Patents by Inventor Manuel Nedbal

Manuel Nedbal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10630710
    Abstract: A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to systems and methods of stateless processing in a fault-tolerant microservice environment. In one example, a method is disclosed, which includes transmitting, by a first microservice, packet data and a context associated therewith; receiving the packet data and the context by a second microservice, the second microservice to: use the context to determine what security processing to perform, perform the security processing over the packet data, and transmit resulting data and the context to a third microservice; and receiving the resulting data and the context by the third microservice, the third microservice to: use the context to determine what security processing to perform, and perform the security processing over the resulting data.
    Type: Grant
    Filed: February 25, 2019
    Date of Patent: April 21, 2020
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 10608991
    Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: March 31, 2020
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah
  • Publication number: 20200092307
    Abstract: Systems, methods, and apparatuses enable agent-less network traffic interception using an overlay network. The system creates an inspection namespace on a server computer and clones namespace properties of a default namespace on the server computer to the inspection namespace. The system creates an overlay network in the inspection namespace connecting the server computer to a security service. The system creates a namespace bridge between the default namespace and the inspection namespace to pass server traffic between the namespaces. The system then transmits server traffic to the security service using the overlay network and an encapsulation protocol.
    Type: Application
    Filed: September 17, 2018
    Publication date: March 19, 2020
    Inventors: Manuel Nedbal, Ratinder Paul Singh Ahuja, John Richard Guzik
  • Patent number: 10579407
    Abstract: Systems and methods are described herein generally relating to network security, and in particular, embodiments described relate to systems and methods for deploying microservices in a networked microservices system. For example, a method is disclosed, which calls for receiving a request to instantiate a microservice, selecting a suitable virtual machine (VM), wherein the selecting comprises calculating the suitability of the virtual machine based on a property load and a property weight, deploying the microservice on the selected virtual machine, configuring the microservice to communicate with an interface microservice, and configuring the microservice to perform security processing on packets processed within a security service.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: March 3, 2020
    Assignee: SHIELDX NETWORKS, INC.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Rajiv Sreedhar
  • Patent number: 10581884
    Abstract: Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment discloses a method of receiving, by a first security microservice, a first channel data encapsulation packet encapsulating a first encapsulation context and a first encapsulated data, performing a security service on the first encapsulated data using the first encapsulation context, transmitting by the first security microservice a second channel data encapsulation packet to a second security microservice, wherein the second channel encapsulation packet comprises a request for security services, receiving by the first security microservice a response from the second security microservice comprising a second security microservice context, a second security microservice timestamp, and a second security microservice load.
    Type: Grant
    Filed: October 18, 2018
    Date of Patent: March 3, 2020
    Assignee: SHIELDX NETWORKS, INC.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20200028868
    Abstract: Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include various security monitoring components, including a NFV security services controller, a VNF manager, and a security monitoring VNF. The security monitoring VNF is configured to receive provisioning data from the NFV security services controller and perform a mutually authenticated key exchange procedure using at least a portion of the provisioning data to establish a secure communication path between the security monitoring VNF and a VNF manager. The security monitoring VNF is further configured to receive personalization data from the VNF manager via the secure communication path and perform a personalization operation to configure one or more functions of the security monitoring VNF based on the personalization data. Other embodiments are described and claimed.
    Type: Application
    Filed: July 30, 2019
    Publication date: January 23, 2020
    Inventors: Kapil Sood, Manuel Nedbal
  • Publication number: 20200028880
    Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
    Type: Application
    Filed: August 16, 2019
    Publication date: January 23, 2020
    Inventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
  • Publication number: 20190394214
    Abstract: Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to real-time configurable load determination. For example, a method is disclosed, which calls for receiving a request to perform a security service, performing the security service on data included with the request; calculating a service load associated with and during the performing the security service, and transmitting a response to the request, wherein the response includes the calculated service load.
    Type: Application
    Filed: May 31, 2019
    Publication date: December 26, 2019
    Applicant: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 10498601
    Abstract: System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects a first microservice of a first hierarchy, configures the microservices of a second lower-level hierarchy to remove the first microservice from load balancing decisions to the first hierarchy, moves the first microservice to another server, configures data plane connectivity to the first microservice to reflect a change in server, and configures the microservices of the second hierarchy to include the first microservice in load balancing decisions to the first hierarchy.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: December 3, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 10484418
    Abstract: Systems, methods, and apparatuses enable updating security policies in response to detecting attack activity or security threats. In an embodiment, security microservices detect attack activity sent between resources within an internal network. In response, the security microservices correlate the attack activity to externally accessible resources that were the initial entry point for the attack activity to the internal network. Based on this correlation, the security microservices update security policies bi-directionally to prevent the spread of future attack activity in the internal network between resources at a same level in the internal network and between resources at different levels in the internal network.
    Type: Grant
    Filed: May 26, 2017
    Date of Patent: November 19, 2019
    Assignee: SHIELDX NETWORKS, INC.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20190349335
    Abstract: Example firewalls disclosed herein populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that monitors communication traffic in at least a portion of a network. Disclosed example firewalls also populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the conditions associated with the firewall rule, the second information based on second data obtained from an external data source. Disclosed example firewalls further determine, based on the first dynamic object and the second dynamic object, whether the firewall rule is to apply to first network traffic associated with a first device in communication with the network.
