Patents by Inventor Mayank Choudhary
Mayank Choudhary has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250028820Abstract: A method includes monitoring user activities at an endpoint device on a network, determining if a user activity at the endpoint device presents a potential threat to network security, creating an alert of the threat, and providing the alert with a redacted version of a screenshot from the endpoint device. One or more open windows are obscured or removed in the redacted version of the screenshot of the endpoint device. Providing the redacted includes receiving data describing physical characteristics of the open window(s) from an operating system, receiving a screenshot of the screen of the endpoint device, and obscuring the one or more open windows by creating one or more visual covers. Each visual cover matches a size and shape of one of the open windows based on the data that describes the physical characteristics of the open window(s). Each visual cover is placed over the corresponding open window.Type: ApplicationFiled: October 9, 2024Publication date: January 23, 2025Inventors: Yigal Meshulam, Tamir Pivnik, David Cohen, Alexander Kremer, Mayank Choudhary, Tal Tikotzki, Mike McKee, Nir Barak, Tal Yaffe
-
Patent number: 12141273Abstract: A computer-based method includes monitoring user activities at an endpoint device on a computer network, determining if one of the user activities at the endpoint device presents a potential threat to network security, creating an alert of the potential threat, and providing, with the alert, a redacted version of a screenshot from the endpoint device. One or more open windows that appeared on the screen of the endpoint device are obscured or removed in the redacted version of the screenshot of the endpoint device.Type: GrantFiled: September 22, 2020Date of Patent: November 12, 2024Assignee: Proofpoint, Inc.Inventors: Yigal Meshulam, Tamir Pivnik, David Cohen, Alexander Kremer, Mayank Choudhary, Tal Tikotzki, Mike McKee, Nir Barak, Tal Yaffe
-
Publication number: 20230252238Abstract: A method including receiving an input of unstructured data; extracting at least one size entity and at least one location entity from the unstructured data using a named entity recognition model; parsing dimensions of the at least one size entity; and outputting structured size data and structured location data.Type: ApplicationFiled: February 9, 2023Publication date: August 10, 2023Inventors: Colin PAWLOWSKI, Viral PANDEY, Mayank CHOUDHARY, Aiveliagaram J. VENKATAKRISHNAN, Murali ARAVAMUDAN, Venkataramanan SOUNDARARAJAN
-
Publication number: 20220342986Abstract: A computer-based method includes monitoring user activities at an endpoint device on a computer network, determining if one of the user activities at the endpoint device presents a potential threat to network security, creating an alert of the potential threat, and providing, with the alert, a redacted version of a screenshot from the endpoint device. One or more open windows that appeared on the screen of the endpoint device are obscured or removed in the redacted version of the screenshot of the endpoint device.Type: ApplicationFiled: September 22, 2020Publication date: October 27, 2022Inventors: Yigal Meshlum, Tamir Pivnik, David Cohen, Alexander Kremer, Mayank Choudhary, Tal Tikotzki, Mike McKee, Nir Barak, Tal Yaffee
-
Patent number: 11449603Abstract: A computer-based method is disclosed to facilitate managing data exfiltration risk in a computer network environment. The method includes collecting computer file management information associated with each respective one of a plurality of computer files in an organization's computer network environment from a computer operating system, collecting user activity information associated with each respective one of a plurality of user sessions by users having access to the organization's computer network environment with a plurality of session monitoring agents, correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information; and assessing data exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information associated with a file history chain.Type: GrantFiled: August 27, 2018Date of Patent: September 20, 2022Assignee: Proofpoint, Inc.Inventors: Oded Tietz, Mayank Choudhary, Nir Barak, Micky Oland, Tal Shemesh, Yigal Meshulam, Lior Calif
-
