Patents by Inventor Ruchir Tewari

Ruchir Tewari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11088843
    Abstract: Trusted virtual process execution contexts using secure distributed ledger are disclosed herein. An example system can be configured to determine an allowable state for an IoT endpoint node of the IoT endpoint nodes, the allowable state having one or more trusted parameters for the IoT endpoint node; hashing the one or more trusted parameters of the allowable state for the IoT endpoint node into a parameter hash; store the hashed, trusted parameters along with the parameter hash; hashed, trusted and provision the one or more trusted elements with the one or more trusted parameters for the IoT endpoint node when the one or more trusted parameters are verified.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: August 10, 2021
    Assignee: NEBBIOLO TECHNOLOGIES, INC.
    Inventors: Ruchir Tewari, Sureshkumar Kaliannan, Atul Prasad
  • Patent number: 11089007
    Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.
    Type: Grant
    Filed: November 21, 2019
    Date of Patent: August 10, 2021
    Assignee: General Electric Company
    Inventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
  • Patent number: 11005857
    Abstract: Systems and methods for security of industrial data streams are provided herein. Methods according to various embodiments include provisioning a fogNode that is communicatively coupled with a fog cloud manager through a forwarder of the fogNode and providing a fogLet within the fogNode, the fogLet communicating with a plurality of operational technology devices. Embodiments include providing fogLet identification information using hardware root of trust of the fogNode, the hardware root of trust of the fogNode being a Trusted Platform Module (TPM) of the fogNode. Embodiments further comprise communicating operational device authentication information with fogLet identification information to a third party tenant application, the third party tenant application validating industrial data streams from the operational technology devices by communicating the operational device authentication information with the fogLet identification information to a third party cloud application.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: May 11, 2021
    Assignee: NEBBIOLO TECHNOLOGIES, INC.
    Inventors: Ruchir Tewari, Thushar Gowda, Pankaj Bhagra, Thiru Narayanan, Palani Chinnakannan
  • Patent number: 10955830
    Abstract: According to some exemplary embodiments, the present disclosure is directed to a secure edge datastream processing and distribution system comprising a trusted datastream with metadata indicating ownership and access rights added at an edge. Further embodiments include sensors, machines or robots sending sensor data attributes to a fog operating system data pipeline, the fog operating system data pipeline sending dynamic data tags to secure containers and/or the fog operating system data pipeline sending role and org assignment data to secure containers. The secure containers may send correlated edge analytics to an authorization policy engine, and/or the secure containers may send datastream identification definition data to an authorization policy engine.
    Type: Grant
    Filed: February 8, 2019
    Date of Patent: March 23, 2021
    Assignee: Nebbiolo Technologies, Inc.
    Inventors: Ruchir Tewari, Kannan Devarajan, Pankaj Bhagra
  • Publication number: 20200257275
    Abstract: According to some exemplary embodiments, the present disclosure is directed to a secure edge datastream processing and distribution system comprising a trusted datastream with metadata indicating ownership and access rights added at an edge. Further embodiments include sensors, machines or robots sending sensor data attributes to a fog operating system data pipeline, the fog operating system data pipeline sending dynamic data tags to secure containers and/or the fog operating system data pipeline sending role and org assignment data to secure containers. The secure containers may send correlated edge analytics to an authorization policy engine, and/or the secure containers may send datastream identification definition data to an authorization policy engine.
    Type: Application
    Filed: February 8, 2019
    Publication date: August 13, 2020
    Inventors: Ruchir Tewari, Kannan Devarajan
  • Publication number: 20200259660
    Abstract: Trusted virtual process execution contexts using secure distributed ledger are disclosed herein. An example system can be configured to determine an allowable state for an IoT endpoint node of the IoT endpoint nodes, the allowable state having one or more trusted parameters for the IoT endpoint node; hashing the one or more trusted parameters of the allowable state for the IoT endpoint node into a parameter hash; store the hashed, trusted parameters along with the parameter hash; hashed, trusted and provision the one or more trusted elements with the one or more trusted parameters for the IoT endpoint node when the one or more trusted parameters are verified.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 13, 2020
    Inventors: Ruchir Tewari, Sureshkumar Kaliannan, Atul Prasad
  • Publication number: 20200137078
    Abstract: Systems and methods for security of industrial data streams are provided herein. Methods according to various embodiments include provisioning a fogNode that is communicatively coupled with a fog cloud manager through a forwarder of the fogNode and providing a fogLet within the fogNode, the fogLet communicating with a plurality of operational technology devices. Embodiments include providing fogLet identification information using hardware root of trust of the fogNode, the hardware root of trust of the fogNode being a Trusted Platform Module (TPM) of the fogNode. Embodiments further comprise communicating operational device authentication information with fogLet identification information to a third party tenant application, the third party tenant application validating industrial data streams from the operational technology devices by communicating the operational device authentication information with the fogLet identification information to a third party cloud application.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: Ruchir Tewari, Thushar Gowda, Pankaj Bhagra, Thiru Narayanan, Palani Chinnakannan
  • Publication number: 20200104182
    Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.
    Type: Application
    Filed: November 21, 2019
    Publication date: April 2, 2020
    Inventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
  • Patent number: 10491584
    Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.
    Type: Grant
    Filed: May 22, 2017
    Date of Patent: November 26, 2019
    Assignee: General Electric Company
    Inventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
  • Publication number: 20180337915
    Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.
    Type: Application
    Filed: May 22, 2017
    Publication date: November 22, 2018
    Inventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
  • Patent number: 9870413
    Abstract: A system and method for efficiently accessing replicas of a storage object. A first node may perform a find operation to determine a plurality of nodes that each store a replica of a first storage object. For each node in the plurality of nodes, the first node may establish a direct connection to the node. The first node may then access the replicas of the first storage object using the respective direct connections to the plurality of nodes. In one embodiment, the nodes may be nodes in a peer-to-peer network. Establishing a direct connection to each storage object replica may enable the first node to communicate with each node in a single hop without having to pass messages via intermediate nodes in the peer-to-peer network.
    Type: Grant
    Filed: April 4, 2014
    Date of Patent: January 16, 2018
    Assignee: Veritas Technologies LLC
    Inventors: Thomas E. Saulpaugh, Gregory L. Slaughter, Ruchir Tewari
  • Patent number: 9602549
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: March 21, 2017
    Assignee: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
  • Patent number: 9563772
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Grant
    Filed: September 1, 2015
    Date of Patent: February 7, 2017
    Assignee: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
  • Publication number: 20160112458
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Application
    Filed: December 15, 2015
    Publication date: April 21, 2016
    Applicant: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
  • Patent number: 9246893
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: January 26, 2016
    Assignee: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
  • Publication number: 20150371045
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Application
    Filed: September 1, 2015
    Publication date: December 24, 2015
    Applicant: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
  • Patent number: 9129112
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 8, 2015
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
  • Patent number: 8886705
    Abstract: A system and method for performing goal-oriented storage management for a distributed data storage network. Storage management software may execute on each node to cause the distributed data storage network to converge toward a system-wide storage goal. In various embodiments, the system-wide storage goal may be defined to accomplish any of various kinds of optimizations or performance improvements for the system, such as balancing storage utilization, achieving appropriate data replication, increasing performance, increasing fault tolerance, etc.
    Type: Grant
    Filed: June 30, 2003
    Date of Patent: November 11, 2014
    Assignee: Symantec Operating Corporation
    Inventors: Ruchir Tewari, Xiaohui “Dawn” Chen, Gregory L. Slaughter, Thomas E. Saulpaugh
  • Publication number: 20140282833
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
  • Publication number: 20140281548
    Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 18, 2014
    Applicant: Oracle International Corporation
    Inventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari