Patents by Inventor PRATHAP SAKALA
PRATHAP SAKALA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200286016Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 22, 2020Publication date: September 10, 2020Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
-
Publication number: 20190244147Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: February 7, 2019Publication date: August 8, 2019Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
-
Patent number: 10204312Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: May 25, 2018Date of Patent: February 12, 2019Assignee: Alert Enterprise, Inc.Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20180314996Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 25, 2018Publication date: November 1, 2018Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 9984344Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: May 1, 2017Date of Patent: May 29, 2018Assignee: Alert Enterprise, Inc.Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20170236080Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 9639820Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: April 25, 2016Date of Patent: May 2, 2017Assignee: Alert EnterpriseInventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20160267408Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: April 25, 2016Publication date: September 15, 2016Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 9324119Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.Type: GrantFiled: March 13, 2014Date of Patent: April 26, 2016Assignee: ALERT ENTERPRISEInventors: Subrat Narenda Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20140279641Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.Type: ApplicationFiled: March 13, 2014Publication date: September 18, 2014Inventors: Subrat Narenda SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Publication number: 20120310850Abstract: In one embodiment, a method includes determining a plurality of event types where each event type being stored in association with event metadata. One or more events are received and an event type in the plurality of event types for each received event is determined. The method determines event metadata for each determined event type and event data from the event based on the event metadata. One or more control data objects are determined stored in association with the determined event type; one or more rules stored in associated with each of the control data objects is determined where the rule comprises one or more criteria being evaluated against one of the data values of said event; and evaluating the event data with the criterion to determine if each of the events is non-compliant or compliant with a low-level system requirement of said rule.Type: ApplicationFiled: June 26, 2012Publication date: December 6, 2012Applicant: SAP AGInventors: YING ZENG, ATUL SUDHALKAR, PETR STASTNY, PRATHAP SAKALA
-
Publication number: 20120016802Abstract: In one embodiment, a method includes determining a plurality of event types where each event type associated with event metadata. An event is received and an event type in the plurality of event types for the received event is determined. The method determines event metadata for the determined event type and event data from the event based on the event metadata. A rule associated with the event type is determined where the rule includes a criterion based on a regulatory compliance issue. A computing device evaluates the event data with the criterion to determine if the event is non-compliant or compliant with the regulatory compliance issue.Type: ApplicationFiled: July 16, 2010Publication date: January 19, 2012Applicant: SAP AGInventors: YING ZENG, ATUL SUDHALKAR, PETR STASTNY, PRATHAP SAKALA