Patents by Inventor Deepak Venugopal

Deepak Venugopal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11425024
    Abstract: Provided is a machine-implemented method for operating a device in a network, comprising entering the device into a non-router membership relation with a self-organizing subnet of the network; receiving at least one message making known parameters of the subnet, the at least one message comprising a centrally-generated and propagated sequence number; detecting, based on the received at least one message comprising a sequence number, a deterioration in propagation of said at least one message; and responsive to the detecting, entering the device into a router membership relation with the self-organizing subnet of the network.
    Type: Grant
    Filed: February 6, 2019
    Date of Patent: August 23, 2022
    Assignee: Arm Limited
    Inventors: Deepak Venugopal, Arto Juhani Kinnunen, Mika Antero Tervonen
  • Patent number: 11190436
    Abstract: Provided is a machine-implemented method of operating a device, comprising entering the device into a membership relation with a first self-organizing subnet at a first rank in a hierarchy of subnets of the network; receiving at the device a message from a second device making known parameters of a second subnet at a second rank in the hierarchy of subnets of the network; and responsive to receipt of the message, sending a message from the first device making known parameters of the first subnet at the first rank to the second device to render the subnet at the second rank operable to merge with the subnet at the first rank.
    Type: Grant
    Filed: February 6, 2019
    Date of Patent: November 30, 2021
    Assignee: ARM LIMITED
    Inventors: Deepak Venugopal, Anna Katariina Liehu, Mika Antero Tervonen
  • Publication number: 20200252326
    Abstract: Provided is a machine-implemented method for operating a device in a network, comprising entering the device into a non-router membership relation with a self-organizing subnet of the network; receiving at least one message making known parameters of the subnet, the at least one message comprising a centrally-generated and propagated sequence number; detecting, based on the received at least one message comprising a sequence number, a deterioration in propagation of said at least one message; and responsive to the detecting, entering the device into a router membership relation with the self-organizing subnet of the network.
    Type: Application
    Filed: February 6, 2019
    Publication date: August 6, 2020
    Inventors: Deepak Venugopal, Arto Juhani Kinnunen, Mika Antero Tervonen
  • Publication number: 20200252325
    Abstract: Provided is a machine-implemented method of operating a device, comprising entering the device into a membership relation with a first self-organizing subnet at a first rank in a hierarchy of subnets of the network; receiving at the device a message from a second device making known parameters of a second subnet at a second rank in the hierarchy of subnets of the network; and responsive to receipt of the message, sending a message from the first device making known parameters of the first subnet at the first rank to the second device to render the subnet at the second rank operable to merge with the subnet at the first rank.
    Type: Application
    Filed: February 6, 2019
    Publication date: August 6, 2020
    Inventors: Deepak Venugopal, Anna Katariina Liehu, Mika Antero Tervonen
  • Patent number: 9576131
    Abstract: In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management server via a mobile network. In the example, the management server includes a processor configured to detect malware in the mobile network, select a client mobile platform having a malware scanning agent, and, manage the malware scanning agent of the client mobile platform using a device independent secure management protocol based at least in part on the malware detected in the mobile network.
    Type: Grant
    Filed: August 10, 2015
    Date of Patent: February 21, 2017
    Assignee: Juniper Networks, Inc.
    Inventors: George Tuvell, Deepak Venugopal
  • Patent number: 9542555
    Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.
    Type: Grant
    Filed: April 13, 2015
    Date of Patent: January 10, 2017
    Assignee: Pulse Secure, LLC
    Inventors: George Tuvell, Deepak Venugopal
  • Publication number: 20160012227
    Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.
    Type: Application
    Filed: April 13, 2015
    Publication date: January 14, 2016
    Inventors: George Tuvell, Deepak Venugopal
  • Publication number: 20150347753
    Abstract: In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management server via a mobile network. In the example, the management server includes a processor configured to detect malware in the mobile network, select a client mobile platform having a malware scanning agent, and, manage the malware scanning agent of the client mobile platform using a device independent secure management protocol based at least in part on the malware detected in the mobile network.
    Type: Application
    Filed: August 10, 2015
    Publication date: December 3, 2015
    Inventors: George Tuvell, Deepak Venugopal
  • Patent number: 9104871
    Abstract: A system and method for detecting malware optimized for mobile platforms. The system and method compares hashed portions of one or more malware signatures to hashes hashed from a suspect application, to determine whether the suspect application is malware-free. A second stage robust hash and splatter set of pseudorandomly selected blocks of the malware signatures reduce false positives allowing for improved detection of malware.
    Type: Grant
    Filed: April 6, 2007
    Date of Patent: August 11, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: George Tuvell, Deepak Venugopal
  • Patent number: 9009818
    Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.
