Patents by Inventor Keeshini Manivannan

Keeshini Manivannan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240179123
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Application
    Filed: January 2, 2024
    Publication date: May 30, 2024
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, JR., Keeshini Manivannan
  • Patent number: 11973756
    Abstract: A processor-implemented method for improving computer identification comprising transmitting a browser fingerprinting test to one or more computing devices and receiving test data from the one more computing devices that includes at least an elapsed processing time and a hash code. The method includes determining an average elapsed processing time and determining a uniqueness level for the browser fingerprinting test by comparing the hash codes for each computing device with one another.
    Type: Grant
    Filed: March 24, 2022
    Date of Patent: April 30, 2024
    Assignee: Visa International Service Association
    Inventors: Joel Trunick, Keeshini Manivannan, Manan Lalaji, Dipeshkumar Patel
  • Patent number: 11895088
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Grant
    Filed: September 21, 2022
    Date of Patent: February 6, 2024
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
  • Publication number: 20230017103
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Application
    Filed: September 21, 2022
    Publication date: January 19, 2023
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
  • Patent number: 11481498
    Abstract: Apparatuses, methods, and systems are provided for making continuous vulnerability management for modern applications. A dependency tree can be created mapping third-party libraries to microservices used in an application of a software package. Natural language processing can be used on release notes and changelogs of new library versions to generate a list of libraries afflicted with common vulnerabilities and exposures (“CVEs”). A number of code calls from an application program interface (“API”) can be made to an afflicted library. A number of code calls including CVEs can be enumerated for each afflicted library. A risk score can be assigned to the API based on the number of code calls including CVEs. The risk score can be compared against a threshold value to cause a remedial action to occur, including updating libraries to newer versions to resolve CVE issues or generating a report regarding the afflicted libraries.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: October 25, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Shashi Velur, Abha Sharma, Karthiga Kengan, Keeshini Manivannan, Chintal Vashi
  • Patent number: 11477164
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: October 18, 2022
    Assignee: Visa International Service Association
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, Jr., Keeshini Manivannan
  • Publication number: 20220217142
    Abstract: A processor-implemented method for improving computer identification comprising transmitting a browser fingerprinting test to one or more computing devices and receiving test data from the one more computing devices that includes at least an elapsed processing time and a hash code. The method includes determining an average elapsed processing time and determining a uniqueness level for the browser fingerprinting test by comparing the hash codes for each computing device with one another.
    Type: Application
    Filed: March 24, 2022
    Publication date: July 7, 2022
    Inventors: Joel Trunick, Keeshini Manivannan, Manan Lalaji, Dipeshkumar Patel
  • Patent number: 11316853
    Abstract: A processor-implemented method for improving computer identification comprising transmitting a browser fingerprinting test to one or more computing devices and receiving test data from the one more computing devices that includes at least an elapsed processing time and a hash code. The method includes determining an average elapsed processing time and determining a uniqueness level for the browser fingerprinting test by comparing the hash codes for each computing device with one another.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: April 26, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Joel Trunick, Keeshini Manivannan, Manan Lalaji, Dipeshkumar Patel
  • Publication number: 20210359993
    Abstract: A processor-implemented method for improving computer identification comprising transmitting a browser fingerprinting test to one or more computing devices and receiving test data from the one more computing devices that includes at least an elapsed processing time and a hash code. The method includes determining an average elapsed processing time and determining a uniqueness level for the browser fingerprinting test by comparing the hash codes for each computing device with one another.
    Type: Application
    Filed: November 30, 2018
    Publication date: November 18, 2021
    Inventors: Joel Trunick, Keeshini Manivannan, Manan Lalaji, Dipeshkumar Patel
  • Publication number: 20210185008
    Abstract: A method for preventing transmission of malicious data may include receiving transaction data including at least one packet associated with a payment transaction; extracting at least one of network layer data or transport layer data from a header of the at least one packet; determining a first probability indicating that the at least one packet is in a first class based on the at least one of the network layer data or the transport layer data using a classifier. The method may also include determining a second probability indicating that the at least one packet is in a second class based on the at least one of the network layer data or the transport layer data using the classifier; and blocking the at least one packet. A system and a computer program product are also disclosed.
    Type: Application
    Filed: December 12, 2019
    Publication date: June 17, 2021
    Inventors: Vinjith Nagaraja, Raymond Scott Brammer, James L. Myers, JR., Keeshini Manivannan
  • Publication number: 20200242254
    Abstract: Apparatuses, methods, and systems are provided for making continuous vulnerability management for modern applications. A dependency tree can be created mapping third-party libraries to microservices used in an application of a software package. Natural language processing can be used on release notes and changelogs of new library versions to generate a list of libraries afflicted with common vulnerabilities and exposures (“CVEs”). A number of code calls from an application program interface (“API”) can be made to an afflicted library. A number of code calls including CVEs can be enumerated for each afflicted library. A risk score can be assigned to the API based on the number of code calls including CVEs. The risk score can be compared against a threshold value to cause a remedial action to occur, including updating libraries to newer versions to resolve CVE issues or generating a report regarding the afflicted libraries.
    Type: Application
    Filed: January 28, 2019
    Publication date: July 30, 2020
    Inventors: Shashi Velur, Abha Sharma, Karthiga Kengan, Keeshini Manivannan, Chintal Vashi