Patents by Inventor Hemang Satish Nadkarni
Hemang Satish Nadkarni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220030017Abstract: Example apparatus disclosed herein to perform a cybersecurity investigation are to generate an information graph based on a set of information seeker tools in response to detection of a threat alert in a monitored network, and search the information graph for a reference pattern associated with a cybersecurity threat. Disclosed example apparatus are also to, in response to detection of a portion of the reference pattern in the information graph, (i) select a first one of information seeker tools associated with a first input-output relationship capable of expanding the portion of the reference pattern to complete the reference pattern, and (ii) execute the first one of information seeker tools to complete the reference pattern associated with the cybersecurity threat.Type: ApplicationFiled: October 4, 2021Publication date: January 27, 2022Inventors: Gabriel G. Infante-Lopez, Hemang Satish Nadkarni, Pablo Andres Michelis, Francisco Matias Cuenca-Acuna, Matias L. Marenchino, Maria Torino
-
Publication number: 20210344692Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.Type: ApplicationFiled: May 13, 2021Publication date: November 4, 2021Applicant: McAfee, LLCInventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
-
Patent number: 11140179Abstract: Example apparatus disclosed herein to perform a cybersecurity investigation include a graph generator to iteratively generate an information graph based on investigative data in response to detection of a threat alert in a monitored network, the investigative data accessed from information sources based on a set of information seeker tools, the information graph generated based on a graph schema specifying possible relationships between the information seeker tools. Example apparatus also include a pattern recognizer to traverse the information graph to identify a path in the information graph matching a pattern from the graph schema associated with a cybersecurity threat. Example apparatus further include a user interface to output the path identified in the information graph and the cybersecurity threat to an output device.Type: GrantFiled: December 26, 2018Date of Patent: October 5, 2021Assignee: Musarubra US LLCInventors: Gabriel G. Infante-Lopez, Hemang Satish Nadkarni, Pablo Andres Michelis, Francisco Matias Cuenca-Acuna, Matias L. Marenchino, Maria Torino
-
Patent number: 11025647Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.Type: GrantFiled: January 6, 2017Date of Patent: June 1, 2021Assignee: McAfee, LLCInventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
-
Patent number: 10447714Abstract: There is disclosed in one example a data exchange layer (DXL) broker, including: a hardware platform including a processor; and instructions encoded in a memory to instruct the processor to communicatively couple to a DXL fabric configured to operate a one to-many (1:N, N>1) publish-subscribe fabric; provide an interface to authenticate and register DXL endpoints with the DXL broker; and provide DXL messaging, including maintaining a routing table of registered DXL endpoints; receiving from a first registered DXL endpoint a one-to-one (1:1) request for an endpoint of the DXL fabric, wherein the endpoint is not a registered DXL endpoint of the broker; and publishing the 1:1 request to the DXL fabric.Type: GrantFiled: October 17, 2018Date of Patent: October 15, 2019Assignee: McAfee, LLCInventors: Hemang Satish Nadkarni, Sudeep Das
-
Publication number: 20190052657Abstract: There is disclosed in one example a data exchange layer (DXL) broker, including: a hardware platform including a processor; and instructions encoded in a memory to instruct the processor to communicatively couple to a DXL fabric configured to operate a one to-many (1:N, N>1) publish-subscribe fabric; provide an interface to authenticate and register DXL endpoints with the DXL broker; and provide DXL messaging, including maintaining a routing table of registered DXL endpoints; receiving from a first registered DXL endpoint a one-to-one (1:1) request for an endpoint of the DXL fabric, wherein the endpoint is not a registered DXL endpoint of the broker; and publishing the 1:1 request to the DXL fabric.Type: ApplicationFiled: October 17, 2018Publication date: February 14, 2019Applicant: McAfee, LLCInventors: Hemang Satish Nadkarni, Sudeep Das
-
Patent number: 9773116Abstract: A system, method and computer readable medium pertaining to evaluation of events from a computer system to assess security risks to that system. Events are evaluated according to the aspects of each event and the aspects are used to make a preliminary determination regarding violation of a security rule. In addition to a preliminary determination of a rule violation, exceptions to the rule may be identified.Type: GrantFiled: January 27, 2014Date of Patent: September 26, 2017Assignee: McAfee, Inc.Inventors: Gregory William Dalcher, Hemang Satish Nadkarni
-
Publication number: 20170264622Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.Type: ApplicationFiled: January 6, 2017Publication date: September 14, 2017Applicant: McAfee, Inc.Inventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
-
Patent number: 9571507Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.Type: GrantFiled: October 21, 2012Date of Patent: February 14, 2017Assignee: McAfee, Inc.Inventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
-
Publication number: 20140143829Abstract: A system, method and computer readable medium pertaining to evaluation of events from a computer system to assess security risks to that system. Events are evaluated according to the aspects of each event and the aspects are used to make a preliminary determination regarding violation of a security rule. In addition to a preliminary determination of a rule violation, exceptions to the rule may be identified.Type: ApplicationFiled: January 27, 2014Publication date: May 22, 2014Inventors: Gregory William Dalcher, Hemang Satish Nadkarni
-
Publication number: 20140115578Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.Type: ApplicationFiled: October 21, 2012Publication date: April 24, 2014Inventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
-
Patent number: 8646025Abstract: A system, method and computer program product are provided for automatically generating a rule exception. An event is identified that at least potentially violates a rule. Thereafter, an exception to the rule is automatically generated.Type: GrantFiled: December 21, 2005Date of Patent: February 4, 2014Assignee: McAfee, Inc.Inventors: Gregory William Dalcher, Hemang Satish Nadkarni
-
Publication number: 20130275998Abstract: A system, method and computer program product are provided for automatically generating a rule exception. An event is identified that at least potentially violates a rule. Thereafter, an exception to the rule is automatically generated.Type: ApplicationFiled: December 21, 2005Publication date: October 17, 2013Inventors: Gregory William Dalcher, Hemang Satish Nadkarni