Patents by Inventor Vikram Kapoor

Vikram Kapoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11483329
    Abstract: Log data associated with an environment that includes containers is received. An example of such an environment is one managed by Kubernetes. A logical graph is generated using at least a portion of the received log data. The logical graph is used to detect an anomaly. In response to the anomaly being detected, the anomaly is recorded.
    Type: Grant
    Filed: October 9, 2020
    Date of Patent: October 25, 2022
    Assignee: Lacework Inc.
    Inventors: Harish Kumar Bharat Singh, Vikram Kapoor
  • Patent number: 11470172
    Abstract: An agent executes in user space on a machine and monitors for network connections. In response to detecting an initiation of a network connection, data associated with a process associated with the network connection is collected, e.g., by the agent. At least a portion of the collected process data is reported to an external node. The reported information can be used to detect anomalies in a network environment.
    Type: Grant
    Filed: February 9, 2021
    Date of Patent: October 11, 2022
    Assignee: Lacework Inc.
    Inventors: Vikram Kapoor, Rakesh Sachdeva, Samuel Joseph Pullara, III
  • Publication number: 20220232024
    Abstract: Detecting deviations from typical user behavior, including: identifying a geographic location of a device that is associated with a user; determining device activity associated with the user; and detecting, based on a profile associated with the user, that the device activity associated with the user deviates from normal activity for the user.
    Type: Application
    Filed: March 25, 2022
    Publication date: July 21, 2022
    Applicant: LACEWORK, INC.
    Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
  • Publication number: 20220232025
    Abstract: Detecting anomalous behavior of a device, including: generating, using information describing historical activity associated with a user device, a trained model for detecting normal activity for the user device; gathering information describing current activity associated with the user device; and determining, by using the information describing current activity associated with the user device as input to the trained model, whether the user device has deviated from normal activity.
    Type: Application
    Filed: March 25, 2022
    Publication date: July 21, 2022
    Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
  • Publication number: 20220224707
    Abstract: Establishing a location profile for a user device, including: gathering information associated with the location of a user device; determining, based on the information associated with the location of a user device, whether the user device is being accessed at a known location; responsive to determining that the user device is being accessed at a known location: determining a characterization of the known location; and determining, based on the characterization of the known location, whether device utilization is anomalous; and responsive to determining that the user device is not being accessed at a known location: determining a characterization of the unknown location; and determining, based on the characterization of the unknown location, whether device utilization is anomalous.
    Type: Application
    Filed: March 25, 2022
    Publication date: July 14, 2022
    Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, YIJOU CHEN
  • Patent number: 11256759
    Abstract: A logical graph is generated using at least a portion of log data received from a set of agents executing on one or more nodes in one or more data centers. The logical graph is generated at least in part by clustering a first set of nodes using a first clustering criteria. The logical graph is augmented at least in part by performing a reclustering operation using a second clustering criteria.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: February 22, 2022
    Assignee: Lacework Inc.
    Inventors: Yijou Chen, Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor
  • Patent number: 11201955
    Abstract: A frame is received at an agent. The frame is analyzed to determine that the frame is associated with a first known pod. IP information is reported to a backend process. The backend process is configured to stitch the IP information with other IP information reported by one or more additional agents to identify a second pod.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: December 14, 2021
    Assignee: Lacework Inc.
    Inventors: Rakesh Sachdeva, Vikram Kapoor
  • Patent number: 11188571
    Abstract: A logical graph is generated using at least a portion of log data received from a set of agents executing on one or more nodes in one or more data centers. The logical graph is augmented using data obtained from one or more agents executing in containerized environments, including by representing communications between pods within the logical graph. The augmented logical graph is used to detect an anomaly.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: November 30, 2021
    Assignee: Lacework Inc.
    Inventors: Yijou Chen, Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor
  • Patent number: 11157502
    Abstract: A request to filter information associated with activities within a network environment is received in response to a user interaction with a graph that comprises a plurality of nodes. At least one node included in the graph is associated with an activity within a network environment. As one example, the request to filter is triggered by a user interaction with a visual representation of at least a portion of the graph. As another example, the request to filter is triggered by a user interaction with a query field. In response to receiving the filter request, a query is generated based on an implicit join using a query service.
    Type: Grant
    Filed: February 10, 2020
    Date of Patent: October 26, 2021
    Assignee: Lacework Inc.
    Inventors: Yijou Chen, Sanjay Kalra, Vikram Kapoor
  • Patent number: 11153339
    Abstract: Activities within a network environment are monitored (e.g., using agents). At least a portion of the monitored activities are used to generate a logical graph model. The generated logical graph model is used to determine an anomaly. The detected anomaly is recorded and can be used to generate an alert.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: October 19, 2021
    Assignee: Lacework Inc.
    Inventors: Vikram Kapoor, Samuel Joseph Pullara, III, Murat Bog, Yijou Chen, Sanjay Kalra
  • Patent number: 11134093
    Abstract: First information associated with a first user login activity is received, as is second information associated with a second user login activity. A determination is made, using the received first and second information, that the first user login activity and second user login activity have a parent-child relationship. The first user login activity and the second user login activity are linked to at least one user and a process.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: September 28, 2021
    Assignee: Lacework Inc.
