Patents by Inventor Ruchir Tewari
Ruchir Tewari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11088843Abstract: Trusted virtual process execution contexts using secure distributed ledger are disclosed herein. An example system can be configured to determine an allowable state for an IoT endpoint node of the IoT endpoint nodes, the allowable state having one or more trusted parameters for the IoT endpoint node; hashing the one or more trusted parameters of the allowable state for the IoT endpoint node into a parameter hash; store the hashed, trusted parameters along with the parameter hash; hashed, trusted and provision the one or more trusted elements with the one or more trusted parameters for the IoT endpoint node when the one or more trusted parameters are verified.Type: GrantFiled: February 7, 2019Date of Patent: August 10, 2021Assignee: NEBBIOLO TECHNOLOGIES, INC.Inventors: Ruchir Tewari, Sureshkumar Kaliannan, Atul Prasad
-
Patent number: 11089007Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.Type: GrantFiled: November 21, 2019Date of Patent: August 10, 2021Assignee: General Electric CompanyInventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
-
Patent number: 11005857Abstract: Systems and methods for security of industrial data streams are provided herein. Methods according to various embodiments include provisioning a fogNode that is communicatively coupled with a fog cloud manager through a forwarder of the fogNode and providing a fogLet within the fogNode, the fogLet communicating with a plurality of operational technology devices. Embodiments include providing fogLet identification information using hardware root of trust of the fogNode, the hardware root of trust of the fogNode being a Trusted Platform Module (TPM) of the fogNode. Embodiments further comprise communicating operational device authentication information with fogLet identification information to a third party tenant application, the third party tenant application validating industrial data streams from the operational technology devices by communicating the operational device authentication information with the fogLet identification information to a third party cloud application.Type: GrantFiled: October 24, 2018Date of Patent: May 11, 2021Assignee: NEBBIOLO TECHNOLOGIES, INC.Inventors: Ruchir Tewari, Thushar Gowda, Pankaj Bhagra, Thiru Narayanan, Palani Chinnakannan
-
Patent number: 10955830Abstract: According to some exemplary embodiments, the present disclosure is directed to a secure edge datastream processing and distribution system comprising a trusted datastream with metadata indicating ownership and access rights added at an edge. Further embodiments include sensors, machines or robots sending sensor data attributes to a fog operating system data pipeline, the fog operating system data pipeline sending dynamic data tags to secure containers and/or the fog operating system data pipeline sending role and org assignment data to secure containers. The secure containers may send correlated edge analytics to an authorization policy engine, and/or the secure containers may send datastream identification definition data to an authorization policy engine.Type: GrantFiled: February 8, 2019Date of Patent: March 23, 2021Assignee: Nebbiolo Technologies, Inc.Inventors: Ruchir Tewari, Kannan Devarajan, Pankaj Bhagra
-
Publication number: 20200257275Abstract: According to some exemplary embodiments, the present disclosure is directed to a secure edge datastream processing and distribution system comprising a trusted datastream with metadata indicating ownership and access rights added at an edge. Further embodiments include sensors, machines or robots sending sensor data attributes to a fog operating system data pipeline, the fog operating system data pipeline sending dynamic data tags to secure containers and/or the fog operating system data pipeline sending role and org assignment data to secure containers. The secure containers may send correlated edge analytics to an authorization policy engine, and/or the secure containers may send datastream identification definition data to an authorization policy engine.Type: ApplicationFiled: February 8, 2019Publication date: August 13, 2020Inventors: Ruchir Tewari, Kannan Devarajan
-
Publication number: 20200259660Abstract: Trusted virtual process execution contexts using secure distributed ledger are disclosed herein. An example system can be configured to determine an allowable state for an IoT endpoint node of the IoT endpoint nodes, the allowable state having one or more trusted parameters for the IoT endpoint node; hashing the one or more trusted parameters of the allowable state for the IoT endpoint node into a parameter hash; store the hashed, trusted parameters along with the parameter hash; hashed, trusted and provision the one or more trusted elements with the one or more trusted parameters for the IoT endpoint node when the one or more trusted parameters are verified.Type: ApplicationFiled: February 7, 2019Publication date: August 13, 2020Inventors: Ruchir Tewari, Sureshkumar Kaliannan, Atul Prasad
-
