Patents by Inventor Prakash Linga
Prakash Linga has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230090586Abstract: One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.Type: ApplicationFiled: November 23, 2022Publication date: March 23, 2023Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20230082183Abstract: One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.Type: ApplicationFiled: November 17, 2022Publication date: March 16, 2023Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11599659Abstract: One example method of operation may include identifying a code segment accessed during a code access event, scanning code of the code segment to identify a degree of sensitivity of the code, appending a code access annotation to the code segment based on detected actions performed to the code during the code access event, and updating a code log to identify the code access annotation.Type: GrantFiled: February 17, 2021Date of Patent: March 7, 2023Assignee: BluBracket, Inc.Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11556642Abstract: One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.Type: GrantFiled: February 17, 2021Date of Patent: January 17, 2023Assignee: BluBracket, Inc.Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11550943Abstract: One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.Type: GrantFiled: February 17, 2021Date of Patent: January 10, 2023Assignee: BluBracket, Inc.Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256089Abstract: One example operation may include selecting one or more terms to query one or more software repositories, querying the one or more of the software repositories for instances of the one or more query terms, identifying one or more domain names included in the one or more software repositories based on the query, and determining one or more relevancy scores corresponding to the one or more public software repositories based on a quantity of identified terms instances and domain names.Type: ApplicationFiled: April 30, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Payman Kamali, Paul Gerlich
-
Publication number: 20210256152Abstract: One example method of operation may include identifying a code access event associated with a code segment, determining whether one or more portions of the code segment require code access permissions, determining whether one or more credentials of a profile associated with the code access event have a required code access credential necessary to permit the code access event, and assigning limited access to the code segment and the profile based on the one or more credentials associated with the code access event.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256142Abstract: One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256143Abstract: One example method of operation may include identifying a plurality of code access events over a period of time, determining whether any of the code access events included any sensitive code segments, determining whether any of the code access events which included the sensitive code segments were unauthorized, and performing one or more automated actions to restrict code access permissions of one or more user profiles.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210255851Abstract: One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Publication number: 20210256123Abstract: One example method of operation may include identifying a code segment accessed during a code access event, scanning code of the code segment to identify a degree of sensitivity of the code, appending a code access annotation to the code segment based on detected actions performed to the code during the code access event, and updating a code log to identify the code access annotation.Type: ApplicationFiled: February 17, 2021Publication date: August 19, 2021Inventors: Prakash Linga, Ajay K. Arora, Vladimir Buzuev
-
Patent number: 11010483Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to access via a user device, applying at least one policy to the data that limits access to the data to user profiles assigned privileges to the policy, encrypting the data, generating metadata indicating the policy and pairing the metadata with the data, and storing the data and the metadata in a policy server.Type: GrantFiled: August 20, 2019Date of Patent: May 18, 2021Assignee: VERAInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley, Nicolas Vautier
-
Patent number: 10607020Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to be protected via a user device, applying at least one policy to the data, storing the at least one policy in a data record identifying the data, modifying a data format of the data to create a modified data, and storing the modified data in memory.Type: GrantFiled: September 10, 2018Date of Patent: March 31, 2020Assignee: VERAInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans
-
Patent number: 10545884Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to access via a user device, identifying a user profile associated with the user device, retrieving at least one user policy associated with the user profile, determining whether the user policy permits the user device to access the data, matching the user policy to a data policy associated with the data, receiving an encryption key at the user device, applying the encryption key to the data, and unwrapping the data from a wrapped data format to access the data.Type: GrantFiled: October 2, 2018Date of Patent: January 28, 2020Assignee: VERAInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley
-
Patent number: 10387665Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to access via a user device, applying at least one policy to the data that limits access to the data to user profiles assigned privileges to the policy, encrypting the data, generating metadata indicating the policy and pairing the metadata with the data, and storing the data and the metadata in a policy server.Type: GrantFiled: November 12, 2015Date of Patent: August 20, 2019Assignee: VeraInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley, Nicolas Vautier
-
Publication number: 20190018801Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to be protected via a user device, applying at least one policy to the data, storing the at least one policy in a data record identifying the data, modifying a data format of the data to create a modified data, and storing the modified data in memory.Type: ApplicationFiled: September 10, 2018Publication date: January 17, 2019Inventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans
-
Patent number: 10089246Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to access via a user device, identifying a user profile associated with the user device, retrieving at least one user policy associated with the user profile, determining whether the user policy permits the user device to access the data, matching the user policy to a data policy associated with the data, receiving an encryption key at the user device, applying the encryption key to the data, and unwrapping the data from a wrapped data format to access the data.Type: GrantFiled: March 19, 2018Date of Patent: October 2, 2018Assignee: VERAInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley
-
Patent number: 10073791Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to be protected via a user device, applying at least one policy to the data, storing the at least one policy in a data record identifying the data, modifying a data format of the data to create a modified data, and storing the modified data in memory.Type: GrantFiled: November 12, 2015Date of Patent: September 11, 2018Assignee: VeraInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans
-
Patent number: 9921976Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to access via a user device, identifying a user profile associated with the user device, retrieving at least one user policy associated with the user profile, determining whether the user policy permits the user device to access the data, matching the user policy to a data policy associated with the data, receiving an encryption key at the user device, applying the encryption key to the data, and unwrapping the data from a wrapped data format to access the data.Type: GrantFiled: November 12, 2015Date of Patent: March 20, 2018Assignee: VeraInventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans, Justin Sisley
-
Publication number: 20160283406Abstract: Data security access and management may require a server dedicated to monitoring document access requests and enforcing rules and policies to limit access to those who are not specifically identified as having access to the data. One example of operation may include selecting data to be protected via a user device, applying at least one policy to the data, storing the at least one policy in a data record identifying the data, modifying a data format of the data to create a modified data, and storing the modified data in memory.Type: ApplicationFiled: November 12, 2015Publication date: September 29, 2016Inventors: Prakash Linga, Ajay Arora, Vladimir Buzuev, Maurice C. Evans