Patents by Inventor Jasvir Singh Gill

Jasvir Singh Gill has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11244270
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: February 8, 2022
    Assignee: ALERTENTERPRISE, INC.
    Inventor: Jasvir Singh Gill
  • Publication number: 20200286016
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: May 22, 2020
    Publication date: September 10, 2020
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
  • Patent number: 10664785
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: May 26, 2020
    Assignee: AlertEnterprise, Inc.
    Inventors: Jasvir Singh Gill, Subrat Narendra Singh, Kiu Li
  • Publication number: 20190244147
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 8, 2019
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
  • Patent number: 10027711
    Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques including situational awareness and video surveillance. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for co-relating seemingly innocent events and activities to detect real threats and risks, while providing powerful alerting and automated remedial action strategies for decisive action.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: July 17, 2018
    Assignee: Alert Enterprise, Inc.
    Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narendra Singh
  • Patent number: 10021138
    Abstract: Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy enforcement. Techniques address blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational technology systems in the context of threat and fraud detection, risk analysis and remediation, active policy enforcement and continuous monitoring. Further, techniques provide out of the box workflow rules that give the ability to add, modify, or delete the applicability parameters for policy enforcement.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: July 10, 2018
    Assignee: Alert Enterprise, Inc.
    Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narenda Singh
  • Patent number: 10019677
    Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: July 10, 2018
    Assignee: Alert Enterprise, Inc.
    Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Madhu Gourineni
  • Publication number: 20150281287
    Abstract: Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy enforcement. Techniques address blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational technology systems in the context of threat and fraud detection, risk analysis and remediation, active policy enforcement and continuous monitoring. Further, techniques provide out of the box workflow rules that give the ability to add, modify, or delete the applicability parameters for policy enforcement.
    Type: Application
    Filed: May 27, 2015
    Publication date: October 1, 2015
    Inventors: Jasvir Singh GILL, Inderpal Ricky ARORA, Srinivasa KAKKERA, Subrat Narenda SINGH
  • Patent number: 8769412
    Abstract: A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: July 1, 2014
    Assignee: Alert Enterprise, Inc.
    Inventors: Jasvir Singh Gill, Srinivasa Kakkera, Inderpal Ricky Arora, Ravi Chunduru
  • Publication number: 20120224057
    Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques including situational awareness and video surveillance. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for co-relating seemingly innocent events and activities to detect real threats and risks, while providing powerful alerting and automated remedial action strategies for decisive action.
    Type: Application
    Filed: March 6, 2012
    Publication date: September 6, 2012
    Inventors: Jasvir Singh GILL, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narendra Singh
  • Publication number: 20120216243
    Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 23, 2012
    Inventors: Jasvir Singh GILL, Inderpal Ricky ARORA, Srinivasa KAKKERA, Madhu GOURINENI
  • Publication number: 20110126111
    Abstract: A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.
    Type: Application
    Filed: November 23, 2010
    Publication date: May 26, 2011
    Inventors: Jasvir Singh GILL, Srinivasa Kakkera, Inderpal Ricky Arora, Ravi Chunduru
  • Publication number: 20090320088
    Abstract: A computer-driven resource manager (122) selectively executes user-initiated tasks (113) according to established rules (112) defining users' permissions for such tasks. A workflow engine (116) manages redefinition of the rules. Responsive to receiving (602) a request to change the rules, the engine processes the request (600). This includes reviewing the request and selecting (604) a corresponding approval path. Also, the workflow engine sequentially proceeds (610, 612, 614, 616, 620) through a sequence of stages defined by the selected path, where in each stage the workflow engine electronically solicits approvals from one or more approvers indicated by the selected approval path. The engine continues through the stages until receiving at least one denial, or all required approvals (616). Responsive to receiving all required approvals, an electronic message is transmitted (618) directing amendment of the rules per the user request.
    Type: Application
    Filed: March 30, 2006
    Publication date: December 24, 2009
    Inventors: Jasvir Singh Gill, Ravinder Gill, Prasada Rao Pysla, Sandeep K. Malik, Srinivasa Kakkera