Patents by Inventor Kunal Mehta
Kunal Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200053109Abstract: There is disclosed in one example a computing apparatus, including: a processor; and logic encoded into one or more computer-readable mediums, the logic to instruct the processor to: capture first data from an intermediate data source across a first temporal interval; perform partial signal processing on the first data to classify the first temporal interval as either suspicious or not suspicious, wherein the first temporal interval is classified as suspicious if it is determined to potentially represent at least a portion of a cryptomining operation; classify second through N temporal intervals as either suspicious or not suspicious; based on the first through N temporal intervals, classify the apparatus as either operating a cryptomining function or not; and upon classifying the apparatus as operating a cryptomining function and determining that the cryptomining function is not authorized, take remedial action on the apparatus.Type: ApplicationFiled: August 9, 2018Publication date: February 13, 2020Applicant: McAfee, LLCInventors: German Lancioni, Kunal Mehta, Carl Woodward
-
Publication number: 20200034538Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform including a performance monitoring unit (PMU); and one or more tangible, non-transitory computer-readable mediums having stored thereon executable instructions to provide a kernel space threat detection engine to: receive a PMU event; correlate the PMU event to a computer security threat including extracting artifacts from the PMU event, and correlating the artifacts to an artifact profile for a known attack; and identify a process associated with the PMU event as a potential attack.Type: ApplicationFiled: July 30, 2018Publication date: January 30, 2020Applicant: McAfee, LLCInventors: Carl Woodward, Kunal Mehta
-
Publication number: 20190319982Abstract: An example system to obscure personally identifiable information of a user of an electronic device is disclosed. The example system includes a first processor to select a set of instructions from a plurality of sets of instructions. The first processor also is to transmit the set of instructions to a second processor, the second processor disposed in an electronic device, the electronic device remote from the first processor, the set of instructions to cause the second processor to obtain non-personally identifiable data from the personally identifiable information gathered by the electronic device. The example system also includes a remote data reader to read the non-personally identifiable data from the electronic device.Type: ApplicationFiled: June 26, 2019Publication date: October 17, 2019Inventors: Ryan M. Durand, Carl D. Woodward, Kunal Mehta, Lynda M. Grindstaff
-
Publication number: 20190278908Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.Type: ApplicationFiled: May 24, 2019Publication date: September 12, 2019Applicant: McAfee, LLCInventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
-
Patent number: 10375109Abstract: Protecting personally identifiable information data collected and/or stored in physical objects with embedded electronic devices by performing at least the following: obtaining a plurality of personally identifiable information algorithms for a plurality of electronic user devices, determining a relevant personally identifiable information algorithm from the plurality of personally identifiable information algorithms, executing the relevant personally identifiable information algorithm over the relevant personally identifiable information from one of the electronic user devices to construct a personally identifiable information data result, and transmitting the personally identifiable information data result without transmitting the relevant personally identifiable information to a remote computing system.Type: GrantFiled: December 23, 2015Date of Patent: August 6, 2019Assignee: McAfee, LLCInventors: Ryan M. Durand, Carl D. Woodward, Kunal Mehta, Lynda M. Grindstaff
-
Patent number: 10339303Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.Type: GrantFiled: January 22, 2015Date of Patent: July 2, 2019Assignee: McAfee, LLCInventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
-
Publication number: 20190139156Abstract: There is disclosed in one example a social media server, including: a processor; a trusted input/output (IO) interface to communicatively couple to a consumer device; a network interface to communicatively couple to an enterprise; and a memory having stored thereon executable instructions to instruct the processor to provide a data loss prevention (DLP) engine to: receive via the trusted IO interface a signed and encrypted user posting for the social media service, the user posting including a signed user state report verifying that the user has passed a biometric screening; transmit content of the user posting to the enterprise via the network interface for DLP analysis; receive from the enterprise a notification that the user posting has passed DLP analysis; and accept the user posting.Type: ApplicationFiled: December 28, 2018Publication date: May 9, 2019Applicant: McAfee, LLCInventors: Kunal Mehta, Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt
-
Publication number: 20190139155Abstract: There is disclosed in one example a data loss prevention (DLP) server, including: a processor; a trusted input/output (IO) interface to communicatively couple to a user device; a social media interface to communicatively couple to a social media service; a trusted execution environment (TEE); and a memory having stored thereon executable instructions to instruct the processor to provide a DLP engine to: receive via the trusted IO interface a signed and encrypted user posting for the social media service, the user posting including a signed user state report verifying that the user has passed a biometric screening; and submit the user posting on behalf of the user to the social media service via the social media interface.Type: ApplicationFiled: December 28, 2018Publication date: May 9, 2019Applicant: McAfee, LLCInventors: Kunal Mehta, Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt
-
Patent number: 10204384Abstract: In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state data interface; analyze the psychological state input; and bar the requested user action at least partly responsive to the analyzing.Type: GrantFiled: December 21, 2015Date of Patent: February 12, 2019Assignee: McAfee, LLCInventors: Kunal Mehta, Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt
-
Patent number: 10140164Abstract: According to an example of the present disclosure, an information technology (IT) environment, such as a data center, a cloud services platform or other type of computing environment, may include computer resources that are dynamically allocated to workloads. A model is generated to estimate performance and allocate computer resources to the workloads.Type: GrantFiled: July 25, 2016Date of Patent: November 27, 2018Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITEDInventors: Kunal Mehta, David M. Klimek, Farah Lalani, Justin Melde, Kate Wilson, Brian Svehaug
