Patents by Inventor Gaurav Banga

Gaurav Banga has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9106690
    Abstract: Approaches for ensuring a document does not inadvertently link or contain to any malicious content. A request from a document embedded within a parent web page itself, or comprised within a window launched by the parent web page, is received. The request is executed in a memory address space separate from a memory address space in which the parent web page resides. The execution of the request is performed using a parent proxy that represents the parent web page. Any malicious actions resulting from the performance of the request affect the parent proxy rather than the parent web page. The parent proxy provides at least a portion of the results of executing the request to a child proxy, which in turn determines what, if any, content within the results should be sent to the web browser rendering the parent web page.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: August 11, 2015
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Kiran Bondalapati, Vikram Kapoor
  • Patent number: 9104544
    Abstract: Mitigating eviction of the memory pages of virtualized machines. Upon detecting that a request to perform an I/O operation has been issued against a block stored a disk, a determination is made as to whether a pristine copy of the contents of the block is stored in memory. If a pristine copy of the contents of the block is stored in memory, then the request may be performed by updating mapping data that maps a page of memory to a location in memory at which the pristine copy is stored. In this way, the request is performed without performing the I/O operation against the block stored on disk. Various approaches for resharing memory, including memory of a template virtual machine, are discussed.
    Type: Grant
    Filed: May 10, 2012
    Date of Patent: August 11, 2015
    Assignee: Bromium, Inc.
    Inventors: Krzysztof Uchronski, Martin O'Brien, Jacob Gorm Hansen, Kiran Bondalapati, Ian Pratt, Gaurav Banga, Vikram Kapoor
  • Publication number: 20150143374
    Abstract: Approaches for executing untrusted software on a client without compromising the client using micro-virtualization to execute untrusted software in isolated contexts. A template for instantiating a virtual machine on a client is identified in response to receiving a request to execute an application. After the template is identified, without human intervention, a virtual machine is instantiated, using the template, in which the application is to be executed. The template may be selected from a plurality of templates based on the nature of the request, as each template describe characteristics of a virtual machine suitable for a different type of activity. When the client determines that the application has ceased to execute, the client ceases execution of the virtual machine without human intervention.
    Type: Application
    Filed: January 30, 2015
    Publication date: May 21, 2015
    Inventors: Gaurav Banga, Kiran Bondalapati, Ian Pratt, Vikram Kapoor
  • Patent number: 9015836
    Abstract: Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An intermediate copy of the digital file in an intermediate format is created from the digital file in the original format. The intermediate format preserves a visual or audio presentation of the digital file without supporting metadata or file format data structures of the original format. A sterilized copy of the digital file is created from the intermediate copy. The sterilized copy is in the original format. The sterilized copy comprises a digital signature indicating that the sterilized copy has been converted from the intermediate format to the original format. Advantageously, the sterilized copy is guaranteed to not possess any malicious code.
    Type: Grant
    Filed: March 2, 2014
    Date of Patent: April 21, 2015
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Rahul Kashyap, Andrew Southgate
  • Patent number: 8972980
    Abstract: Approaches for executing untrusted software on a client without compromising the client using micro-virtualization to execute untrusted software in isolated contexts. A template for instantiating a virtual machine on a client is identified in response to receiving a request to execute an application. After the template is identified, without human intervention, a virtual machine is instantiated, using the template, in which the application is to be executed. The template may be selected from a plurality of templates based on the nature of the request, as each template describe characteristics of a virtual machine suitable for a different type of activity. Selected resources such as files are displayed to the virtual machines according to user and organization policies and controls. When the client determines that the application has ceased to execute, the client ceases execution of the virtual machine without human intervention.
    Type: Grant
    Filed: May 25, 2011
    Date of Patent: March 3, 2015
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Ian Pratt, Kiran Bondalapati, Vikram Kapoor
  • Publication number: 20140380315
    Abstract: Approaches for transferring a file using a virtualized application. A virtualized application executes within a virtual machine residing on a physical machine. When the virtualized application is instructed to download a file stored external to the physical machine, the virtualized application displays an interface which enables at least a portion of a file system, maintained by a host OS, to be browsed while preventing files stored within the virtual machine to be browsed. Upon the virtualized application receiving input identifying a target location within the file system, the virtualized application stores the file at the target location. The virtualized application may also upload a file stored on the physical machine using an interface which enables at least a portion of a file system of a host OS to be browsed while preventing files in the virtual machine to be browsed.
