Patents by Inventor Dattatraya Kulkarni

Dattatraya Kulkarni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160381037
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: April 25, 2016
    Publication date: December 29, 2016
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20160345171
    Abstract: The present disclosure relates to a system and method for providing a secure context exchange cloud service which enables context information to be shared among devices, and providing a safety application which utilizes the context information being shared. In one example, the context exchange cloud service provides secure exchange of the context information, which in turn enables a safety application to enhance personal safety.
    Type: Application
    Filed: December 24, 2014
    Publication date: November 24, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
  • Publication number: 20160306996
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a request to share data, determine metadata for the data to be shared, communicate the metadata to a social drive, where the social drive is separate from the electronic device and the data is not located on the social drive, and communicate the shared data to a member of the social drive when the member requests the data.
    Type: Application
    Filed: December 26, 2014
    Publication date: October 20, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Kamlesh Halder, KranthiKumar Gadde, Susmita Nayak, Mitesh Kumar, Raj Vardhan, Alan Illia Lefort
  • Publication number: 20160299779
    Abstract: The present disclosure relates to a system and method for providing a service on a wearable device where the wearable device is limited in its functionality in some way when compared with a companion device. In particular, the disclosure describes use cases for configuring the wearable device, and use cases for configuring a wearable device and performing service application functions on the wearable device while leveraging a companion device.
    Type: Application
    Filed: December 23, 2014
    Publication date: October 13, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
  • Publication number: 20160212208
    Abstract: To provide a more seamless experience across multiple devices, task streaming systems and methods allow a user to create “task-contexts” and manage metadata of files stored across multiple data storage devices and user preferences associated with capabilities of the multiple devices for operating on the file. Furthermore, the task streaming systems and methods are provided to allow task-contexts to be shared from one device to another device. A task-context specifies one or more files and one or more operations to be performed on the one or more files. By providing a task-context from one device to the other device, a user can accomplish a task with a particular file and seamlessly transition between devices with minimal disruption and effort.
    Type: Application
    Filed: December 14, 2013
    Publication date: July 21, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya KULKARNI, Srikanth NALLURI, Kamlesh HALDER, Kaushal Kr. DHRUW, Shailaja SHANKAR, Venkatasubrahmanyam KRISHNAPUR, Kranthikumar GADDE
  • Publication number: 20160205115
    Abstract: According to one example, a system and method are disclosed for malware and grayware remediation. For example, the system is operable to identify applications that have some legitimate behavior but that also exhibit some undesirable behavior. A remediation engine is provided to detect malware behavior in otherwise useful applications, and allow the useful parts of the application to run while blocking the malware behavior. In an example method of “healing,” this may involve modifying the application binary to remove undesirable behavior. In an example method of “personalization,” this may involve inserting control hooks through the operating system to prevent certain subroutines from taking effect.
    Type: Application
    Filed: December 21, 2013
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur
  • Publication number: 20160196274
    Abstract: Distributed favorite files are stored in a favorite storage device. An agent dynamically monitors usage statistics for a plurality of files, wherein the plurality of files are located on a plurality of devices, designates a first file of the plurality of files as a favorite file based on usage statistics for the first file, and in response to designating the first file as a favorite file, stores a copy of the first file on a favorites storage device.
    Type: Application
    Filed: November 23, 2015
    Publication date: July 7, 2016
    Inventors: Kranthikumar Gadde, Mitesh Kumar, Kamlesh Halder, Raj Vardhan, Srikanth Nalluri, Dattatraya Kulkarni, Susmita Nayak, Krishnapur Venkatasubrahmanyam
  • Publication number: 20160196218
    Abstract: Securely distributing a backup file includes identifying a file to be stored, generating a plurality of file chunks from the file, transmitting from a first device, each of the plurality of file chunks to one of a plurality of storage locations, and generating, at the first device, a map that identifies the storage location for each chunk. Retrieving a distributed backup file includes receiving a request to retrieve a file, obtaining a map corresponding to the file, wherein the map identifies a storage location for each of a plurality of file chunks of the file, retrieving the plurality of file chunks from the identified locations, and generating the requested file by combining the plurality of file chunks.
    Type: Application
    Filed: December 23, 2015
    Publication date: July 7, 2016
    Inventors: Mitesh Kumar, Srikanth Nalluri, Dattatraya Kulkarni, Kamlesh Halder, Kranthikumar Gadde, Kaushal Kumar Dhruw, Krishnapur Venkatasubrahmanyam, Susmital Nayak
  • Publication number: 20160187141
    Abstract: A technique includes providing real-time collective and collaborative navigation for one or more users to navigate to a destination. Each computing device associated with a member includes navigation objects that is pooled in a server and updated on each client device of users as one or more users navigate to a destination. A set of navigation objects may be created and distributed to the members within the group for the session, whereby the navigation objects are data structures that may be managed by a server. Based on a contextual trigger, the navigation object may be created or modified and used to provide a context to the navigation session. Navigation objects may continuously analyze user context and user situations to detect anomalies for one or more members in the group.
    Type: Application
    Filed: December 10, 2015
    Publication date: June 30, 2016
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Susmita Nayak, Krishnapur Venkatasubrahmanyam, Anjan Nayak, Raghuvir Songhela, Bhaavika Panjwani
  • Publication number: 20160188878
    Abstract: The present disclosure relates to a system and method for performing antimalware scanning of data files that is data-centric rather than device-centric, In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware, After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan, The originating device may also scan the data for malware contextually-relevant to a second device.
    Type: Application
    Filed: December 13, 2013
    Publication date: June 30, 2016
    Applicant: McAfee, Inc.
    Inventors: DATTATRAYA KULKARNI, SRIKANTH NALLURI, KAMLESH HALDER, VENKATASUBRAHMANYAM KRISHNAPUR, SHAILAJA SHANKAR, KAUSHAL KUMAR DHRUW
  • Patent number: 9326134
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: April 26, 2016
    Assignee: McAfee Inc.
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20160092469
    Abstract: In an example, one or more computing devices operate to provide a context-aware reputation of a place, such as in relation to a human user. Context may include the user's identity and purpose, as well as environmental factors such as time of day, weather, and political drivers. The device may communicate with a server to receive globalized safety intelligence. When the user enters a zone, the device may determine a context-sensitive reputation, such as “Green,” “Yellow,” or “Red.” Depending on the reputation, the device may then take an appropriate action, such as warning the user or providing additional information.
    Type: Application
    Filed: September 26, 2014
    Publication date: March 31, 2016
    Applicant: McAfee, Inc.
    Inventors: Joydeb Mukherjee, Saravana Kumar Subramanian, Raj Vardhan, Rangaswamy Narayana, Shankar Subramanian, Dattatraya Kulkarni, Javed Hasan
  • Patent number: 9245193
    Abstract: One or more devices capture a scene of real world, and process one or more image(s) which include distances to points on surfaces in the real world. The distances are used to automatically identify a set of surfaces in the real world. Then, the one or more devices check whether a surface in the set is suitable for display of an element of information to be projected into the scene. On finding that a surface is suitable, a transform function is automatically identified, followed by automatic application of the transform function to the element of the information. A transformed element, which results from automatically applying the transform function, is stored in a frame buffer coupled to a projector, at a specific position in the frame buffer identified during the check for suitability. When no surface is suitable, user input is obtained, followed by projection of information as per user input.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: January 26, 2016
    Assignee: QUALCOMM Incorporated
    Inventor: Tejas Dattatraya Kulkarni
  • Publication number: 20150245189
    Abstract: A safety event is determined as affecting a user based at least in part context data collected at a user device associated with the user. In some aspects, context data is detected from sensors on the client device, the context data describing a present context of the user. A deviation of the present context from a historical context is determined to be beyond a threshold. Determining that the deviation is beyond the threshold can be determined to correspond to a safety event potentially jeopardizing safety of the user. In some aspects, an action can be launched in response to determining the safety event.
