-
1.
公开(公告)号:US20240106847A1
公开(公告)日:2024-03-28
申请号:US18214527
申请日:2023-06-27
申请人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , VENKATESHU CHERUKUPALLI , YIWEI WANG , YIWEI WANG , ZHIWEN ZHANG , ZHIWEN ZHANG , ZHIWEN ZHANG , UDAYAN JOSHI
发明人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , VENKATESHU CHERUKUPALLI , YIWEI WANG , YIWEI WANG , ZHIWEN ZHANG , ZHIWEN ZHANG , ZHIWEN ZHANG , UDAYAN JOSHI
IPC分类号: H04L9/40
CPC分类号: H04L63/1425 , H04L63/1416 , H04L63/1433 , H04L63/145
摘要: In one aspect, a computerized method for detecting reconnaissance and infiltration in data lakes and cloud warehouses, comprising: monitoring a SaaS data store or a cloud-native data store from inside the data store; examining the attack and automatically identifies how far the attack has progressed in the attack lifecycle; identifying the target and scope of the attack evaluates how far the attackers have penetrated the system and what is their target; and establishing the value of the asset subject to the attackers' attack and maps the impact of the attack on the CIA (confidentiality, integrity and availability) triad.
-
2.
公开(公告)号:US20240232341A1
公开(公告)日:2024-07-11
申请号:US18367894
申请日:2023-09-13
申请人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
发明人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
IPC分类号: G06F21/55
CPC分类号: G06F21/554 , G06F2221/034
摘要: In one aspect, In one aspect, a computerized method for automatic grading, impact analysis and mapping to the CIA triad, comprising: identifying a value of a plurality of data stores; associating the value back to an attack scenario such that a measure of impact with respect to attack progression or susceptibility now has a pecuniary value and generating a grading score; associating the grading score mapped to Confidentiality, Integrity and Availability (CIA) Triad; associating an attack progression with the pecuniary value and priority; identifying a progression of the attack; determining a time that is available for a response before a damage occurs to a system under attack; determining a stage of the attack in an attack kill chain, wherein for every stage of the attack as the progress happens, associating the pecuniary value and an impact for such a stage; and automatically calculates an overall data threat grade of the system.
-
公开(公告)号:US20240028572A1
公开(公告)日:2024-01-25
申请号:US18100574
申请日:2023-01-24
申请人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH Rao , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
发明人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH Rao , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
CPC分类号: G06F16/219 , G06F16/27
摘要: In one aspect, a computerized system for securing data cloning and sharing options on data warehouses, comprising: a clone determiner engine that determines that a data asset is a primary data asset or a clone data asset, wherein the clone determiner engine comprises: a log data analyzer that obtains and analyzes a set of logs of the data asset from a specified log source, and wherein set of logs are used to determine that the data asset is the primary data asset or the clone data asset, a timestamp analyzer engine that obtains a timestamp data of the data asset and reviews the timestamp data to analyze ordering of the data asset, and wherein the timestamp analyzer engine determines the data asset is a primary asset or a secondary asset, and a fingerprints analyzer that obtains and reviews the data asset and any metadata of data asset, and wherein the fingerprints analyzer creates a fingerprint based on a content of the data asset and the metadata of the data asset, and wherein the fingerprints analyzer then uses the fingerprints to determine that the data asset is the clone data asset of an already known asset in conjunction with an output of the timestamp analyzer engine and the log data analyzer.
-
公开(公告)号:US20230334162A1
公开(公告)日:2023-10-19
申请号:US18107513
申请日:2023-02-09
申请人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
发明人: NAVINDRA YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
CPC分类号: G06F21/604 , G06F21/6218 , G06F2221/2113
摘要: In one aspect, a computerized method for minimizing a data governance in order to improve data security, comprising: providing and imposing a set of access rules to a set of data, wherein the set of data is stored in a data warehouse; measuring a level of over provisioning of the set of data; measuring a level of data abuse susceptibility of the set of data; implementing a dark data governance operation on the set of data; and identifying a set of infrequently used roles in the set of data.
-
5.
公开(公告)号:US20240056460A1
公开(公告)日:2024-02-15
申请号:US18235349
申请日:2023-08-18
申请人: NAVINDRA Ross YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
发明人: NAVINDRA Ross YADAV , SUPREETH HOSUR NAGESH RAO , RAVI SANKURATRI , DANESH IRANI , ALOK LALIT WADHWA , VASIL DOCHKOV YORDANOV , VENKATESHU CHERUKUPALLI , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI
CPC分类号: H04L63/1416 , G06F21/64 , H04L63/1425
摘要: In one aspect, a computerized method for detecting data abuse and data exfiltration in a data store or a data lakes cloud warehouse, comprising: identifying a plurality of Command and control (CnC) channels in an enterprise data cloud infrastructure; identifying and detecting malicious compressed data transfers and encrypted data transfers; implementing a destination analysis from within the data store; and implementing data abuse detection and prevention operations.
-
公开(公告)号:US20230018068A1
公开(公告)日:2023-01-19
申请号:US17829361
申请日:2022-06-01
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC分类号: H04L9/40
摘要: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
-
公开(公告)号:US20220407883A1
公开(公告)日:2022-12-22
申请号:US17711031
申请日:2022-04-01
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BRADY SCHULMAN , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , DANESH IRANI
IPC分类号: H04L9/40
摘要: In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
-
公开(公告)号:US20220272111A1
公开(公告)日:2022-08-25
申请号:US17527466
申请日:2021-11-16
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG , UDAYAN JOSHI , SOUMYADEEP CHOUDHURY , MUHAMMADA FURQAN , MANISH ARIGALA
IPC分类号: H04L9/40
摘要: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
-
9.
公开(公告)号:US20220269792A1
公开(公告)日:2022-08-25
申请号:US17205966
申请日:2021-03-18
申请人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG
发明人: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG
摘要: A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation. The method includes the step of placing the set of discovered data and the set of data accesses that are relevant in the context of a specified governmental data privacy regulation into a set of discovered information about the infrastructure. The method includes the step of, with the set of discovered information about the infrastructure, mapping the set of discovered information about the infrastructure to a set of deterministic dimensions.
-
公开(公告)号:US20120202243A1
公开(公告)日:2012-08-09
申请号:US13196829
申请日:2011-08-02
申请人: PETER G. SCHULTZ , LEI WANG , JOHN CHRISTOPHER ANDERSON , JASON WILLIAM CHIN , DAVID R. LIU , THOMAS J. MAGLIERY , ERIC L. MEGGERS , RYAN A. MEHL , MIRO PASTRNAK , STEPHEN WILLIAM SANTORO , ZHIWEN ZHANG
发明人: PETER G. SCHULTZ , LEI WANG , JOHN CHRISTOPHER ANDERSON , JASON WILLIAM CHIN , DAVID R. LIU , THOMAS J. MAGLIERY , ERIC L. MEGGERS , RYAN A. MEHL , MIRO PASTRNAK , STEPHEN WILLIAM SANTORO , ZHIWEN ZHANG
IPC分类号: C12P21/06
CPC分类号: C12P21/00 , C07K14/00 , C07K14/505 , C12N9/93 , C12N15/67 , C12P13/00 , C12P13/005 , C12P13/04 , C12P13/22 , C12P19/26 , C12P21/02
摘要: The invention provides methods and compositions for in vivo incorporation of unnatural amino acids. Also provided are compositions including proteins with unnatural amino acids.
摘要翻译: 本发明提供用于体内引入非天然氨基酸的方法和组合物。 还提供了包含具有非天然氨基酸的蛋白质的组合物。
-
-
-
-
-
-
-
-
-