Patents by Inventor Shashank Srivastava
Shashank Srivastava has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240154937Abstract: There is disclosed in an example a gateway device, including a hardware computing platform, and a secure domain name system (DNS) engine having circuitry and stored instructions to-program the circuitry, the secure DNS engine to communicatively couple to an endpoint via a local network, begin a secure DNS transaction with the endpoint, determine whether the endpoint supports delegated credentials, and after determining that the endpoint supports delegated credentials, establish a secure DNS session with the endpoint using a delegated credential.Type: ApplicationFiled: January 16, 2024Publication date: May 9, 2024Applicant: McAfee, LLCInventors: Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava
-
Publication number: 20240137383Abstract: There is disclosed herein a computer-implemented system and method of providing wellness detect and response (WDR) security services for an enterprise, including computing, for the enterprise, a quantitative user-centric security posture, wherein computing the quantitative user-centric security posture comprises calculating, for a user, a quantitative user risk profile according to a combination of user role, user privileges, user behavior, and digital assets assigned to a user and owned by the enterprise.Type: ApplicationFiled: December 15, 2023Publication date: April 25, 2024Applicant: McAfee, LLCInventors: Dattatraya Kulkarni, Raghavendra Satyanarayana Hebbalalu, Srikanth Nalluri, Urmil Mahendra Parikh, Shashank Jain, Himanshu Srivastava, Piyush Pramod Joshi, Partha Sarathi Barik, Purushothaman Balamurugan, Saravana Kumar Ramalingam, Devanshi Saxena, Martin Pivetta, Sujay Subrahmanya, Shahmeet Singh, Ryan Burrows, Samrat Chitta
-
Publication number: 20240111256Abstract: A machine learning model that uses composite metrology data determines at least one parameter of a device under test using measured metrology data from the device. The composite metrology data is generated by merging measured metrology data from a reference device with synthetic metrology data calculated from a model of the reference device. The composite metrology data may be generated further based on a synthetic metrology data calculated from a model for a modified reference device. The modified reference device may be generated using variations of at least one parameter of the model to expand the parameter space of the training range.Type: ApplicationFiled: June 22, 2023Publication date: April 4, 2024Applicant: Onto Innovation Inc.Inventors: Haodong Qiu, Zhuo Chen, Wei Ming Chiew, Jie Li, Jingsheng Shi, Shashank Srivastava
-
Publication number: 20240114048Abstract: A computer-implemented method provides security services to an enterprise. The method computes, for a plurality of enterprise users, a plurality of user health scores based on respective protection statuses for a plurality of enterprise assets owned by respective users; computes, for the enterprise, an overall enterprise security status score based on the plurality of user health scores; graphically displays to an enterprise administrator the overall enterprise security status score; and presents to the enterprise administrator a plurality of action recommendations to improve the overall enterprise security status score.Type: ApplicationFiled: December 23, 2022Publication date: April 4, 2024Applicant: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Himanshu Srivastava, Shashank Jain, Urmil Mahendra Parikh, Raghavendra Satyanarayana Hebbalalu, Piyush Pramod Joshi, Partha Sarathi Barik, Purushothaman Balamurugan, Saravana Kumar Ramalingam, Devanshi Saxena, Martin Pivetta, Sujay Subrahmanya, Shahmeet Singh, Ryan Burrows
-
Patent number: 11917080Abstract: There is disclosed in one example a network gateway device, including: a hardware platform including a processor and a memory; a network interface, including network interface hardware; and instructions encoded within the memory to instruct the processor to: receive from an endpoint device, via the network interface, a signed security posture data structure, the signed security posture data structure including information about a security posture of the endpoint device; cryptographically verify the signed security posture data structure; and according to the signed security posture data structure, assign a network security policy to the endpoint device.Type: GrantFiled: March 31, 2021Date of Patent: February 27, 2024Assignee: McAfee, LLCInventors: Tirumaleswar Reddy Konda, Shashank Jain, Piyush Pramod Joshi, Himanshu Srivastava
-
Publication number: 20210256443Abstract: A computerized method for implementing an optimal supply chain configuration includes the step of implementing an optimal supply chain configuration for a business. The method includes the step of modelling costs for minimization in an optimal supply chain configuration. The method includes the step of modelling constraints in an optimal supply chain configuration. The method includes the step of, based on the modelled cost for minimization and the modelled constraints, optimizing a supply chain for the business.Type: ApplicationFiled: November 19, 2020Publication date: August 19, 2021Inventors: SHASHANK SRIVASTAVA, RAHUL JAIN, GEET GARG, CHAITANYA SANGANI, KEVIN ABRAHAM
-
Patent number: 10824755Abstract: One embodiment provides a method, including: receiving, at a third-party storage provider and from a data owner, a plurality of encrypted documents, wherein each of the plurality of encrypted documents is encrypted by the data owner using at least one encryption key; receiving, from a query user, an encrypted query, wherein the query is encrypted using the at least one encryption key; computing an edit distance value between the encrypted query and at least a portion of the plurality of encrypted documents, wherein the computing comprises communicating with an entity to work together to compute the edit distance value; the communicating comprising (i) providing, from the third-party storage provider to the entity, an encrypted function of an edit distance matrix and (ii) receiving an encrypted edit distance value computed by the entity from the encrypted function; and returning the encrypted edit distance value to the query user.Type: GrantFiled: October 11, 2018Date of Patent: November 3, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Akshar Kaul, Sameep Mehta, Shashank Srivastava
-
Publication number: 20200226506Abstract: In one aspect, a computerized method of automated solution for periodic journey planning comprising includes the step of creating a set of salesbeats using a set of outlet data and a set of customer level data. The method includes the step of allocating each of the salesbeats to one or more sales executives. A salesbeat includes a plan that defines who to visit; when to visit; an identity of a sales executives to send and a day level route plan made for field sales/marketing personnel to make visits to a number of stores at a predefined frequency. The method includes the step of allocating the sales executives are allocated to a specified set of days. The method includes the step of implements sequencing of outlets within the salesbeats established using a capacitated vehicle routing problem (CVRP) algorithm such that a distance traveled and a time window of the salesbeat is optimized for the sales executives.Type: ApplicationFiled: November 14, 2019Publication date: July 16, 2020Inventors: Shashank Srivastava, Rahul Jain, geet garg, Manu A C, Aniket Uday Sawant, Arun Nalla
-
Publication number: 20200117821Abstract: One embodiment provides a method, including: receiving, at a third-party storage provider and from a data owner, a plurality of encrypted documents, wherein each of the plurality of encrypted documents is encrypted by the data owner using at least one encryption key; receiving, from a query user, an encrypted query, wherein the query is encrypted using the at least one encryption key; computing an edit distance value between the encrypted query and at least a portion of the plurality of encrypted documents, wherein the computing comprises communicating with an entity to work together to compute the edit distance value; the communicating comprising (i) providing, from the third-party storage provider to the entity, an encrypted function of an edit distance matrix and (ii) receiving an encrypted edit distance value computed by the entity from the encrypted function; and returning the encrypted edit distance value to the query user.Type: ApplicationFiled: October 11, 2018Publication date: April 16, 2020Inventors: Akshar Kaul, Sameep Mehta, Shashank Srivastava