Patents by Inventor Niranjan Koduri

Niranjan Koduri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11574074
    Abstract: Provided herein are systems and methods for classifying content to prevent data breach or exfiltration. An entity engine may receive content for classification into a content type for preventing data breach or exfiltration. The entity engine may determine that secondary data, defined by an operand of an entity definition, is present in the content. Each entity definition may correspond to one content type and may include a Boolean expression of operands. Each operand may include a matching element to be used for matching against content undergoing classification into one of the content types, upon secondary data defined by the operand being present in the content. The entity engine may classify the content into a content type of the content types, corresponding to the entity definition, based on matching the matching element of the operand to the content, and matching other operands of the entity definition to the content.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: February 7, 2023
    Assignee: Digital Guardian LLC
    Inventors: Niranjan Koduri, Richard Douglas LeCour, Emanoel Daryoush
  • Patent number: 11507697
    Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.
    Type: Grant
    Filed: October 12, 2020
    Date of Patent: November 22, 2022
    Assignee: Digital Guardian LLC
    Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
  • Publication number: 20210026992
    Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.
    Type: Application
    Filed: October 12, 2020
    Publication date: January 28, 2021
    Applicant: Digital Guardian, Inc.
    Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
  • Patent number: 10803204
    Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.
    Type: Grant
    Filed: January 25, 2018
    Date of Patent: October 13, 2020
    Assignee: Digital Guardian LLC
    Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
  • Publication number: 20190228186
    Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.
    Type: Application
    Filed: January 25, 2018
    Publication date: July 25, 2019
    Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
  • Publication number: 20190180048
    Abstract: Provided herein are systems and methods for classifying content to prevent data breach or exfiltration. An entity engine may receive content for classification into a content type for preventing data breach or exfiltration. The entity engine may determine that secondary data, defined by an operand of an entity definition, is present in the content. Each entity definition may correspond to one content type and may include a Boolean expression of operands. Each operand may include a matching element to be used for matching against content undergoing classification into one of the content types, upon secondary data defined by the operand being present in the content. The entity engine may classify the content into a content type of the content types, corresponding to the entity definition, based on matching the matching element of the operand to the content, and matching other operands of the entity definition to the content.
    Type: Application
    Filed: December 11, 2017
    Publication date: June 13, 2019
    Inventors: Niranjan Koduri, Richard Douglas LeCour, Emanoel Daryoush
  • Patent number: 9306955
    Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: April 5, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
  • Patent number: 9237168
    Abstract: Traffic control techniques are provided for intercepting an initial message in a handshaking procedure for a secure communication between a first device and a second device at a proxy device. Identification information associated with the second device is extracted from the initial message. A policy is applied to communications between the first device and second device based on the identification information.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: January 12, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Jianxin Wang, Hari Shankar, Trevor Highland, Niranjan Koduri, Daryl Odnert
  • Publication number: 20150304340
    Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.
    Type: Application
    Filed: June 29, 2015
    Publication date: October 22, 2015
    Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
  • Patent number: 9100366
    Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: August 4, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
  • Publication number: 20140075497
    Abstract: A policy is established comprising a condition having a multiphase attribute of a multiphase transaction. Phase specific policies are established for each phase in which the multiphase attribute may become known. The multiphase transaction is evaluated according to the phase specific policies at each phase of the multiphase transaction in which the multiphase attribute may become known until a policy decision of the policy is determined.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Haiyan Luo, Hari Shankar, Daryl Odnert, Niranjan Koduri
  • Publication number: 20130312054
    Abstract: Traffic control techniques are provided for intercepting an initial message in a handshaking procedure for a secure communication between a first device and a second device at a proxy device. Identification information associated with the second device is extracted from the initial message. A policy is applied to communications between the first device and second device based on the identification information.
    Type: Application
    Filed: May 17, 2012
    Publication date: November 21, 2013
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Jianxin Wang, Hari Shankar, Trevor Highland, Niranjan Koduri, Daryl Odnert