Patents by Inventor Satyam Tyagi

Satyam Tyagi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10965651
    Abstract: Described herein are systems, methods, and software to enhance secure communications between computing systems. In one implementation, a private domain name system (DNS) receives a DNS lookup request from a computing system of a plurality of computing systems associated with a private communication group, and forwards the DNS lookup request to a public DNS. The private DNS further receives a public address associated with the DNS lookup request from the public DNS, translates the public address to a private address, and transfers the private address to the requesting computing system.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: March 30, 2021
    Assignee: COLORTOKENS, INC.
    Inventors: Anoop Kapoor, Ryan Farjadi, Pankaj Parekh, Ashish Trivedi, Satyam Tyagi, Harish Magganmane, Deepak Mohanty, Ravi Voleti
  • Publication number: 20190190894
    Abstract: Described herein are systems, methods, and software to enhance secure communications between computing systems. In one implementation, a private domain name system (DNS) receives a DNS lookup request from a computing system of a plurality of computing systems associated with a private communication group, and forwards the DNS lookup request to a public DNS. The private DNS further receives a public address associated with the DNS lookup request from the public DNS, translates the public address to a private address, and transfers the private address to the requesting computing system.
    Type: Application
    Filed: December 20, 2017
    Publication date: June 20, 2019
    Inventors: Anoop Kapoor, Ryan Farjadi, Pankaj Parekh, Ashish Trivedi, Satyam Tyagi, Harish Magganmane, Deepak Mohanty, Ravi Voleti
  • Patent number: 9961197
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: May 1, 2018
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Patent number: 9197746
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Grant
    Filed: February 5, 2009
    Date of Patent: November 24, 2015
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Publication number: 20150124945
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Application
    Filed: January 12, 2015
    Publication date: May 7, 2015
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Patent number: 8705720
    Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: April 22, 2014
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
  • Patent number: 8582567
    Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
    Type: Grant
    Filed: August 9, 2006
    Date of Patent: November 12, 2013
    Assignee: Avaya Inc.
    Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Kumar Singh, Raghavendra Venkata Thodime
  • Patent number: 8503657
    Abstract: A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.
    Type: Grant
    Filed: October 21, 2009
    Date of Patent: August 6, 2013
    Assignee: Avaya Inc.
    Inventors: Satyam Tyagi, Guru-Prasad Thodime-Venkata
  • Patent number: 8433521
    Abstract: In one embodiment, a path request message for a new data flow is received at a network node. The path request message indicates resources needed to accommodate the new data flow. The resources needed to accommodate the new data flow are compared to an amount of available resources at the network node. Provided there are sufficient available resources at the network node to accommodate the new data flow, the resources needed to accommodate the new data flow are associated with a held resources state. Subsequently, a reservation request message is received at the network node. The reservation request message requests resources for the new data flow. A determination is made that the requested resources correspond to resources associated with the held resources state. The requested resources are removed from the held resources state and reserved for the new data flow.
    Type: Grant
    Filed: November 16, 2009
    Date of Patent: April 30, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Satyam Tyagi, Subhasri Dhesikan
  • Publication number: 20100107230
    Abstract: A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.
    Type: Application
    Filed: October 21, 2009
    Publication date: April 29, 2010
    Applicant: Sipera Systems, Inc.
    Inventors: Satyam Tyagi, Guru-Prasad Thodime-Venkata
  • Publication number: 20100074107
    Abstract: In one embodiment, a path request message for a new data flow is received at a network node. The path request message indicates resources needed to accommodate the new data flow. The resources needed to accommodate the new data flow are compared to an amount of available resources at the network node. Provided there are sufficient available resources at the network node to accommodate the new data flow, the resources needed to accommodate the new data flow are associated with a held resources state. Subsequently, a reservation request message is received at the network node. The reservation request message requests resources for the new data flow. A determination is made that the requested resources correspond to resources associated with the held resources state. The requested resources are removed from the held resources state and reserved for the new data flow.
    Type: Application
    Filed: November 16, 2009
    Publication date: March 25, 2010
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Satyam Tyagi, Subhasri Dhesikan
  • Patent number: 7636302
    Abstract: A technique avoids unnecessary preemption of resource reservations along a requested flow between nodes in a computer network. A node receives priority-based resource reservation requests and determines conditions of reservation eligibility by comparing the requested resources to the amount of available resources at the node. Specifically, the node maintains a “held resources” state where available requested resources are held prior to their being assigned or reserved (confirmed) for the requested flow, such as, e.g., during an initial Resource reSerVation Protocol (RSVP) Path message. The node includes the held resources in calculations of available resources in such a way as to prevent resources from being assigned or reserved if the resources would be subsequently preempted by a request of higher priority, or if an earlier request would first utilize the resources. The node (e.g.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: December 22, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Satyam Tyagi, Subhasri Dhesikan
  • Publication number: 20090217039
    Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
    Type: Application
    Filed: February 5, 2009
    Publication date: August 27, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
  • Publication number: 20090168756
    Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.
    Type: Application
    Filed: February 8, 2008
    Publication date: July 2, 2009
    Applicant: SIPERA SYSTEMS, INC.
    Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
  • Publication number: 20070121596
    Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).
    Type: Application
    Filed: August 9, 2006
    Publication date: May 31, 2007
    Applicant: Sipera Systems, Inc.
    Inventors: Krishna Kurapati, Sachin Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Singh, Raghavendra Thodime
  • Publication number: 20060274650
    Abstract: A technique avoids unnecessary preemption of resource reservations along a requested flow between nodes in a computer network. A node receives priority-based resource reservation requests and determines conditions of reservation eligibility by comparing the requested resources to the amount of available resources at the node. Specifically, the node maintains a “held resources” state where available requested resources are held prior to their being assigned or reserved (confirmed) for the requested flow, such as, e.g., during an initial Resource reSerVation Protocol (RSVP) Path message. The node includes the held resources in calculations of available resources in such a way as to prevent resources from being assigned or reserved if the resources would be subsequently preempted by a request of higher priority, or if an earlier request would first utilize the resources. The node (e.g.
    Type: Application
    Filed: May 20, 2005
    Publication date: December 7, 2006
    Inventors: Satyam Tyagi, Subhasri Dhesikan