Patents by Inventor Anand Kashyap

Anand Kashyap has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150261940
    Abstract: A computer-implemented method for detecting information leakage by an organizational insider may include (1) identifying a set of organizational insiders of an organization, (2) identifying a set of public forums used by one or more organizational insiders, (3) identifying a set of messages posted to one or more public forums, (4) creating a message record corresponding to each message, with the record including a message summary, and a set of message metadata fields, (5) consolidating message records with common metadata fields into a message summary record, and (6) identifying, based on the message summary record, an information leakage threat. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: April 25, 2014
    Publication date: September 17, 2015
    Applicant: SYMANTEC CORPORATION
    Inventors: Kevin Alejandro Roundy, Anand Kashyap
  • Publication number: 20150264084
    Abstract: A computer-implemented method for protecting organizations against spear phishing attacks may include (1) searching a plurality of websites for user profiles belonging users who are affiliated with an organization and who have access to at least one privileged computing resource controlled by the organization, (2) retrieving, from the user profiles, personal information describing the users, (3) determining, based on the personal information, that a portion of the user profiles belongs to an individual user with access to the privileged computing resource, (4) identifying at least one phishing attack risk factor in the user profiles that belong to the individual user, and (5) assessing, based at least in part on the phishing attack risk factor, a risk of a phishing attack targeting the individual user to illegitimately gain access to the privileged computing resource. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: April 25, 2014
    Publication date: September 17, 2015
    Applicant: Symantec Corporation
    Inventors: Anand Kashyap, Sudhanshu Shekhar
  • Patent number: 8949243
    Abstract: A computer-implemented method to determine a rating of an item is described. At least one user review with textual information relating to the item is collected. A rating for at least one sentence of the textual information is calculated. An overall rating for the item is determined based on the calculated rating for the at least one sentence of the textual information.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: February 3, 2015
    Assignee: Symantec Corporation
    Inventors: Anand Kashyap, Karthik Ragunath Balasundaram
  • Patent number: 8769676
    Abstract: Techniques for identifying suspicious applications are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for identifying suspicious applications comprising determining one or more clusters of applications in an identified category of applications based on requested permissions of each of two or more applications in each of the one or more clusters of applications, determining a center application of each of the one or more clusters, and determining, using at least one computer processor, a similarity score for an application being evaluated based at least in part on a distance between the application being evaluated and the center application of a closest cluster of the one or more clusters.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: July 1, 2014
    Assignee: Symantec Corporation
    Inventor: Anand Kashyap
  • Patent number: 8627125
    Abstract: Power management systems and methods are presented. In one embodiment, implementation of a method for context specific power management of a resource, comprises: defining a context within which a resource operates, wherein the context is defined by one or more parameters; tracking a usage history of the resource operating within the context to determine passive user feedback related to a plurality of timeout values; and determining a timeout value for a current operation of the resource within the context based on the usage history.
    Type: Grant
    Filed: April 7, 2011
    Date of Patent: January 7, 2014
    Assignee: Symantec Corporation
    Inventor: Anand Kashyap
  • Patent number: 8543861
    Abstract: A computer-implemented method for diagnosing a network configuration of a computing device is described. A test network configuration is captured. A test network signature is generated from the test network configuration. A label is assigned to the test network signature. A determination is made as to whether the test network signature is labeled as an unsuccessful network signature. If the test network signature is labeled unsuccessful, one or more procedures to change the label are generated.
    Type: Grant
    Filed: April 2, 2010
    Date of Patent: September 24, 2013
    Assignee: Symantec Corporation
    Inventors: Sanjay Sawhney, Anand Kashyap
  • Publication number: 20120260112
    Abstract: Power management systems and methods are presented. In one embodiment, implementation of a method for context specific power management of a resource, comprises: defining a context within which a resource operates, wherein the context is defined by one or more parameters; tracking a usage history of the resource operating within the context to determine passive user feedback related to a plurality of timeout values; and determining a timeout value for a current operation of the resource within the context based on the usage history.
    Type: Application
    Filed: April 7, 2011
    Publication date: October 11, 2012
    Applicant: SYMANTEC CORPORATION
    Inventor: Anand Kashyap
  • Patent number: 8111154
    Abstract: A computer-implemented method for monitoring a mobile-computing device using geo-location information is disclosed. The method may include a learning phase. During the learning phase, a user may be located within a first range of physical locations during a recurring time period. The method may include generating a location profile for a mobile-computing device of the user and receiving a device-monitoring policy for the mobile-computing device from an administrator. The location profile may correlate the first range of physical locations with the recurring time period. The method may further include detecting, after the learning phase, that the mobile-computing device is outside the first range of physical locations during a first instance of the recurring time period. The method may also include implementing the device-monitoring policy after detecting that the mobile-computing device is outside the first range of physical locations during the first instance of the recurring time period.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: February 7, 2012
    Assignee: Symantec Corporation
    Inventors: Hemant Puri, Anand Kashyap, Sanjay Sawhney
  • Publication number: 20090213740
    Abstract: A method according to the invention includes determining a PHY layer model for a single interferer in an 802.11 wireless network responsive to an input of measured pair wise of at least one of a delivery ratio and received signal strength RSSI values in the 802.11 wireless network; ascertaining a deferral probability for a given node in the network in the presence of multiple interferers in a MAC layer model of the 802.11 network responsive to the determining step in the PHY layer model; and deriving from the ascertaining step at least one of sending capacity in the presence of multiple interferers, packet collision probability in the presence of multiple interferers and available capacity in a given link for a corresponding link delivery ratio.
    Type: Application
    Filed: February 25, 2008
    Publication date: August 27, 2009
    Applicant: NEC LABORATORIES AMERICA, INC.
    Inventors: Samrat Ganguly, Anand Kashyap