Patents by Inventor Nishant Doshi

Nishant Doshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10349139
    Abstract: Examples of systems are described herein in which an item of content may be delivered to multiple devices within a group of devices at the same time while reducing bandwidth consumption. Such systems may also allow for attractive pricing and features that may encourage more users to consume the item of content.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: July 9, 2019
    Assignee: Comcast Cable Communications, LLC
    Inventors: Nishant Doshi, Ambud Sharma, Alexei Savaliev
  • Publication number: 20190138809
    Abstract: Disclosed are systems and methods for summarizing content or preparing missed portions of content based on natural language queries. A natural language query can be received. One or more portions of summarized or missed content can be determined based on the natural language query, and transmitted to a user device.
    Type: Application
    Filed: November 7, 2017
    Publication date: May 9, 2019
    Inventors: Nishant Doshi, Daniel Grady, Glenn Wesley, John Schmerge, Scott Laubach, Yan Sperling, Arvind Mundra
  • Publication number: 20180048725
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics.
    Type: Application
    Filed: October 24, 2017
    Publication date: February 15, 2018
    Inventor: Nishant Doshi
  • Publication number: 20180048637
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a SSO service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service. Upon determining that the authentication request satisfies the at least one criterion, the method provides forwarding the authentication request to the SSO service.
    Type: Application
    Filed: October 24, 2017
    Publication date: February 15, 2018
    Inventor: Nishant Doshi
  • Patent number: 9807079
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a SSO service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service. Upon determining that the authentication request satisfies the at least one criterion, the method provides forwarding the authentication request to the SSO service.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: October 31, 2017
    Assignee: Palo Alto Network, Inc.
    Inventor: Nishant Doshi
  • Patent number: 9807182
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics.
    Type: Grant
    Filed: August 18, 2014
    Date of Patent: October 31, 2017
    Assignee: Palo Alto Networks, Inc.
    Inventor: Nishant Doshi
  • Publication number: 20170311042
    Abstract: Examples of systems are described herein in which an item of content may be delivered to multiple devices within a group of devices at the same time while reducing bandwidth consumption. Such systems may also allow for attractive pricing and features that may encourage more users to consume the item of content.
    Type: Application
    Filed: July 11, 2017
    Publication date: October 26, 2017
    Inventors: Nishant Doshi, Ambud Sharma, Alexei Savaliev
  • Publication number: 20170235973
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the data object. The method further includes determining an indication of exposure of the data object based on the plurality of exposure characteristics.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Inventor: Nishant Doshi
  • Patent number: 9736538
    Abstract: Examples of systems are described herein in which an item of content may be delivered to multiple devices within a group of devices at the same time while reducing bandwidth consumption. Such systems may also allow for attractive pricing and features that may encourage more users to consume the item of content.
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: August 15, 2017
    Assignee: Comcast Cable Communications, LLC
    Inventors: Nishant Doshi, Ambud Sharma, Alexei Saveliev
  • Publication number: 20170149855
    Abstract: Methods and systems for intelligent use of off-peak bandwidth are disclosed. An example method can comprise receiving a request for content from a user device. The content server can transmit the content to the user device. Upon receiving a teardown command to suspend transmission of the content, after transmitting a first portion of the content to the user device, the content server can determine that playback of the content is likely to be resumed at a peak time. The content server can then pre-position a second portion of the content proximate to the user device prior to the peak time.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventors: Nishant Doshi, Scott Auger, Ambud Sharma
  • Patent number: 9661065
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the data object. The method further includes determining an indication of exposure of the data object based on the plurality of exposure characteristics.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: May 23, 2017
    Assignee: Palo Alto Networks, Inc.
    Inventor: Nishant Doshi
  • Publication number: 20160119325
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a SSO service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service. Upon determining that the authentication request satisfies the at least one criterion, the method provides forwarding the authentication request to the SSO service.
    Type: Application
    Filed: October 23, 2015
    Publication date: April 28, 2016
    Inventor: Nishant Doshi
  • Publication number: 20150312262
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics.
    Type: Application
    Filed: August 18, 2014
    Publication date: October 29, 2015
    Inventor: Nishant Doshi
  • Publication number: 20150310333
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for indicating data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving information about a data object from the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the data object. The method further includes determining an indication of exposure of the data object based on the plurality of exposure characteristics.
    Type: Application
    Filed: June 6, 2014
    Publication date: October 29, 2015
    Inventor: Nishant Doshi
  • Patent number: 9083729
    Abstract: A computer-implemented method for determining that uniform resource locators are malicious may include identifying a uniform resource locator that may be posted on a social networking platform and that may be subject to a security assessment, gathering contextual data from the social networking platform that describes at least one instance of the uniform resource locator within the social networking platform, generating, based on the contextual data, a social fingerprint of the uniform resource locator and classifying the uniform resource locator as malicious based at least in part on the social fingerprint. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: July 14, 2015
    Assignee: Symantec Corporation
    Inventors: Nishant Doshi, Sourabh Satish
  • Patent number: 8997228
    Abstract: Techniques for detecting infected websites are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting an infected website comprising receiving at least one redirection report from at least one security agent, receiving at least one malware report from the at least one security agent, analyzing correlation between the at least one redirection report and the at least one malware report, aggregating information from the at least one redirection report, the at least one malware report, and the correlation analysis, and detecting an infected website based on the aggregated information.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: March 31, 2015
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Nishant A. Doshi
  • Publication number: 20150020127
    Abstract: Examples of systems are described herein in which an item of content may be delivered to multiple devices within a group of devices at the same time while reducing bandwidth consumption. Such systems may also allow for attractive pricing and features that may encourage more users to consume the item of content.
    Type: Application
    Filed: July 9, 2013
    Publication date: January 15, 2015
    Inventors: Nishant Doshi, Ambud Sharma, Alexei Saveliev
  • Patent number: 8627407
    Abstract: A computer-implemented method for preventing modification of network resources in the absence of a user's consent is disclosed. The method may comprise: 1) identifying an attempt to modify a network resource, 2) administering a human-verification test, and 3) determining, based on the outcome of the human-verification test, whether to prevent modification of the network resource. In addition, a computer-implemented method for preventing unauthorized communication with network resources may comprise: 1) identifying a communication attempt between a network resource and an untrusted resource, 2) determining whether communication between the network resource and the untrusted resource is authorized, and 3) determining, based on whether communication between the network resource and the untrusted resource is authorized, whether to allow communication between the network resource and the untrusted resource. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: January 7, 2014
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Nishant Doshi
  • Patent number: 8307435
    Abstract: The execution of a software application is diverted to detect software object corruption in the software application. Software objects used by the software application are identified and their pointers are inspected. One or more tests are applied to pointers pointing to the virtual method tables of the software objects, addresses (or pointers) in the virtual method tables, and memory attributes or content of the memory buffer identified by the addresses for inconsistencies that indicate corruption. A determination of whether the software objects are corrupted is made based on the outcome of the tests. If software object corruption is detected, proper corrective actions are applied to prevent malicious exploitation of the corruption.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: November 6, 2012
    Assignee: Symantec Corporation
    Inventors: Uriel Mann, Nishant Doshi