Patents by Inventor Siddharth Sukumar Burle

Siddharth Sukumar Burle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250126127
    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed for association of cloud accounts by instantiating or executing machine-readable instructions to in response to a linking request, associate a first cloud account and a second cloud account, where the association causes changes made to the first cloud account to be propagated to the second cloud account, store the association in a database, monitor a configuration of the first cloud account, and after a change in the configuration information of the first cloud account, apply the configuration information corresponding to the first cloud account to the second cloud account.
    Type: Application
    Filed: April 30, 2024
    Publication date: April 17, 2025
    Inventors: Neeraj Jakhar, Siddharth Sukumar Burle
  • Publication number: 20250126128
    Abstract: An example apparatus comprises memory, first instructions, and programmable circuitry to be programmed by the first instructions to associate a first portion of metadata with a first category, the metadata corresponding to a cloud resource of a cloud account, associate a second portion of the metadata with a second category, and determine a template based on the first portion being greater than the second portion, the template associated with the first category, the template including second instructions to define a target state to be enforced on the cloud account.
    Type: Application
    Filed: April 30, 2024
    Publication date: April 17, 2025
    Inventors: Manish Jain, Siddharth Sukumar Burle, Vishal Gupta, Manoj Kumar Jain, Neeraj Pramod Shah, Chaitrali Talegaonkar, Sagar Sheetalchandra Hukkeri, Ashitosh Dilip Wagh
  • Publication number: 20250126186
    Abstract: Methods and apparatus to manage infrastructure as code (IaC) implementations are disclosed, A disclosed example system to manage a shared computing resource includes programmable circuitry; and machine readable instructions to cause the programmable circuitry to: determine an IaC type associated with a request corresponding to the shared computing resource; select a template from a plurality of IaC templates based on the IaC type; and service the request based on the template.
    Type: Application
    Filed: April 30, 2024
    Publication date: April 17, 2025
    Inventors: Manish Jain, Siddharth Sukumar Burle, Vishal Gupta, Shivanee Shravan Bagbande, Sagar Sheetalchandra Hukkeri
  • Publication number: 20250126120
    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed for converting enforcement policy information into provisioning template information by instantiating or executing machine-readable instructions to determine a type of a first placeholder of a provisioning template with a plurality of placeholders, copy enforcement policy data corresponding to the determined type of the first placeholder, fill the first placeholder of the provisioning template with the copied enforcement policy data, and save the provisioning template.
    Type: Application
    Filed: April 26, 2024
    Publication date: April 17, 2025
    Inventors: Siddharth Sukumar Burle, Manish Jain, Vishal Gupta, Amit Meena, Suraj Malgave
  • Publication number: 20250124133
    Abstract: Systems, apparatus, articles of manufacture, and methods are disclosed to isolate state management in infrastructure as code environments. Disclosed is an apparatus comprising monitor a security infrastructure to determine a first state of the security infrastructure, the security infrastructure to control a function based on the first state, the function defined by an operating protocol; determine that the security infrastructure has transitioned to a second state, the second state associated with an alteration to the security infrastructure; determine whether the alteration of the security infrastructure associated with the second state is undesired, wherein the alteration being undesired corresponds to the function of the security infrastructure deviating from the operating protocol; and modify the security infrastructure by replacing the second state with a third state to counteract the deviation from the operating protocol corresponding to the second state.
    Type: Application
    Filed: April 30, 2024
    Publication date: April 17, 2025
    Inventors: Siddharth Sukumar Burle, Sharadendu Prakash Sinha, Umedh Shriram Meshram, Manish Jain, Neeraj Pramod Shah
  • Patent number: 11637861
    Abstract: A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: April 25, 2023
    Assignee: BMC Software, Inc.
    Inventors: Siddharth Sukumar Burle, Ajoy Kumar, Manish Jain
  • Publication number: 20210234889
    Abstract: A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 29, 2021
    Inventors: Siddharth Sukumar Burle, Ajoy Kumar, Manish Jain