    Type: Application
    Filed: July 29, 2019
    Publication date: November 14, 2019
    Inventors: Bikram Kumar Gupta, Ananth Raman, Manuel Nedbal, Elanthiraiyan A. Anbalagan
  • Patent number: 10447716
    Abstract: Systems, methods, and apparatuses enable a network security system to more efficiently process and respond to events generated by hypervisors and other associated components of a networked computer system. In this context, a hypervisor event refers broadly to any action that occurs related to one or more components of a hypervisor (including the hypervisor itself, virtual servers hosted by the hypervisor, etc.) and/or to data identifying the occurrence of the action(s) (e.g., a log entry, a notification message, etc.). A security service obtains and analyzes event data from any number of different types of hypervisors, where each different type of hypervisor may represent events differently and/or make event data accessible in different ways, among other differences.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: October 15, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Pankaj Sitpure
  • Publication number: 20190312900
    Abstract: A system, method, and non-transitory computer-readable relating to network security are disclosed. In particular, embodiments described generally relate to systems and methods of stateless processing in a fault-tolerant microservice environment. In one example, a method is disclosed, which includes transmitting, by a first microservice, packet data and a context associated therewith; receiving the packet data and the context by a second microservice, the second microservice to: use the context to determine what security processing to perform, perform the security processing over the packet data, and transmit resulting data and the context to a third microservice; and receiving the resulting data and the context by the third microservice, the third microservice to: use the context to determine what security processing to perform, and perform the security processing over the resulting data.
    Type: Application
    Filed: February 25, 2019
    Publication date: October 10, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20190289035
    Abstract: Systems, methods, and apparatuses enable a microservice to identify server-to-server communication paths between servers in a networked environment. The system identifies a server connected to a security microservice managed by a management microservice. The system deploys a security policy on the identified server, and identifies the server-to-server communication paths between the identified server and one or more of a plurality of servers. The system identifies the active communication paths from the identified server to one or more of a plurality of servers, or a subset of communication paths determined based on search criteria. When the system identifies servers of the one or more of the plurality of servers without an existing security policy, the system processes the identified server. In one embodiment, processing the identified servers includes applying a security policy to the identified servers.
    Type: Application
    Filed: March 14, 2018
    Publication date: September 19, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel
  • Patent number: 10417033
    Abstract: Systems, methods, and apparatuses enable optimizing a size of computer threat signature libraries used by computer security applications to detect potential occurrences of computer and network security threats. In an embodiment, a threat signature is a pattern used by a computer security application to detect instances of potential security threats. A threat signature library is a collection of individual threat signatures, the library used in conjunction with a threat library to enable detecting a range of threats to computing devices and networks (e.g., various known viruses, malware, spam, types of network-based attacks, etc.). Based on profile information collected for a computing device, a security orchestrator optimizes the size of security threat signature libraries to be used to provide security services to the device.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: September 17, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Publication number: 20190273718
    Abstract: Systems, methods, and apparatuses enable a microservice to intercept and filter network traffic generated by virtual machines (VMs) and routed by a virtual switch (vSwitch). The system assigns a unique port group and identifier (e.g., a VLAN) to each VM, and maintains a mapping between the unique identifier and a VLAN used to communicate network traffic from the vSwitch to a physical switch. When network traffic is sent from a VM, the network traffic is intercepted by a trunk and sent to a microservice. The microservice performs a mapping procedure to identify the VLAN for transmitting the network traffic to the physical switch. The microservice determines whether the network traffic requires further inspection or analysis, or whether the network traffic can be transmitted to the physical switch using the VLAN identified during the mapping procedure.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 5, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Meni Hillel
  • Patent number: 10404838
    Abstract: Systems and methods are described herein generally relating to network security, and in particular, embodiments described generally relate to systems and methods for selecting microservices to process protocol data streams. For example, a method is disclosed, which calls for receiving a protocol packet, the protocol packet comprising a sequence number, generating a difference by subtracting a protocol message base from the sequence number, generating a first quotient by dividing the difference by a protocol common message length, generating a second value using the first quotient, determining a Transmission Control Protocol (TCP) reassembly resource using the generated second value, and transmitting the protocol packet to the determined TCP reassembly resource.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: September 3, 2019
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Elanthiraiyan Ammoor Anbalagan, Lee Chik Cheung, Sumanth Gangashanaiah, John Richard Guzik
  • Publication number: 20190268353
    Abstract: Systems, methods, and apparatuses prevent malicious network traffic from accessing or being transmitted to trusted network resources in a network environment. In one embodiment, a management microservice initializes a security microservice on a computing device and configures a network interface as a secure channel for communications with the security microservice. When the management microservice authenticates the network interface, the management microservice enables a data channel interface for the security microservice, allowing the security microservice to receive network traffic from other security microservices. Prior to enabling the data channel interface, the security microservice does not have an active interface with any other security microservices, which prevents any traffic, including malicious network traffic from reaching areas of the security microservice during the initialization process.
    Type: Application
    Filed: February 23, 2018
    Publication date: August 29, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Samir Shah
  • Patent number: 10397280
    Abstract: Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: August 27, 2019
    Assignee: Intel Corporation
    Inventors: Kapil Sood, Valerie J. Young, Muthaiah Venkatachalam, Manuel Nedbal
  • Publication number: 20190251082
    Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.
    Type: Application
    Filed: February 14, 2019
    Publication date: August 15, 2019
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah