Patents by Inventor Bharath Madhusudan
Bharath Madhusudan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200195691Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.Type: ApplicationFiled: February 24, 2020Publication date: June 18, 2020Inventors: Vinay Mahadik, Due Nguyen, Paul Katcher, Nikita Chikate, Amar Patekar, Bharath Madhusudan
-
Patent number: 10609078Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.Type: GrantFiled: March 3, 2017Date of Patent: March 31, 2020Assignee: SECURLY, INC.Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
-
Publication number: 20170180426Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.Type: ApplicationFiled: March 3, 2017Publication date: June 22, 2017Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
-
Patent number: 9602467Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.Type: GrantFiled: April 6, 2015Date of Patent: March 21, 2017Assignee: SECURLY, INC.Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
-
Publication number: 20160294775Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.Type: ApplicationFiled: April 6, 2015Publication date: October 6, 2016Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
-
Patent number: 9172715Abstract: A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected during the time period and the source asset is designated as a potential security risk based on the detected low frequency sequence of failed connection attempts.Type: GrantFiled: October 22, 2013Date of Patent: October 27, 2015Assignee: McAfee, Inc.Inventors: Vinay Mahadik, Bharath Madhusudan, Shivakumar Buruganahalli, Venu Vissamsetty
-
Publication number: 20140089661Abstract: One variation of a method for selectively filtering internet traffic includes: receiving DNS queries; determining resource access levels for the DNS queries based on an internet resource database, wherein the resource access levels comprise a first level, a second level, and a third level returning an unmodified IP address for the first level DNS queries; returning a replacement resource IP address for the second level DNS queries; returning a web proxy server IP address for the third level DNS queries; and regulating HTTP traffic directed to the web proxy server IP address.Type: ApplicationFiled: September 24, 2013Publication date: March 27, 2014Applicant: Securly, Inc.Inventors: Vinay Mahadik, Bharath Madhusudan
-
Patent number: 8677487Abstract: A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware.Type: GrantFiled: October 18, 2011Date of Patent: March 18, 2014Assignee: McAfee, Inc.Inventors: Ravindra Balupari, Vinay Mahadik, Bharath Madhusudan, Chintan H. Shah
-
Publication number: 20140047547Abstract: A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected during the time period and the source asset is designated as a potential security risk based on the detected low frequency sequence of failed connection attempts.Type: ApplicationFiled: October 22, 2013Publication date: February 13, 2014Applicant: McAfee, Inc.Inventors: Vinay Mahadik, Bharath Madhusudan, Shivakumar Buruganahalli, Venu Vissamsetty
-
Patent number: 8650287Abstract: Source assets are monitored for activities, each activity associated with a corresponding activity weight indicating probability of the activity resulting from a security compromise. A source asset is determined to perform a particular activity indicative of a potential security compromise, such as a download of an executable of malicious reputation. A source asset tracking instance is instantiated to include data identifying the particular activity. The tracking instance is to be updated based on identification of subsequently monitored activities. A reputation value is determined for the activity weight of the particular activity based at least in part on the malicious reputation of the executable. An asset reputation is determined for the source asset from the corresponding activity weights of monitored activities involving the source asset and a security risk is determined when the asset reputation exceeds a threshold.Type: GrantFiled: April 27, 2011Date of Patent: February 11, 2014Assignee: McAfee, Inc.Inventors: Vinay Mahadik, Bharath Madhusudan
-
Publication number: 20130246605Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adjusting the sensitivity of a behavior detection process on a per-device basis based on a local reputation for each device.Type: ApplicationFiled: April 27, 2011Publication date: September 19, 2013Applicant: MCAFEE, INC.Inventors: Vinay Mahadik, Bharath Madhusudan
-
Publication number: 20130247184Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for stealth attack monitoring. In one aspect, a method includes monitoring a network for failed connection attempts in the network, wherein each failed internal connection attempt is initiated by a source asset and is an attempt to connect to a destination asset; and only in response to detecting a failed connection attempt initiated by a source asset, instantiating a source asset tracking instance in a computer memory, and for each source asset tracking instance in the computer memory: monitoring the corresponding source asset for a threshold number of failed connection attempts to destination assets during a time period; and in response to detecting the threshold number of failed connection attempts from the source asset during the time period for the source asset tracking instance, designating the source asset as a security risk.Type: ApplicationFiled: April 27, 2011Publication date: September 19, 2013Applicant: MCAFEE, INC.Inventors: Vinay Mahadik, Bharath Madhusudan, Shivakumar Buruganahalli, Venu Vissamsetty
-
Publication number: 20130097699Abstract: A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware.Type: ApplicationFiled: October 18, 2011Publication date: April 18, 2013Inventors: Ravindra Balupari, Vinay Mahadik, Bharath Madhusudan, Chintan H. Shah
-
Publication number: 20060053295Abstract: Methods and systems consistent with the present invention identify a repeating content in a data stream. A hash function is computed for at least one portion of a plurality of portions of the data stream. The at least one portion of the data stream has benign characters removed therefrom to prevent the identification of a benign string as the repeating content. At least one counter of a plurality of counters is incremented responsive to the computed hash function result. Each counter corresponds to a respective computed hash function result. The repeating content is identified when the at least one of the plurality of counters exceeds a count value. It is verified that the identified repeating content is not a benign string.Type: ApplicationFiled: August 24, 2005Publication date: March 9, 2006Inventors: Bharath Madhusudan, John Lockwood