Patents by Inventor PRATHAP SAKALA

PRATHAP SAKALA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200286016
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: May 22, 2020
    Publication date: September 10, 2020
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
  • Publication number: 20190244147
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 8, 2019
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
  • Patent number: 10204312
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Grant
    Filed: May 25, 2018
    Date of Patent: February 12, 2019
    Assignee: Alert Enterprise, Inc.
    Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
  • Publication number: 20180314996
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: May 25, 2018
    Publication date: November 1, 2018
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
  • Patent number: 9984344
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: May 29, 2018
    Assignee: Alert Enterprise, Inc.
    Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
  • Publication number: 20170236080
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
  • Patent number: 9639820
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: May 2, 2017
    Assignee: Alert Enterprise
    Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
  • Publication number: 20160267408
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.
    Type: Application
    Filed: April 25, 2016
    Publication date: September 15, 2016
    Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
  • Patent number: 9324119
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: April 26, 2016
    Assignee: ALERT ENTERPRISE
    Inventors: Subrat Narenda Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
  • Publication number: 20140279641
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Inventors: Subrat Narenda SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
  • Publication number: 20120310850
    Abstract: In one embodiment, a method includes determining a plurality of event types where each event type being stored in association with event metadata. One or more events are received and an event type in the plurality of event types for each received event is determined. The method determines event metadata for each determined event type and event data from the event based on the event metadata. One or more control data objects are determined stored in association with the determined event type; one or more rules stored in associated with each of the control data objects is determined where the rule comprises one or more criteria being evaluated against one of the data values of said event; and evaluating the event data with the criterion to determine if each of the events is non-compliant or compliant with a low-level system requirement of said rule.
    Type: Application
    Filed: June 26, 2012
    Publication date: December 6, 2012
    Applicant: SAP AG
    Inventors: YING ZENG, ATUL SUDHALKAR, PETR STASTNY, PRATHAP SAKALA
  • Publication number: 20120016802
    Abstract: In one embodiment, a method includes determining a plurality of event types where each event type associated with event metadata. An event is received and an event type in the plurality of event types for the received event is determined. The method determines event metadata for the determined event type and event data from the event based on the event metadata. A rule associated with the event type is determined where the rule includes a criterion based on a regulatory compliance issue. A computing device evaluates the event data with the criterion to determine if the event is non-compliant or compliant with the regulatory compliance issue.
    Type: Application
    Filed: July 16, 2010
    Publication date: January 19, 2012
    Applicant: SAP AG
    Inventors: YING ZENG, ATUL SUDHALKAR, PETR STASTNY, PRATHAP SAKALA