    Type: Grant
    Filed: April 6, 2007
    Date of Patent: April 14, 2015
    Assignee: Pulse Secure, LLC
    Inventors: George Tuvell, Deepak Venugopal
  • Patent number: 8881283
    Abstract: A collection agent monitors a mobile network for data samples containing executable code. The collection agent accepts executables and forwards them to a sample collection center for further analysis, reporting, or in some instances initiating one or more mitigating actions. Depending on the network protocol being monitored, the collection agent responds to connection attempts from nearby mobile devices.
    Type: Grant
    Filed: October 9, 2007
    Date of Patent: November 4, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: George Tuvell, Deepak Venugopal, Guoning Hu
  • Patent number: 8321941
    Abstract: A system and method for detecting malware by modeling the behavior of malware and comparing a suspect executable with the model. The system and method extracts feature elements from malware-infected applications, groups the feature elements into feature sets, and develops rules describing a malicious probability relationship between the feature elements. Using malware-free and malware-infected applications as training data, the system and method heuristically trains the rules and creates a probability model for identifying malware. To detect malware, the system and method scans the suspect executable for feature sets and applies the results to the probability model to determine the probability that the suspect executable is malware-infected.
    Type: Grant
    Filed: April 6, 2007
    Date of Patent: November 27, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: George Tuvell, Deepak Venugopal, Guoning Hu
  • Patent number: 8312545
    Abstract: A system and method for detecting malware on a mobile platform in a mobile network. The system and method verifies that an executable is malware-free by computing the checksum of the executable and comparing that checksum with a checksum obtained from a malware-free copy of the executable. The checksum is a sum of all 32-bit values in a code section and an import section of said executable, a byte sequence at an entry point in said executable, a size descriptor of an import table, a size descriptor of said import section, a cyclic redundancy check of said executable, or a combination thereof.
    Type: Grant
    Filed: April 6, 2007
    Date of Patent: November 13, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: George Tuvell, Deepak Venugopal, Matthew Pfefferle
  • Publication number: 20120096539
    Abstract: A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.
    Type: Application
    Filed: December 23, 2011
    Publication date: April 19, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Guoning Hu, Deepak Venugopal, Shantaru Bhardwaj
  • Patent number: 8087085
    Abstract: A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.
    Type: Grant
    Filed: November 27, 2007
    Date of Patent: December 27, 2011
    Assignee: Juniper Networks, Inc.
    Inventors: Guoning Hu, Deepak Venugopal, Shantanu Bhardwaj
  • Publication number: 20080178294
    Abstract: A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.
    Type: Application
    Filed: November 27, 2007
    Publication date: July 24, 2008
    Inventors: Guoning Hu, Deepak Venugopal, Shantanu Bhardwaj
  • Publication number: 20070240221
    Abstract: A system and method for detecting malware on a mobile platform in a mobile network. The system and method verifies that an executable is malware-free by computing the checksum of the executable and comparing that checksum with a checksum obtained from a malware-free copy of the executable. The checksum is a sum of all 32-bit values in a code section and an import section of said executable, a byte sequence at an entry point in said executable, a size descriptor of an import table, a size descriptor of said import section, a cyclic redundancy check of said executable, or a combination thereof.
    Type: Application
    Filed: April 6, 2007
    Publication date: October 11, 2007
    Inventors: George Tuvell, Deepak Venugopal, Matthew Pfefferle
  • Publication number: 20070240218
    Abstract: A system and method for detecting malware optimized for mobile platforms. The system and method compares hashed portions of one or more malware signatures to hashes hashed from a suspect application, to determine whether the suspect application is malware-free. A second stage robust hash and splatter set of pseudorandomly selected blocks of the malware signatures reduce false positives allowing for improved detection of malware.
    Type: Application
    Filed: April 6, 2007
    Publication date: October 11, 2007
    Inventors: George Tuvell, Deepak Venugopal
  • Publication number: 20070240217
    Abstract: A system and method for detecting malware by modeling the behavior of malware and comparing a suspect executable with the model. The system and method extracts feature elements from malware-infected applications, groups the feature elements into feature sets, and develops rules describing a malicious probability relationship between the feature elements. Using malware-free and malware-infected applications as training data, the system and method heuristically trains the rules and creates a probability model for identifying malware. To detect malware, the system and method scans the suspect executable for feature sets and applies the results to the probability model to determine the probability that the suspect executable is malware-infected.
    Type: Application
    Filed: April 6, 2007
    Publication date: October 11, 2007
    Inventors: George Tuvell, Deepak Venugopal, Guoning Hu
  • Publication number: 20070240219
    Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.
    Type: Application
    Filed: April 6, 2007
    Publication date: October 11, 2007
    Inventors: George Tuvell, Deepak Venugopal