Patents by Inventor Ratinder Paul Singh Ahuja

Ratinder Paul Singh Ahuja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170374064
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Application
    Filed: September 11, 2017
    Publication date: December 28, 2017
    Applicant: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Publication number: 20170359217
    Abstract: System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment selects a first microservice of a first hierarchy, configures the microservices of a second lower-level hierarchy to remove the first microservice from load balancing decisions to the first hierarchy, moves the first microservice to another server, configures data plane connectivity to the first microservice to reflect a change in server, and configures the microservices of the second hierarchy to include the first microservice in load balancing decisions to the first hierarchy.
    Type: Application
    Filed: June 27, 2016
    Publication date: December 14, 2017
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 9794254
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: October 17, 2017
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Patent number: 9716617
    Abstract: System, methods, and apparatuses used to monitor network traffic of a datacenter and report security threats are described. For example, one embodiment scales out a hierarchy of microservices in a security system. In particular, the embodiment calls for scaling out a hierarchy of microservices in such a security system, creating a new microservice of a first hierarchy, configuring data plane connectivity between the new microservice and a microservice of a second, higher-level hierarchy; configuring data plane connectivity between the new microservice and a microservice of a third, lower-level hierarchy; and configuring the microservices of the third level of hierarchy to include the new microservice in load balancing decisions to the first hierarchy.
    Type: Grant
    Filed: June 14, 2016
    Date of Patent: July 25, 2017
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal
  • Patent number: 9602548
    Abstract: A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: March 21, 2017
    Assignee: McAfee, Inc.
    Inventors: William Deninger, Ratinder Paul Singh Ahuja, Lee C. Cheung
  • Publication number: 20160381037
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: April 25, 2016
    Publication date: December 29, 2016
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Patent number: 9430564
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: August 30, 2016
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
  • Patent number: 9374225
    Abstract: Security of a plurality of registered digital documents in a system are monitored and the monitoring includes determining whether signatures associated with the registered digital documents are included in data propagating in network traffic of the system. A particular signature of a particular document in the plurality of registered digital documents is detected from the data propagating in the network. It is determined, based at least in part on the detecting, that detection of the particular signature exceeds a threshold detection rate for registered digital documents in the system. The particular signature is removed from a signature database including the signatures of the plurality of registered digital documents.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: June 21, 2016
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
  • Publication number: 20160142442
    Abstract: A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state.
    Type: Application
    Filed: November 16, 2015
    Publication date: May 19, 2016
    Applicant: McAfee, Inc.
    Inventors: William Deninger, Ratinder Paul Singh Ahuja, Lee C. Cheung
  • Patent number: 9326134
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: April 26, 2016
    Assignee: McAfee Inc.
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Patent number: 9195937
    Abstract: A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: November 24, 2015
    Assignee: McAfee, Inc.
    Inventors: William Deninger, Ratinder Paul Singh Ahuja, Lee C. Cheung
  • Patent number: 9094338
    Abstract: A system and method for capturing objects and balancing systems resources in a capture system are described. An object is captured, metadata associated with the objected generated, and the object and metadata stored.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: July 28, 2015
    Assignee: McAFEE, INC.
    Inventors: Ratinder Paul Singh Ahuja, William Deninger, Erik de la Iglesia, Rick Lowe
  • Publication number: 20150067810
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Application
    Filed: August 11, 2014
    Publication date: March 5, 2015
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Patent number: 8850591
    Abstract: A method is provided in one example embodiment and it includes identifying a root term and determining one or more other terms belonging to a group associated with the root term. The method also includes selecting one or more of the terms from the group and generating a concept based on the selected terms from the group, wherein the concept is applied to a rule that affects data management for one or more documents that satisfy the rule. In more specific embodiments, the root term is identified via a search or via an incident list. In other embodiments, a collection of meaningful terms is provided to assist in determining the other terms for the group, the collection of meaningful terms being generated based on the root term. The concept can be used to automatically mark one or more documents that relate to the concept.
    Type: Grant
    Filed: January 13, 2009
    Date of Patent: September 30, 2014
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, William Deninger, Faizel Lakhani, Joel Christner
  • Publication number: 20140289416
    Abstract: A system and method for capturing objects and balancing systems resources in a capture system are described. An object is captured, metadata associated with the objected generated, and the object and metadata stored.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 25, 2014
    Inventors: Ratinder Paul Singh Ahuja, William Deninger, Erik de la Iglesia, Rick Lowe
  • Patent number: 8806615
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Grant
    Filed: November 4, 2010
    Date of Patent: August 12, 2014
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Publication number: 20140194094
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: October 18, 2013
    Publication date: July 10, 2014
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Patent number: 8762386
    Abstract: Content leaving a local network can be captured and indexed so that queries can be performed on the captured data. In one embodiment, the present invention comprises an apparatus that connects to a network. In one embodiment, this apparatus includes a network interface module to connect the apparatus to a network, a packet capture module to intercept packets being transmitted on the network, an object assembly module to reconstruct objects being transmitted on the network from the intercepted packets, an object classification module to determine the content in the reconstructed objects, and an object store module to store the objects. This apparatus can also have a user interface to enable a user to search objects stored in the object store module.
    Type: Grant
    Filed: June 24, 2011
    Date of Patent: June 24, 2014
    Assignee: McAfee, Inc.
    Inventors: Erik de la Iglesia, Rick Lowe, Ratinder Paul Singh Ahuja, William Deninger, Samuel King, Ashish Khasgiwala, Donald J. Massaro
  • Publication number: 20140173739
    Abstract: A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset.
    Type: Application
    Filed: December 18, 2012
    Publication date: June 19, 2014
    Inventors: Ratinder Paul Singh Ahuja, Sven Schrecker
  • Publication number: 20140164314
    Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.
    Type: Application
    Filed: January 16, 2014
    Publication date: June 12, 2014
    Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar