The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
May. 06, 2025
Filed:
Nov. 16, 2021
Supreeth Hosur Nagesh Rao, Cupertino, CA (US);
Navindra Yadav, Cupertino, CA (US);
Ravi Sankuratri, Cupertino, CA (US);
Alok Lalit Wadhwa, Milipitas, CA (US);
Aria Rahadian, San Jose, CA (US);
Bharathwaj Sankara Viswanathan, Mountain View, CA (US);
Brady Schulman, Milford, CA (US);
Matthew Finn, Lebanon, GA (US);
Paul John Lesiak, West Orange, NJ (US);
Ravi Shanker Prasad, Fremont, CA (US);
Vasil Dochkov Yordanov, San Jose, CA (US);
Yiwei Wang, San Jose, CA (US);
Zhiwen Zhang, San Jose, CA (US);
Udayan Joshi, San Diego, CA (US);
Soumyadeep Choudhury, San Jose, CA (US);
Muhammada Furqan, Lowell, MA (US);
Manish Arigala, San Jose, CA (US);
Supreeth Hosur Nagesh Rao, Cupertino, CA (US);
Navindra Yadav, Cupertino, CA (US);
Ravi Sankuratri, Cupertino, CA (US);
Alok Lalit Wadhwa, Milipitas, CA (US);
Aria Rahadian, San Jose, CA (US);
Bharathwaj Sankara Viswanathan, Mountain View, CA (US);
Brady Schulman, Milford, CA (US);
Matthew Finn, Lebanon, GA (US);
Paul John Lesiak, West Orange, NJ (US);
Ravi Shanker Prasad, Fremont, CA (US);
Vasil Dochkov Yordanov, San Jose, CA (US);
Yiwei Wang, San Jose, CA (US);
Zhiwen Zhang, San Jose, CA (US);
Udayan Joshi, San Diego, CA (US);
Soumyadeep Choudhury, San Jose, CA (US);
Muhammada Furqan, Lowell, MA (US);
Manish Arigala, San Jose, CA (US);
Abstract
In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.