Patents by Inventor Mehul Krishnanand Revankar

Mehul Krishnanand Revankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250193227
    Abstract: Disclosed embodiments include receiving network data associated with a first system of a network. The network data may comprise first data, second data, third data, fourth data, fifth data, and sixth data. The method may quantify, the first data, the second data, the third data, the fourth data, the fifth data, and the sixth data. The method may further determine, a risk parameter based on the quantifying. The method may generate, a vulnerability risk profile for a vulnerability based on the risk parameter. The vulnerability profile may indicate a security weakness of the first system or the second system. The method may determine, based on the security weakness of the first system or the second system, a remediation protocol for minimizing the security weakness of the first system of the network or the second system of the network.
    Type: Application
    Filed: February 20, 2025
    Publication date: June 12, 2025
    Inventors: Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
  • Patent number: 12255913
    Abstract: Disclosed embodiments include receiving network data associated with a first system of a network. The network data may comprise first data, second data, third data, fourth data, fifth data, and sixth data. The method may quantify, the first data, the second data, the third data, the fourth data, the fifth data, and the sixth data. The method may further determine, a risk parameter based on the quantifying. The method may generate, a vulnerability risk profile for a vulnerability based on the risk parameter. The vulnerability profile may indicate a security weakness of the first system or the second system. The method may determine, based on the security weakness of the first system or the second system, a remediation protocol for minimizing the security weakness of the first system of the network or the second system of the network.
    Type: Grant
    Filed: June 20, 2022
    Date of Patent: March 18, 2025
    Assignee: Qualys, Inc.
    Inventors: Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
  • Publication number: 20240430293
    Abstract: Disclosed are methods and systems for assessing system risks associated with one or more assets coupled to a network and mitigating against said system risks. According to one implementation, a method for assessing a system risk comprises receiving network data associated with a first asset communicatively coupled to a network, quantifying the network data, and generating a risk parameter using the quantified network data and vulnerability data associated with the network. The method further comprises determining, based on the risk parameter that a security risk of a first asset of the network is higher than the security risk of a second asset of the network. Upon this determining, the method initiates remediation operations that first secure the first asset on the network against a security breach to the network.
    Type: Application
    Filed: September 6, 2024
    Publication date: December 26, 2024
    Inventors: Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
  • Patent number: 12088618
    Abstract: Disclosed are methods and systems for assessing system risks associated with one or more assets coupled to a network and mitigating against said system risks. According to one implementation, a method for assessing a system risk comprises receiving network data associated with a first asset communicatively coupled to a network, quantifying the network data, and generating a risk parameter using the quantified network data and vulnerability data associated with the network. The method further comprises determining, based on the risk parameter that a security risk of a first asset of the network is higher than the security risk of a second asset of the network. Upon this determining, the method initiates remediation operations that first secure the first asset on the network against a security breach to the network.
    Type: Grant
    Filed: June 20, 2022
    Date of Patent: September 10, 2024
    Assignee: Qualys, Inc.
    Inventors: Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
  • Publication number: 20230412630
    Abstract: Disclosed are methods and systems for assessing system risks associated with one or more assets coupled to a network and mitigating against said system risks. According to one implementation, a method for assessing a system risk comprises receiving network data associated with a first asset communicatively coupled to a network, quantifying the network data, and generating a risk parameter using the quantified network data and vulnerability data associated with the network. The method further comprises determining, based on the risk parameter that a security risk of a first asset of the network is higher than the security risk of a second asset of the network. Upon this determining, the method initiates remediation operations that first secure the first asset on the network against a security breach to the network.
    Type: Application
    Filed: June 20, 2022
    Publication date: December 21, 2023
    Inventors: Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi
  • Publication number: 20230412631
    Abstract: Disclosed embodiments include receiving network data associated with a first system of a network. The network data may comprise first data, second data, third data, fourth data, fifth data, and sixth data. The method may quantify, the first data, the second data, the third data, the fourth data, the fifth data, and the sixth data. The method may further determine, a risk parameter based on the quantifying. The method may generate, a vulnerability risk profile for a vulnerability based on the risk parameter. The vulnerability profile may indicate a security weakness of the first system or the second system. The method may determine, based on the security weakness of the first system or the second system, a remediation protocol for minimizing the security weakness of the first system of the network or the second system of the network.
    Type: Application
    Filed: June 20, 2022
    Publication date: December 21, 2023
    Inventors: Mehul Krishnanand Revankar, Sumedh S. Thakar, Anand Paturi