Patents by Inventor Keshava Berg
Keshava Berg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200344246Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.Type: ApplicationFiled: July 14, 2020Publication date: October 29, 2020Applicant: Level 3 Communications, LLCInventors: Brad Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
-
Patent number: 10721243Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.Type: GrantFiled: November 13, 2018Date of Patent: July 21, 2020Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
-
Publication number: 20190104136Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.Type: ApplicationFiled: November 13, 2018Publication date: April 4, 2019Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, Justin George Mohr
-
Patent number: 10129270Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.Type: GrantFiled: September 27, 2013Date of Patent: November 13, 2018Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
-
Patent number: 10097575Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: December 4, 2017Date of Patent: October 9, 2018Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20180091545Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: December 4, 2017Publication date: March 29, 2018Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Patent number: 9838414Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: November 21, 2016Date of Patent: December 5, 2017Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20170070530Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: November 21, 2016Publication date: March 9, 2017Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Patent number: 9503481Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: November 16, 2015Date of Patent: November 22, 2016Assignee: LEVEL 3 COMMUNICATIONS, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20160072846Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: November 16, 2015Publication date: March 10, 2016Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Patent number: 9191409Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: November 25, 2013Date of Patent: November 17, 2015Assignee: LEVEL 3 COMMUNICATIONS, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20150150072Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: November 25, 2013Publication date: May 28, 2015Applicant: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Patent number: 8990911Abstract: Systems, methods and apparatus for providing single sign on across a plurality of resources is disclosed. An exemplary method includes receiving a request from a user to access a particular one of the plurality of resources; establishing an SSO session for the user if an SSO session has not been established; determining if the user has been authenticated to the particular resource, and if not, retrieving credentials for the user that are specific to the resource; presenting the credentials to the resource so as to create a session with the resource; and presenting a user interface for a customer to configure which of the plurality of resources can be accessed by users.Type: GrantFiled: March 25, 2009Date of Patent: March 24, 2015Assignee: EMC CorporationInventors: Eric Olden, Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III
-
Publication number: 20140096251Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.Type: ApplicationFiled: September 27, 2013Publication date: April 3, 2014Applicant: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
-
Patent number: 8418238Abstract: A system, method and apparatus for managing access across a plurality of applications is disclosed. The system may include a user store connector configured to connect to one or more user stores to retrieve attributes; an authentication connector configured to communicate with at least one authentication subsystem to authenticate a user; a policy engine configured to retrieve attributes from the user store connector corresponding to a user and use the attributes to evaluate access policies, if any, which are defined for protection of resources, to determine whether or not the user should be granted access to the resources; an admin component that is configured to enable the access policies to be defined relative to attributes and the resources; and a policy store configured to store the access policies.Type: GrantFiled: March 25, 2009Date of Patent: April 9, 2013Assignee: Symplified, Inc.Inventors: Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III, Eric Olden
-
Publication number: 20090249440Abstract: A system, method and apparatus for managing access across a plurality of applications is disclosed. The system may include a user store connector configured to connect to one or more user stores to retrieve attributes; an authentication connector configured to communicate with at least one authentication subsystem to authenticate a user; a policy engine configured to retrieve attributes from the user store connector corresponding to a user and use the attributes to evaluate access policies, if any, which are defined for protection of resources, to determine whether or not the user should be granted access to the resources; an admin component that is configured to enable the access policies to be defined relative to attributes and the resources; and a policy store configured to store the access policies.Type: ApplicationFiled: March 25, 2009Publication date: October 1, 2009Inventors: Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III, Eric Olden
-
Publication number: 20090249439Abstract: Systems, methods and apparatus for providing single sign on across a plurality of resources is disclosed. An exemplary method includes receiving a request from a user to access a particular one of the plurality of resources; establishing an SSO session for the user if an SSO session has not been established; determining if the user has been authenticated to the particular resource, and if not, retrieving credentials for the user that are specific to the resource; presenting the credentials to the resource so as to create a session with the resource; and presenting a user interface for a customer to configure which of the plurality of resources can be accessed by users.Type: ApplicationFiled: March 25, 2009Publication date: October 1, 2009Inventors: Eric Olden, Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III