Patents by Inventor Imran S. Koradia

Imran S. Koradia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190342338
    Abstract: Systems and methods are provided for facilitating automated compliance with security, audit and network configuration policies. In some instances, new runtime configuration files are iteratively generated and compared to a baseline configuration file to determine whether a threshold variance exists between the baseline configuration file and each separate and new runtime configuration file. If the threshold variance exists, remedial actions are triggered. In some instances, runtime configuration files are scanned for blacklist configuration settings. When blacklist configuration settings are found, remedial actions can also be triggered. In some instances, configuration files are scrubbed by omitting detected blacklist items from the configuration files. In some instances, changes are only made to configuration files when they match changes on an approved change list and are absent from an open incident list.
    Type: Application
    Filed: May 1, 2018
    Publication date: November 7, 2019
    Inventors: Parvez Anandam, Imran S. Koradia, Zheng Tang, Andrew Mendelsohn, Ankush Grover, Liyuan Zhou, Brandon Michael Klassen, David A. Maltz, Albert Gordon Greenberg
  • Publication number: 20190342296
    Abstract: Systems and methods are provided for facilitating automated compliance with security, audit and network configuration policies. In some instances, new runtime configuration files are iteratively generated and compared to a baseline configuration file to determine whether a threshold variance exists between the baseline configuration file and each separate and new runtime configuration file. If the threshold variance exists, remedial actions are triggered. In some instances, runtime configuration files are scanned for blacklist configuration settings. When blacklist configuration settings are found, remedial actions can also be triggered. In some instances, configuration files are scrubbed by omitting detected blacklist items from the configuration files. In some instances, changes are only made to configuration files when they match changes on an approved change list and are absent from an open incident list.
    Type: Application
    Filed: May 1, 2018
    Publication date: November 7, 2019
    Inventors: Parvez Anandam, Imran S. Koradia, Zheng Tang, Andrew Mendelsohn, Ankush Grover, Liyuan Zhou, Brandon Michael Klassen, David A. Maltz, Albert Gordon Greenberg