Patents by Inventor Bharath Madhusudan

Bharath Madhusudan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200195691
    Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.
    Type: Application
    Filed: February 24, 2020
    Publication date: June 18, 2020
    Inventors: Vinay Mahadik, Due Nguyen, Paul Katcher, Nikita Chikate, Amar Patekar, Bharath Madhusudan
  • Patent number: 10609078
    Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: March 31, 2020
    Assignee: SECURLY, INC.
    Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
  • Publication number: 20170180426
    Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.
    Type: Application
    Filed: March 3, 2017
    Publication date: June 22, 2017
    Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
  • Patent number: 9602467
    Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.
    Type: Grant
    Filed: April 6, 2015
    Date of Patent: March 21, 2017
    Assignee: SECURLY, INC.
    Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
  • Publication number: 20160294775
    Abstract: A system and method for web filtering, including: generating an institutional policy dashboard that enables an institution that issued a computing device to a minor user to select a set of institutional web access policies sanctioned by the institution; generating a parental policy dashboard that enables a parent of the minor user to select to a set of parental web access policies sanctioned by the parent; filtering web content accessed by the minor user via the computing device by enforcing the parental and the institutional web access policies; and reporting to the parent a set of web accesses undertaken by the minor user via the computing device.
    Type: Application
    Filed: April 6, 2015
    Publication date: October 6, 2016
    Inventors: Vinay Mahadik, Bharath Madhusudan, Paul Katcher, Due Nguyen, Nikita Chikate, Amar Patekar
  • Patent number: 9172715
    Abstract: A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected during the time period and the source asset is designated as a potential security risk based on the detected low frequency sequence of failed connection attempts.
    Type: Grant
    Filed: October 22, 2013
    Date of Patent: October 27, 2015
    Assignee: McAfee, Inc.
    Inventors: Vinay Mahadik, Bharath Madhusudan, Shivakumar Buruganahalli, Venu Vissamsetty
  • Publication number: 20140089661
    Abstract: One variation of a method for selectively filtering internet traffic includes: receiving DNS queries; determining resource access levels for the DNS queries based on an internet resource database, wherein the resource access levels comprise a first level, a second level, and a third level returning an unmodified IP address for the first level DNS queries; returning a replacement resource IP address for the second level DNS queries; returning a web proxy server IP address for the third level DNS queries; and regulating HTTP traffic directed to the web proxy server IP address.
    Type: Application
    Filed: September 24, 2013
    Publication date: March 27, 2014
    Applicant: Securly, Inc.
    Inventors: Vinay Mahadik, Bharath Madhusudan
  • Patent number: 8677487
    Abstract: A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware.
    Type: Grant
    Filed: October 18, 2011
    Date of Patent: March 18, 2014
    Assignee: McAfee, Inc.
    Inventors: Ravindra Balupari, Vinay Mahadik, Bharath Madhusudan, Chintan H. Shah
  • Publication number: 20140047547
    Abstract: A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected during the time period and the source asset is designated as a potential security risk based on the detected low frequency sequence of failed connection attempts.
    Type: Application
    Filed: October 22, 2013
    Publication date: February 13, 2014
    Applicant: McAfee, Inc.
    Inventors: Vinay Mahadik, Bharath Madhusudan, Shivakumar Buruganahalli, Venu Vissamsetty
  • Patent number: 8650287
    Abstract: Source assets are monitored for activities, each activity associated with a corresponding activity weight indicating probability of the activity resulting from a security compromise. A source asset is determined to perform a particular activity indicative of a potential security compromise, such as a download of an executable of malicious reputation. A source asset tracking instance is instantiated to include data identifying the particular activity. The tracking instance is to be updated based on identification of subsequently monitored activities. A reputation value is determined for the activity weight of the particular activity based at least in part on the malicious reputation of the executable. An asset reputation is determined for the source asset from the corresponding activity weights of monitored activities involving the source asset and a security risk is determined when the asset reputation exceeds a threshold.
    Type: Grant
    Filed: April 27, 2011
    Date of Patent: February 11, 2014
    Assignee: McAfee, Inc.
    Inventors: Vinay Mahadik, Bharath Madhusudan
  • Publication number: 20130246605
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adjusting the sensitivity of a behavior detection process on a per-device basis based on a local reputation for each device.
    Type: Application
    Filed: April 27, 2011
    Publication date: September 19, 2013
    Applicant: MCAFEE, INC.
    Inventors: Vinay Mahadik, Bharath Madhusudan
  • Publication number: 20130247184
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for stealth attack monitoring. In one aspect, a method includes monitoring a network for failed connection attempts in the network, wherein each failed internal connection attempt is initiated by a source asset and is an attempt to connect to a destination asset; and only in response to detecting a failed connection attempt initiated by a source asset, instantiating a source asset tracking instance in a computer memory, and for each source asset tracking instance in the computer memory: monitoring the corresponding source asset for a threshold number of failed connection attempts to destination assets during a time period; and in response to detecting the threshold number of failed connection attempts from the source asset during the time period for the source asset tracking instance, designating the source asset as a security risk.
    Type: Application
    Filed: April 27, 2011
    Publication date: September 19, 2013
    Applicant: MCAFEE, INC.
    Inventors: Vinay Mahadik, Bharath Madhusudan, Shivakumar Buruganahalli, Venu Vissamsetty
  • Publication number: 20130097699
    Abstract: A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware.
    Type: Application
    Filed: October 18, 2011
    Publication date: April 18, 2013
    Inventors: Ravindra Balupari, Vinay Mahadik, Bharath Madhusudan, Chintan H. Shah
  • Publication number: 20060053295
    Abstract: Methods and systems consistent with the present invention identify a repeating content in a data stream. A hash function is computed for at least one portion of a plurality of portions of the data stream. The at least one portion of the data stream has benign characters removed therefrom to prevent the identification of a benign string as the repeating content. At least one counter of a plurality of counters is incremented responsive to the computed hash function result. Each counter corresponds to a respective computed hash function result. The repeating content is identified when the at least one of the plurality of counters exceeds a count value. It is verified that the identified repeating content is not a benign string.
    Type: Application
    Filed: August 24, 2005
    Publication date: March 9, 2006
    Inventors: Bharath Madhusudan, John Lockwood