Patents by Inventor Srinivasa Kakkera
Srinivasa Kakkera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200286016Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, data from public sites, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 22, 2020Publication date: September 10, 2020Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
-
Publication number: 20190244147Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: February 7, 2019Publication date: August 8, 2019Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA, Jasvir Singh Gill
-
Patent number: 10204312Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: May 25, 2018Date of Patent: February 12, 2019Assignee: Alert Enterprise, Inc.Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20180314996Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 25, 2018Publication date: November 1, 2018Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 10027711Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques including situational awareness and video surveillance. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for co-relating seemingly innocent events and activities to detect real threats and risks, while providing powerful alerting and automated remedial action strategies for decisive action.Type: GrantFiled: March 6, 2012Date of Patent: July 17, 2018Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narendra Singh
-
Patent number: 10021138Abstract: Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy enforcement. Techniques address blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational technology systems in the context of threat and fraud detection, risk analysis and remediation, active policy enforcement and continuous monitoring. Further, techniques provide out of the box workflow rules that give the ability to add, modify, or delete the applicability parameters for policy enforcement.Type: GrantFiled: May 27, 2015Date of Patent: July 10, 2018Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narenda Singh
-
Patent number: 10019677Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.Type: GrantFiled: February 15, 2012Date of Patent: July 10, 2018Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Inderpal Ricky Arora, Srinivasa Kakkera, Madhu Gourineni
-
Patent number: 9984344Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: May 1, 2017Date of Patent: May 29, 2018Assignee: Alert Enterprise, Inc.Inventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20170236080Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 9639820Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: GrantFiled: April 25, 2016Date of Patent: May 2, 2017Assignee: Alert EnterpriseInventors: Subrat Narendra Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20160267408Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across devices and sensors in a machine-to-machine (M2M) or Internet of things (IOT) environment. For example, a device is assigned a risk score which is based on baseline factors such as expected network packets between two devices, normal network packets, access to critical devices, authorized access requests from one device to another device, normal communications to a device, and the critical ports of a device; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, and anomalies from normal behavior patterns. Techniques encompass risk management by computing a risk score in a timely fashion in accordance with an architecture that enables achieving the required scaling necessitated by the huge number of devices in the machine-to-machine (M2M) or Internet of things (IOT) environment.Type: ApplicationFiled: April 25, 2016Publication date: September 15, 2016Inventors: Subrat Narendra SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 9324119Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.Type: GrantFiled: March 13, 2014Date of Patent: April 26, 2016Assignee: ALERT ENTERPRISEInventors: Subrat Narenda Singh, Srinivasa Kakkera, Kiu Li, Prathap Sakala
-
Publication number: 20150281287Abstract: Techniques are provided that for providing complete solutions for role-based, rules-driven access enforcement, the techniques including active policy enforcement. Techniques address blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational technology systems in the context of threat and fraud detection, risk analysis and remediation, active policy enforcement and continuous monitoring. Further, techniques provide out of the box workflow rules that give the ability to add, modify, or delete the applicability parameters for policy enforcement.Type: ApplicationFiled: May 27, 2015Publication date: October 1, 2015Inventors: Jasvir Singh GILL, Inderpal Ricky ARORA, Srinivasa KAKKERA, Subrat Narenda SINGH
-
Publication number: 20140279641Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.Type: ApplicationFiled: March 13, 2014Publication date: September 18, 2014Inventors: Subrat Narenda SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Patent number: 8769412Abstract: A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.Type: GrantFiled: November 23, 2010Date of Patent: July 1, 2014Assignee: Alert Enterprise, Inc.Inventors: Jasvir Singh Gill, Srinivasa Kakkera, Inderpal Ricky Arora, Ravi Chunduru
-
Publication number: 20120224057Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven access enforcement, the techniques including situational awareness and video surveillance. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for co-relating seemingly innocent events and activities to detect real threats and risks, while providing powerful alerting and automated remedial action strategies for decisive action.Type: ApplicationFiled: March 6, 2012Publication date: September 6, 2012Inventors: Jasvir Singh GILL, Inderpal Ricky Arora, Srinivasa Kakkera, Subrat Narendra Singh
-
Publication number: 20120216243Abstract: A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.Type: ApplicationFiled: February 15, 2012Publication date: August 23, 2012Inventors: Jasvir Singh GILL, Inderpal Ricky ARORA, Srinivasa KAKKERA, Madhu GOURINENI
-
Publication number: 20110126111Abstract: A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.Type: ApplicationFiled: November 23, 2010Publication date: May 26, 2011Inventors: Jasvir Singh GILL, Srinivasa Kakkera, Inderpal Ricky Arora, Ravi Chunduru
-
Publication number: 20110066562Abstract: A computer-based business application (CBBA) management system includes multiple real time agents (RTAs) embedded with local CBBA software in order to permit cross-application functions and/or real-time functions such as local monitoring, reporting, or prevention.Type: ApplicationFiled: May 22, 2006Publication date: March 17, 2011Inventors: Susan Stapleton, Srinivasa Kakkera
-
Publication number: 20090320088Abstract: A computer-driven resource manager (122) selectively executes user-initiated tasks (113) according to established rules (112) defining users' permissions for such tasks. A workflow engine (116) manages redefinition of the rules. Responsive to receiving (602) a request to change the rules, the engine processes the request (600). This includes reviewing the request and selecting (604) a corresponding approval path. Also, the workflow engine sequentially proceeds (610, 612, 614, 616, 620) through a sequence of stages defined by the selected path, where in each stage the workflow engine electronically solicits approvals from one or more approvers indicated by the selected approval path. The engine continues through the stages until receiving at least one denial, or all required approvals (616). Responsive to receiving all required approvals, an electronic message is transmitted (618) directing amendment of the rules per the user request.Type: ApplicationFiled: March 30, 2006Publication date: December 24, 2009Inventors: Jasvir Singh Gill, Ravinder Gill, Prasada Rao Pysla, Sandeep K. Malik, Srinivasa Kakkera