Patents by Inventor Srinivas Mantripragada

Srinivas Mantripragada has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150040220
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: October 16, 2014
    Publication date: February 5, 2015
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20140173731
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: February 3, 2014
    Publication date: June 19, 2014
    Applicant: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Patent number: 8730946
    Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: May 20, 2014
    Assignee: Redshift Internetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee
  • Publication number: 20120246103
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Application
    Filed: April 17, 2012
    Publication date: September 27, 2012
    Inventors: SRINIVAS MANTRIPRAGADA, Amitava Mukherjee, Rickard Per-Olof Sjöberg
  • Publication number: 20120204261
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: April 16, 2012
    Publication date: August 9, 2012
    Inventors: SRINIVAS MANTRIPRAGADA, Amitava MUKHERJEE, Barry BOMZER
  • Patent number: 8176001
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: May 8, 2012
    Assignee: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjöberg
  • Patent number: 8171548
    Abstract: Protected software, such as an application and/or DLL, is monitored by protective software to guard against attacks, while distinguishing spurious, benign events from attacks. In a 1-touch approach, the protected software is monitored in a testing environment to detect spurious, benign events caused by, e.g., incompatibility or interoperability problems. The spurious events can be remediated in different ways, such as by applying a relaxed security policy. In a production mode, or 0-touch mode, when the protected software is subject to attacks, the corresponding remediation can be applied when the spurious events are again detected. Security events which occur in production mode can also be treated as benign when they occur within a specified time window. The applications and/or DLLs can further be classified according to whether they are known to have bad properties, known to be well-behaved, or unknown. Appropriate treatment is provided based on the classification.
    Type: Grant
    Filed: April 21, 2010
    Date of Patent: May 1, 2012
    Assignee: VMware, Inc.
    Inventors: Srinivas Mantripragada, Timothy Garnett, Derek L. Bruening, Vladimir Kiriansky, Bharath Chandramohan, James Brink, Saman P. Amarasinghe, Sandy Wilbourn
  • Patent number: 8161540
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: April 17, 2012
    Assignee: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20100205669
    Abstract: Protected software, such as an application and/or DLL, is monitored by protective software to guard against attacks, while distinguishing spurious, benign events from attacks. In a 1-touch approach, the protected software is monitored in a testing environment to detect spurious, benign events caused by, e.g., incompatibility or interoperability problems. The spurious events can be remediated in different ways, such as by applying a relaxed security policy. In a production mode, or 0-touch mode, when the protected software is subject to attacks, the corresponding remediation can be applied when the spurious events are again detected. Security events which occur in production mode can also be treated as benign when they occur within a specified time window. The applications and/or DLLs can further be classified according to whether they are known to have bad properties, known to be well-behaved, or unknown. Appropriate treatment is provided based on the classification.
    Type: Application
    Filed: April 21, 2010
    Publication date: August 12, 2010
    Applicant: VMWARE, INC.
    Inventors: Srinivas MANTRIPRAGADA, Tim GARNETT, Derek BRUENING, Vladimir KIRIANSKY, Bharath CHANDRAMOHAN, James BRINK, Saman P. AMARASINGHE, Sandy WILBOURN
  • Patent number: 7735136
    Abstract: Protected software, such as an application and/or DLL, is monitored by protective software to guard against attacks, while distinguishing spurious, benign events from attacks. In a 1-touch approach, the protected software is monitored in a testing environment to detect spurious, benign events caused by, e.g., incompatibility or interoperability problems. The spurious events can be remediated in different ways, such as by applying a relaxed security policy. In a production mode, or 0-touch mode, when the protected software is subject to attacks, the corresponding remediation can be applied when the spurious events are again detected. Security events which occur in production mode can also be treated as benign when they occur within a specified time window. The applications and/or DLLs can further be classified according to whether they are known to have bad properties, known to be well-behaved, or unknown. Appropriate treatment is provided based on the classification.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: June 8, 2010
    Assignee: VMware, Inc.
    Inventors: Srinivas Mantripragada, Tim Garnett, Derek Bruening, Vladimir Kiriansky, Bharath Chandramohan, James Brink, Saman P. Amarasinghe, Sandy Wilbourn
  • Publication number: 20090106318
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjoberg
  • Publication number: 20090103524
    Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee
  • Publication number: 20090028135
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: July 28, 2008
    Publication date: January 29, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20060288420
    Abstract: Protected software, such as an application and/or DLL, is monitored by protective software to guard against attacks, while distinguishing spurious, benign events from attacks. In a 1-touch approach, the protected software is monitored in a testing environment to detect spurious, benign events caused by, e.g., incompatibility or interoperability problems. The spurious events can be remediated in different ways, such as by applying a relaxed security policy. In a production mode, or 0-touch mode, when the protected software is subject to attacks, the corresponding remediation can be applied when the spurious events are again detected. Security events which occur in production mode can also be treated as benign when they occur within a specified time window. The applications and/or DLLs can further be classified according to whether they are known to have bad properties, known to be well-behaved, or unknown. Appropriate treatment is provided based on the classification.
    Type: Application
    Filed: April 18, 2006
    Publication date: December 21, 2006
    Inventors: Srinivas Mantripragada, Tim Garnett, Derek Bruening, Vladimir Kiriansky, Bharath Chandramohan, James Brink, Saman Amarasinghe, Sandy Wilbourn
  • Publication number: 20050044538
    Abstract: A system for optimizing computing code containing procedures identifies code blocks as hot blocks or cold blocks in each procedure based on the local block weights of the code blocks in the procedure. The hot blocks are grouped into an intraprocedure hot section and an intraprocedure cold section for each procedure to optimize the procedure. The intraprocedure hot sections in the procedures are selectively grouped into an interprocedure hot section and the intraprocedure cold sections are selectively grouped into an interprocedure cold section, based on global block weights of the code blocks, to optimize the computing code. Additionally, code sections from called procedures can be duplicated into calling procedures to further optimize the computing code.
    Type: Application
    Filed: August 17, 2004
    Publication date: February 24, 2005
    Inventor: Srinivas Mantripragada