Patents by Inventor Gangadharasa Srinivasa
Gangadharasa Srinivasa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9852296Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 25, 2015Date of Patent: December 26, 2017Assignee: McAfee, LLCInventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9703958Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 25, 2015Date of Patent: July 11, 2017Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9607150Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: May 11, 2015Date of Patent: March 28, 2017Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20160019392Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 25, 2015Publication date: January 21, 2016Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20160021129Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 25, 2015Publication date: January 21, 2016Applicant: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20150347755Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: May 11, 2015Publication date: December 3, 2015Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9032523Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 16, 2013Date of Patent: May 12, 2015Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 8646089Abstract: A method is provided in one example embodiment that includes receiving a signal to enable a whitelist mode on a host in a network, terminating a process executing on the host if the process is not verified, and blocking execution of software objects on the host if the software objects are not represented on the whitelist. In more particular embodiments, the method also includes identifying the process on a process list that enumerates one or more processes executing on the host. Yet further embodiments include quarantining the host if a second process on the process list is a critical process and if the second process is not verified. More specific embodiments include identifying and restarting another process on the process list if process memory was modified.Type: GrantFiled: October 18, 2011Date of Patent: February 4, 2014Assignee: McAfee, Inc.Inventors: Sridhar Jayanthi, Praneet Khare, Gangadharasa Srinivasa
-
Publication number: 20140026218Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 16, 2013Publication date: January 23, 2014Applicant: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 8539583Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rolling back protection processes. In one aspect, a method includes determining that a file is a malicious file, storing a duplicate of the file in a quarantine area, performing one or more protection processes on the file, if the determination that the file is a malicious file is a false positive determination, restoring the file by a pre-boot rollback process to a state prior to the one or more protection processes performed on the file, and booting the computer with the restored file, and if the determination that the file is a malicious file is not a false positive determination, not restoring the file to a state prior to the one or more protection processes performed on the file, and booting the computer.Type: GrantFiled: November 3, 2009Date of Patent: September 17, 2013Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20130097708Abstract: A method is provided in one example embodiment that includes receiving a signal to enable a whitelist mode on a host in a network, terminating a process executing on the host if the process is not verified, and blocking execution of software objects on the host if the software objects are not represented on the whitelist. In more particular embodiments, the method also includes identifying the process on a process list that enumerates one or more processes executing on the host. Yet further embodiments include quarantining the host if a second process on the process list is a critical process and if the second process is not verified. More specific embodiments include identifying and restarting another process on the process list if process memory was modified.Type: ApplicationFiled: October 18, 2011Publication date: April 18, 2013Inventors: Sridhar Jayanthi, Praneet Khare, Gangadharasa Srinivasa
-
Publication number: 20110107424Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rolling back protection processes. In one aspect, a method includes determining that a file is a malicious file, storing a duplicate of the file in a quarantine area, performing one or more protection processes on the file, if the determination that the file is a malicious file is a false positive determination, restoring the file by a pre-boot rollback process to a state prior to the one or more protection processes performed on the file, and booting the computer with the restored file, and if the determination that the file is a malicious file is not a false positive determination, not restoring the file to a state prior to the one or more protection processes performed on the file, and booting the computer.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa