Patents by Inventor Poornaprajna UDUPI
Poornaprajna UDUPI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10701035Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.Type: GrantFiled: April 23, 2018Date of Patent: June 30, 2020Assignee: NETFLIX, INC.Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
-
Patent number: 10178074Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.Type: GrantFiled: March 31, 2017Date of Patent: January 8, 2019Assignee: NETFLIX, INC.Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
-
Publication number: 20180316647Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.Type: ApplicationFiled: April 23, 2018Publication date: November 1, 2018Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
-
Patent number: 9954822Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.Type: GrantFiled: March 28, 2017Date of Patent: April 24, 2018Assignee: NETFLIX, INC.Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
-
Publication number: 20170207911Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.Type: ApplicationFiled: March 31, 2017Publication date: July 20, 2017Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
-
Publication number: 20170201489Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.Type: ApplicationFiled: March 28, 2017Publication date: July 13, 2017Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
-
Patent number: 9621588Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.Type: GrantFiled: September 24, 2014Date of Patent: April 11, 2017Assignee: NETFLIX, INC.Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
-
Patent number: 9614818Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.Type: GrantFiled: July 27, 2015Date of Patent: April 4, 2017Assignee: NETFLIX, INC.Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
-
Patent number: 9485305Abstract: A technique for providing an API from a server to one of more endpoint devices including receiving a request for data from a endpoint device, retrieving one or more data resources from the data resources available within the server, based upon the request, manipulating the data within the retrieved data resources into a response optimized for the endpoint device, and transmitting the response to the endpoint device.Type: GrantFiled: May 9, 2013Date of Patent: November 1, 2016Assignee: NETFLIX, Inc.Inventors: Daniel Jacobson, Benjamin James Christensen, Ben Schmaus, Mikey Cohen, Poornaprajna Udupi, Jason Cacciatore, Ganapriya Poolavari
-
Publication number: 20160088020Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.Type: ApplicationFiled: September 24, 2014Publication date: March 24, 2016Inventors: Jason Chan, Poornaprajna Udupi, Shashi Madappa
-
Publication number: 20150333904Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.Type: ApplicationFiled: July 27, 2015Publication date: November 19, 2015Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
-
Patent number: 9094377Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.Type: GrantFiled: August 16, 2013Date of Patent: July 28, 2015Assignee: NETFLIX, INC.Inventors: Poornaprajna Udupi, Jason Chan, Jay Zarfoss
-
Publication number: 20150052358Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.Type: ApplicationFiled: August 16, 2013Publication date: February 19, 2015Applicant: Netflix, Inc.Inventors: Poornaprajna UDUPI, Jason CHAN, Jay ZARFOSS
-
Publication number: 20130318154Abstract: A technique for providing an API from a server to one of more endpoint devices including receiving a request for data from a endpoint device, retrieving one or more data resources from the data resources available within the server, based upon the request, manipulating the data within the retrieved data resources into a response optimized for the endpoint device, and transmitting the response to the endpoint device.Type: ApplicationFiled: May 9, 2013Publication date: November 28, 2013Applicant: NETFLIX, Inc.Inventors: Daniel JACOBSON, Benjamin James CHRISTENSEN, Ben SCHMAUS, Mikey COHEN, Poornaprajna UDUPI, Jason CACCIATORE, Ganapriya POOLAVARI