manage access to applications for minimizing security threats and risks in a computing environment of the organization. The security management system can obtain network data about network traffic to identify unique applications. The security management system can perform analysis and correlation, including use of one or more data sources, to determine information about an application. The system can compute a measure of security for an application (“an application risk score”) and a user (“a user risk score”). The score may be analyzed to determine a threat of security posed by the application based on use of the application. The security system can perform one or more instructions to configure access permitted by an application, whether access is denied or restricted.Type: ApplicationFiled: February 23, 2017Publication date: August 31, 2017Applicant: Oracle International CorporationInventors: Ganesh Kirti, Kamalendu Biswas, Sumedha Nalin Perera, Adina Florina Simu
-
Patent number: 9692789Abstract: Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy.Type: GrantFiled: October 24, 2014Date of Patent: June 27, 2017Assignee: Oracle International CorporationInventors: Ganesh Kirti, Rohit Gupta, Kamalendu Biswas, Ramana Rao Satyasai Turlapati
-
Publication number: 20150319185Abstract: Systems and methods for contextual and cross application threat detection in cloud applications in accordance with embodiments of the invention are disclosed. In one embodiment, a method for detecting threat activity in a cloud application using past activity data from cloud applications includes receiving activity data concerning actions performed by a user account associated with a user within a monitored cloud application, receiving external contextual data about the user that does not concern actions performed using the user account within the monitored cloud application, where the external contextual data is retrieved from outside of the monitored cloud application, deriving a baseline user profile using the activity data and external contextual data and associating the baseline user profile with the user account, and determining the likelihood of anomalous activity using the baseline user profile.Type: ApplicationFiled: June 24, 2015Publication date: November 5, 2015Inventors: Ganesh Kirti, Kamalendu Biswas, Prakash Gurumurthy, Raja S. Alomari, Sumedha Sumedha Nalin Perera
-
Publication number: 20150172321Abstract: Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy.Type: ApplicationFiled: October 24, 2014Publication date: June 18, 2015Inventors: Ganesh Kirti, Rohit Gupta, Kamalendu Biswas, Ramana Rao Satyasai Turlapati
-
Patent number: 8635660Abstract: Systems, methods, and machine-readable media are disclosed for providing dynamic and/or conditional constraints on queries based on an external security policy. In one embodiment, a method is provided which comprises receiving from a user a request to access a resource. A condition clause can be read from a grant statement defined in the security policy. The grant statement can define permission for the user to access the requested resource. In some cases, the grant statement can comprise a Java Authentication and Authorization Service (JAAS) grant statement. A query associated with the requested access can be modified based on the permission granted to the user. The modified query can then be made to perform the requested access.Type: GrantFiled: December 6, 2005Date of Patent: January 21, 2014Assignee: Oracle International CorporationInventors: Raymond K. Ng, Ganesh Kirti, Thomas Keefe, Naresh Kumar
-
Patent number: 8220033Abstract: One embodiment of the present invention provides a system that facilitates accessing a credential. During operation, the system receives a request at a credentials-storage framework (CSF) to retrieve the credential. If a target credential store containing the credential is not already connected to the CSF, the system looks up a bootstrap credential for the target credential store in a bootstrap credential store, which contains bootstrap credentials for other credential stores. Next, the system uses this bootstrap credential to connect the CSF to the target credential store. Finally, the system retrieves the credential from the target credential store, and returns the credential to the requestor.Type: GrantFiled: May 3, 2006Date of Patent: July 10, 2012Assignee: Oracle International CorporationInventors: Raymond K. Ng, Ganesh Kirti, Thomas Keefe, Naresh Kumar
-
Patent number: 7945960Abstract: Systems, methods, and machine-readable media are disclosed for providing conditional grants of permission in an externally configured security policy. In one embodiment, a method is provided which comprises reading a condition clause from a grant statement defined in the security policy. The grant statement can cause the granting of permission for a user to access a requested resource. One or more constraints on the grant statement can be determined based on the condition clause. Permission can be granted to access the requested resource based on the one or more constraints.Type: GrantFiled: December 6, 2005Date of Patent: May 17, 2011Assignee: Oracle International CorporationInventors: Raymond K. Ng, Ganesh Kirti, Thomas Keefe, Naresh Kumar
-
Publication number: 20070261107Abstract: One embodiment of the present invention provides a system that facilitates accessing a credential. During operation, the system receives a request at a credentials-storage framework (CSF) to retrieve the credential. If a target credential store containing the credential is not already connected to the CSF, the system looks up a bootstrap credential for the target credential store in a bootstrap credential store, which contains bootstrap credentials for other credential stores. Next, the system uses this bootstrap credential to connect the CSF to the target credential store. Finally, the system retrieves the credential from the target credential store, and returns the credential to the requestor.Type: ApplicationFiled: May 3, 2006Publication date: November 8, 2007Inventors: Raymond Ng, Ganesh Kirti, Thomas Keefe, Naresh Kumar
-
Publication number: 20070136819Abstract: Systems, methods, and machine-readable media are disclosed for providing conditional grants of permission in an externally configured security policy. In one embodiment, a method is provided which comprises reading a condition clause from a grant statement defined in the security policy. The grant statement can cause the granting of permission for a user to access a requested resource. One or more constraints on the grant statement can be determined based on the condition clause. Permission can be granted to access the requested resource based on the one or more constraints.Type: ApplicationFiled: December 6, 2005Publication date: June 14, 2007Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Raymond Ng, Ganesh Kirti, Thomas Keefe, Naresh Kumar
-
Publication number: 20070130616Abstract: Systems, methods, and machine-readable media are disclosed for providing dynamic and/or conditional constraints on queries based on an external security policy. In one embodiment, a method is provided which comprises receiving from a user a request to access a resource. A condition clause can be read from a grant statement defined in the security policy. The grant statement can define permission for the user to access the requested resource. In some cases, the grant statement can comprise a Java Authentication and Authorization Service (JAAS) grant statement. A query associated with the requested access can be modified based on the permission granted to the user. The modified query can then be made to perform the requested access.Type: ApplicationFiled: December 6, 2005Publication date: June 7, 2007Applicant: Oracle International CorporationInventors: Raymond Ng, Ganesh Kirti, Thomas Keefe, Naresh Kumar