Publication number: 20200137078Abstract: Systems and methods for security of industrial data streams are provided herein. Methods according to various embodiments include provisioning a fogNode that is communicatively coupled with a fog cloud manager through a forwarder of the fogNode and providing a fogLet within the fogNode, the fogLet communicating with a plurality of operational technology devices. Embodiments include providing fogLet identification information using hardware root of trust of the fogNode, the hardware root of trust of the fogNode being a Trusted Platform Module (TPM) of the fogNode. Embodiments further comprise communicating operational device authentication information with fogLet identification information to a third party tenant application, the third party tenant application validating industrial data streams from the operational technology devices by communicating the operational device authentication information with the fogLet identification information to a third party cloud application.Type: ApplicationFiled: October 24, 2018Publication date: April 30, 2020Inventors: Ruchir Tewari, Thushar Gowda, Pankaj Bhagra, Thiru Narayanan, Palani Chinnakannan
-
Publication number: 20200104182Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.Type: ApplicationFiled: November 21, 2019Publication date: April 2, 2020Inventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
-
Patent number: 10491584Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.Type: GrantFiled: May 22, 2017Date of Patent: November 26, 2019Assignee: General Electric CompanyInventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
-
Publication number: 20180337915Abstract: Systems and methods for role-based access control to computing resources are presented. In an example embodiment, a request to perform a type of access of a computing resource is received via a communication network from a process executing on a client device. Using a data store storing process identifiers and associated access control information, access control information associated with the requesting process is identified based on a process identifier of the requesting process. Based on the access control information associated with the requesting process, a determination is made whether the requesting process is allowed to perform the requested type of access of the computing resource. The request is processed based on the requesting process being allowed to perform the requested type of access of the computing resource.Type: ApplicationFiled: May 22, 2017Publication date: November 22, 2018Inventors: Ruchir Tewari, Vineet Banga, Atul Chandrakant Kshirsagar
-
Patent number: 9870413Abstract: A system and method for efficiently accessing replicas of a storage object. A first node may perform a find operation to determine a plurality of nodes that each store a replica of a first storage object. For each node in the plurality of nodes, the first node may establish a direct connection to the node. The first node may then access the replicas of the first storage object using the respective direct connections to the plurality of nodes. In one embodiment, the nodes may be nodes in a peer-to-peer network. Establishing a direct connection to each storage object replica may enable the first node to communicate with each node in a single hop without having to pass messages via intermediate nodes in the peer-to-peer network.Type: GrantFiled: April 4, 2014Date of Patent: January 16, 2018Assignee: Veritas Technologies LLCInventors: Thomas E. Saulpaugh, Gregory L. Slaughter, Ruchir Tewari
-
Patent number: 9602549Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: December 15, 2015Date of Patent: March 21, 2017Assignee: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 9563772Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: September 1, 2015Date of Patent: February 7, 2017Assignee: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20160112458Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: December 15, 2015Publication date: April 21, 2016Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 9246893Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: March 14, 2014Date of Patent: January 26, 2016Assignee: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20150371045Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: September 1, 2015Publication date: December 24, 2015Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 9129112Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: March 15, 2013Date of Patent: September 8, 2015Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 8886705Abstract: A system and method for performing goal-oriented storage management for a distributed data storage network. Storage management software may execute on each node to cause the distributed data storage network to converge toward a system-wide storage goal. In various embodiments, the system-wide storage goal may be defined to accomplish any of various kinds of optimizations or performance improvements for the system, such as balancing storage utilization, achieving appropriate data replication, increasing performance, increasing fault tolerance, etc.Type: GrantFiled: June 30, 2003Date of Patent: November 11, 2014Assignee: Symantec Operating CorporationInventors: Ruchir Tewari, Xiaohui “Dawn” Chen, Gregory L. Slaughter, Thomas E. Saulpaugh
-
Publication number: 20140282833Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20140281548Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: March 14, 2014Publication date: September 18, 2014Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari