Patents by Inventor Partha Sarathi Barik

Partha Sarathi Barik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240137383
    Abstract: There is disclosed herein a computer-implemented system and method of providing wellness detect and response (WDR) security services for an enterprise, including computing, for the enterprise, a quantitative user-centric security posture, wherein computing the quantitative user-centric security posture comprises calculating, for a user, a quantitative user risk profile according to a combination of user role, user privileges, user behavior, and digital assets assigned to a user and owned by the enterprise.
    Type: Application
    Filed: December 15, 2023
    Publication date: April 25, 2024
    Applicant: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Raghavendra Satyanarayana Hebbalalu, Srikanth Nalluri, Urmil Mahendra Parikh, Shashank Jain, Himanshu Srivastava, Piyush Pramod Joshi, Partha Sarathi Barik, Purushothaman Balamurugan, Saravana Kumar Ramalingam, Devanshi Saxena, Martin Pivetta, Sujay Subrahmanya, Shahmeet Singh, Ryan Burrows, Samrat Chitta
  • Patent number: 11966787
    Abstract: There is disclosed in one example a computer apparatus, including: a hardware platform including a central processor unit (CPU) and a memory; and instructions encoded within the memory to instruct the CPU to: enumerate a plurality of running processes, and associate resource demands with the running processes; predict a resource starvation condition for at least one process; rank the plurality of running processes according to a dynamic ranking algorithm, wherein the ranking algorithm includes user engagement as an input for ranking a process; and according to the ranking and a safeguard algorithm, deallocate resources from a process ranked lower than the at least one process and assign the deallocated resources to the at least one process to mitigate the predicted resource starvation condition.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: April 23, 2024
    Assignee: McAfee LLC
    Inventors: Raghavendra Satyanarayana Hebbalalu, Dattatraya Kulkarni, Srikanth Nalluri, Partha Sarathi Barik, Raja Sinha, Anjan Kumar Nayak
  • Publication number: 20240114048
    Abstract: A computer-implemented method provides security services to an enterprise. The method computes, for a plurality of enterprise users, a plurality of user health scores based on respective protection statuses for a plurality of enterprise assets owned by respective users; computes, for the enterprise, an overall enterprise security status score based on the plurality of user health scores; graphically displays to an enterprise administrator the overall enterprise security status score; and presents to the enterprise administrator a plurality of action recommendations to improve the overall enterprise security status score.
    Type: Application
    Filed: December 23, 2022
    Publication date: April 4, 2024
    Applicant: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Himanshu Srivastava, Shashank Jain, Urmil Mahendra Parikh, Raghavendra Satyanarayana Hebbalalu, Piyush Pramod Joshi, Partha Sarathi Barik, Purushothaman Balamurugan, Saravana Kumar Ramalingam, Devanshi Saxena, Martin Pivetta, Sujay Subrahmanya, Shahmeet Singh, Ryan Burrows
  • Publication number: 20220318061
    Abstract: There is disclosed in one example a computer apparatus, including: a hardware platform including a central processor unit (CPU) and a memory; and instructions encoded within the memory to instruct the CPU to: enumerate a plurality of running processes, and associate resource demands with the running processes; predict a resource starvation condition for at least one process; rank the plurality of running processes according to a dynamic ranking algorithm, wherein the ranking algorithm includes user engagement as an input for ranking a process; and according to the ranking and a safeguard algorithm, deallocate resources from a process ranked lower than the at least one process and assign the deallocated resources to the at least one process to mitigate the predicted resource starvation condition.
    Type: Application
    Filed: March 31, 2021
    Publication date: October 6, 2022
    Applicant: McAfee, LLC
    Inventors: Raghavendra Satyanarayana Hebbalalu, Dattatraya Kulkarni, Srikanth Nalluri, Partha Sarathi Barik, Raja Sinha, Anjan Kumar Nayak
  • Publication number: 20220318057
    Abstract: An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to monitor software and hardware parameters on an electronic device that includes an application designated as a preferred application; determine whether the preferred application is running; detect a change in software or hardware parameters that indicates to reallocate resources to the preferred application; and apply, based on detecting the change in software or hardware parameters, an optimization policy that reallocates resources to a process associated with the preferred application.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 6, 2022
    Inventors: Raghavendra Satyanarayana Hebbalalu, Raja Sinha, Dattatraya Kulkarni, Partha Sarathi Barik, Srikanth Nalluri, Siddaraya B. Revashetti
  • Publication number: 20220269817
    Abstract: Methods, apparatus, systems, and articles of manufacture for orchestrating personal protection across digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to monitor digital assets associated with a protection threat surface to detect a protection event, determine one or more protection vectors associated with the digital assets in response to detecting the protection event, the one or more protection vectors including one or more values corresponding to an impact of the protection event on an overall protection posture associated with the protection threat surface, and determine protection remediation action for the digital assets based on the one or more protection vectors.
    Type: Application
    Filed: August 27, 2021
    Publication date: August 25, 2022
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raghavendra Hebbalalu, Sandeep Swastik, Piyush Pramod Joshi, Samrat Chitta, Partha Sarathi Barik