Patents by Inventor John Poothokaran
John Poothokaran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924218Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.Type: GrantFiled: May 11, 2023Date of Patent: March 5, 2024Assignee: Avast Software s.r.o.Inventors: Sadia Afroz, Juyong Do, John Poothokaran
-
Publication number: 20230283611Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.Type: ApplicationFiled: May 11, 2023Publication date: September 7, 2023Applicant: Avast Software s.r.o.Inventors: Sadia Afroz, Juyong Do, John Poothokaran
-
Publication number: 20230283612Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.Type: ApplicationFiled: May 11, 2023Publication date: September 7, 2023Applicant: Avast Software s.r.o.Inventors: Sadia Afroz, Juyong Do, John Poothokaran
-
Patent number: 11711372Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.Type: GrantFiled: March 16, 2020Date of Patent: July 25, 2023Assignee: Avast Software s.r.o.Inventors: Sadia Afroz, Juyong Do, John Poothokaran
-
Patent number: 11704423Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.Type: GrantFiled: December 28, 2020Date of Patent: July 18, 2023Assignee: Avast Software s.r.o.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Patent number: 11625494Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.Type: GrantFiled: February 6, 2020Date of Patent: April 11, 2023Assignee: Avast Software s.r.o.Inventors: John Poothokaran, Armin Wasicek
-
Patent number: 11599661Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: GrantFiled: February 7, 2022Date of Patent: March 7, 2023Assignee: Smith Micro Software, Inc.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Publication number: 20220207170Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.Type: ApplicationFiled: December 28, 2020Publication date: June 30, 2022Applicant: Avast Software s.r.o.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Publication number: 20220156400Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: ApplicationFiled: February 7, 2022Publication date: May 19, 2022Applicant: SMITH MICRO SOFTWARE, INC.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Publication number: 20220132208Abstract: Permissions in a parental control system are managed by evaluating a set of current permissions settings, current interests, and the age of at least one child subject to the current permissions to derive one or more suggested modifications to the current permissions. The one or more suggested modifications are determined to be age appropriate for the at least one child and to be of interest to the child. The one or more current interests comprise prior usage data of the at least one child.Type: ApplicationFiled: October 23, 2020Publication date: April 28, 2022Applicant: Avast Software s.r.o.Inventors: Deepali Garg, John Poothokaran, Juyong Do
-
Patent number: 11244065Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: GrantFiled: July 23, 2019Date of Patent: February 8, 2022Assignee: Smith Micro Software, Inc.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
-
Publication number: 20210288965Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.Type: ApplicationFiled: March 16, 2020Publication date: September 16, 2021Applicant: Avast Software s.r.o.Inventors: Sadia Afroz, Juyong Do, John Poothokaran
-
Publication number: 20210248247Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.Type: ApplicationFiled: February 6, 2020Publication date: August 12, 2021Applicant: Avast Software s.r.o.Inventors: John Poothokaran, Armin Wasicek
-
Publication number: 20210026978Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.Type: ApplicationFiled: July 23, 2019Publication date: January 28, 2021Applicant: Avast Software s.r.o.Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta