Patents by Inventor Srikanth Nalluri
Srikanth Nalluri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190306166Abstract: Particular embodiments described herein provide for an electronic device that can be configured to establish a connection with a router, obtain identification for the router, communicate the identification of the router to a network element, receive a hash of at least a portion of a certificate for the router, and disconnect the connection and establish a new connection with the router, where the hash is used to authenticate network services received from the router during the new connection. In an example, the hash is part of a subject public key infrastructure (SPKI) pin set.Type: ApplicationFiled: March 29, 2018Publication date: October 3, 2019Applicant: McAfee, LLCInventors: Tirumaleswar Reddy Konda, Himanshu Srivastava, Harsha Ramamurthy Joshi, Srikanth Nalluri, Dattatraya Kulkarni
-
Patent number: 10417417Abstract: The present disclosure relates to a system and method for performing antimalware scanning of data files that is data-centric rather than device-centric, In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware, After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan, The originating device may also scan the data for malware contextually-relevant to a second device.Type: GrantFiled: December 13, 2013Date of Patent: September 17, 2019Assignee: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Kamlesh Halder, Venkatasubrahmanyam Krishnapur, Sailaja K. Shankar, Kaushal Kumar Dhruw
-
Publication number: 20190238563Abstract: There is disclosed in one example a remediation server including: a hardware platform, including a processor, a memory, and a network interface; and instructions encoded within the memory to instruct the processor to: receive an application binary; create an application logic model of the application binary; and create personalization rules for the application binary based on the application logic model.Type: ApplicationFiled: April 12, 2019Publication date: August 1, 2019Applicant: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur
-
Publication number: 20190171835Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for secure distributed backup for personal device and cloud data. An example method disclosed herein includes, in response to a request for a file from a client device, obtaining a map corresponding to the file from a remote device, and requesting, by executing an instruction with a processor, a first file chunk from a first cloud storage location based on the map. The example method further includes requesting, by executing an instruction with the processor, a second file chunk from a second cloud storage location based on the map, and generating, by executing an instruction with the processor, the file by combining the first file chunk and the second file chunk. The example method also includes causing transmission of the file to the client device.Type: ApplicationFiled: January 21, 2019Publication date: June 6, 2019Inventors: Mitesh Kumar, Srikanth Nalluri, Dattatraya Kulkarni, Kamlesh Halder, Kranthikumar Gadde, Kaushal Kumar Dhruw, Krishnapur Venkatasubrahmanyam, Susmita Nayak
-
Patent number: 10305929Abstract: According to one example, a system and method are disclosed for malware and grayware remediation. For example, the system is operable to identify applications that have some legitimate behavior but that also exhibit some undesirable behavior. A remediation engine is provided to detect malware behavior in otherwise useful applications, and allow the useful parts of the application to run while blocking the malware behavior. In an example method of “healing,” this may involve modifying the application binary to remove undesirable behavior. In an example method of “personalization,” this may involve inserting control hooks through the operating system to prevent certain subroutines from taking effect.Type: GrantFiled: December 21, 2013Date of Patent: May 28, 2019Assignee: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur
-
Publication number: 20190138497Abstract: Disclosed examples include receiving an indication that a file is designated as a favorite file from a user device; retrieving the file from a remote location; storing the file as a first favorite file on a favorites storage device; re-retrieving the file from the remote location; and updating the first favorite file with the re-retrieved file.Type: ApplicationFiled: December 28, 2018Publication date: May 9, 2019Inventors: Kranthikumar Gadde, Mitesh Kumar, Kamlesh Halder, Raj Vardhan, Srikanth Nalluri, Dattatraya Kulkarni, Susmita Nayak, Krishnapur Venkatasubrahmanyam
-
Patent number: 10204109Abstract: Distributed favorite files are stored in a favorite storage device. An agent dynamically monitors usage statistics for a plurality of files, wherein the plurality of files are located on a plurality of devices, designates a first file of the plurality of files as a favorite file based on usage statistics for the first file, and in response to designating the first file as a favorite file, stores a copy of the first file on a favorites storage device.Type: GrantFiled: November 23, 2015Date of Patent: February 12, 2019Assignee: McAfee, LLCInventors: Kranthikumar Gadde, Mitesh Kumar, Kamlesh Halder, Raj Vardhan, Srikanth Nalluri, Dattatraya Kulkarni, Susmita Nayak, Krishnapur Venkatasubrahmanyam
-
Patent number: 10206100Abstract: The present disclosure relates to a system and method for providing a secure context exchange cloud service which enables context information to be shared among devices, and providing a safety application which utilizes the context information being shared. In one example, the context exchange cloud service provides secure exchange of the context information, which in turn enables a safety application to enhance personal safety.Type: GrantFiled: December 24, 2014Date of Patent: February 12, 2019Assignee: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
-
Patent number: 10198589Abstract: Securely distributing a backup file includes identifying a file to be stored, generating a plurality of file chunks from the file, transmitting from a first device, each of the plurality of file chunks to one of a plurality of storage locations, and generating, at the first device, a map that identifies the storage location for each chunk. Retrieving a distributed backup file includes receiving a request to retrieve a file, obtaining a map corresponding to the file, wherein the map identifies a storage location for each of a plurality of file chunks of the file, retrieving the plurality of file chunks from the identified locations, and generating the requested file by combining the plurality of file chunks.Type: GrantFiled: December 23, 2015Date of Patent: February 5, 2019Assignee: McAfee, LLCInventors: Mitesh Kumar, Srikanth Nalluri, Dattatraya Kulkarni, Kamlesh Halder, Kranthikumar Gadde, Kaushal Kumar Dhruw, Krishnapur Venkatasubrahmanyam, Susmita Nayak
-
Publication number: 20190026464Abstract: Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device.Type: ApplicationFiled: September 21, 2018Publication date: January 24, 2019Applicant: McAfee, LLCInventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Kaushal Kumar Dhruw, Kamlesh Halder
-
Patent number: 10114950Abstract: Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device.Type: GrantFiled: July 18, 2017Date of Patent: October 30, 2018Assignee: McAfee, LLC.Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Kaushal Kumar Dhruw, Kamlesh Halder
-
Patent number: 9936018Abstract: To provide a more seamless experience across multiple devices, task streaming systems and methods allow a user to create “task-contexts” and manage metadata of files stored across multiple data storage devices and user preferences associated with capabilities of the multiple devices for operating on the file. Furthermore, the task streaming systems and methods are provided to allow task-contexts to be shared from one device to another device. A task-context specifies one or more files and one or more operations to be performed on the one or more files. By providing a task-context from one device to the other device, a user can accomplish a task with a particular file and seamlessly transition between devices with minimal disruption and effort.Type: GrantFiled: December 14, 2013Date of Patent: April 3, 2018Assignee: McAfee, LLCInventors: Dattatraya Kulkarni, Srikanth Nalluri, Kamlesh Halder, Venkatasubrahmanyam Krishnapur, Shailaja Shankar, Kaushal Kumar Dhruw, Kranthikumar Gadde
-
Publication number: 20180089431Abstract: Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device.Type: ApplicationFiled: July 18, 2017Publication date: March 29, 2018Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Kaushal Kumar Dhruw, Kamlesh Halder
-
Publication number: 20170302609Abstract: Particular embodiments described herein provide for system that can be configured to deliver a notification to a user based on the user's preference for each device that receives the notification. The user's preference is based on how the user interacted with similar notifications in the past and the system can change how it will deliver similar notifications to the user in the future based on how the user interacts with the notification.Type: ApplicationFiled: July 2, 2016Publication date: October 19, 2017Applicant: McAfee, Inc.Inventors: Raj Vardhan, Arvind Sankarasubramanian, Kranthi Kumar Gadde, Srikanth Nalluri, Dattatraya Kulkarni
-
Publication number: 20170195865Abstract: A safety event is determined as affecting a user based at least in part context data collected at a user device associated with the user. In some aspects, context data is detected from sensors on the client device, the context data describing a present context of the user. A deviation of the present context from a historical context is determined to be beyond a threshold. Determining that the deviation is beyond the threshold can be determined to correspond to a safety event potentially jeopardizing safety of the user. In some aspects, an action can be launched in response to determining the safety event.Type: ApplicationFiled: November 10, 2016Publication date: July 6, 2017Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Yogesh Jain, Kaushal Kumar Dhruw, Kamlesh Halder
-
Publication number: 20170105171Abstract: A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. The rules may include definitions of access rights, with respect to the network enabled device, for users, applications, commands or queries made by applications, remote host devices, and network domains.Type: ApplicationFiled: October 6, 2016Publication date: April 13, 2017Inventors: Himanshu Srivastava, Dattatraya Kulkarni, Srikanth Nalluri, Krishnapur N. Venkatasubrahmanyam, Kamlesh Halder, Raj Vardhan
-
Publication number: 20160345171Abstract: The present disclosure relates to a system and method for providing a secure context exchange cloud service which enables context information to be shared among devices, and providing a safety application which utilizes the context information being shared. In one example, the context exchange cloud service provides secure exchange of the context information, which in turn enables a safety application to enhance personal safety.Type: ApplicationFiled: December 24, 2014Publication date: November 24, 2016Applicant: McAfee, Inc.Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
-
Publication number: 20160306996Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a request to share data, determine metadata for the data to be shared, communicate the metadata to a social drive, where the social drive is separate from the electronic device and the data is not located on the social drive, and communicate the shared data to a member of the social drive when the member requests the data.Type: ApplicationFiled: December 26, 2014Publication date: October 20, 2016Applicant: McAfee, Inc.Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Kamlesh Halder, KranthiKumar Gadde, Susmita Nayak, Mitesh Kumar, Raj Vardhan, Alan Illia Lefort
-
Publication number: 20160299779Abstract: The present disclosure relates to a system and method for providing a service on a wearable device where the wearable device is limited in its functionality in some way when compared with a companion device. In particular, the disclosure describes use cases for configuring the wearable device, and use cases for configuring a wearable device and performing service application functions on the wearable device while leveraging a companion device.Type: ApplicationFiled: December 23, 2014Publication date: October 13, 2016Applicant: McAfee, Inc.Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
-
Publication number: 20160212208Abstract: To provide a more seamless experience across multiple devices, task streaming systems and methods allow a user to create “task-contexts” and manage metadata of files stored across multiple data storage devices and user preferences associated with capabilities of the multiple devices for operating on the file. Furthermore, the task streaming systems and methods are provided to allow task-contexts to be shared from one device to another device. A task-context specifies one or more files and one or more operations to be performed on the one or more files. By providing a task-context from one device to the other device, a user can accomplish a task with a particular file and seamlessly transition between devices with minimal disruption and effort.Type: ApplicationFiled: December 14, 2013Publication date: July 21, 2016Applicant: McAfee, Inc.Inventors: Dattatraya KULKARNI, Srikanth NALLURI, Kamlesh HALDER, Kaushal Kr. DHRUW, Shailaja SHANKAR, Venkatasubrahmanyam KRISHNAPUR, Kranthikumar GADDE