Patents by Inventor Keshava Berg

Keshava Berg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180091545
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: December 4, 2017
    Publication date: March 29, 2018
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 9838414
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: December 5, 2017
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20170070530
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: November 21, 2016
    Publication date: March 9, 2017
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 9503481
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: November 22, 2016
    Assignee: LEVEL 3 COMMUNICATIONS, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20160072846
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: November 16, 2015
    Publication date: March 10, 2016
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 9191409
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: November 17, 2015
    Assignee: LEVEL 3 COMMUNICATIONS, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20150150072
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 8990911
    Abstract: Systems, methods and apparatus for providing single sign on across a plurality of resources is disclosed. An exemplary method includes receiving a request from a user to access a particular one of the plurality of resources; establishing an SSO session for the user if an SSO session has not been established; determining if the user has been authenticated to the particular resource, and if not, retrieving credentials for the user that are specific to the resource; presenting the credentials to the resource so as to create a session with the resource; and presenting a user interface for a customer to configure which of the plurality of resources can be accessed by users.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: March 24, 2015
    Assignee: EMC Corporation
    Inventors: Eric Olden, Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III
  • Publication number: 20140096251
    Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.
    Type: Application
    Filed: September 27, 2013
    Publication date: April 3, 2014
    Applicant: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
  • Patent number: 8418238
    Abstract: A system, method and apparatus for managing access across a plurality of applications is disclosed. The system may include a user store connector configured to connect to one or more user stores to retrieve attributes; an authentication connector configured to communicate with at least one authentication subsystem to authenticate a user; a policy engine configured to retrieve attributes from the user store connector corresponding to a user and use the attributes to evaluate access policies, if any, which are defined for protection of resources, to determine whether or not the user should be granted access to the resources; an admin component that is configured to enable the access policies to be defined relative to attributes and the resources; and a policy store configured to store the access policies.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: April 9, 2013
    Assignee: Symplified, Inc.
    Inventors: Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III, Eric Olden
  • Publication number: 20090249439
    Abstract: Systems, methods and apparatus for providing single sign on across a plurality of resources is disclosed. An exemplary method includes receiving a request from a user to access a particular one of the plurality of resources; establishing an SSO session for the user if an SSO session has not been established; determining if the user has been authenticated to the particular resource, and if not, retrieving credentials for the user that are specific to the resource; presenting the credentials to the resource so as to create a session with the resource; and presenting a user interface for a customer to configure which of the plurality of resources can be accessed by users.
    Type: Application
    Filed: March 25, 2009
    Publication date: October 1, 2009
    Inventors: Eric Olden, Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III
  • Publication number: 20090249440
    Abstract: A system, method and apparatus for managing access across a plurality of applications is disclosed. The system may include a user store connector configured to connect to one or more user stores to retrieve attributes; an authentication connector configured to communicate with at least one authentication subsystem to authenticate a user; a policy engine configured to retrieve attributes from the user store connector corresponding to a user and use the attributes to evaluate access policies, if any, which are defined for protection of resources, to determine whether or not the user should be granted access to the resources; an admin component that is configured to enable the access policies to be defined relative to attributes and the resources; and a policy store configured to store the access policies.
    Type: Application
    Filed: March 25, 2009
    Publication date: October 1, 2009
    Inventors: Darren C. Platt, Coby Royer, Keshava Berg, Joseph H. Wallingford, III, Eric Olden