Patents by Inventor Krishna Sathyanarayana
Krishna Sathyanarayana has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240104205Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.Type: ApplicationFiled: December 5, 2023Publication date: March 28, 2024Inventors: Krishna SATHYANARAYANA, Anoop Wilbur SALDANHA, Abhijit MOHANTA
-
Publication number: 20240078310Abstract: Events of a calendar are identified and evaluated for confidentiality due to an explicit tag, location, participants, or subject matter. In response, permissions of applications on a device are dynamically reduced. Permissions may include permissions to access sensors such as a microphone and camera. Sensors of other devices such as a voice-processing device or Bluetooth device may be disabled. The risk associated with applications on a device may be evaluated based on permissions, usage, collected data, cloud service provider, location, permissions and usage of other users of the application, and other attributes of the application. The risk may be represented as a risk score used to determine whether to perform a mitigation action.Type: ApplicationFiled: December 5, 2022Publication date: March 7, 2024Inventors: Brian James Buck, Tyler Croak, Krishna Sathyanarayana
-
Patent number: 11880458Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.Type: GrantFiled: September 22, 2021Date of Patent: January 23, 2024Assignee: Juniper Networks, Inc.Inventors: Krishna Sathyanarayana, Anoop Wilbur Saldanha, Abhijit Mohanta
-
Publication number: 20220004632Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.Type: ApplicationFiled: September 22, 2021Publication date: January 6, 2022Inventors: Krishna SATHYANARAYANA, Anoop Wilbur SALDANHA, Abhijit MOHANTA
-
Patent number: 11138313Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.Type: GrantFiled: August 13, 2018Date of Patent: October 5, 2021Assignee: Juniper Networks, Inc.Inventors: Krishna Sathyanarayana, Anoop Wilbur Saldanha, Abhijit Mohanta
-
Publication number: 20200050762Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.Type: ApplicationFiled: August 13, 2018Publication date: February 13, 2020Inventors: Krishna SATHYANARAYANA, Anoop Wilbur SALDANHA, Abhijit MOHANTA
-
Patent number: 8824482Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.Type: GrantFiled: September 23, 2011Date of Patent: September 2, 2014Assignee: Cisco Technology, Inc.Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh Krishnamurthy Bangalore, Varakuti Venugopal Reddy
-
Publication number: 20120008508Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.Type: ApplicationFiled: September 23, 2011Publication date: January 12, 2012Applicant: CISCO TECHNOLOGY, INC.Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh BK, Varakuti Venugopal Reddy
-
Patent number: 8078679Abstract: In one embodiment of the invention, a method for automating collateral configuration in a network is provided. A service is configured on a network device (termed as service providing device). The service providing device sends a Collateral Configuration Request Protocol (CCRP) message to other network devices (termed as service accessing devices). The service accessing devices process the CCRP message for their automatic collateral configuration in order to access the configured service on the service providing device.Type: GrantFiled: April 12, 2006Date of Patent: December 13, 2011Assignee: Cisco Technology, Inc.Inventors: Preetham Kajekar, Krishna Sathyanarayana
-
Patent number: 8040895Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.Type: GrantFiled: March 22, 2006Date of Patent: October 18, 2011Assignee: Cisco Technology, Inc.Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh Krishnamurthy Bangalore, Varakuti Venugopal Reddy
-
Patent number: 7680925Abstract: A method, system, and apparatus are provided for testing a service in a network. A simulated interface is created on a network device by a Network Management Station (NMS). Thereafter, an instruction is received at the simulated interface from the NMS. The instruction comprises a source address, a destination address and other information to test a service. The service is tested on the network device based on the received instruction. A response is generated from the test. The response indicates whether the service is working as intended between the source address and the destination address. The response is sent from the simulated interface to the NMS.Type: GrantFiled: January 24, 2006Date of Patent: March 16, 2010Assignee: Cisco Technology, Inc.Inventors: Krishna Sathyanarayana, Preetham Kajekar, Guruprasad Ramarao, Vikas Sharma, Varukuti Venugopal Reddy
-
Publication number: 20070244995Abstract: In one embodiment of the invention, a method for automating collateral configuration in a network is provided. A service is configured on a network device (termed as service providing device). The service providing device sends a Collateral Configuration Request Protocol (CCRP) message to other network devices (termed as service accessing devices). The service accessing devices process the CCRP message for their automatic collateral configuration in order to access the configured service on the service providing device.Type: ApplicationFiled: April 12, 2006Publication date: October 18, 2007Applicant: Cisco Technology, Inc.Inventors: Preetham Kajekar, Krishna Sathyanarayana
-
Publication number: 20070223487Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.Type: ApplicationFiled: March 22, 2006Publication date: September 27, 2007Applicant: Cisco Technology, Inc.Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh BK, Varakuti Reddy
-
Publication number: 20070171834Abstract: A method, system, and apparatus are provided for testing a service in a network. A simulated interface is created on a network device by a Network Management Station (NMS). Thereafter, an instruction is received at the simulated interface from the NMS. The instruction comprises a source address, a destination address and other information to test a service. The service is tested on the network device based on the received instruction. A response is generated from the test. The response indicates whether the service is Working as intended between the source address and the destination address. The response is sent from the simulated interface to the NMS.Type: ApplicationFiled: January 24, 2006Publication date: July 26, 2007Applicant: Cisco Technology, Inc.Inventors: Krishna Sathyanarayana, Preetham Kajekar, Guruprasad Ramarao, Vikas Sharma, Varukuti Reddy