Patents by Inventor Prabandham Madan Gopal

Prabandham Madan Gopal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10083307
    Abstract: An approach is proposed that contemplates systems, methods, and computer-readable storage mediums to support receiving, from a computerized system, a first encrypted file entity key and signed access metadata, wherein the first encrypted file entity key is created by encrypting a file entity key using a first encryption key, the signed access metadata is signed by the file entity key and the encrypted file entity is created by encrypting a file entity using the file entity key. The approach then determines whether to facilitate the decryption of the encrypted file entity by the computerized system and sends a second encrypted file entity key to the computerized system if it is determined to facilitate the decryption. The approach prevents the computerized system to decrypt the encrypted file entity if it is determined not to facilitate the decryption of the encrypted file entity by the computerized system.
    Type: Grant
    Filed: May 5, 2016
    Date of Patent: September 25, 2018
    Assignee: Barracuda Networks, Inc.
    Inventors: Asaf Cidon, Israel Cidon, Lior Gavish, Prabandham Madan Gopal, Chandrashekhar Shetty
  • Publication number: 20160246972
    Abstract: An approach is proposed that contemplates systems, methods, and computer-readable storage mediums to support receiving, from a computerized system, a first encrypted file entity key and signed access metadata, wherein the first encrypted file entity key is created by encrypting a file entity key using a first encryption key, the signed access metadata is signed by the file entity key and the encrypted file entity is created by encrypting a file entity using the file entity key. The approach then determines whether to facilitate the decryption of the encrypted file entity by the computerized system and sends a second encrypted file entity key to the computerized system if it is determined to facilitate the decryption. The approach prevents the computerized system to decrypt the encrypted file entity if it is determined not to facilitate the decryption of the encrypted file entity by the computerized system.
    Type: Application
    Filed: May 5, 2016
    Publication date: August 25, 2016
    Inventors: Asaf Cidon, Israel Cidon, Lior Gavish, Prabandham Madan Gopal, Chandrashekhar Shetty
  • Patent number: 9373001
    Abstract: System, computer readable medium and method for decryption. The method may include receiving, by a third computerized system and from a fourth computerized system, a first encrypted file entity key and signed access metadata. The first encrypted file entity key is created by encrypting a file entity key by a first computerized system using an encryption key of a second computerized system. The signed access metadata is signed by the file entity key. The encrypted file entity is created by encrypting a file entity by the first computerized system using the file entity key. Sending, by the third computerized system, the signed access metadata and the first encrypted file entity key to the second computerized system. Receiving a response from the second computerized system. Determining, based on the response from the second computerized system, whether to facilitate a decryption of the encrypted file entity by the fourth computerized entity.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: June 21, 2016
    Assignee: BARRACUDA NETWORKS, INC.
    Inventors: Asaf Cidon, Israel Cidon, Lior Gavish, Prabandham Madan Gopal, Chandrashekhar Shetty
  • Publication number: 20140258719
    Abstract: System, computer readable medium and method for decryption. The method may include receiving, by a third computerized system and from a fourth computerized system, a first encrypted file entity key and signed access metadata. The first encrypted file entity key is created by encrypting a file entity key by a first computerized system using an encryption key of a second computerized system. The signed access metadata is signed by the file entity key. The encrypted file entity is created by encrypting a file entity by the first computerized system using the file entity key. Sending, by the third computerized system, the signed access metadata and the first encrypted file entity key to the second computerized system. Receiving a response from the second computerized system. Determining, based on the response from the second computerized system, whether to facilitate a decryption of the encrypted file entity by the fourth computerized entity.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 11, 2014
    Applicant: Sookasa Inc.
    Inventors: Asaf Cidon, Israel Cidon, Lior Gavish, Prabandham Madan Gopal, Chandrashekhar Shetty
  • Patent number: 8549584
    Abstract: A unified access control component (UACC) can maintain information relating to network access information and physical location information associated with respective users who may access a network that can include network resources (e.g., applications, information). The UACC can cross reference the network access information (e.g., user network access events, credentials, and policy) and physical location information (e.g., user physical access events, credentials, and policy) and can generate and enforce a unified network access policy based on network access information and physical location information associated with a particular user. After network access privileges have been granted to a user, the UACC can continue to monitor the user. The UACC can include a dynamic authentication component that can request a user re-authenticate if a change in the physical location and/or network access associated with the user is detected, such that a re-computation of network access privileges is desired.
    Type: Grant
    Filed: April 25, 2007
    Date of Patent: October 1, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Amit Singh, Prabandham Madan Gopal, Manjunath S. Bangalore, Raman Shankara Krishnan
  • Publication number: 20090119762
    Abstract: A network access system. In particular implementations, a method includes monitoring, responsive to a network access request of a client, an authentication session between an authentication server and the client, and determining user credential information associated with a user of the client based on one or more messages of the authentication session. The method also includes accessing, using the user credential information, physical entry information indicating a physical location of the user relative to a defined perimeter, and conditionally allowing the client access to a network based on the physical entry information and a successful authentication of the client.
    Type: Application
    Filed: March 6, 2008
    Publication date: May 7, 2009
    Applicant: Cisco Technology, Inc.
    Inventors: Allan Thomson, Matthew Glenn, Prabandham Madan Gopal, Vinod Dashora, Neeraj Purandare
  • Publication number: 20080271109
    Abstract: A unified access control component (UACC) can maintain information relating to network access information and physical location information associated with respective users who may access a network that can include network resources (e.g., applications, information). The UACC can cross reference the network access information (e.g., user network access events, credentials, and policy) and physical location information (e.g., user physical access events, credentials, and policy) and can generate and enforce a unified network access policy based on network access information and physical location information associated with a particular user. After network access privileges have been granted to a user, the UACC can continue to monitor the user. The UACC can include a dynamic authentication component that can request a user re-authenticate if a change in the physical location and/or network access associated with the user is detected, such that a re-computation of network access privileges is desired.
    Type: Application
    Filed: April 25, 2007
    Publication date: October 30, 2008
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Amit Singh, Prabandham Madan Gopal, Manjunath S. Bangalore, Raman Shankara Krishnan