Patents by Inventor Krishna K. Yellepeddy
Krishna K. Yellepeddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11095676Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: GrantFiled: October 29, 2019Date of Patent: August 17, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anne L. Bolgert, Richard J. Cohen, Miguel Sang, Krishna K. Yellepeddy
-
Patent number: 10977620Abstract: Embodiments include a technique for scheduling meeting based on calendaring dependencies. The technique includes receiving prerequisite information for scheduling a meeting, the prerequisite information including a meeting agenda, meeting objective, and location, and validating, by a computing system, the prerequisite information based on an aggregate condition of the prerequisite information. The technique also includes responsive to the validation, scheduling the meeting based on the prerequisite information, otherwise restricting the scheduling of the meeting, and electronically transmitting a meeting request including the prerequisite information based on the validation.Type: GrantFiled: February 8, 2017Date of Patent: April 13, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David B. Kumhyr, Krishna K. Yellepeddy
-
Publication number: 20200067964Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: ApplicationFiled: October 29, 2019Publication date: February 27, 2020Inventors: Anne L. BOLGERT, Richard J. COHEN, Miguel SANG, Krishna K. YELLEPEDDY
-
Patent number: 10530804Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: GrantFiled: October 4, 2018Date of Patent: January 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anne L. Bolgert, Richard J. Cohen, Miguel Sang, Krishna K. Yellepeddy
-
Patent number: 10523424Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: September 8, 2017Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20190036962Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: ApplicationFiled: October 4, 2018Publication date: January 31, 2019Inventors: Anne L. BOLGERT, Richard J. COHEN, Miguel SANG, Krishna K. YELLEPEDDY
-
Patent number: 10164998Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: GrantFiled: September 13, 2017Date of Patent: December 25, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anne L. Bolgert, Richard J. Cohen, Miguel Sang, Krishna K. Yellepeddy
-
Publication number: 20180225636Abstract: Embodiments include a technique for scheduling meeting based on calendaring dependencies. The technique includes receiving prerequisite information for scheduling a meeting, the prerequisite information including a meeting agenda, meeting objective, and location, and validating, by a computing system, the prerequisite information based on an aggregate condition of the prerequisite information. The technique also includes responsive to the validation, scheduling the meeting based on the prerequisite information, otherwise restricting the scheduling of the meeting, and electronically transmitting a meeting request including the prerequisite information based on the validation.Type: ApplicationFiled: February 8, 2017Publication date: August 9, 2018Inventors: DAVID B. KUMHYR, KRISHNA K. YELLEPEDDY
-
Patent number: 9881173Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: GrantFiled: June 27, 2016Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Publication number: 20180013548Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: September 8, 2017Publication date: January 11, 2018Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20180007080Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: ApplicationFiled: September 13, 2017Publication date: January 4, 2018Inventors: Anne L. BOLGERT, Richard J. COHEN, Miguel SANG, Krishna K. YELLEPEDDY
-
Patent number: 9848010Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: GrantFiled: November 24, 2015Date of Patent: December 19, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anne L. Bolgert, Richard J. Cohen, Miguel Sang, Krishna K. Yellepeddy
-
Patent number: 9794063Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: January 27, 2014Date of Patent: October 17, 2017Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20170149815Abstract: Systems and methods for identifying and remediating malware-compromised mobile devices are disclosed. A computer-implemented method includes accessing, by a computing device, malware risk data; determining, by the computing device, a mobile device is at risk from malware based on the malware risk data; identifying, by the computing device, a set of connections of a user of the mobile device, wherein each connection in the set of connections is associated with a user computer device; identifying, by the computing device, at least one user computer device from the set of connections at risk from the malware; and outputting, by the computer device, a malware notification for the mobile device at risk and at least one user computer device at risk.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Inventors: Anne L. BOLGERT, Richard J. COHEN, Miguel SANG, Krishna K. YELLEPEDDY
-
Patent number: 9594920Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: GrantFiled: March 20, 2012Date of Patent: March 14, 2017Assignee: International Business Machines CorporationInventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Publication number: 20160306983Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: ApplicationFiled: June 27, 2016Publication date: October 20, 2016Inventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Patent number: 9378388Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: GrantFiled: April 20, 2010Date of Patent: June 28, 2016Assignee: International Business Machines CorporationInventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Publication number: 20140177842Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: January 27, 2014Publication date: June 26, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8683222Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: March 1, 2012Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8675875Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: May 18, 2010Date of Patent: March 18, 2014Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti