Patents by Inventor Giridhar Sreenivas
Giridhar Sreenivas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220078162Abstract: Disclosed is a system for deploying a secure server that provides one or more network services. Generally stated, a secure server is deployed in a secure environment behind a privacy barrier. The secure server is configured to interact with a service host on a public network outside the privacy barrier. The service host facilitates routing information from the public network through the privacy barrier to the secure server.Type: ApplicationFiled: November 16, 2021Publication date: March 10, 2022Applicant: Privacy Labs, Inc.Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Publication number: 20210409395Abstract: In accordance with this disclosure, a system and method for remotely enabling proximity-based authentication is provided. A computing device initiates a secure server based on proximity-based communication when the computing device is in a vicinity of the secure server. The computer device then prompts proximity-based authentication to establish a secure connection with the secure server. As a result of the proximity-based authentication, the computing device is authenticated and locally stores a secure token sent from the secure server in response to the proximity-based authentication. Once the authenticated computing device communicates with the secure server, remote authentication is initiated to the secure server and the authenticated computing device is remotely connected to the secure server if the stored secure token is properly accepted by the secure server for authentication.Type: ApplicationFiled: September 9, 2021Publication date: December 30, 2021Applicant: Privacy Labs, Inc.Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Patent number: 11184329Abstract: Disclosed is a system for deploying a secure server that provides one or more network services. Generally stated, a secure server is deployed in a secure environment behind a privacy barrier. The secure server is configured to interact with a service host on a public network outside the privacy barrier. The service host facilitates routing information from the public network through the privacy barrier to the secure server.Type: GrantFiled: July 25, 2018Date of Patent: November 23, 2021Assignee: PRIVACY LABS, INC.Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Patent number: 11128616Abstract: In accordance with this disclosure, a system and method for remotely enabling proximity-based authentication is provided. A computing device initiates a secure server based on proximity-based communication when the computing device is in a vicinity of the secure server. The computer device then prompts proximity-based authentication to establish a secure connection with the secure server. As a result of the proximity-based authentication, the computing device is authenticated and locally stores a secure token sent from the secure server in response to the proximity-based authentication. Once the authenticated computing device communicates with the secure server, remote authentication is initiated to the secure server and the authenticated computing device is remotely connected to the secure server if the stored secure token is properly accepted by the secure server for authentication.Type: GrantFiled: October 16, 2018Date of Patent: September 21, 2021Assignee: PRIVACY LABS, INC.Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Publication number: 20200120087Abstract: In accordance with this disclosure, a system and method for remotely enabling proximity-based authentication is provided. A computing device initiates a secure server based on proximity-based communication when the computing device is in a vicinity of the secure server. The computer device then prompts proximity-based authentication to establish a secure connection with the secure server. As a result of the proximity-based authentication, the computing device is authenticated and locally stores a secure token sent from the secure server in response to the proximity-based authentication. Once the authenticated computing device communicates with the secure server, remote authentication is initiated to the secure server and the authenticated computing device is remotely connected to the secure server if the stored secure token is properly accepted by the secure server for authentication.Type: ApplicationFiled: October 16, 2018Publication date: April 16, 2020Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Publication number: 20200036678Abstract: Disclosed is a system for deploying a secure server that provides one or more network services. Generally stated, a secure server is deployed in a secure environment behind a privacy barrier. The secure server is configured to interact with a service host on a public network outside the privacy barrier. The service host facilitates routing information from the public network through the privacy barrier to the secure server.Type: ApplicationFiled: July 25, 2018Publication date: January 30, 2020Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Patent number: 10198581Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: GrantFiled: March 7, 2012Date of Patent: February 5, 2019Assignee: Rapid7, Inc.Inventors: Giridhar Sreenivas, Derek Sigurdson, Kurt Berglund, Jordan Parker
-
Patent number: 9706410Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: GrantFiled: March 7, 2012Date of Patent: July 11, 2017Assignee: Rapid 7, Inc.Inventors: Giridhar Sreenivas, Derek Sigurdson
-
Patent number: 9668137Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: GrantFiled: March 7, 2012Date of Patent: May 30, 2017Assignee: Rapid7, Inc.Inventors: Derek Sigurdson, Giridhar Sreenivas
-
Patent number: 8832793Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: GrantFiled: March 7, 2012Date of Patent: September 9, 2014Assignee: Rapid7, Inc.Inventors: Derek Sigurdson, Giridhar Sreenivas, Jordan Parker, Kurt Berglund
-
Patent number: 8676187Abstract: Methods that facilitate automatic selection of service bearers in a mobile based on user-initiated policies and service-provider-initiated policies set forth in a policy document are described herein. The mobile device initially receives a policy document from either the mobile device manufacturer or the service provider before the mobile device is provisioned on a communications network. The mobile device user and the service provider may make subsequent changes to the policy document. When a user-initiated policy change conflicts with a service-provider-initiated policy, the user-initiated policy change is disregarded in favor of the service-provider-initiated policy. The mobile device automatically selects an appropriate bearer based at least on the availability of service bearers in the current environment and the policies set forth in the policy document.Type: GrantFiled: February 8, 2012Date of Patent: March 18, 2014Assignee: T-Mobile USA, Inc.Inventors: Alexandru Catalin Ionescu, Giridhar Sreenivas
-
Publication number: 20130239175Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: ApplicationFiled: March 7, 2012Publication date: September 12, 2013Inventors: Derek SIGURDSON, Giridhar SREENIVAS, Jordan PARKER, Kurt BERGLUND
-
Publication number: 20130239168Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: ApplicationFiled: March 7, 2012Publication date: September 12, 2013Inventors: Giridhar SREENIVAS, Derek SIGURDSON, Kurt BERGLUND, Jordan PARKER
-
Publication number: 20130239167Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: ApplicationFiled: March 7, 2012Publication date: September 12, 2013Inventors: Giridhar SREENIVAS, Derek SIGURDSON
-
Publication number: 20130239177Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.Type: ApplicationFiled: March 7, 2012Publication date: September 12, 2013Inventors: Derek SIGURDSON, Giridhar SREENIVAS
-
Publication number: 20120315889Abstract: Methods that facilitate automatic selection of service bearers in a mobile based on user-initiated policies and service-provider-initiated policies set forth in a policy document are described herein. The mobile device initially receives a policy document from either the mobile device manufacturer or the service provider before the mobile device is provisioned on a communications network. The mobile device user and the service provider may make subsequent changes to the policy document. When a user-initiated policy change conflicts with a service-provider-initiated policy, the user-initiated policy change is disregarded in favor of the service-provider-initiated policy. The mobile device automatically selects an appropriate bearer based at least on the availability of service bearers in the current environment and the policies set forth in the policy document.Type: ApplicationFiled: February 8, 2012Publication date: December 13, 2012Inventors: Alexandru Catalin Ionescu, Giridhar Sreenivas
-
Patent number: D890161Type: GrantFiled: May 31, 2018Date of Patent: July 14, 2020Assignee: Privacy Labs, Inc.Inventors: Giridhar Sreenivas, Derek Sigurdson, Feridoon Malekzadeh