    Type: Application
    Filed: October 18, 2013
    Publication date: August 27, 2015
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Venkata Krishnan Nagarajan, Yogesh Jain, Kaushal Kumar Dhruw, Kamlesh Halder
  • Publication number: 20150220734
    Abstract: Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device.
    Type: Application
    Filed: October 18, 2013
    Publication date: August 6, 2015
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Venkata Krishnan Nagarajan, Kaushal Kumar Dhruw, Kamlesh Halder
  • Publication number: 20140194094
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: October 18, 2013
    Publication date: July 10, 2014
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Patent number: 8674131
    Abstract: The dehydrated alkali metal salts of carboxylic acid are dissolved in the alcohol such as methanol or ethanol or butanol to make their solution in corresponding alcohol. The solution alcohol is further treated with carbon dioxide under pressure or at atmospheric pressure at elevated temperature such as 150 to 200° C. The carboxylic acid gets converted into corresponding alkyl ester and calcium carbonate or sodium carbonate or potassium carbonate as the byproduct. Calcium lactate or sodium lactate or sodium acetate or sodium benzoate or sodium salicylate as alkali metal salt solution prepared in methanol or ethanol or butanol when treated with carbon dioxide under pressure or at atmospheric pressure at elevated temperature gets converted to methyl lactate or ethyl lactate or methyl acetate or methyl benzoate or methyl salicylate as product.
    Type: Grant
    Filed: September 6, 2010
    Date of Patent: March 18, 2014
    Assignee: Council of Scientific and Industrial Research
    Inventors: Prashant Purushottam Barve, Bhaskar Dattatraya Kulkarni, Milind Yashwant Gupte, Sanjay Narayan Nene, Ravindra William Shinde
  • Patent number: 8621046
    Abstract: Methods and apparatus for provision of offline advertising services are described. In one embodiment, content data is stored in a local memory of a computing device prior to going offline. Once offline, the stored content is provided from the local memory, while the metrics regarding the provided content is collected and later transmitted to a remote server. Other embodiments are also described.
    Type: Grant
    Filed: December 26, 2009
    Date of Patent: December 31, 2013
    Assignee: Intel Corporation
    Inventors: Mahamood Hussain, Dennis Luo, Krishnamurthy Sridharan, Dattatraya Kulkarni
  • Publication number: 20130044193
    Abstract: One or more devices capture a scene of real world, and process one or more image(s) which include distances to points on surfaces in the real world. The distances are used to automatically identify a set of surfaces in the real world. Then, the one or more devices check whether a surface in the set is suitable for display of an element of information to be projected into the scene. On finding that a surface is suitable, a transfer function is automatically identified, followed by automatic application of the transfer function to the element of the information. A transformed element, which results from automatically applying the transfer function, is stored in a frame buffer coupled to a projector, at a specific position in the frame buffer identified during the check for suitability. When no surface is suitable, user input is obtained, followed by projection of information as per user input.
    Type: Application
    Filed: July 13, 2012
    Publication date: February 21, 2013
    Applicant: QUALCOMM INCORPORATED
    Inventor: Tejas Dattatraya Kulkarni
  • Publication number: 20130044912
    Abstract: Camera(s) capture a scene, including an object that is portable. An image of the scene is processed to segment therefrom a portion corresponding to the object, which is then identified from among a set of predetermined real world objects. An identifier of the object is used, with a set of associations between object identifiers and user identifiers, to obtain a user identifier that identifies a user at least partially from among a set of users. Specifically, the user identifier may identify a group of users that includes the user (“weak identification”) or alternatively the user identifier may identify the user uniquely (“strong identification”) in the set. The user identifier is used either alone or in combination with user input to obtain and store in memory, information to be output to the user. At least a portion of the obtained information is thereafter output, e.g. displayed by projection into the scene.
    Type: Application
    Filed: July 13, 2012
    Publication date: February 21, 2013
    Applicant: QUALCOMM INCORPORATED
    Inventors: Tejas Dattatraya Kulkarni, Bocong Liu, Ankur B. Nandwani, Justin E. Taseski, Benjamin J. Yule, Dimosthenis Kaleas, Babak Forutanpour