Patents by Inventor Prasenna Ravi

Prasenna Ravi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250202931
    Abstract: The technology disclosed prevents phishing attacks where a malicious attacker creates a malicious file in a cloud-based store and shares it with endpoint users. A user, opening the shared document, is redirected to a malicious website where a corporation's critical data may be compromised. The cloud-based method applies a set of rules and policies to allow the shared document or block the shared document from the network, based on identifying the ownership or originator of the shared document. Documents from blacklisted websites are blocked. Documents from trusted sources are allowed access to the network. Unknown documents are blocked and threat-scanned to determine if they contain malicious content. If analysis proves a blocked document to be safe, it may be released into the network along with subsequent documents having the same ownership or originator.
    Type: Application
    Filed: October 28, 2024
    Publication date: June 19, 2025
    Applicant: Netskope, Inc.
    Inventors: Prasenna Ravi, Muhammed Shafeek, Venkataswamy Pathapati, Anupam Kumar
  • Patent number: 12132757
    Abstract: The technology disclosed prevents phishing attacks where a malicious attacker creates a malicious file in a cloud-based store and shares it with endpoint users. A user, opening the shared document, is redirected to a malicious website where a corporation's critical data may be compromised. The cloud-based method applies a set of rules and policies to allow the shared document or block the shared document from the network, based on identifying the ownership or originator of the shared document. Documents from blacklisted websites are blocked. Documents from trusted sources are allowed access to the network. Unknown documents are blocked and threat-scanned to determine if they contain malicious content. If analysis proves a blocked document to be safe, it may be released into the network along with subsequent documents having the same ownership or originator.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: October 29, 2024
    Assignee: NetSkope, Inc.
    Inventors: Anupam Kumar, Prasenna Ravi, Muhammed Shafeek, Venkataswamy Pathapati
  • Publication number: 20240195840
    Abstract: The technology disclosed describes a network security system (NSS) for managing cloud security posture. The NSS uses synthetic request injection to determine a security posture of a resource hosted on a cloud application for policy enforcement. The NSS receives an incoming request from a client directed toward a resource hosted on a cloud application during an application session. The NSS holds the incoming request, generates the synthetic request, and transmits the synthetic request to the cloud application. The synthetic request is designed to retrieve information specifying the security posture of the resource from the cloud application using the resource identifier. The NSS receives a response to the synthetic request from the cloud application that supplies the information specifying the security posture of the resource. The NSS applies a policy on the incoming request based on the security posture information.
    Type: Application
    Filed: February 16, 2024
    Publication date: June 13, 2024
    Inventors: Krishna Narayanaswamy, David Tze-Si Wu, Prasenna Ravi
  • Patent number: 11985168
    Abstract: The technology disclosed describes a system. The system comprises an edge network of a plurality of points of presence of a network security system. Points of presence in the plurality of points of presence are configured to intermediate traffic between clients and cloud applications and to use metadata to apply policies on the intermediated traffic. There are redundancies in metadata synchronization between the points of presence due to metadata migration to a second point of presence from a first point of presence handing off intermediation to the second point of presence within an application session. Each of the points of presence is configured with inline metadata generation logic. The inline metadata generation logic is configured to issue synthetic requests to provide the metadata to the second point of presence without requiring the metadata migration to the second point of presence.
    Type: Grant
    Filed: November 22, 2021
    Date of Patent: May 14, 2024
    Assignee: Netskope, Inc.
    Inventors: David Tze-Si Wu, Prasenna Ravi
  • Patent number: 11943260
    Abstract: The technology disclosed enables metadata-based policy enforcement for requests that do not include metadata relevant to a policy. In a particular example, a method provides, in a network security system interposed between clients and a cloud application, receiving an incoming request from a client directed towards the cloud application. In response to determining that the incoming request lacks metadata for enforcement of a policy, the method includes transmitting a synthetic request to obtain the metadata from the cloud application and receiving a response to the synthetic request. The response provides the metadata. The method further includes applying the policy to the incoming request based on the metadata.
    Type: Grant
    Filed: February 2, 2023
    Date of Patent: March 26, 2024
    Assignee: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, David Tze-Si Wu, Prasenna Ravi
  • Patent number: 11888902
    Abstract: The technology disclosed describes a network security system that is configured to configure a synthetic request with an object identifier, and to inject the synthetic request into an application session to transmit the synthetic request to a cloud application. The synthetic request is configured to retrieve object metadata about the object using the object identifier. The network security system is further configured to receive from the cloud application a response to the synthetic request. The response supplies the object metadata.