Patent number: 10764254Abstract: A method is disclosed comprising providing a federated search facility adapted to search for content on a plurality of disparate computer content storage facilities comprising receiving a computer content search request from a client computing device, wherein the user of the client computing device has access rights to secure computer content on at least one of a first content storage and a second content storage; executing a first computer content search on the first content storage and a second computer content search on the second content storage; receiving a first computer content search result from the first content storage and a second computer content search result from the second content storage; consolidating the first computer content search result and the second computer content search result into a consolidated computer content search result; and providing the consolidated computer content search result to the user as a single computer content search result.Type: GrantFiled: March 22, 2019Date of Patent: September 1, 2020Assignee: Intralinks, Inc.Inventors: Christopher Todd Ford, Mayank Choudhary, Kevin L. McCarthy, Anupam Miharia, John William Giudice, Kiran Kumar Tadakamalla, Cole Parker Mercer, Peter Wenzel, Paul Tearnen, Clement Cazalot, Salil J. Darji, Jonathan Gorin
-
Publication number: 20200193019Abstract: A computer-based method is disclosed to facilitate managing data exfiltration risk in a computer network environment. The method includes collecting computer file management information associated with each respective one of a plurality of computer files in an organization's computer network environment from a computer operating system, collecting user activity information associated with each respective one of a plurality of user sessions by users having access to the organization's computer network environment with a plurality of session monitoring agents, correlating at least some of the collected user activity information to one or more of the computer files associated with the collected file management information; and assessing data exfiltration risk with respect to one or more of the computer files based at least in part on some of the file management information and the correlated user activity information associated with a file history chain.Type: ApplicationFiled: August 27, 2018Publication date: June 18, 2020Inventors: Oded Tietz, Mayank Choudhary, Nir Barak, Micky Oland, Tal Shemesh, Yigal Meshulam, Lior Calif
-
Publication number: 20190222560Abstract: A method is disclosed comprising providing a federated search facility adapted to search for content on a plurality of disparate computer content storage facilities comprising receiving a computer content search request from a client computing device, wherein the user of the client computing device has access rights to secure computer content on at least one of a first content storage and a second content storage; executing a first computer content search on the first content storage and a second computer content search on the second content storage; receiving a first computer content search result from the first content storage and a second computer content search result from the second content storage; consolidating the first computer content search result and the second computer content search result into a consolidated computer content search result; and providing the consolidated computer content search result to the user as a single computer content search result.Type: ApplicationFiled: March 22, 2019Publication date: July 18, 2019Inventors: Christopher Todd Ford, Mayank Choudhary, Kevin L. McCarthy, Anupam Miharia, John William Giudice, Kiran Kumar Tadakamalla, Cole Parker Mercer, Peter Wenzel, Paul Tearnen, Clement Cazalot, Salil J. Darji, Jonathan Gorin
-
Publication number: 20180367506Abstract: A method is disclosed comprising providing a federated search facility adapted to search for content on a plurality of disparate computer content storage facilities comprising receiving a computer content search request from a client computing device, wherein the user of the client computing device has access rights to secure computer content on at least one of a first content storage and a second content storage; executing a first computer content search on the first content storage and a second computer content search on the second content storage; receiving a first computer content search result from the first content storage and a second computer content search result from the second content storage; consolidating the first computer content search result and the second computer content search result into a consolidated computer content search result; and providing the consolidated computer content search result to the user as a single computer content search result.Type: ApplicationFiled: June 27, 2018Publication date: December 20, 2018Inventors: Christopher Todd Ford, Mayank Choudhary, Kevin L. McCarthy, Anupam Miharia, John William Giudice, Kiran Kumar Tadakamalla, Cole Parker Mercer, Peter Wenzel, Paul Tearnen, Clement Cazalot, Salil J. Darji, Jonathan Gorin
-
