Patents by Inventor Saket Dwivedi

Saket Dwivedi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090216587
    Abstract: Physical coordinates of a user and an asset are determined. A probability that the user and the asset are close to one another is determined based on the physical coordinates of the user and the asset. Permission for the user to access to the asset is decided based on the probability. Additionally or alternatively, logical coordinates of a user and an asset are determined. The logical coordinates of the user and the asset are compared, and permission for the user to access to the asset is decided based on the comparison.
    Type: Application
    Filed: June 20, 2008
    Publication date: August 27, 2009
    Inventors: Saket Dwivedi, Harsha R. Angeri, Vikram J. Arora
  • Publication number: 20080320552
    Abstract: Enterprise threat assessment and management provides both physical and logical security. Physical access control systems are configured to identify physical events in the physical domain, and logical access control systems are configured to identify logical events in the logical domain. Connectors establish uninterrupted coupling to the physical and logical access control systems. Event middleware is configured to selectively subscribe only to those events that correspond to defined policies. The policies define a correlation of the physical and logical events, actions are initiated depending upon the correlated physical and logical events defined by the policies.
    Type: Application
    Filed: June 19, 2008
    Publication date: December 25, 2008
    Inventors: Tarun Kumar, Venkata Bulusu, Balasubramanian Meenakshi, Saket Dwivedi, Harsha R. Angeri, Vikram J. Arora
  • Publication number: 20080091681
    Abstract: A security architecture has an event analysis engine that acquires several tangible actions. The occur in an action space of an organization, and relate to unauthorized access to assets and reproduction of information. The event analysis engine evaluates the acquired actions based on the information stored in the database and in the context of past actions which have occurred, and determines a suitable response to the acquired action based on the evaluation.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 17, 2008
    Inventors: Saket Dwivedi, Harsha Angeri, Vikram Arora