Patents by Inventor Gaurav Banga

Gaurav Banga has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11115429
    Abstract: Programmatic mechanisms that enable the automatic assignment of categories to network entities based on observed evidence. Agents gather observation data that identifies observations made by agents about the network and a plurality of nodes of the network. The agents provide the observation data to a classification module, which assigns a device category to the nodes of the network based on the observation data and a probabilistic node model. The probabilistic node model considers several probabilities to ascertain a recommended device category for a particular node, such as probabilities based on a manufacturer of a node, an operating system executing on a node, information about other nodes in the local vicinity of a node, and an administrator web page associated with a node. The classification module may also assign a particular network category to the network based on the observation data and a probabilistic network model.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: September 7, 2021
    Assignee: Balbix, Inc.
    Inventors: Gaurav Banga, Vansh Makh, Vinay Sridhara, Rajarshi Gupta, Aravind Raghava Iyengar, Sumanth Maram
  • Patent number: 11023088
    Abstract: Approaches for composing the display of a virtualized web browser. Upon a host module, executing in a host operating system, of a virtualized web browser being instructed to display a new web page, policy data is consulted to determine if one or more trigger conditions are satisfied. Upon determining that at least one of the one or more trigger conditions is satisfied, the virtualized web browser, transparently to a user, retrieving and rendering the new web page in a location different than where the previous web page was retrieved and rendered by the virtualized web browser. After the new web page has been retrieved and rendered at the location specified by the policy data, the host module displays the new web page. The policy data may operate to specify the behavior of individual tabs of the virtualized web browser.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: June 1, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Prakash Buddhiraja, Kiran Bondalapati, Vikram Kapoor, Gaurav Banga, Ian Pratt
  • Patent number: 10846396
    Abstract: Embodiments of the invention enable any request to download data to a computer system to be performed such that the requested data is stored in a dedicated virtual machine. A request to transfer data from an external location to the computer system is received. The request may originate from a process in a virtual machine or a host operating system. A connection with the external location using parameters identified in the request. The request is performed by transferring the data from the external location to a dedicated virtual machine which does not have access to the file system and cannot persistently store data on the computer system. One or more dedicated virtual machines may be instantiated as needed. A single dedicated virtual machine may accommodate multiple downloads concurrently.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: November 24, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Gaurav Banga, Ian Pratt, Vikram Kapoor, Kiran Bondalapati
  • Publication number: 20200218832
    Abstract: Approaches for transferring control to a bit set. Execution of a bit set upon a host operating system is monitored. A determination is made that the execution of the bit set exhibits a suspicious characteristic. In response, the execution of the bit set on the host operating system is ceased. Then, the bit set is copied into an isolated environment and control to the bit set is transferred within the isolated environment. Thereafter, execution analysis upon the bit set is initiated in the isolated environment. The isolated environment may, but need not, reside on a different physical device than upon which executes the host operating system.
    Type: Application
    Filed: September 18, 2019
    Publication date: July 9, 2020
    Inventors: Ian Pratt, Rahul Kashyap, Gaurav Banga
  • Patent number: 10546118
    Abstract: Approaches for ensuring a file operation is not performed in a malicious manner. Upon being instructed to perform the file operation on a file, a profile for the file is obtained. The profile is data that is signed by a digital signature and identifies a set of resources which said file requires. The profile associated with a particular file may be obtained in a variety of different ways. The file operation is performed in a virtual machine that lacks access to resources of the device or of a network except for those resources identified in the profile.
    Type: Grant
    Filed: July 16, 2014
    Date of Patent: January 28, 2020
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Vikram Kapoor, Ian Pratt, Gaurav Banga
  • Patent number: 10430614
    Abstract: Approaches for transferring control to a bit set. Execution of a bit set upon a host operating system is monitored. A determination is made that the execution of the bit set exhibits a suspicious characteristic. In response, the execution of the bit set on the host operating system is ceased. Then, the bit set is copied into an isolated environment and control to the bit set is transferred within the isolated environment. Thereafter, execution analysis upon the bit set is initiated in the isolated environment. The isolated environment may, but need not, reside on a different physical device than upon which executes the host operating system.
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: October 1, 2019
    Assignee: Bromium, Inc.
    Inventors: Ian Pratt, Rahul C. Kashyap, Gaurav Banga
  • Patent number: 10320829
    Abstract: Approaches for analyzing risk of security breaches to a network. Agents gather, from multiple sources across the network, analysis data that identifies one or more habitable nodes and one or more opaque nodes. Habitable nodes each possess a computing environment conducive to installation of at least one of agent, while opaque nodes do not. An enterprise risk model is generated for the network using the analysis data. The enterprise risk model models a risk of security breaches to assets of the network from both authorized and unauthorized users of the network based on attributes of the habitable nodes and the opaque nodes of the network. The enterprise risk model may model both the present and the future risk to the enterprise, enabling, resources, such as time and money, to be best allocated in a scientific and methodical manner to improve the risk profile of the enterprise network.
    Type: Grant
    Filed: August 11, 2016
    Date of Patent: June 11, 2019
    Assignee: Balbix, Inc.
    Inventors: Gaurav Banga, Rajarshi Gupta, Vinay Sridhara, Vineet Kumar
  • Patent number: 10311122
    Abstract: Migrating support for a web browsing session between a virtual machine and a host operating system. A web session is supported by a first virtual machine which executes on a computer system. Upon receiving a request for the web session to enter an unprotected mode, support for the web session is migrated from the first virtual machine to a host operating system of the computer system. In unprotected mode, web sessions are supported by the host operating system rather than by a virtual machine. After migrating support for the web session to the host operating system, a visual cue indicating that the unprotected mode is active is displayed. After receiving a request to exit the unprotected mode, support for the web session is migrated from the host operating system to a second virtual machine executing on the computer system and the visual cue is removed.
    Type: Grant
    Filed: August 22, 2014
    Date of Patent: June 4, 2019
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Ian Pratt, Vikram Kapoor, Kiran Bondalapati
  • Patent number: 10313384
    Abstract: Approaches for enforcing security constraints against a network without impacting business workflows. A network is programmatically divided into a set of restrictive subnetworks without human intervention. One or more agents, executing on a plurality of nodes of the network, enforce security constraints by requiring a process, which requests access to an asset stored on a node of the network, to possess a security credential associated with a particular restrictive subnetwork to which the node belongs for access to the asset to be granted. The set of restrictive subnetworks may be determined based upon an enterprise risk model that models both the present and the future risk to the enterprise.
    Type: Grant
    Filed: August 11, 2016
    Date of Patent: June 4, 2019
    Assignee: Balbix, Inc.
    Inventors: Gaurav Banga, Rajarshi Gupta, Vinay Sridhara, Vineet Kumar
  • Patent number: 10250631
    Abstract: Approaches for modeling a risk of security breaches to a network. Agents gather, from multiple sources across the network, analysis data that identifies observed characteristics of habitable nodes and opaque nodes. Using the analysis data a multi-layer risk model for the network is generated that comprises a first layer that models an inherent risk of security breaches to assets of the network based on the observed characteristics. The model also comprises a second layer that models a present state of the inherent risk to the assets caused by global and temporal events. The model also comprises a third layer that models a change to the risk of security breaches in response to potential mitigative actions. The model may be used to understand how risk of a security breach is distributed and interdependent upon the nodes of the network so as to allow the most valuable preventive measures to be taken.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: April 2, 2019
    Assignee: Balbix, Inc.
    Inventors: Vinay Sridhara, Vansh Pal Singh Makh, Gaurav Banga, Rajarshi Gupta
  • Patent number: 10095530
    Abstract: Approaches for transferring control to a bit set. At a point of ingress, prior to transferring control to the bit set, a determination is made as to whether the bit set is recognized as being included within a set of universally known malicious bit sets. If the bit set is not so recognized, then another determination is made as to whether the bit set is recognized as being included within a set of locally known virtuous bit sets. If the bit set is recognized as being included within a set of locally known virtuous bit sets, then control is not transferred to the bit set. Upon determining that the bit set is not included within the set of locally known virtuous bit sets, then the bit set is copied into a micro-virtual machine and control is transferred to the bit set within the micro-virtual machine.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: October 9, 2018
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Ian Pratt, Rahul Kashyap
  • Patent number: 10095662
    Abstract: Approaches for synchronizing resources of a virtualized web browser. When a virtualized web browser is instructed to display a web page, a host module executing within a host operating instructs retrieves, from each of one or more virtual machines, contents for a portion of the web page. The virtualized web browser assembles the contents and displays the web page. A web browser executing in the host operating system may, but need not, retrieve any of the content displayed thereby. Instead, the content retrieved by the web browser executing in the host operating system may be retrieved by and rendered within a virtual machine. The behavior of the virtualized web browser may be configured using policy data.
    Type: Grant
    Filed: June 18, 2012
    Date of Patent: October 9, 2018
    Assignee: Bromium, Inc.
    Inventors: Kiran Bondalapati, Vikram Kapoor, Prakash Buddhiraja, Gaurav Banga, Ian Pratt
  • Patent number: 10055231
    Abstract: Approaches for handling network resources in a virtualized computing environment. A first request for network resources is received from a first virtual machine. Policy data is consulted to determine how to service the first request. The first request is processed by providing the first virtual machine with access to only a first portion of network resources. A second request for network resources is received from a second virtual machine. Policy data is consulted to determine how to service the second request. The second request is processed by providing the second virtual machine with access to only a second portion of network resources that is not coextensive with the first portion. In this way, virtual machines may have access to particular resources and/or specific bounded areas of a network.
    Type: Grant
    Filed: June 19, 2012
    Date of Patent: August 21, 2018
    Assignee: Bromium, Inc.
    Inventors: Xin Li, Gaurav Banga, Ian Pratt, Vikram Kapoor
  • Patent number: 9921860
    Abstract: Approaches for launching an application within a virtual machine. In response to receiving a request to launch an application, a device instantiates, without human intervention and based on a policy, a virtual machine in which the application is to be launched. The policy determines which resources of a device, such as a mobile device or computer system, are accessible to the virtual machine. The policy may, but need not, determine whether the virtual machine has access to a type of resource which obligates the user of the device to make a monetary payment for the user of the resource.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: March 20, 2018
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Sergei Vorobiev, Deepak Khajuria, Vikram Kapoor, Ian Pratt, Simon Crosby, Adrian Taylor
  • Patent number: 9923926
    Abstract: Approaches for managing potentially malicious files using one or more isolated environments. In response to receiving a request to perform an action on a file, a client applies a policy to determine whether the action is deemed trustworthy. The client identifies, without human intervention, an isolated environment, executing or to be executed on the client, in which the action is to be performed based on whether the action is deemed trustworthy. In this way, embodiments allow a user to make use of data deemed untrusted in certain cases without allowing the untrusted data from having unfettered access to the resources of the client. If the requested action is performed in a different isolated environment from which the action was requested, embodiments enable the performance of the action to be performed seamlessly to the user.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: March 20, 2018
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Sergei Vorobiev, Deepak Khajuria, Vikram Kapoor, Ian Pratt, Simon Crosby
  • Publication number: 20180048668
    Abstract: Approaches for modeling a risk of security breaches to a network. Agents gather, from multiple sources across the network, analysis data that identifies observed characteristics of habitable nodes and opaque nodes. Using the analysis data a multi-layer risk model for the network is generated that comprises a first layer that models an inherent risk of security breaches to assets of the network based on the observed characteristics. The model also comprises a second layer that models a present state of the inherent risk to the assets caused by global and temporal events. The model also comprises a third layer that models a change to the risk of security breaches in response to potential mitigative actions. The model may be used to understand how risk of a security breach is distributed and interdependent upon the nodes of the network so as to allow the most valuable preventive measures to be taken.
    Type: Application
    Filed: December 19, 2016
    Publication date: February 15, 2018
    Inventors: Rajarshi Gupta, Vansh Pal Singh Makh, Gaurav Banga, Vinay Sridhara
  • Publication number: 20180048534
    Abstract: Programmatic mechanisms that enable the automatic assignment of categories to network entities based on observed evidence. Agents gather observation data that identifies observations made by agents about the network and a plurality of nodes of the network. The agents provide the observation data to a classification module, which assigns a device category to the nodes of the network based on the observation data and a probabilistic node model. The probabilistic node model considers several probabilities to ascertain a recommended device category for a particular node, such as probabilities based on a manufacturer of a node, an operating system executing on a node, information about other nodes in the local vicinity of a node, and an administrator web page associated with a node. The classification module may also assign a particular network category to the network based on the observation data and a probabilistic network model.
    Type: Application
    Filed: March 29, 2017
    Publication date: February 15, 2018
    Inventors: Gaurav Banga, Vansh Makh, Vinay Sridhara, Rajarshi Gupta
  • Patent number: 9792131
    Abstract: Approaches for creating a template virtual machine. An in-memory state of a virtual machine and/or a set of applications executing within the virtual machine are adjusted and/or configured based on the intended use of the template virtual machine. Thereafter, the virtual machine is established as a template virtual machine. The template virtual machine may be used to create one or more virtual machines using a copy-on-write memory process.
    Type: Grant
    Filed: May 10, 2012
    Date of Patent: October 17, 2017
    Assignee: Bromium, Inc.
    Inventors: Krzysztof Uchronski, Martin O'Brien, Jacob Gorm Hansen, Kiran Bondalapati, Ian Pratt, Gaurav Banga, Vikram Kapoor
  • Patent number: 9767274
    Abstract: Approaches for providing a guest operating system to a virtual machine. A read-only copy of one or more disk volumes, including a boot volume, is created. A copy of a master boot record (MBR) for the one or more disk volumes is also stored. The read-only copy may be, but need not be, made using a Volume Shadow Copy Service (VSS). A virtual disk, for use by the virtual machine, is created based on the read-only copy of the one or more disk volumes and the copy of the master boot record (MBR), wherein the virtual disk comprises the guest operating system used by the virtual machine. In this way, a single installed operating system may provide both the host operating system and the guest operating system.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: September 19, 2017
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Ian Pratt, Simon Crosby, Vikram Kapoor, Kiran Bondalapati, Vadim Dmitriev
  • Patent number: 9734131
    Abstract: Approaches for synchronizing history data across a virtualized web browser. When a user instructs a virtualized web browser, executing on a host operating system, to display a web page, a host module executing on the host operating system may instruct a guest module executing within a particular virtual machine to retrieve the web page. The host module may provide to the guest module history data for the virtualized web browser. History data describes browsing history for the virtualized web browser, either in the current instance or for previous instances. The guest module performs operations in accordance with the history data. When the host module receives the screen data content from the guest module, the host module instructs the virtualized web browser to display the web page using the screen data content.
    Type: Grant
    Filed: June 18, 2012
    Date of Patent: August 15, 2017
    Assignee: Bromium, Inc.
    Inventors: Kiran Bondalapati, Vikram Kapoor, Prakash Buddhiraja, Gaurav Banga, Ian Pratt