Patents by Inventor Satyam Tyagi
Satyam Tyagi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12177261Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: GrantFiled: March 28, 2024Date of Patent: December 24, 2024Assignee: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Patent number: 12177260Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: GrantFiled: March 28, 2024Date of Patent: December 24, 2024Assignee: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Patent number: 12177262Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: GrantFiled: March 28, 2024Date of Patent: December 24, 2024Assignee: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Publication number: 20240356983Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: ApplicationFiled: March 28, 2024Publication date: October 24, 2024Applicant: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Publication number: 20240356979Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: ApplicationFiled: March 28, 2024Publication date: October 24, 2024Applicant: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Publication number: 20240356982Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: ApplicationFiled: March 28, 2024Publication date: October 24, 2024Applicant: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Publication number: 20240356981Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: ApplicationFiled: March 28, 2024Publication date: October 24, 2024Applicant: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Syn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Publication number: 20240356980Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: ApplicationFiled: March 28, 2024Publication date: October 24, 2024Applicant: ColorTokens Inc.Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Publication number: 20240356978Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.Type: ApplicationFiled: June 28, 2023Publication date: October 24, 2024Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
-
Patent number: 10965651Abstract: Described herein are systems, methods, and software to enhance secure communications between computing systems. In one implementation, a private domain name system (DNS) receives a DNS lookup request from a computing system of a plurality of computing systems associated with a private communication group, and forwards the DNS lookup request to a public DNS. The private DNS further receives a public address associated with the DNS lookup request from the public DNS, translates the public address to a private address, and transfers the private address to the requesting computing system.Type: GrantFiled: December 20, 2017Date of Patent: March 30, 2021Assignee: COLORTOKENS, INC.Inventors: Anoop Kapoor, Ryan Farjadi, Pankaj Parekh, Ashish Trivedi, Satyam Tyagi, Harish Magganmane, Deepak Mohanty, Ravi Voleti
-
Publication number: 20190190894Abstract: Described herein are systems, methods, and software to enhance secure communications between computing systems. In one implementation, a private domain name system (DNS) receives a DNS lookup request from a computing system of a plurality of computing systems associated with a private communication group, and forwards the DNS lookup request to a public DNS. The private DNS further receives a public address associated with the DNS lookup request from the public DNS, translates the public address to a private address, and transfers the private address to the requesting computing system.Type: ApplicationFiled: December 20, 2017Publication date: June 20, 2019Inventors: Anoop Kapoor, Ryan Farjadi, Pankaj Parekh, Ashish Trivedi, Satyam Tyagi, Harish Magganmane, Deepak Mohanty, Ravi Voleti
-
Patent number: 9961197Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: GrantFiled: January 12, 2015Date of Patent: May 1, 2018Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Patent number: 9197746Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: GrantFiled: February 5, 2009Date of Patent: November 24, 2015Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Publication number: 20150124945Abstract: The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.Type: ApplicationFiled: January 12, 2015Publication date: May 7, 2015Inventors: Srikrishna Kurapati, Rajesh Mohan, Karthikeyan Sadhasivam, Satyam Tyagi
-
Patent number: 8705720Abstract: The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process.Type: GrantFiled: February 8, 2008Date of Patent: April 22, 2014Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Guru-Prasad Thodime-Venkata, Satyam Tyagi
-
Patent number: 8582567Abstract: The present invention provides a system, method and apparatus for providing network level and nodal level vulnerability protection in VoIP networks by receiving a communication, filtering the received communication using three or more stages selected from the group comprising a media protection and filtering plane, a policy based filtering plane, a signature based filtering plane, a protocol anomaly detection and filtering plane and a behavioral learning based filtering plane, and either allowing or denying the received communication based the filtering step. The stages are applicable to one or more protocols including SIP, IMS, UMA, H.248, H.323, RTP, CSTA/XML or a combination thereof. In addition, the stages can be implemented within a single device or are distributed across a network (e.g., SIP network, a UMA network, an IMS network or a combination thereof).Type: GrantFiled: August 9, 2006Date of Patent: November 12, 2013Assignee: Avaya Inc.Inventors: Srikrishna Kurapati, Sachin Purushottam Joglekar, Venkatesan Iyengar Prasanna, Satyam Tyagi, Guru Thodime, Pravin Khandelwal, Chandrasekhar Manchenella, Mukesh Kumar Singh, Raghavendra Venkata Thodime
-
Patent number: 8503657Abstract: A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.Type: GrantFiled: October 21, 2009Date of Patent: August 6, 2013Assignee: Avaya Inc.Inventors: Satyam Tyagi, Guru-Prasad Thodime-Venkata
-
Patent number: 8433521Abstract: In one embodiment, a path request message for a new data flow is received at a network node. The path request message indicates resources needed to accommodate the new data flow. The resources needed to accommodate the new data flow are compared to an amount of available resources at the network node. Provided there are sufficient available resources at the network node to accommodate the new data flow, the resources needed to accommodate the new data flow are associated with a held resources state. Subsequently, a reservation request message is received at the network node. The reservation request message requests resources for the new data flow. A determination is made that the requested resources correspond to resources associated with the held resources state. The requested resources are removed from the held resources state and reserved for the new data flow.Type: GrantFiled: November 16, 2009Date of Patent: April 30, 2013Assignee: Cisco Technology, Inc.Inventors: Satyam Tyagi, Subhasri Dhesikan
-
Publication number: 20100107230Abstract: A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.Type: ApplicationFiled: October 21, 2009Publication date: April 29, 2010Applicant: Sipera Systems, Inc.Inventors: Satyam Tyagi, Guru-Prasad Thodime-Venkata
-
Publication number: 20100074107Abstract: In one embodiment, a path request message for a new data flow is received at a network node. The path request message indicates resources needed to accommodate the new data flow. The resources needed to accommodate the new data flow are compared to an amount of available resources at the network node. Provided there are sufficient available resources at the network node to accommodate the new data flow, the resources needed to accommodate the new data flow are associated with a held resources state. Subsequently, a reservation request message is received at the network node. The reservation request message requests resources for the new data flow. A determination is made that the requested resources correspond to resources associated with the held resources state. The requested resources are removed from the held resources state and reserved for the new data flow.Type: ApplicationFiled: November 16, 2009Publication date: March 25, 2010Applicant: CISCO TECHNOLOGY, INC.Inventors: Satyam Tyagi, Subhasri Dhesikan