Patents by Inventor Varun Kulkarni

Varun Kulkarni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12255925
    Abstract: Methods, systems, and devices for data processing in a computing system are described. The computing system may receive a notification of an update to network security objects hosted in diverse substrates within the computing system. The computing system may retrieve a network security policy for a service instance impacted by the update. The computing system may update the network security policy for the service instance according to a network security configuration of the hosting substrate. The computing system may translate the updated network security policy into access control lists (ACLs) for network entities managing communications between service instances within the computing system. The computing system may store the ACLs in respective data repositories that are accessible to the network entities. The computing system may transmit a notification that the ACLs are available for deployment, thereby causing the network entities to retrieve the ACLs from the respective data repositories.
    Type: Grant
    Filed: January 31, 2023
    Date of Patent: March 18, 2025
    Assignee: Salesforce, Inc.
    Inventors: Gianstefano Monni, Jose Lejin P J, Megha Dixit, Prabhat Singh, Praveenkumar Sowpati, Darragh Connaughton, Dheeraj Kakkar, Aditya Suresh Kumar, Varun Kulkarni Somashekhar, Vamshi Karnati, Arthur Jones, Ashwin Shroff
  • Patent number: 12250197
    Abstract: A system is disclosed for acquiring and managing data regarding external IP (EIP) addresses of services offered in a trusted public cloud environment. The system monitors an application program interface of a service executing in a trusted public cloud environment for occurrence of an event that is related to an EIP of the service. When an event is detected, the system extract EIP related data and metadata of the service, generates a message with the extracted EIP data, and posts the message to a central message queue. The system monitors the message queue for the presence of a new message. Upon detecting a new message, the system processes the message, extracts EIP related data. metadata, and identifies an action. A central database that stores EIP related information of services executing in the trusted public cloud environment is updated based on the identified action.
    Type: Grant
    Filed: August 9, 2021
    Date of Patent: March 11, 2025
    Assignee: Salesforce, Inc.
    Inventors: Adam J. Salter, Deepanshu Badola, Stephen Fung, Santhosh ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Amitabh B. Chakrabarty, Vinod Vasant Pai, Christopher Jason Donley, Prabhat Singh
  • Publication number: 20250047719
    Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
    Type: Application
    Filed: October 22, 2024
    Publication date: February 6, 2025
    Inventors: Toan Van Nguyen, Sriram Srinivasan, Syed Abdullah Shah, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Prabhat Singh, Bogdan Florin Romanescu
  • Patent number: 12170692
    Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
    Type: Grant
    Filed: September 16, 2020
    Date of Patent: December 17, 2024
    Assignee: Salesforce, Inc.
    Inventors: Toan Van Nguyen, Sriram Srinivasan, Syed Abdullah Shah, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Prabhat Singh, Bogdan Florin Romanescu
  • Publication number: 20240259429
    Abstract: Methods, systems, and devices for data processing in a computing system are described. The computing system may receive a notification of an update to network security objects hosted in diverse substrates within the computing system. The computing system may retrieve a network security policy for a service instance impacted by the update. The computing system may update the network security policy for the service instance according to a network security configuration of the hosting substrate. The computing system may translate the updated network security policy into access control lists (ACLs) for network entities managing communications between service instances within the computing system. The computing system may store the ACLs in respective data repositories that are accessible to the network entities. The computing system may transmit a notification that the ACLs are available for deployment, thereby causing the network entities to retrieve the ACLs from the respective data repositories.
    Type: Application
    Filed: January 31, 2023
    Publication date: August 1, 2024
    Inventors: Gianstefano Monni, Jose Lejin P J, Megha Dixit, Prabhat Singh, Praveenkumar Sowpati, Darragh Connaughton, Dheeraj Kakkar, Aditya Suresh Kumar, Varun Kulkarni Somashekhar, Vamshi Karnati, Arthur Jones, Ashwin Shroff
  • Publication number: 20230039162
    Abstract: A system is disclosed for acquiring and managing data regarding external IP (EIP) addresses of services offered in a trusted public cloud environment. The system monitors an application program interface of a service executing in a trusted public cloud environment for occurrence of an event that is related to an EIP of the service. When an event is detected, the system extract EIP related data and metadata of the service, generates a message with the extracted EIP data, and posts the message to a central message queue. The system monitors the message queue for the presence of a new message. Upon detecting a new message, the system processes the message, extracts EIP related data. metadata, and identifies an action. A central database that stores EIP related information of services executing in the trusted public cloud environment is updated based on the identified action.
    Type: Application
    Filed: August 9, 2021
    Publication date: February 9, 2023
    Inventors: Adam J. Salter, Deepanshu Badola, Stephen Fung, Santhosh ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Amitabh B. Chakrabarty, Vinod Vasant Pai, Christopher Jason Donley, Prabhat Singh
  • Publication number: 20220086189
    Abstract: Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
    Type: Application
    Filed: September 16, 2020
    Publication date: March 17, 2022
    Inventors: Toan Van Nguyen, Sriram Srinivasan, Syed Abdullah Shah, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Prabhat Singh, Bogdan Florin Romanescu
  • Publication number: 20220086193
    Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for automation of network security policy analysis and deployment. A server system can obtain a system input comprising two versions of a policy output. The system can generate a severity characteristic that indicates a severity of deploying the second version of the policy output. The system can then determine whether to deploy the second version of the policy output based on the severity characteristic. The system can then, in response to determining that the second version of the policy output is to be deployed, deploy the second version of the policy output to one of a plurality of clouds.
    Type: Application
    Filed: January 28, 2021
    Publication date: March 17, 2022
    Applicant: salesforce.com, inc.
    Inventors: Toan Van Nguyen, Qiyuan Zheng, Santhosh Ram Vetrinadar Manohar, Varun Kulkarni Somashekhar, Prabhat Singh
  • Publication number: 20120297134
    Abstract: A storage system includes a storage controller, a storage array coupled to the storage controller, and a temporary storage device coupled to the storage controller. The storage array is operated as a redundant array of independent drives (RAID) array and includes a high priority storage volume and a low priority storage volume. The storage controller stores high priority data transfers on the high priority volume, stores low priority data transfers on the temporary storage device, and moves the low priority data transfers to the low priority volume in response to a condition of the storage system.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 22, 2012
    Applicant: DELL PRODUCTS, LP
    Inventors: Akshai Parthasarathy, Anthony Fernandez, Varun Kulkarni