    Inventors: Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Yijou Chen, Harish Kumar Bharat Singh
  • Patent number: 11023088
    Abstract: Approaches for composing the display of a virtualized web browser. Upon a host module, executing in a host operating system, of a virtualized web browser being instructed to display a new web page, policy data is consulted to determine if one or more trigger conditions are satisfied. Upon determining that at least one of the one or more trigger conditions is satisfied, the virtualized web browser, transparently to a user, retrieving and rendering the new web page in a location different than where the previous web page was retrieved and rendered by the virtualized web browser. After the new web page has been retrieved and rendered at the location specified by the policy data, the host module displays the new web page. The policy data may operate to specify the behavior of individual tabs of the virtualized web browser.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: June 1, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Prakash Buddhiraja, Kiran Bondalapati, Vikram Kapoor, Gaurav Banga, Ian Pratt
  • Patent number: 10986196
    Abstract: An agent executes in user space on a machine and monitors for network connections. In response to detecting an initiation of a network connection, data associated with a process associated with the network connection is collected, e.g., by the agent. At least a portion of the collected process data is reported to an external node. The reported information is used to detect anomalies in a network environment.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: April 20, 2021
    Assignee: Lacework Inc.
    Inventors: Vikram Kapoor, Rakesh Sachdeva, Samuel Joseph Pullara, III
  • Patent number: 10986114
    Abstract: Log data associated with at least one user session in a network environment associated with an original user is received. A logical graph is generated using at least a portion of the received log data. One example of such a logical graph is a privilege change graph that models privilege changes between processes. Another example of such a logical graph is a user login graph that models machines with which the original user interacts. Another example of such a logical graph is a machine-server graph that clusters machines into nodes based on resources executing on the machine. The generated logical graph is used to detect an anomaly.
    Type: Grant
    Filed: July 1, 2019
    Date of Patent: April 20, 2021
    Assignee: Lacework Inc.
    Inventors: Harish Kumar Bharat Singh, Vikram Kapoor, Murat Bog, Yijou Chen
  • Patent number: 10873592
    Abstract: Log data associated with an environment that includes containers is received. An example of such an environment is one managed by Kubernetes. A logical graph is generated using at least a portion of the received log data. The logical graph is used to detect an anomaly. In response to the anomaly being detected, the anomaly is recorded.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: December 22, 2020
    Assignee: Lacework Inc.
    Inventors: Harish Kumar Bharat Singh, Vikram Kapoor
  • Patent number: 10846396
    Abstract: Embodiments of the invention enable any request to download data to a computer system to be performed such that the requested data is stored in a dedicated virtual machine. A request to transfer data from an external location to the computer system is received. The request may originate from a process in a virtual machine or a host operating system. A connection with the external location using parameters identified in the request. The request is performed by transferring the data from the external location to a dedicated virtual machine which does not have access to the file system and cannot persistently store data on the computer system. One or more dedicated virtual machines may be instantiated as needed. A single dedicated virtual machine may accommodate multiple downloads concurrently.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: November 24, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Gaurav Banga, Ian Pratt, Vikram Kapoor, Kiran Bondalapati
  • Patent number: 10686932
    Abstract: Apparatus and methods are disclosed for allowing smart phone users to “capture the moment” by allowing easy access to a camera application when a mobile device is in an above-lock (or locked) mode, while also preventing unauthorized access to other smart phone functionality. According to one embodiment of the disclosed technology, a method of operating a mobile device having an above-lock state and a below-lock state comprises receiving input data requesting invocation of an camera application when the mobile device is in the above-lock state and invoking the requested camera application on the device, where one or more functions of the requested application are unavailable as a result of the mobile device being in the above-lock state.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: June 16, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shamik Bandyopadhyay, Donald A. Barnett, Vikram Kapoor, Veronica Y. Law, Kathryn C. Lemson, Tirthankar Sengupta, Divya Tyamagundlu, Ahmad Bilal
  • Patent number: 10614071
    Abstract: A request to filter information associated with activities within a network environment is received. As one example, the request to filter is triggered by a user interaction with a graph. As another example, the request to filter is triggered by a user interaction with a query field. In response to receiving the filter request, a query is generated based on an implicit join using a query service.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: April 7, 2020
    Assignee: Lacework Inc.
    Inventors: Yijou Chen, Sanjay Kalra, Vikram Kapoor
  • Patent number: 10581891
    Abstract: Activities within a network environment are monitored (e.g., using agents). At least a portion of the monitored activities are used to generate a logical graph model. The generated logical graph model is used to determine an anomaly. The detected anomaly is recorded and can be used to generate an alert.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: March 3, 2020
    Assignee: Lacework Inc.
    Inventors: Vikram Kapoor, Samuel Joseph Pullara, III, Murat Bog, Yijou Chen, Sanjay Kalra
  • Patent number: 10546118
    Abstract: Approaches for ensuring a file operation is not performed in a malicious manner. Upon being instructed to perform the file operation on a file, a profile for the file is obtained. The profile is data that is signed by a digital signature and identifies a set of resources which said file requires. The profile associated with a particular file may be obtained in a variety of different ways. The file operation is performed in a virtual machine that lacks access to resources of the device or of a network except for those resources identified in the profile.
    Type: Grant
    Filed: July 16, 2014
    Date of Patent: January 28, 2020
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Vikram Kapoor, Ian Pratt, Gaurav Banga