Patents by Inventor Deepak Venugopal
Deepak Venugopal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11425024Abstract: Provided is a machine-implemented method for operating a device in a network, comprising entering the device into a non-router membership relation with a self-organizing subnet of the network; receiving at least one message making known parameters of the subnet, the at least one message comprising a centrally-generated and propagated sequence number; detecting, based on the received at least one message comprising a sequence number, a deterioration in propagation of said at least one message; and responsive to the detecting, entering the device into a router membership relation with the self-organizing subnet of the network.Type: GrantFiled: February 6, 2019Date of Patent: August 23, 2022Assignee: Arm LimitedInventors: Deepak Venugopal, Arto Juhani Kinnunen, Mika Antero Tervonen
-
Patent number: 11190436Abstract: Provided is a machine-implemented method of operating a device, comprising entering the device into a membership relation with a first self-organizing subnet at a first rank in a hierarchy of subnets of the network; receiving at the device a message from a second device making known parameters of a second subnet at a second rank in the hierarchy of subnets of the network; and responsive to receipt of the message, sending a message from the first device making known parameters of the first subnet at the first rank to the second device to render the subnet at the second rank operable to merge with the subnet at the first rank.Type: GrantFiled: February 6, 2019Date of Patent: November 30, 2021Assignee: ARM LIMITEDInventors: Deepak Venugopal, Anna Katariina Liehu, Mika Antero Tervonen
-
Publication number: 20200252326Abstract: Provided is a machine-implemented method for operating a device in a network, comprising entering the device into a non-router membership relation with a self-organizing subnet of the network; receiving at least one message making known parameters of the subnet, the at least one message comprising a centrally-generated and propagated sequence number; detecting, based on the received at least one message comprising a sequence number, a deterioration in propagation of said at least one message; and responsive to the detecting, entering the device into a router membership relation with the self-organizing subnet of the network.Type: ApplicationFiled: February 6, 2019Publication date: August 6, 2020Inventors: Deepak Venugopal, Arto Juhani Kinnunen, Mika Antero Tervonen
-
Publication number: 20200252325Abstract: Provided is a machine-implemented method of operating a device, comprising entering the device into a membership relation with a first self-organizing subnet at a first rank in a hierarchy of subnets of the network; receiving at the device a message from a second device making known parameters of a second subnet at a second rank in the hierarchy of subnets of the network; and responsive to receipt of the message, sending a message from the first device making known parameters of the first subnet at the first rank to the second device to render the subnet at the second rank operable to merge with the subnet at the first rank.Type: ApplicationFiled: February 6, 2019Publication date: August 6, 2020Inventors: Deepak Venugopal, Anna Katariina Liehu, Mika Antero Tervonen
-
Patent number: 9576131Abstract: In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management server via a mobile network. In the example, the management server includes a processor configured to detect malware in the mobile network, select a client mobile platform having a malware scanning agent, and, manage the malware scanning agent of the client mobile platform using a device independent secure management protocol based at least in part on the malware detected in the mobile network.Type: GrantFiled: August 10, 2015Date of Patent: February 21, 2017Assignee: Juniper Networks, Inc.Inventors: George Tuvell, Deepak Venugopal
-
Patent number: 9542555Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.Type: GrantFiled: April 13, 2015Date of Patent: January 10, 2017Assignee: Pulse Secure, LLCInventors: George Tuvell, Deepak Venugopal
-
Publication number: 20160012227Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.Type: ApplicationFiled: April 13, 2015Publication date: January 14, 2016Inventors: George Tuvell, Deepak Venugopal
-
Publication number: 20150347753Abstract: In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management server via a mobile network. In the example, the management server includes a processor configured to detect malware in the mobile network, select a client mobile platform having a malware scanning agent, and, manage the malware scanning agent of the client mobile platform using a device independent secure management protocol based at least in part on the malware detected in the mobile network.Type: ApplicationFiled: August 10, 2015Publication date: December 3, 2015Inventors: George Tuvell, Deepak Venugopal
-
Patent number: 9104871Abstract: A system and method for detecting malware optimized for mobile platforms. The system and method compares hashed portions of one or more malware signatures to hashes hashed from a suspect application, to determine whether the suspect application is malware-free. A second stage robust hash and splatter set of pseudorandomly selected blocks of the malware signatures reduce false positives allowing for improved detection of malware.Type: GrantFiled: April 6, 2007Date of Patent: August 11, 2015Assignee: Juniper Networks, Inc.Inventors: George Tuvell, Deepak Venugopal
-
