Patents by Inventor Krishna Sathyanarayana

Krishna Sathyanarayana has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240104205
    Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.
    Type: Application
    Filed: December 5, 2023
    Publication date: March 28, 2024
    Inventors: Krishna SATHYANARAYANA, Anoop Wilbur SALDANHA, Abhijit MOHANTA
  • Publication number: 20240078310
    Abstract: Events of a calendar are identified and evaluated for confidentiality due to an explicit tag, location, participants, or subject matter. In response, permissions of applications on a device are dynamically reduced. Permissions may include permissions to access sensors such as a microphone and camera. Sensors of other devices such as a voice-processing device or Bluetooth device may be disabled. The risk associated with applications on a device may be evaluated based on permissions, usage, collected data, cloud service provider, location, permissions and usage of other users of the application, and other attributes of the application. The risk may be represented as a risk score used to determine whether to perform a mitigation action.
    Type: Application
    Filed: December 5, 2022
    Publication date: March 7, 2024
    Inventors: Brian James Buck, Tyler Croak, Krishna Sathyanarayana
  • Patent number: 11880458
    Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: January 23, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Krishna Sathyanarayana, Anoop Wilbur Saldanha, Abhijit Mohanta
  • Publication number: 20220004632
    Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.
    Type: Application
    Filed: September 22, 2021
    Publication date: January 6, 2022
    Inventors: Krishna SATHYANARAYANA, Anoop Wilbur SALDANHA, Abhijit MOHANTA
  • Patent number: 11138313
    Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: October 5, 2021
    Assignee: Juniper Networks, Inc.
    Inventors: Krishna Sathyanarayana, Anoop Wilbur Saldanha, Abhijit Mohanta
  • Publication number: 20200050762
    Abstract: A device may receive a file that has been downloaded, or is to be downloaded, to a user device, and that is to be subject to a malware detection procedure. The device may obtain, based on one or more file identification properties of the file, metadata identifying user interactions associated with the file. The metadata may include a first group of user interactions performed when the file was accessed on the user device or a second group of user interactions performed when the file was accessed on one or more other user devices. The device may test the file in a sandbox environment to obtain a result by performing the user interactions identified by the metadata and executing the malware detection procedure to determine whether the file is malware. The device may provide a notification to cause the user device to perform actions when the file is malware.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Inventors: Krishna SATHYANARAYANA, Anoop Wilbur SALDANHA, Abhijit MOHANTA
  • Patent number: 8824482
    Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.
    Type: Grant
    Filed: September 23, 2011
    Date of Patent: September 2, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh Krishnamurthy Bangalore, Varakuti Venugopal Reddy
  • Publication number: 20120008508
    Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.
    Type: Application
    Filed: September 23, 2011
    Publication date: January 12, 2012
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh BK, Varakuti Venugopal Reddy
  • Patent number: 8078679
    Abstract: In one embodiment of the invention, a method for automating collateral configuration in a network is provided. A service is configured on a network device (termed as service providing device). The service providing device sends a Collateral Configuration Request Protocol (CCRP) message to other network devices (termed as service accessing devices). The service accessing devices process the CCRP message for their automatic collateral configuration in order to access the configured service on the service providing device.
    Type: Grant
    Filed: April 12, 2006
    Date of Patent: December 13, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Preetham Kajekar, Krishna Sathyanarayana
  • Patent number: 8040895
    Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.
    Type: Grant
    Filed: March 22, 2006
    Date of Patent: October 18, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh Krishnamurthy Bangalore, Varakuti Venugopal Reddy
  • Patent number: 7680925
    Abstract: A method, system, and apparatus are provided for testing a service in a network. A simulated interface is created on a network device by a Network Management Station (NMS). Thereafter, an instruction is received at the simulated interface from the NMS. The instruction comprises a source address, a destination address and other information to test a service. The service is tested on the network device based on the received instruction. A response is generated from the test. The response indicates whether the service is working as intended between the source address and the destination address. The response is sent from the simulated interface to the NMS.
    Type: Grant
    Filed: January 24, 2006
    Date of Patent: March 16, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Krishna Sathyanarayana, Preetham Kajekar, Guruprasad Ramarao, Vikas Sharma, Varukuti Venugopal Reddy
  • Publication number: 20070244995
    Abstract: In one embodiment of the invention, a method for automating collateral configuration in a network is provided. A service is configured on a network device (termed as service providing device). The service providing device sends a Collateral Configuration Request Protocol (CCRP) message to other network devices (termed as service accessing devices). The service accessing devices process the CCRP message for their automatic collateral configuration in order to access the configured service on the service providing device.
    Type: Application
    Filed: April 12, 2006
    Publication date: October 18, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Preetham Kajekar, Krishna Sathyanarayana
  • Publication number: 20070223487
    Abstract: Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be detected for an egress as well as an ingress ACL. The ACEs that have a hit count above a user-specified hit count are checked for their validity. The validity of the ACE is checked, using the information based on a Forwarding Information Base (FIB). If an ACE is found to be invalid, it is considered dead. The dead ACEs are referred as candidates for removal from the ACL. If the ACE is found to be a candidate for removal, a system administrator can either warn the network administrator about the candidate for removal or delete the ACE from the ACL after a pre-defined time limit.
    Type: Application
    Filed: March 22, 2006
    Publication date: September 27, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Preetham Kajekar, Krishna Sathyanarayana, Sundar Ramakrishnan, Ganesh BK, Varakuti Reddy
  • Publication number: 20070171834
    Abstract: A method, system, and apparatus are provided for testing a service in a network. A simulated interface is created on a network device by a Network Management Station (NMS). Thereafter, an instruction is received at the simulated interface from the NMS. The instruction comprises a source address, a destination address and other information to test a service. The service is tested on the network device based on the received instruction. A response is generated from the test. The response indicates whether the service is Working as intended between the source address and the destination address. The response is sent from the simulated interface to the NMS.
    Type: Application
    Filed: January 24, 2006
    Publication date: July 26, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Krishna Sathyanarayana, Preetham Kajekar, Guruprasad Ramarao, Vikas Sharma, Varukuti Reddy