    Type: Grant
    Filed: March 7, 2022
    Date of Patent: January 30, 2024
    Assignee: Netskope, Inc.
    Inventors: Prasenna Ravi, David Tze-Si Wu
  • Patent number: 11831683
    Abstract: The technology disclosed relates to using synthetic request injection to improve cloud object security posture management.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: November 28, 2023
    Assignee: Netskope, Inc.
    Inventors: David Tze-Si Wu, Prasenna Ravi
  • Patent number: 11831685
    Abstract: The technology disclosed relates to application-specific data flow for synthetic request injection for cloud security enforcement. In particular, it relates to data flow logic configured to inject an incoming request directed to a cloud application in a processing path of a particular network security system.
    Type: Grant
    Filed: March 7, 2022
    Date of Patent: November 28, 2023
    Assignee: Netskope, Inc.
    Inventors: Prasenna Ravi, David Tze-Si Wu
  • Publication number: 20230336592
    Abstract: The technology disclosed enables metadata-based policy enforcement for requests that do not include metadata relevant to a policy. In a particular example, a method provides, in a network security system interposed between clients and a cloud application, receiving an incoming request from a client directed towards the cloud application. In response to determining that the incoming request lacks metadata for enforcement of a policy, the method includes transmitting a synthetic request to obtain the metadata from the cloud application and receiving a response to the synthetic request. The response provides the metadata. The method further includes applying the policy to the incoming request based on the metadata.
    Type: Application
    Filed: February 2, 2023
    Publication date: October 19, 2023
    Applicant: Netskope, Inc.
    Inventors: Krishna Narayanaswamy, David Tze-Si Wu, Prasenna Ravi
  • Patent number: 11757944
    Abstract: The technology disclosed describes a system. The system comprises a network security system interposed between clients and cloud applications. The network security system is configured to generate a synthetic request, and inject the synthetic request into an application session to transmit the synthetic request to a cloud application and receive a response to the synthetic request from the cloud application.
    Type: Grant
    Filed: November 15, 2021
    Date of Patent: September 12, 2023
    Assignee: Netskope, Inc.
    Inventors: David Tze-Si Wu, Prasenna Ravi
  • Patent number: 11647052
    Abstract: The technology disclosed describes a system. The system comprises a network security system interposed between clients and cloud applications. The network security system is configured to process an incoming request from a client and generate metadata. The network security system is further configured to transmit the incoming request to a cloud application. The network security system is further configured to configure the metadata to expire after an expiration window. The network security system is further configured to receive, after the expiration window, a further incoming request from the client. The further incoming request is directed towards the cloud application and subject to policy enforcement that requires the expired metadata. The network security system is further configured to hold the further incoming request and transmit a synthetic request to the cloud application. The synthetic request is configured to retrieve the expired metadata from the cloud application.
    Type: Grant
    Filed: April 22, 2021
    Date of Patent: May 9, 2023
    Assignee: Netskope, Inc.
    Inventors: David Tze-Si Wu, Prasenna Ravi
  • Publication number: 20220345492
    Abstract: The technology disclosed describes a system. The system comprises a network security system interposed between clients and cloud applications. The network security system is configured to generate a synthetic request, and inject the synthetic request into an application session to transmit the synthetic request to a cloud application and receive a response to the synthetic request from the cloud application.
    Type: Application
    Filed: November 15, 2021
    Publication date: October 27, 2022
    Applicant: Netskope, Inc.
    Inventors: David Tze-Si WU, Prasenna RAVI
  • Publication number: 20220345494
    Abstract: The technology disclosed relates to using synthetic request injection to improve cloud object security posture management.
    Type: Application
    Filed: November 29, 2021
    Publication date: October 27, 2022
    Applicant: Netskope, Inc.
    Inventors: David Tze-Si WU, Prasenna RAVI
  • Publication number: 20220345490
    Abstract: The technology disclosed describes a system. The system comprises a network security system interposed between clients and cloud applications. The network security system is configured to process an incoming request from a client and generate metadata. The network security system is further configured to transmit the incoming request to a cloud application. The network security system is further configured to configure the metadata to expire after an expiration window. The network security system is further configured to receive, after the expiration window, a further incoming request from the client. The further incoming request is directed towards the cloud application and subject to policy enforcement that requires the expired metadata. The network security system is further configured to hold the further incoming request and transmit a synthetic request to the cloud application. The synthetic request is configured to retrieve the expired metadata from the cloud application.
