-
1.
公开(公告)号:US20240106847A1
公开(公告)日:2024-03-28
申请号:US18214527
申请日:2023-06-27
Applicant: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , VENKATESHU CHERUKUPALLI , YIWEI WANG , YIWEI WANG , ZHIWEN ZHANG , ZHIWEN ZHANG , ZHIWEN ZHANG , UDAYAN JOSHI
Inventor: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , VENKATESHU CHERUKUPALLI , YIWEI WANG , YIWEI WANG , ZHIWEN ZHANG , ZHIWEN ZHANG , ZHIWEN ZHANG , UDAYAN JOSHI
IPC: H04L9/40
CPC classification number: H04L63/1425 , H04L63/1416 , H04L63/1433 , H04L63/145
Abstract: In one aspect, a computerized method for detecting reconnaissance and infiltration in data lakes and cloud warehouses, comprising: monitoring a SaaS data store or a cloud-native data store from inside the data store; examining the attack and automatically identifies how far the attack has progressed in the attack lifecycle; identifying the target and scope of the attack evaluates how far the attackers have penetrated the system and what is their target; and establishing the value of the asset subject to the attackers' attack and maps the impact of the attack on the CIA (confidentiality, integrity and availability) triad.
-
公开(公告)号:US20220407883A1
公开(公告)日:2022-12-22
申请号:US17711031
申请日:2022-04-01
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC: H04L9/40
Abstract: In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
-
3.
公开(公告)号:US20220269792A1
公开(公告)日:2022-08-25
申请号:US17205966
申请日:2021-03-18
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG
Abstract: A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation. The method includes the step of placing the set of discovered data and the set of data accesses that are relevant in the context of a specified governmental data privacy regulation into a set of discovered information about the infrastructure. The method includes the step of, with the set of discovered information about the infrastructure, mapping the set of discovered information about the infrastructure to a set of deterministic dimensions.
-
公开(公告)号:US20210029283A1
公开(公告)日:2021-01-28
申请号:US16932013
申请日:2020-07-17
Applicant: Yiwei WANG , Liyan LIU , Wei WANG
Inventor: Yiwei WANG , Liyan LIU , Wei WANG
IPC: H04N5/232
Abstract: A method, for correcting a rolling shutter phenomenon, includes obtaining a double fish-eye image to be processed using a photographing device; obtaining an image processing parameter including gyro data of the photographing device; calculating a rolling shutter phenomenon correcting parameter based on the image processing parameter; and correcting the rolling shutter phenomenon with respect to the double fish-eye image in a spherical-coordinate system using the rolling shutter phenomenon correcting parameter.
-
公开(公告)号:US20250124149A1
公开(公告)日:2025-04-17
申请号:US18227223
申请日:2023-07-27
Applicant: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
Inventor: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
Abstract: In one aspect, a computerized method for detecting hiding and data intelligence gathering in a data lake or a cloud warehouse, comprising: implementing a hiding and data intelligence collection analysis phase in the data lake or the cloud warehouse; implementing a discovery process in the data lake or the cloud warehouse; implementing a data gathering process in the data lake or the cloud warehouse; and performing one or more dynamic masking operations to detect a Dynamic Masking column anomalies and to detect one or more atypical commands in the data lake or the cloud warehouse.
-
6.
公开(公告)号:US20240232341A1
公开(公告)日:2024-07-11
申请号:US18367894
申请日:2023-09-13
Applicant: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
Inventor: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
IPC: G06F21/55
CPC classification number: G06F21/554 , G06F2221/034
Abstract: In one aspect, In one aspect, a computerized method for automatic grading, impact analysis and mapping to the CIA triad, comprising: identifying a value of a plurality of data stores; associating the value back to an attack scenario such that a measure of impact with respect to attack progression or susceptibility now has a pecuniary value and generating a grading score; associating the grading score mapped to Confidentiality, Integrity and Availability (CIA) Triad; associating an attack progression with the pecuniary value and priority; identifying a progression of the attack; determining a time that is available for a response before a damage occurs to a system under attack; determining a stage of the attack in an attack kill chain, wherein for every stage of the attack as the progress happens, associating the pecuniary value and an impact for such a stage; and automatically calculates an overall data threat grade of the system.
-
7.
公开(公告)号:US20240056460A1
公开(公告)日:2024-02-15
申请号:US18235349
申请日:2023-08-18
Applicant: NAVINDRA Ross YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
Inventor: NAVINDRA Ross YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
CPC classification number: H04L63/1416 , G06F21/64 , H04L63/1425
Abstract: In one aspect, a computerized method for detecting data abuse and data exfiltration in a data store or a data lakes cloud warehouse, comprising: identifying a plurality of Command and control (CnC) channels in an enterprise data cloud infrastructure; identifying and detecting malicious compressed data transfers and encrypted data transfers; implementing a destination analysis from within the data store; and implementing data abuse detection and prevention operations.
-
公开(公告)号:US20210227139A1
公开(公告)日:2021-07-22
申请号:US17051602
申请日:2019-05-09
Applicant: Yiwei WANG , Liyan LIU , Wei WANG
Inventor: Yiwei WANG , Liyan LIU , Wei WANG
Abstract: Disclosed is a video stabilization method including steps of selecting a first area in a first image; determining at least one first feature point based on the first area, and performing feature point matching on the first image and a second image so as to obtain at least one feature point matching pair between the first image and the second image, each feature point matching pair including a first feature point of the first image and a second feature point of the second image; conducting motion parameter estimation based on the at least one feature point matching pair so as to obtain a motion parameter; and carrying out motion compensation with respect to the first image based on the motion parameter so as to acquire a first stable image after compensation.
-
公开(公告)号:US20190143517A1
公开(公告)日:2019-05-16
申请号:US16190750
申请日:2018-11-14
Applicant: Yezhou Yang , Wenlong Zhang , Yiwei Wang , Xin Ye
Inventor: Yezhou Yang , Wenlong Zhang , Yiwei Wang , Xin Ye
Abstract: Various embodiments of systems and methods for collision-free trajectory planning in human-robot interaction through hand movement prediction from vision are disclosed.
-
公开(公告)号:US20230018068A1
公开(公告)日:2023-01-19
申请号:US17829361
申请日:2022-06-01
Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC: H04L9/40
Abstract: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
-
-
-
-
-
-
-
-
-