Patent number: 10033702Abstract: In embodiments of the present invention, improved secure exchange system features include a federated search facility, hybrid encryption management (adjustable encryption key management), anonymous IRM, disassembled storage of data as chunks rather than files, asynchronous notification process/integrated file upload and messaging, an identity facility, multi-factor authentication, dynamic access authorization, and various enhancements to a customizable exchange system.Type: GrantFiled: December 19, 2015Date of Patent: July 24, 2018Assignee: Intralinks, Inc.Inventors: Christopher Todd Ford, Mayank Choudhary, Kevin L. McCarthy, Anupam Miharia, John William Giudice, Kiran Kumar Tadakamalla, Cole Parker Mercer, Peter Wenzel, Paul Teamen, Clement Cazalot, Salil J. Darji, Jonathan Gorin
-
Patent number: 9762553Abstract: In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment through a secure exchange facility managed by an intermediate organizational entity amongst users of a plurality of other organizational entities, wherein computer data content and access rights for the computer data content is shared between a first and second user, the computer data content and access rights for the computer data content are transformed into a DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities.Type: GrantFiled: January 12, 2017Date of Patent: September 12, 2017Inventors: Christopher Todd Ford, Visal Chandrakant Acharya, Richard David Anstey, Wasif Qayyum Awan, Amir M. Azmi, Selom Harry Azuma, Wade Michael Callison, Clement Cazalot, Mayank Choudhary, Peter W. Cleary, Benedict Robert Dsilva, Fuat Ertunc, Simon Genzer, John William Giudice, Douglas McLean Gordon, Jonathan Gorin, Mushegh Hakhinian, John Held, Ronald W. Hovsepian, Ganesh Kannan, John Landy, David Scott Lindsay, Dario R. Lirio, Himali Mahajan, Olivier Mangez, Kevin L. McCarthy, Kevin McNulty, Jerry Lee Meyer, Anupam Miharia, Constantin Miroslav, Andrew James Mitchell, Uli P. Mittermaier, Harshal Morparia, Alex Negrea, Yana Nikolayeva, Madhavi Parimi, Matthew A. Porzio, Vedang Shailesh Purohit, Liviu Rozin, Godsway Sappor, Glenn Schwartz, Fahim Siddiqui, Nanu Swamy, Paul Tearnen, Karla Toyloy-Mattera, Sudhakar Velamoor, Margin Vora, Michael Joseph Waluk, Charlie Weiblen, Peter Wenzel, Jeffery Chi Wong, Tony Yip, Khurram Ghafoor
-
Publication number: 20170142076Abstract: In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment through a secure exchange facility managed by an intermediate organizational entity amongst users of a plurality of other organizational entities, wherein computer data content and access rights for the computer data content is shared between a first and second user, the computer data content and access rights for the computer data content are transformed into a DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities.Type: ApplicationFiled: January 12, 2017Publication date: May 18, 2017Inventors: Christopher Todd Ford, Visal Chandrakant Acharya, Richard David Anstey, Wasif Qayyum Awan, Amir M. Azmi, Selom Harry Azuma, Wade Michael Callison, Clement Cazalot, Mayank Choudhary, Peter W. Cleary, Benedict Robert Dsilva, Fuat Ertunc, Simon Genzer, John William Giudice, Douglas McLean Gordon, Jonathan Gorin, Mushegh Hakhinian, John Held, Ronald W. Hovsepian, Ganesh Kannan, John Landy, David Scott Lindsay, Dario R. Lirio, Himali Mahajan, Olivier Mangez, Kevin L. McCarthy, Kevin McNulty, Jerry Lee Meyer, Anupam Miharia, Constantin Miroslav, Andrew James Mitchell, Uli P. Mittermaier, Harshal Morparia, Alex Negrea, Yana Nikolayeva, Madhavi Parimi, Matthew A. Porzio, Vedang Shailesh Purohit, Liviu Rozin, Godsway Sappor, Glenn Schwartz, Fahim Siddiqui, Nanu Swamy, Paul Tearnen, Karla Toyloy-Mattera, Sudhakar Velamoor, Margin Vora, Michael Joseph Waluk, Charlie Weiblen, Peter Wenzel, Jeffrey Chi Wong, Tony Yip, Khurram Ghafoor
-
Patent number: 9613190Abstract: An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment includes establishing, by a secure exchange facility and managed by an intermediate organizational entity, a procedure that allows a user from a first entity to share access to computer data content with a user from a second entity based on indicated access rights. The method includes transforming the computer data content into DRM protected content, utilizing a DRM engine provided by a separate entity. The method includes granting access to the content to the second user, providing permissioned control to entities utilizing a number of data storage nodes, and managing secure data exchange of the content and metadata, without the secure exchange facility having access to the content. The method includes operations to support content services including data transformation, filtering, analytics, and searching tools for the content.Type: GrantFiled: April 22, 2015Date of Patent: April 4, 2017Assignee: Intralinks, Inc.Inventors: Christopher Todd Ford, Visal Chandrakant Acharya, Richard David Anstey, Wasif Qayyum Awan, Amir M. Azmi, Selom Harry Azuma, Wade Michael Callison, Clement Cazalot, Mayank Choudhary, Peter W. Cleary, Benedict Robert Dsilva, Fuat Ertunc, Simon Genzer, John William Giudice, Douglas McLean Gordon, Jonathan Gorin, Mushegh Hakhinian, John Held, Ronald W. Hovsepian, Ganesh Kannan, John Landy, David Scott Lindsay, Dario R. Lirio, Himali Mahajan, Olivier Mangez, Kevin L. McCarthy, Kevin McNulty, Jerry Lee Meyer, Anupam Miharia, Constantin Miroslav, Andrew James Mitchell, Uli P. Mittermaier, Harshal Morparia, Alex Negrea, Yana Nikolayeva, Madhavi Parimi, Matthew A. Porzio, Vedang Shailesh Purohit, Liviu Rozin, Godsway Sappor, Glenn Schwartz, Fahim Siddiqui, Nanu Swamy, Paul Tearnen, Karla Toyloy-Mattera, Sudhakar Velamoor, Margin Vora, Michael Joseph Waluk, Charlie Weiblen, Peter Wenzel, Jeffery Chi Wong, Tony Yip, Khurram Ghafoor
-
Publication number: 20170041296Abstract: In embodiments of the present invention, improved secure exchange system features include a federated search facility, hybrid encryption management (adjustable encryption key management), anonymous IRM, disassembled storage of data as chunks rather than files, asynchronous notification process/integrated file upload and messaging, an identity facility, multi-factor authentication, dynamic access authorization, and various enhancements to a customizable exchange system.Type: ApplicationFiled: December 19, 2015Publication date: February 9, 2017Inventors: Christopher Todd Ford, Mayank Choudhary, Kevin L. McCarthy, Anupam Miharia, John William Giudice, Kiran Kumar Tadakamalla, Cole Parker Mercer, Peter Wenzel, Paul Tearnen, Clement Cazalot, Salil J. Darji, Jonathan Gorin
-
Publication number: 20150310188Abstract: In embodiments of the present invention improved capabilities are described for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment through a secure exchange facility managed by an intermediate organizational entity amongst users of a plurality of other organizational entities, wherein computer data content and access rights for the computer data content is shared between a first and second user, the computer data content and access rights for the computer data content are transformed into a DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities.Type: ApplicationFiled: April 22, 2015Publication date: October 29, 2015Inventors: Christopher Todd Ford, Visal Chandrakant Acharya, Richard David Anstey, Wasif Qayyum Awan, Amir M. Azmi, Selom Harry Azuma, Wade Michael Callison, Clement Cazalot, Mayank Choudhary, Peter W. Cleary, Benedict Robert Dsilva, Fuat Ertunc, Simon Genzer, John William Giudice, Douglas McLean Gordon, Jonathan Gorin, Mushegh Hakhinian, John Held, Ronald W. Hovsepian, Ganesh Kannan, John Landy, David Scott Lindsay, Dario R. Lirio, Himali Mahajan, Olivier Mangez, Kevin L. McCarthy, Kevin McNulty, Jerry Lee Meyer, Anupam Miharia, Constantin Miroslav, Andrew James Mitchell, Uli P. Mittermaier, Harshal Morparia, Alex Negrea, Yana Nikolayeva, Madhavi Parimi, Matthew A. Porzio, Vedang Shailesh Purohit, Liviu Rozin, Godsway Sappor, Glenn Schwartz, Fahim Siddiqui, Nanu Swamy, Paul Tearnen, Karla Toyloy-Mattera, Sudhakar Velamoor, Margin Vora, Michael Joseph Waluk, Charlie Weiblen, Peter Wenzel, Jeffrey Chi Wong, Tony Yip, Khurram Ghafoor
-
Publication number: 20150163206Abstract: In embodiments, the disclosure provides a secure data exchange system that includes a data management facility; and a plurality of data storage nodes. The data management facility manages content sharing between entities of data stored in the data storage nodes, wherein the data is stored by a user of a first entity and comprises content and metadata. The data management facility only has access to the metadata of the user data for managing of the data in the plurality of data storage nodes and not the content. The data management facility may be geographically distributed at a plurality of data management sites and the data storage nodes may exist inside and outside of a firewall of the first entity.Type: ApplicationFiled: December 10, 2014Publication date: June 11, 2015Inventors: Kevin L. McCarthy, Jerry Lee Meyer, Sudhakar Velamoor, David Scott Lindsay, Visal Chandrakant Acharya, Benedict Robert Dsilva, Paul Tearnen, Peter Wenzel, John Held, Charlie Weiblen, Ganesh Kannan, Madhavi Parimi, Selom Harry Azuma, Himali Mahajan, Dario R. Lirio, Michael Joseph Waluk, John Landy, Fahim Siddiqui, Christopher Todd Ford, Margin Vora, Matthew A. Porzio, Harshal Morparia, Yana Nikolayeva, Tony Yip, Mayank Choudhary, Liviu Rozin, Ronald W. Hovsepian, John William Giudice, Vedang Shailesh Purohit, Wasif Qayyum Awan, Peter W. Cleary