    Type: Application
    Filed: April 22, 2021
    Publication date: October 27, 2022
    Applicant: Netskope, Inc.
    Inventors: David Tze-Si WU, Prasenna RAVI
  • Publication number: 20220345496
    Abstract: The technology disclosed describes a network security system that is configured to configure a synthetic request with an object identifier, and to inject the synthetic request into an application session to transmit the synthetic request to a cloud application. The synthetic request is configured to retrieve object metadata about the object using the object identifier. The network security system is further configured to receive from the cloud application a response to the synthetic request. The response supplies the object metadata.
    Type: Application
    Filed: March 7, 2022
    Publication date: October 27, 2022
    Applicant: NETSKOPE, INC.
    Inventors: Prasenna RAVI, David Tze-Si WU
  • Publication number: 20220345493
    Abstract: The technology disclosed describes a system. The system comprises an edge network of a plurality of points of presence of a network security system. Points of presence in the plurality of points of presence are configured to intermediate traffic between clients and cloud applications and to use metadata to apply policies on the intermediated traffic. There are redundancies in metadata synchronization between the points of presence due to metadata migration to a second point of presence from a first point of presence handing off intermediation to the second point of presence within an application session. Each of the points of presence is configured with inline metadata generation logic. The inline metadata generation logic is configured to issue synthetic requests to provide the metadata to the second point of presence without requiring the metadata migration to the second point of presence.
    Type: Application
    Filed: November 22, 2021
    Publication date: October 27, 2022
    Applicant: Netskope, Inc.
    Inventors: David Tze-Si WU, Prasenna RAVI
  • Publication number: 20220345495
    Abstract: The technology disclosed relates to application-specific data flow for synthetic request injection for cloud security enforcement. In particular, it relates to data flow logic configured to inject an incoming request directed to a cloud application in a processing path of a particular network security system.
    Type: Application
    Filed: March 7, 2022
    Publication date: October 27, 2022
    Applicant: NETSKOPE, INC.
    Inventors: Prasenna RAVI, David Tze-Si WU
  • Publication number: 20220345500
    Abstract: The technology disclosed describes a system. The system comprises a network security system interposed between clients and cloud applications. The network security system is configured to receive one or more incoming requests towards a cloud application from a client during an application session, inject one or more synthetic requests into the application session to transmit the synthetic requests to the cloud application, and receive one or more responses to the synthetic requests from the cloud application. The synthetic requests are constructed using one or more parameters of the incoming requests, and do not transmit the incoming requests.
    Type: Application
    Filed: April 14, 2022
    Publication date: October 27, 2022
    Applicant: Netskope, Inc.
    Inventors: Prasenna RAVI, David Tze-Si WU
  • Publication number: 20220345463
    Abstract: The technology disclosed relates to an inline proxy configured with synthetic request injection logic to intercept incoming requests during an application session, and generate, during the application session, synthetic requests that are separate from the incoming requests.
    Type: Application
    Filed: March 16, 2022
    Publication date: October 27, 2022
    Applicant: NETSKOPE, INC.
    Inventors: David Tze-Si WU, Prasenna RAVI
  • Publication number: 20220232015
    Abstract: The technology disclosed prevents phishing attacks where a malicious attacker creates a malicious file in a cloud-based store and shares it with endpoint users. A user, opening the shared document, is redirected to a malicious website where a corporation's critical data may be compromised. The cloud-based method applies a set of rules and policies to allow the shared document or block the shared document from the network, based on identifying the ownership or originator of the shared document. Documents from blacklisted websites are blocked. Documents from trusted sources are allowed access to the network. Unknown documents are blocked and threat-scanned to determine if they contain malicious content. If analysis proves a blocked document to be safe, it may be released into the network along with subsequent documents having the same ownership or originator.
    Type: Application
    Filed: July 30, 2021
    Publication date: July 21, 2022
    Applicant: NetSkope, Inc.
    Inventors: Anupam KUMAR, Prasenna RAVI, Muhammed SHAFEEK, Venkataswamy PATHAPATI