Patents by Inventor John Poothokaran

John Poothokaran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924218
    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
    Type: Grant
    Filed: May 11, 2023
    Date of Patent: March 5, 2024
    Assignee: Avast Software s.r.o.
    Inventors: Sadia Afroz, Juyong Do, John Poothokaran
  • Publication number: 20230283611
    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
    Type: Application
    Filed: May 11, 2023
    Publication date: September 7, 2023
    Applicant: Avast Software s.r.o.
    Inventors: Sadia Afroz, Juyong Do, John Poothokaran
  • Publication number: 20230283612
    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
    Type: Application
    Filed: May 11, 2023
    Publication date: September 7, 2023
    Applicant: Avast Software s.r.o.
    Inventors: Sadia Afroz, Juyong Do, John Poothokaran
  • Patent number: 11711372
    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
    Type: Grant
    Filed: March 16, 2020
    Date of Patent: July 25, 2023
    Assignee: Avast Software s.r.o.
    Inventors: Sadia Afroz, Juyong Do, John Poothokaran
  • Patent number: 11704423
    Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.
    Type: Grant
    Filed: December 28, 2020
    Date of Patent: July 18, 2023
    Assignee: Avast Software s.r.o.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
  • Patent number: 11625494
    Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.
    Type: Grant
    Filed: February 6, 2020
    Date of Patent: April 11, 2023
    Assignee: Avast Software s.r.o.
    Inventors: John Poothokaran, Armin Wasicek
  • Patent number: 11599661
    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
    Type: Grant
    Filed: February 7, 2022
    Date of Patent: March 7, 2023
    Assignee: Smith Micro Software, Inc.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
  • Publication number: 20220207170
    Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.
    Type: Application
    Filed: December 28, 2020
    Publication date: June 30, 2022
    Applicant: Avast Software s.r.o.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
  • Publication number: 20220156400
    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
    Type: Application
    Filed: February 7, 2022
    Publication date: May 19, 2022
    Applicant: SMITH MICRO SOFTWARE, INC.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
  • Publication number: 20220132208
    Abstract: Permissions in a parental control system are managed by evaluating a set of current permissions settings, current interests, and the age of at least one child subject to the current permissions to derive one or more suggested modifications to the current permissions. The one or more suggested modifications are determined to be age appropriate for the at least one child and to be of interest to the child. The one or more current interests comprise prior usage data of the at least one child.
    Type: Application
    Filed: October 23, 2020
    Publication date: April 28, 2022
    Applicant: Avast Software s.r.o.
    Inventors: Deepali Garg, John Poothokaran, Juyong Do
  • Patent number: 11244065
    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: February 8, 2022
    Assignee: Smith Micro Software, Inc.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
  • Publication number: 20210288965
    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
    Type: Application
    Filed: March 16, 2020
    Publication date: September 16, 2021
    Applicant: Avast Software s.r.o.
    Inventors: Sadia Afroz, Juyong Do, John Poothokaran
  • Publication number: 20210248247
    Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.
    Type: Application
    Filed: February 6, 2020
    Publication date: August 12, 2021
    Applicant: Avast Software s.r.o.
    Inventors: John Poothokaran, Armin Wasicek
  • Publication number: 20210026978
    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Applicant: Avast Software s.r.o.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta