Patents by Inventor Gokul Singaraju
Gokul Singaraju has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11570185Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: GrantFiled: October 21, 2019Date of Patent: January 31, 2023Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Publication number: 20200053107Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: ApplicationFiled: October 21, 2019Publication date: February 13, 2020Applicant: AT&T Intellectual Property I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Patent number: 10547647Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.Type: GrantFiled: January 29, 2019Date of Patent: January 28, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Gokul Singaraju, Ashutosh Dutta, Thusitha Jayawardena, Christopher Van Wart
-
Patent number: 10454956Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: GrantFiled: August 13, 2018Date of Patent: October 22, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Publication number: 20190158542Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.Type: ApplicationFiled: January 29, 2019Publication date: May 23, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Gokul Singaraju, Ashutosh Dutta, Thusitha Jayawardena, Christopher Van Wart
-
Patent number: 10230767Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.Type: GrantFiled: July 29, 2015Date of Patent: March 12, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Gokul Singaraju, Ashutosh Dutta, Thusitha Jayawardena, Christopher Van Wart
-
Publication number: 20190007431Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: ApplicationFiled: August 13, 2018Publication date: January 3, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Patent number: 10079844Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: GrantFiled: August 22, 2017Date of Patent: September 18, 2018Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Publication number: 20170353479Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: ApplicationFiled: August 22, 2017Publication date: December 7, 2017Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Patent number: 9787701Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: GrantFiled: March 16, 2017Date of Patent: October 10, 2017Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Publication number: 20170187732Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: ApplicationFiled: March 16, 2017Publication date: June 29, 2017Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Patent number: 9606854Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: GrantFiled: August 13, 2015Date of Patent: March 28, 2017Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Publication number: 20170046211Abstract: An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.Type: ApplicationFiled: August 13, 2015Publication date: February 16, 2017Inventors: Thusitha Jayawardena, Jeffrey E. Bickford, Mikhail Istomin, John Liefert, Gokul Singaraju, Christopher Van Wart
-
Publication number: 20170034220Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.Type: ApplicationFiled: July 29, 2015Publication date: February 2, 2017Inventors: Gokul Singaraju, Ashutosh Dutta, Thusitha Jayawardena, Christopher Van Wart
-
Patent number: 8891745Abstract: Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option.Type: GrantFiled: September 2, 2013Date of Patent: November 18, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Sanjay Macwan, Gokul Singaraju
-
Publication number: 20140012675Abstract: Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option.Type: ApplicationFiled: September 2, 2013Publication date: January 9, 2014Applicant: AT&T Intellectual Property I, L.P.Inventors: Sanjay Macwan, Gokul Singaraju
-
Patent number: 8526586Abstract: Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option.Type: GrantFiled: June 21, 2011Date of Patent: September 3, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Sanjay Macwan, Gokul Singaraju
-
Publication number: 20130138716Abstract: A system that incorporates teachings of the present disclosure may include, for example, detecting an occurrence of an activity by synthesizing sensory data collected at a mobile communication device according to one or more references corresponding to the activity, sharing tracking information associated with the detected occurrence of the activity over a communication network, and presenting feedback information corresponding to the tracking information. Other embodiments are disclosed.Type: ApplicationFiled: November 28, 2011Publication date: May 30, 2013Applicant: AT&T Intellectual Property I, LPInventors: Sanjay Macwan, Gokul Singaraju
-
Publication number: 20120328090Abstract: Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option.Type: ApplicationFiled: June 21, 2011Publication date: December 27, 2012Inventors: Sanjay Macwan, Gokul Singaraju