    Type: Application
    Filed: September 5, 2014
    Publication date: December 25, 2014
    Inventors: Deepak Khajuria, Kiran Bondalapati, Vikram Kapoor, Gaurav Banga, Ian Pratt
  • Patent number: 8839245
    Abstract: Approaches for transferring a file using a virtualized application. A virtualized application executes within a virtual machine residing on a physical machine. When the virtualized application is instructed to download a file stored external to the physical machine, the virtualized application displays an interface which enables at least a portion of a file system, maintained by a host OS, to be browsed while preventing files stored within the virtual machine to be browsed. Upon the virtualized application receiving input identifying a target location within the file system, the virtualized application stores the file at the target location. The virtualized application may also upload a file stored on the physical machine using an interface which enables at least a portion of a file system of a host OS to be browsed while preventing files in the virtual machine to be browsed.
    Type: Grant
    Filed: June 18, 2012
    Date of Patent: September 16, 2014
    Assignee: Bromium, Inc.
    Inventors: Deepak Khajuria, Kiran Bondalapati, Vikram Kapoor, Gaurav Banga, Ian Pratt
  • Publication number: 20140259159
    Abstract: Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An intermediate copy of the digital file in an intermediate format is created from the digital file in the original format. The intermediate format preserves a visual or audio presentation of the digital file without supporting metadata or file format data structures of the original format. A sterilized copy of the digital file is created from the intermediate copy. The sterilized copy is in the original format. The sterilized copy comprises a digital signature indicating that the sterilized copy has been converted from the intermediate format to the original format. Advantageously, the sterilized copy is guaranteed to not possess any malicious code.
    Type: Application
    Filed: March 2, 2014
    Publication date: September 11, 2014
    Applicant: Bromium, Inc.
    Inventors: Gaurav Banga, Rahul Kashyap, Andrew Southgate
  • Patent number: 8799691
    Abstract: Methods, systems, apparatuses and program products are disclosed for providing power/energy control. HPM (Hierarchical Power Management) systems provide for and improve on the power management support beyond what is available in current PC notebooks and desktops.
    Type: Grant
    Filed: August 20, 2009
    Date of Patent: August 5, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Gaurav Banga, Kaushik Barde, Anand Pandit
  • Patent number: 8782232
    Abstract: A method for operating a server first assigns a plurality of storage volumes to one or more storage devices. A plurality of sub-volumes is established within a namespace of each of the plurality of storage volumes. An instance of a virtual server is created, the virtual server having a plurality of assigned sub-volumes, the assigned sub-volumes chosen from different storage volumes of the plurality of storage volumes. A file system function is shared between the server and the instance of the virtual server, the file system function using at least one of the plurality of assigned sub-volumes.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: July 15, 2014
    Assignee: NetApp, Inc.
    Inventors: Mark Muhlestein, Gaurav Banga
  • Patent number: 8752047
    Abstract: Approaches for transferring data to a client by safely receiving the data in or more virtual machines. In response to the client determining that digital content, originating from an external source, is to be received or processed by the client, the client identifies, without human intervention, one or more virtual machines, executing or to be executed on the client, into which the digital content is to be stored. In doing so, the client may consult policy data to determine a placement policy, a containment policy, and a persistence policy for any virtual machine to receive the digital content. In this way, digital content, such as executable code or interpreted data, of unknown trustworthiness may be safely received by the client without the possibility of any malicious code therein from affecting any undesirable consequence upon the client.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: June 10, 2014
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Kiran Bondalapati, Ian Pratt, Vikram Kapoor
  • Patent number: 8745383
    Abstract: Techniques for securing a client. An operating system agent is one or more software modules that execute in an operating system of a client, such as a portable computer. Portions of the operating system agent may monitor resources of the client. The operating system agent sends a message, which describes an operational state of the operating system agent, to a BIOS agent. The BIOS agent is one or more software modules operating in a BIOS of the client. The BIOS agent performs an action based on a policy that is described by policy data stored within the BIOS of the client. The BIOS agent performs the action in response to either (a) the operational state described by the message, or (b) the BIOS agent not receiving the message after an expected period of time.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: June 3, 2014
    Assignee: Absolute Software Corporation
    Inventors: Anahit Tarkhanyan, Ravi Gupta, Gaurav Banga
  • Patent number: 8719933
    Abstract: Approaches for processing a digital file in a manner designed to minimize exposure of any malicious code contained therein. A digital file resides with a virtual machine. When the virtual machine receives an instruction to print, fax, or email the digital file, the virtual machine creates, from the digital file existing in an original format, a copy of the digital file in a different format within the virtual machine. The different format preserves a visual presentation of the digital file without supporting metadata or file format data structures of the original format. The virtual machine instructs the host OS to print the copy of the digital file, send a facsimile of the copy of the digital file, or email the copy of the digital file. The host OS may consult policy data in determining how to carry out the request vis-à-vis the digital file.
    Type: Grant
    Filed: June 19, 2012
    Date of Patent: May 6, 2014
    Assignee: Bromium, Inc.