-
Publication number: 20180329722Abstract: The disclosure relates to methods, systems, and apparatuses, including computer programs on a computer storage medium, for generating a dynamic user interface and playing a video within the dynamic user interface. A dynamic computer user guidance system includes a user interface generation module that causes a display of a dynamic user interface. The dynamic user interface provides a plurality of instructions via one or more dynamic elements. The user interface generation module generates a user interface status indicator. The system includes a video control module that an integrated video to play in the dynamic user interface in response to receipt of the user interface status indicator. The video control module generates a video status indicator. A synchronization module communicably coupled to the user interface generation module and the video control module synchronize a state change in one or more dynamic elements in response to receipt of the video status indicator.Type: ApplicationFiled: July 28, 2016Publication date: November 15, 2018Inventors: David H. Nguyen, Allison Youngdahl, Shawn D. Meyer, Kunal Mehta, Ziqiu Li, Rob W. Honts, David M. Klimek, Robert Freele, Stephanie Anderson
-
Publication number: 20180024868Abstract: According to an example of the present disclosure, an information technology (IT) environment, such as a data center, a cloud services platform or other type of computing environment, may include computer resources that are dynamically allocated to workloads. A model is generated to estimate performance and allocate computer resources to the workloads.Type: ApplicationFiled: July 25, 2016Publication date: January 25, 2018Inventors: Kunal MEHTA, David M. Klimek, Farah Lalani, Justin Melde, Kate Wilson, Brian Svehaug
-
Patent number: 9723006Abstract: There is disclosed in an example a computing apparatus, including: a process deprivilging engine operable for: recognizing that a process has an undetermined reputation; intercepting a first access request directed to a first resource; determining that the first resource is not owned by the process; and at least partially blocking access to the first resource. There is further disclosed a method of providing the process deprivileging engine, and one or more computer-readable mediums having stored thereon executable instructions for providing the process deprivileging engine.Type: GrantFiled: June 27, 2015Date of Patent: August 1, 2017Assignee: McAfee, Inc.Inventors: Zheng Zhang, John D. Teddy, Craig D. Schmugar, Erdem Aktas, Clint R. Merrill, Kunal Mehta
-
Publication number: 20170187748Abstract: Protecting personally identifiable information data collected and/or stored in physical objects with embedded electronic devices by performing at least the following: obtaining a plurality of personally identifiable information algorithms for a plurality of electronic user devices, determining a relevant personally identifiable information algorithm from the plurality of personally identifiable information algorithms, executing the relevant personally identifiable information algorithm over the relevant personally identifiable information from one of the electronic user devices to construct a personally identifiable information data result, and transmitting the personally identifiable information data result without transmitting the relevant personally identifiable information to a remote computing system.Type: ApplicationFiled: December 23, 2015Publication date: June 29, 2017Inventors: Ryan M. Durand, Carl D. Woodward, Kunal Mehta, Lynda M. Grindstaff
-
Publication number: 20170177884Abstract: In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state data interface; analyze the psychological state input; and bar the requested user action at least partly responsive to the analyzing.Type: ApplicationFiled: December 21, 2015Publication date: June 22, 2017Applicant: McAfee, Inc.Inventors: Kunal Mehta, Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt
-
Publication number: 20170111388Abstract: A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a secured storage communicatively coupled to the client. The system further includes a client application including computer-executable instructions on the medium. The instructions are readable by the processor. The application is configured to manage a trusted image of software of a client in a secured storage and, upon a signal indicating malware on the client, restore the trusted image to the client independent of an operating system and user processes of the client.Type: ApplicationFiled: April 1, 2016Publication date: April 20, 2017Inventors: Kunal Mehta, Dmitri Rubakha, Carl D. Woodward, Steven L. Grobman, Adrian R. Pearson, Faraz A. Siddiqi
-
Publication number: 20160381024Abstract: There is disclosed in an example a computing apparatus, including: a process deprivilging engine operable for: recognizing that a process has an undetermined reputation; intercepting a first access request directed to a first resource;determining that the first resource is not owned by the process; and at least partially blocking access to the first resource. There is further disclosed a method of providing the process deprivileging engine, and one or more computer-readable mediums having stored thereon executable instructions for providing the process deprivileging engine.Type: ApplicationFiled: June 27, 2015Publication date: December 29, 2016Inventors: Zheng Zhang, John D. Teddy, Craig D. Schmugar, Erdem Aktas, Clint R. Merrill, Kunal Mehta
-
Publication number: 20160371484Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.Type: ApplicationFiled: January 22, 2015Publication date: December 22, 2016Inventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
-
Publication number: 20160283259Abstract: In an example, a virtual data center includes a plurality of agentless virtual machines (VMs) protected by a security virtual appliance (SVA). Because the VMs are agentless, they cannot internally manage, update, or enforce VM-specific security policies. However, each VM includes an API that provides an interface for monitoring events such as turn on, turn off, heartbeats, and file events, as well as an interface for ordering an on-demand scan. The SVA builds a policy table, with entries for each VM or class of VMs, and using the API, monitors appropriate events, such as file events, to enforce VM-specific policies. Because the policy table is lightweight, it can be efficiently ported between multiple hypervisors, thus ensuring that a VMs policy remains intact, even if that VM is ported to a different hypervisor.Type: ApplicationFiled: March 28, 2015Publication date: September 29, 2016Applicant: McAfee, Inc.Inventor: Kunal Mehta