Patents by Inventor Anup Ghosh
Anup Ghosh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240320323Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: ApplicationFiled: May 23, 2024Publication date: September 26, 2024Applicant: Invincea, Inc.Inventors: Anup GHOSH, Scott COSBY, Alan KEISTER, Benjamin BRYANT, Stephen TAYLOR
-
Patent number: 12019734Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: GrantFiled: March 24, 2021Date of Patent: June 25, 2024Assignee: Invincea, Inc.Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
-
Patent number: 11514934Abstract: The present disclosure generally relates to a dual free layer (DFL) two dimensional magnetic recording (TDMR) read head. The read head comprises a first sensor, a first rear hard bias (RHB) structure disposed adjacent to the first sensor, an upper shield disposed over the first sensor and first RHB structure, a lower shield disposed over the upper shield, a second sensor disposed over the lower shield, and a second RHB structure disposed adjacent to the second sensor. A first surface of the first sensor is substantially flush or aligned with a first surface of the first RHB structure. A first surface of the second sensor is substantially flush or aligned with a first surface of the second RHB structure. The upper shield extends linearly from a media facing surface into the read head. The first lower shield is over-milled a greater amount of time than the second lower shield.Type: GrantFiled: October 27, 2021Date of Patent: November 29, 2022Assignee: Western Digital Technologies, Inc.Inventors: Ming Mao, Chen-Jung Chien, Daniele Mauri, Goncalo Marcos Baião De Albuquerque, Chih-Ching Hu, Anup Ghosh Roy, Yung-Hung Wang
-
Patent number: 11310252Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: February 13, 2020Date of Patent: April 19, 2022Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Publication number: 20210209225Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: ApplicationFiled: March 24, 2021Publication date: July 8, 2021Applicant: Invincea, Inc.Inventors: Anup GHOSH, Scott COSBY, Alan KEISTER, Benjamin BRYANT, Stephen TAYLOR
-
Patent number: 10984097Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: GrantFiled: November 1, 2019Date of Patent: April 20, 2021Assignee: Invincea, Inc.Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
-
Publication number: 20200267173Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: February 13, 2020Publication date: August 20, 2020Applicant: George Mason Research Foundation, Inc.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Publication number: 20200242236Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: ApplicationFiled: November 1, 2019Publication date: July 30, 2020Applicant: Invincea, Inc.Inventors: Anup GHOSH, Scott COSBY, Alan KEISTER, Benjamin BRYANT, Stephen TAYLOR
-
Patent number: 10567414Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: January 17, 2019Date of Patent: February 18, 2020Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Patent number: 10467406Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: GrantFiled: June 26, 2018Date of Patent: November 5, 2019Assignee: Invincea, Inc.Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
-
Publication number: 20190158523Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: January 17, 2019Publication date: May 23, 2019Applicant: George Mason Research Foundation, Inc.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Patent number: 10187417Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: December 14, 2017Date of Patent: January 22, 2019Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Publication number: 20180314823Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: ApplicationFiled: June 26, 2018Publication date: November 1, 2018Applicant: Invincea, Inc.Inventors: Anup GHOSH, Scott COSBY, Alan KEISTER, Benjamin BRYANT, Stephen TAYLOR
-
Patent number: 10068601Abstract: A magnetic read apparatus includes a media-facing surface (MFS), a sensor, a shield structure, a side bias structure, and a shield reference bias structure. The sensor includes a free layer and a nonmagnetic layer. The shield structure includes a shield pinning structure and a shield reference structure between the shield pinning structure and the nonmagnetic layer. The nonmagnetic layer is between the free layer and a shield reference structure. The shield pinning structure includes a pinned moment oriented in a first direction. The shield reference structure includes a reference structure moment weakly coupled with the pinned moment. The side bias structure is adjacent to a side of the free layer and biases the free layer in a first direction parallel to the MFS. The shield reference bias structure is adjacent to the shield reference structure and biases the shield reference structure in a direction opposite to the first direction.Type: GrantFiled: August 9, 2016Date of Patent: September 4, 2018Assignee: Western Digital (Fremont), LLCInventors: Shaoping Li, Shihai He, Gerardo A. Bertero, Ming Mao, Yuankai Zheng, Anup Ghosh Roy, Chen-Jung Chien, Zhihong Zhang
-
Patent number: 10043001Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: GrantFiled: November 22, 2016Date of Patent: August 7, 2018Assignee: Invincea, Inc.Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
-
Publication number: 20180103053Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OSVM. A detection module operates under the guest OSVM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: December 14, 2017Publication date: April 12, 2018Applicant: George Mason Research Foundation, Inc.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Patent number: 9871812Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OS VM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: March 15, 2017Date of Patent: January 16, 2018Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Patent number: 9812155Abstract: A method provides a magnetic read apparatus. A sensor stack is deposited. The read sensor is defined from the stack such that the sensor has sides forming a junction angle of 75 degrees-105 degrees from a sensor bottom. Defining the sensor includes performing a first ion mill at a first angle and a first energy and performing a second ion mill at a second angle greater than the first angle and at a second energy less than the first energy. The first angle is 5 degrees-30 degrees from normal to the top surface. After the first ion mill, less than half of the stack's bottom layer depth remains unmilled. Magnetic bias structure(s) adjacent to the sides may be formed. The magnetic bias structure(s) include a side shielding material having at least one of the saturation magnetization greater than 800 emu/cm3 and an exchange length less than five nanometers.Type: GrantFiled: November 23, 2015Date of Patent: November 7, 2017Assignee: WESTERN DIGITAL (FREMONT), LLCInventors: Anup Ghosh Roy, Guanxiong Li, Daniele Mauri, Ming Mao, Goncalo Albuquerque, Savas Gider
-
Publication number: 20170302692Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: March 15, 2017Publication date: October 19, 2017Applicant: George Mason Research Foundation, Inc.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Publication number: 20170200004Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: ApplicationFiled: November 22, 2016Publication date: July 13, 2017Applicant: Invincea, Inc.Inventors: Anup GHOSH, Scott COSBY, Alan KEISTER, Benjamin BRYANT, Stephen TAYLOR