    Inventors: Deepak Khajuria, Gaurav Banga, Vikram Kapoor, Ian Pratt
  • Patent number: 8667594
    Abstract: Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An intermediate copy of the digital file in an intermediate format is created from the digital file in the original format. The intermediate format preserves a visual or audio presentation of the digital file without supporting metadata or file format data structures of the original format. A sterilized copy of the digital file is created from the intermediate copy. The sterilized copy is in the original format. The sterilized copy comprises a digital signature indicating that the sterilized copy has been converted from the intermediate format to the original format. Advantageously, the sterilized copy is guaranteed to not possess any malicious code.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: March 4, 2014
    Assignee: Bromium, Inc.
    Inventors: Gaurav Banga, Rahul Kashyap, Andrew Southgate
  • Patent number: 8510825
    Abstract: Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in the BIOS of the client. The policy data describes one or more policies which the client should follow. When an operating system agent detects that a condition, specified by a particular policy of the one or more policies, has been met, the operating system agent performs one or more actions specified by the particular policy, such as disabling the client, retrieving a file from the client, erasing a file from the client, or encrypting a file on the client. The operating system agent is one or more software modules that execute in the operating system of the client.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: August 13, 2013
    Assignee: Absolute Software Corporation
    Inventors: Anahit Tarkhanyan, Ravi Gupta, Gaurav Banga
  • Publication number: 20130191924
    Abstract: Approaches for preventing unauthorized access of sensitive data within an operating system (OS), e.g., a guest OS used by a virtual machine. Dummy data may be written over physical locations on disk where sensitive data is stored, thereby preventing a malicious program from accessing the sensitive data. Alternately, a delete operation may be performed on sensitive data within an OS, and thereafter the OS is converted into a serialized format to expunge the deleted data. The serialized OS is converted into a deserialized form to facilitate its use. Optionally, a data structure may be updated to identify where sensitive data is located within an OS. When a request to access a portion of the OS is received, the data structure is consulted to determine whether the requested portion contains sensitive data, and if so, dummy data is returned to the requestor without consulting the requested portion of the OS.
    Type: Application
    Filed: January 25, 2012
    Publication date: July 25, 2013
    Inventors: Gianni Tedesco, Anushree Pole, Andrew Southgate, Ian Pratt, Vikram Kapoor, Gaurav Banga
  • Patent number: 8489847
    Abstract: A system memory is partitioned into a first paged partition for a first operating system and a second paged partition for a second operating system. The first paged partition is mapped into a first virtual memory partition, and the second paged partition is mapped into a second virtual memory partition. A subset of pages within the second virtual memory partition is marked as reclaimable by the first operating system to produce a set of marked pages. Responsive to a request by the first operating system for further memory, at least one reclaimable page selected from the set of marked pages is swapped out to a storage file, and the first operating system writes to the at least one reclaimable page.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: July 16, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kaushik Barde, Gaurav Banga
  • Publication number: 20130132691
    Abstract: Approaches for providing a guest operating system to a virtual machine. A read-only copy of one or more disk volumes, including a boot volume, is created. A copy of a master boot record (MBR) for the one or more disk volumes is also stored. The read-only copy may be, but need not be, made using a Volume Shadow Copy Service (VSS). A virtual disk, for use by the virtual machine, is created based on the read-only copy of the one or more disk volumes and the copy of the master boot record (MBR), wherein the virtual disk comprises the guest operating system used by the virtual machine. In this way, a single installed operating system may provide both the host operating system and the guest operating system.
    Type: Application
    Filed: November 22, 2011
    Publication date: May 23, 2013
    Inventors: Gaurav Banga, Ian Pratt, Simon Crosby, Vikram Kapoor, Kiran Bondalapati, Vadim Dmitriev
  • Publication number: 20130055256
    Abstract: Approaches for transferring data to a client by safely receiving the data in or more virtual machines. In response to the client determining that digital content, originating from an external source, is to be received or processed by the client, the client identifies, without human intervention, one or more virtual machines, executing or to be executed on the client, into which the digital content is to be stored. In doing so, the client may consult policy data to determine a placement policy, a containment policy, and a persistence policy for any virtual machine to receive the digital content. In this way, digital content, such as executable code or interpreted data, of unknown trustworthiness may be safely received by the client without the possibility of any malicious code therein from affecting any undesirable consequence upon the client.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Inventors: Gaurav Banga, Kiran Bondalapati, Ian Pratt, Vikram Kapoor
  • Patent number: 8364825
    Abstract: Methods, systems, apparatuses and program products are disclosed for managing connections to telecommunications networks, especially networks that deploy Internet Protocols and the like. Provision is made for colligating a connectivity ruleset, interconverting status data to form a dataset of candidate communication links, and supplicating a network connection. Also for forming physical location profiles and selecting a network on that basis and upon a basis of a present physical location of the respective computer.
    Type: Grant
    Filed: February 4, 2009
    Date of Patent: January 29, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Gaurav Banga, Giridhar Pemmasani, Vishwanathan Rajendran