Patents by Inventor Jasvir Singh Gill
Jasvir Singh Gill has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11244270Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: May 22, 2020Date of Patent: February 8, 2022Assignee: ALERTENTERPRISE, INC.Inventor: Jasvir Singh Gill
-
Publication number: 20200286016Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 22, 2020Publication date: September 10, 2020Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
-
Patent number: 10664785Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: February 7, 2019Date of Patent: May 26, 2020Assignee: AlertEnterprise, Inc.Inventors: Jasvir Singh Gill, Subrat Narendra Singh, Kiu Li
-
Publication number: 20190244147Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: February 7, 2019Publication date: August 8, 2019Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
-
Patent number: 10027711Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques including situational awareness and video surveillance. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for co-relating seemingly innocent events and activities to detect real threats and risks, while providing powerful alerting and automated remedial action strategies for decisive action.Type: GrantFiled: March 6, 2012Date of Patent: July 17, 2018Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narendra Singh
-
Patent number: 10021138Abstract: Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy enforcement. Techniques address blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational technology systems in the context of threat and fraud detection, risk analysis and remediation, active policy enforcement and continuous monitoring. Further, techniques provide out of the box workflow rules that give the ability to add, modify, or delete the applicability parameters for policy enforcement.Type: GrantFiled: May 27, 2015Date of Patent: July 10, 2018Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narenda Singh
-
Patent number: 10019677Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.Type: GrantFiled: February 15, 2012Date of Patent: July 10, 2018Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Madhu Gourineni
-
Publication number: 20150281287Abstract: Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy enforcement. Techniques address blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational technology systems in the context of threat and fraud detection, risk analysis and remediation, active policy enforcement and continuous monitoring. Further, techniques provide out of the box workflow rules that give the ability to add, modify, or delete the applicability parameters for policy enforcement.Type: ApplicationFiled: May 27, 2015Publication date: October 1, 2015Inventors: Jasvir Singh GILL, Inderpal Ricky ARORA, Srinivasa KAKKERA, Subrat Narenda SINGH
-
Patent number: 8769412Abstract: A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.Type: GrantFiled: November 23, 2010Date of Patent: July 1, 2014Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Srinivasa Kakkera, Inderpal Ricky Arora, Ravi Chunduru
-
Publication number: 20120224057Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques including situational awareness and video surveillance. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for co-relating seemingly innocent events and activities to detect real threats and risks, while providing powerful alerting and automated remedial action strategies for decisive action.Type: ApplicationFiled: March 6, 2012Publication date: September 6, 2012Inventors: Jasvir Singh GILL, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narendra Singh
-
Publication number: 20120216243Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.Type: ApplicationFiled: February 15, 2012Publication date: August 23, 2012Inventors: Jasvir Singh GILL, Inderpal Ricky ARORA, Srinivasa KAKKERA, Madhu GOURINENI
-
Publication number: 20110126111Abstract: A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.Type: ApplicationFiled: November 23, 2010Publication date: May 26, 2011Inventors: Jasvir Singh GILL, Srinivasa Kakkera, Inderpal Ricky Arora, Ravi Chunduru
-
Publication number: 20090320088Abstract: A computer-driven resource manager (122) selectively executes user-initiated tasks (113) according to established rules (112) defining users' permissions for such tasks. A workflow engine (116) manages redefinition of the rules. Responsive to receiving (602) a request to change the rules, the engine processes the request (600). This includes reviewing the request and selecting (604) a corresponding approval path. Also, the workflow engine sequentially proceeds (610, 612, 614, 616, 620) through a sequence of stages defined by the selected path, where in each stage the workflow engine electronically solicits approvals from one or more approvers indicated by the selected approval path. The engine continues through the stages until receiving at least one denial, or all required approvals (616). Responsive to receiving all required approvals, an electronic message is transmitted (618) directing amendment of the rules per the user request.Type: ApplicationFiled: March 30, 2006Publication date: December 24, 2009Inventors: Jasvir Singh Gill, Ravinder Gill, Prasada Rao Pysla, Sandeep K. Malik, Srinivasa Kakkera