Patents by Inventor Parthasarathy Krishnan
Parthasarathy Krishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230064951Abstract: The present invention relates to compounds which can inhibit host cell ACE2 receptor, viral spike S protein, Spike protein-ACE2 receptor interface, RNA-dependent RNA polymerase (RdRp), helicase and exoribonuclease activity. Particularly the invention relates to kaempferol analogs, derivatives and prodrugs as antiviral agents specific to Severe Acute Respiratory Syndrome coronavirus 2 (SARS-CoV-2) or SARS-CoV-2 and SARS (Severe, acute respiratory syndrome coronavirus).Type: ApplicationFiled: August 18, 2022Publication date: March 2, 2023Inventors: Parul P. Lakhlani, Parthasarathy Krishnan
-
Publication number: 20220411409Abstract: The present invention relates to compounds which can inhibit host cell ACE2 receptor, viral spike S protein, Spike protein-ACE2 receptor interface, RNA-dependent RNA polymerase (RdRp), helicase and exoribonuclease activity. Particularly the invention relates to anthocyanidin analogs, derivatives and prodrugs as antiviral agents specific to Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) or SARS-CoV-2 and SARS (Severe acute respiratory syndrome coronavirus).Type: ApplicationFiled: June 15, 2022Publication date: December 29, 2022Inventors: Parul P. Lakhlani, Parthasarathy Krishnan
-
Publication number: 20220229886Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.Type: ApplicationFiled: August 31, 2021Publication date: July 21, 2022Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 11106768Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.Type: GrantFiled: December 24, 2018Date of Patent: August 31, 2021Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 10606988Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.Type: GrantFiled: August 21, 2018Date of Patent: March 31, 2020Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20190130081Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.Type: ApplicationFiled: December 24, 2018Publication date: May 2, 2019Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20190012440Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.Type: ApplicationFiled: August 21, 2018Publication date: January 10, 2019Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 10162947Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.Type: GrantFiled: May 18, 2015Date of Patent: December 25, 2018Assignee: NSS Lab Works LLCInventors: Namakkal S Sambamurthy, Parthasarathy Krishnan
-
Patent number: 10055559Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.Type: GrantFiled: December 22, 2017Date of Patent: August 21, 2018Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20180121637Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.Type: ApplicationFiled: December 22, 2017Publication date: May 3, 2018Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 9852275Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.Type: GrantFiled: March 15, 2013Date of Patent: December 26, 2017Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20150249688Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.Type: ApplicationFiled: May 18, 2015Publication date: September 3, 2015Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 9092605Abstract: Methods and systems are presented for securing network access. One method includes operations for granting a user access to remote computer resources after authenticating a login request from the user sent from a secured computer device, and for receiving a network access request from a network access device to allow the user access through the network access device. A network access granted message is sent to the network access device when the user currently has been granted access to the remote computer resources, where the secured computer device performs periodic authentication operations to validate an identification of the user based on biometric data taken of the user. Further, the method includes operations for receiving notification from the secured computer device that one of the authentication operations has failed, and for sending a network access denied for the user to the network access device in response to the notification.Type: GrantFiled: March 15, 2013Date of Patent: July 28, 2015Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 9081980Abstract: A method for managing data use of an enterprise is disclosed. The method includes receiving login parameters from a user associated with user identification information. The method authenticates the login parameters and the user information to determine if the login parameters match the user identification information. The method provides access to specific data in a database that stores enterprise information. Upon providing access, initiating video capture of a viewing space for the screen, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data. During the video capture, capturing image data presented on the screen and input received for the user interface of the screen. The method acts to bind the video capture and the captured image data presented on the screen and the input received.Type: GrantFiled: March 14, 2013Date of Patent: July 14, 2015Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 9053335Abstract: Systems and method are provided for enforcing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method disables the access to the database of secure information upon detecting a predefined security enforcement violation associated with an activity by the user during access to the database. The method being executed by a processor.Type: GrantFiled: March 14, 2013Date of Patent: June 9, 2015Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 9047464Abstract: Methods, systems, and computer programs are presented for securing a computer device. One method includes an operation for capturing interaction data for a user interfacing with the computer device, the interaction data including keyboard inputs and screen captures taken periodically. Further, the method includes operations for extracting semantic meaning of the interaction data, and generating a schema, based on the extracted semantic meaning, to create meaningful tags for the interaction data. The schema is analyzed based on a model in order to identify security threats, and an alarm is created when non-conforming behavior for the model is detected.Type: GrantFiled: March 15, 2013Date of Patent: June 2, 2015Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Patent number: 8904473Abstract: Devices, methods, and computer programs are presented for displaying information output of a host. One apparatus includes a housing that includes a panel, a scalar, a sensor, an integrated circuit (IC), and a communications device. The panel includes a plurality of light emitting devices arranged to define an area for displaying information output from the host. The scalar is for receiving pixel data from the host computer to be displayed on the panel, and the sensor is for capturing data proximate to the panel. The IC is in communication with the scalar and the panel, the integrated circuit configured to intercept the information output from the host computer, the data of the sensor being analyzed for security control when the information output is to be presented to the scalar. The communications device is for enabling the IC to communicate with a remote computer without communicating through the host computer.Type: GrantFiled: April 11, 2012Date of Patent: December 2, 2014Assignee: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20140283016Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20140283059Abstract: Methods, systems, and computer programs are presented for securing a computer device. One method includes an operation for capturing interaction data for a user interfacing with the computer device, the interaction data including keyboard inputs and screen captures taken periodically. Further, the method includes operations for extracting semantic meaning of the interaction data, and generating a schema, based on the extracted semantic meaning, to create meaningful tags for the interaction data. The schema is analyzed based on a model in order to identify security threats, and an alarm is created when non-conforming behavior for the model is detected.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
-
Publication number: 20140282965Abstract: Methods, systems, and computer programs are presented for securing network access. One method includes an operation for granting a user access to remote computer resources after authenticating a login request from the user sent from a secured computer device. In addition, the method includes an operation for receiving a network access request from a network access device to allow the user to access the remote computer resources through the network access device. A network access granted message for the user is sent to the network access device when the user currently has been granted access to the remote computer resources, where the secured computer device performs periodic authentication operations to validate an identification of the user based on biometric data taken of the user.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: NSS Lab Works LLCInventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan