Patents by Inventor Satyam Tyagi
Satyam Tyagi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10965651Abstract: Described herein are systems, methods, and software to enhance secure communications between computing systems. In one implementation, a private domain name system (DNS) receives a DNS lookup request from a computing system of a plurality of computing systems associated with a private communication group, and forwards the DNS lookup request to a public DNS. The private DNS further receives a public address associated with the DNS lookup request from the public DNS, translates the public address to a private address, and transfers the private address to the requesting computing system.Type: GrantFiled: December 20, 2017Date of Patent: March 30, 2021Assignee: COLORTOKENS, INC.Inventors: Anoop Kapoor, Ryan Farjadi, Pankaj Parekh, Ashish Trivedi, Satyam Tyagi, Harish Magganmane, Deepak Mohanty, Ravi Voleti
-
Publication number: 20190190894Abstract: Described herein are systems, methods, and software to enhance secure communications between computing systems. In one implementation, a private domain name system (DNS) receives a DNS lookup request from a computing system of a plurality of computing systems associated with a private communication group, and forwards the DNS lookup request to a public DNS. The private DNS further receives a public address associated with the DNS lookup request from the public DNS, translates the public address to a private address, and transfers the private address to the requesting computing system.Type: ApplicationFiled: December 20, 2017Publication date: June 20, 2019Inventors: Anoop Kapoor, Ryan Farjadi, Pankaj Parekh, Ashish Trivedi, Satyam Tyagi, Harish Magganmane, Deepak Mohanty, Ravi Voleti
-
Patent number: 9961197Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: GrantFiled: January 12, 2015Date of Patent: May 1, 2018Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Patent number: 9197746Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: GrantFiled: February 5, 2009Date of Patent: November 24, 2015Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Publication number: 20150124945Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: ApplicationFiled: January 12, 2015Publication date: May 7, 2015Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Patent number: 8705720Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.Type: GrantFiled: February 8, 2008Date of Patent: April 22, 2014Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
-
Patent number: 8582567Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).Type: GrantFiled: August 9, 2006Date of Patent: November 12, 2013Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Kumar Singh, Raghavendra Venkata Thodime
-
Patent number: 8503657Abstract: A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.Type: GrantFiled: October 21, 2009Date of Patent: August 6, 2013Assignee: Avaya Inc.Inventors: Satyam Tyagi, Guru-Prasad Thodime-Venkata
-
Patent number: 8433521Abstract: In one embodiment, a path request message for a new data flow is received at a network node. The path request message indicates resources needed to accommodate the new data flow. The resources needed to accommodate the new data flow are compared to an amount of available resources at the network node. Provided there are sufficient available resources at the network node to accommodate the new data flow, the resources needed to accommodate the new data flow are associated with a held resources state. Subsequently, a reservation request message is received at the network node. The reservation request message requests resources for the new data flow. A determination is made that the requested resources correspond to resources associated with the held resources state. The requested resources are removed from the held resources state and reserved for the new data flow.Type: GrantFiled: November 16, 2009Date of Patent: April 30, 2013Assignee: Cisco Technology, Inc.Inventors: Satyam Tyagi, Subhasri Dhesikan
-
Publication number: 20100107230Abstract: A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.Type: ApplicationFiled: October 21, 2009Publication date: April 29, 2010Applicant: Sipera Systems, Inc.Inventors: Satyam Tyagi, Guru-Prasad Thodime-Venkata
-
Publication number: 20100074107Abstract: In one embodiment, a path request message for a new data flow is received at a network node. The path request message indicates resources needed to accommodate the new data flow. The resources needed to accommodate the new data flow are compared to an amount of available resources at the network node. Provided there are sufficient available resources at the network node to accommodate the new data flow, the resources needed to accommodate the new data flow are associated with a held resources state. Subsequently, a reservation request message is received at the network node. The reservation request message requests resources for the new data flow. A determination is made that the requested resources correspond to resources associated with the held resources state. The requested resources are removed from the held resources state and reserved for the new data flow.Type: ApplicationFiled: November 16, 2009Publication date: March 25, 2010Applicant: CISCO TECHNOLOGY, INC.Inventors: Satyam Tyagi, Subhasri Dhesikan
-
Patent number: 7636302Abstract: A technique avoids unnecessary preemption of resource reservations along a requested flow between nodes in a computer network. A node receives priority-based resource reservation requests and determines conditions of reservation eligibility by comparing the requested resources to the amount of available resources at the node. Specifically, the node maintains a “held resources” state where available requested resources are held prior to their being assigned or reserved (confirmed) for the requested flow, such as, e.g., during an initial Resource reSerVation Protocol (RSVP) Path message. The node includes the held resources in calculations of available resources in such a way as to prevent resources from being assigned or reserved if the resources would be subsequently preempted by a request of higher priority, or if an earlier request would first utilize the resources. The node (e.g.Type: GrantFiled: May 20, 2005Date of Patent: December 22, 2009Assignee: Cisco Technology, Inc.Inventors: Satyam Tyagi, Subhasri Dhesikan
-
Publication number: 20090217039Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: ApplicationFiled: February 5, 2009Publication date: August 27, 2009Applicant: SIPERA SYSTEMS, INC.Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Publication number: 20090168756Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.Type: ApplicationFiled: February 8, 2008Publication date: July 2, 2009Applicant: SIPERA SYSTEMS, INC.Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
-
Publication number: 20070121596Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).Type: ApplicationFiled: August 9, 2006Publication date: May 31, 2007Applicant: Sipera Systems, Inc.Inventors: Krishna Kurapati, Sachin Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Singh, Raghavendra Thodime
-
Publication number: 20060274650Abstract: A technique avoids unnecessary preemption of resource reservations along a requested flow between nodes in a computer network. A node receives priority-based resource reservation requests and determines conditions of reservation eligibility by comparing the requested resources to the amount of available resources at the node. Specifically, the node maintains a “held resources” state where available requested resources are held prior to their being assigned or reserved (confirmed) for the requested flow, such as, e.g., during an initial Resource reSerVation Protocol (RSVP) Path message. The node includes the held resources in calculations of available resources in such a way as to prevent resources from being assigned or reserved if the resources would be subsequently preempted by a request of higher priority, or if an earlier request would first utilize the resources. The node (e.g.Type: ApplicationFiled: May 20, 2005Publication date: December 7, 2006Inventors: Satyam Tyagi, Subhasri Dhesikan