Patent number: 9009818Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.Type: GrantFiled: April 6, 2007Date of Patent: April 14, 2015Assignee: Pulse Secure, LLCInventors: George Tuvell, Deepak Venugopal
-
Patent number: 8881283Abstract: A collection agent monitors a mobile network for data samples containing executable code. The collection agent accepts executables and forwards them to a sample collection center for further analysis, reporting, or in some instances initiating one or more mitigating actions. Depending on the network protocol being monitored, the collection agent responds to connection attempts from nearby mobile devices.Type: GrantFiled: October 9, 2007Date of Patent: November 4, 2014Assignee: Juniper Networks, Inc.Inventors: George Tuvell, Deepak Venugopal, Guoning Hu
-
Patent number: 8321941Abstract: A system and method for detecting malware by modeling the behavior of malware and comparing a suspect executable with the model. The system and method extracts feature elements from malware-infected applications, groups the feature elements into feature sets, and develops rules describing a malicious probability relationship between the feature elements. Using malware-free and malware-infected applications as training data, the system and method heuristically trains the rules and creates a probability model for identifying malware. To detect malware, the system and method scans the suspect executable for feature sets and applies the results to the probability model to determine the probability that the suspect executable is malware-infected.Type: GrantFiled: April 6, 2007Date of Patent: November 27, 2012Assignee: Juniper Networks, Inc.Inventors: George Tuvell, Deepak Venugopal, Guoning Hu
-
Patent number: 8312545Abstract: A system and method for detecting malware on a mobile platform in a mobile network. The system and method verifies that an executable is malware-free by computing the checksum of the executable and comparing that checksum with a checksum obtained from a malware-free copy of the executable. The checksum is a sum of all 32-bit values in a code section and an import section of said executable, a byte sequence at an entry point in said executable, a size descriptor of an import table, a size descriptor of said import section, a cyclic redundancy check of said executable, or a combination thereof.Type: GrantFiled: April 6, 2007Date of Patent: November 13, 2012Assignee: Juniper Networks, Inc.Inventors: George Tuvell, Deepak Venugopal, Matthew Pfefferle
-
Publication number: 20120096539Abstract: A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.Type: ApplicationFiled: December 23, 2011Publication date: April 19, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Guoning Hu, Deepak Venugopal, Shantaru Bhardwaj
-
Patent number: 8087085Abstract: A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.Type: GrantFiled: November 27, 2007Date of Patent: December 27, 2011Assignee: Juniper Networks, Inc.Inventors: Guoning Hu, Deepak Venugopal, Shantanu Bhardwaj
-
Publication number: 20080178294Abstract: A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.Type: ApplicationFiled: November 27, 2007Publication date: July 24, 2008Inventors: Guoning Hu, Deepak Venugopal, Shantanu Bhardwaj
-
Publication number: 20070240221Abstract: A system and method for detecting malware on a mobile platform in a mobile network. The system and method verifies that an executable is malware-free by computing the checksum of the executable and comparing that checksum with a checksum obtained from a malware-free copy of the executable. The checksum is a sum of all 32-bit values in a code section and an import section of said executable, a byte sequence at an entry point in said executable, a size descriptor of an import table, a size descriptor of said import section, a cyclic redundancy check of said executable, or a combination thereof.Type: ApplicationFiled: April 6, 2007Publication date: October 11, 2007Inventors: George Tuvell, Deepak Venugopal, Matthew Pfefferle
-
Publication number: 20070240218Abstract: A system and method for detecting malware optimized for mobile platforms. The system and method compares hashed portions of one or more malware signatures to hashes hashed from a suspect application, to determine whether the suspect application is malware-free. A second stage robust hash and splatter set of pseudorandomly selected blocks of the malware signatures reduce false positives allowing for improved detection of malware.Type: ApplicationFiled: April 6, 2007Publication date: October 11, 2007Inventors: George Tuvell, Deepak Venugopal
-
Publication number: 20070240217Abstract: A system and method for detecting malware by modeling the behavior of malware and comparing a suspect executable with the model. The system and method extracts feature elements from malware-infected applications, groups the feature elements into feature sets, and develops rules describing a malicious probability relationship between the feature elements. Using malware-free and malware-infected applications as training data, the system and method heuristically trains the rules and creates a probability model for identifying malware. To detect malware, the system and method scans the suspect executable for feature sets and applies the results to the probability model to determine the probability that the suspect executable is malware-infected.Type: ApplicationFiled: April 6, 2007Publication date: October 11, 2007Inventors: George Tuvell, Deepak Venugopal, Guoning Hu
-
Publication number: 20070240219Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.Type: ApplicationFiled: April 6, 2007Publication date: October 11, 2007Inventors: George Tuvell, Deepak Venugopal