Patents by Inventor Nagarjuna Venna

Nagarjuna Venna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10326786
    Abstract: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: June 18, 2019
    Assignee: BitSight Technologies, Inc.
    Inventors: Philip J. Gladstone, Alan J. Kirby, John M. Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer
  • Patent number: 10176445
    Abstract: Among other things, information is obtained by computer about Internet-related assets of organizations. The information is used to identify relationships between the organizations with respect to the assets. The information about the identified relationships is made available for display or analysis or both.
    Type: Grant
    Filed: April 1, 2016
    Date of Patent: January 8, 2019
    Assignee: BitSight Technologies, Inc.
    Inventors: Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer, Philip John Steuart Gladstone, Mathew Cherian
  • Publication number: 20180375822
    Abstract: A computer-implemented method is provided for mapping IP addresses and domain names to organizations. The method includes receiving, by a mapping system from an data provider, a dataset related to a plurality of users of the data provider. The dataset includes (a) an IP address for a user device of each user of the plurality of users, and (b) a domain name for a user account of each user of the plurality of users; enriching, by an analytics engine of the mapping system, the received dataset with enrichment data from an enrichment source; receiving, by the analytics engine from a storage medium, historical data relevant to the enriched dataset; and mapping, by the analytics engine, (i) the IP address and/or (ii) the domain name of each user of a portion of the plurality of users to an organization based on the enriched dataset and the historical data.
    Type: Application
    Filed: June 22, 2018
    Publication date: December 27, 2018
    Inventors: Daniel Dahlberg, Stephen Boyer, Nagarjuna Venna, Philip John Steuart Gladstone
  • Patent number: 9973524
    Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: May 15, 2018
    Assignee: BitSight Technologies, Inc.
    Inventors: Stephen Boyer, Nagarjuna Venna, Megumi Ando
  • Publication number: 20170236079
    Abstract: Among other things, information is obtained by computer about Internet-related assets of organizations. The information is used to identify relationships between the organizations with respect to the assets. The information about the identified relationships is made available for display or analysis or both.
    Type: Application
    Filed: April 1, 2016
    Publication date: August 17, 2017
    Inventors: Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer, Philip John Steuart Gladstone, Mathew Cherian
  • Publication number: 20170236077
    Abstract: Among other things, information is obtained by computer about Internet-related assets of organizations. The information is used to identify relationships between the organizations with respect to the assets. The information about the identified relationships is made available for display or analysis or both.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Nagarjuna Venna, David Feinzeig, Amy Eastment, Daniel Dahlberg, Stephen Boyer, Philip John Steuart Gladstone, Mathew Cherian
  • Patent number: 9680858
    Abstract: Among other things, information is acquired and stored that is indicative of security risks associated with security subjects and with entities to which the security subjects belong. The stored information is analyzed by computer to derive security indicators for the entities. With respect to entities selected by the users, security information is presented by computer to users. The security information includes security indicators for the entities and security information for security subjects. The security information for security subjects includes annotations provided by users. The annotations are managed by computer based on communications from the users.
    Type: Grant
    Filed: April 21, 2016
    Date of Patent: June 13, 2017
    Assignee: Bitsight Technologies, Inc.
    Inventors: Stephen Boyer, Nagarjuna Venna, Philip John Steuart Gladstone, Nicholas Whalen
  • Publication number: 20170093901
    Abstract: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
    Type: Application
    Filed: August 17, 2016
    Publication date: March 30, 2017
    Inventors: Philip J. Gladstone, Alan J. Kirby, John M. Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer
  • Publication number: 20160330231
    Abstract: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
    Type: Application
    Filed: July 22, 2016
    Publication date: November 10, 2016
    Inventors: Philip John Steuart Gladstone, Alan Joseph Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer
  • Publication number: 20160323308
    Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
    Type: Application
    Filed: November 18, 2015
    Publication date: November 3, 2016
    Inventors: Stephen Boyer, Nagarjuna Venna, Megumi Ando
  • Patent number: 9438615
    Abstract: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: September 6, 2016
    Assignee: BitSight Technologies, Inc.
    Inventors: Philip John Steuart Gladstone, Alan Joseph Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer
  • Publication number: 20160205126
    Abstract: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
    Type: Application
    Filed: September 22, 2011
    Publication date: July 14, 2016
    Applicant: BITSIGHT TECHNOLOGIES, INC.
    Inventors: Stephen Wayne Boyer, Nagarjuna Venna, Megumi Ando
  • Publication number: 20150074579
    Abstract: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
    Type: Application
    Filed: September 9, 2013
    Publication date: March 12, 2015
    Inventors: Philip John Steuart Gladstone, Alan Joseph Kirby, John Matthew Truelove, David Feinzeig, Nagarjuna Venna, Stephen Boyer
  • Patent number: 8576909
    Abstract: A system and method for monitoring a sequence of video packets for quantifying video quality includes a video picture monitor that accesses data in a header of a video packet included in the sequence of video packets. The header is separate from video content stored in the video packet. The video picture monitor also determines from the accessed data, a relationship between a portion of a picture included in the video packet and at least a portion of a picture included in another video packet. Both video packets are included in the sequence of video packets. This relationship indicates whether to use the video content stored in the first video packet to quantify video quality.
    Type: Grant
    Filed: March 17, 2011
    Date of Patent: November 5, 2013
    Inventors: Nagarjuna Venna, Kaynam Hedayat
  • Publication number: 20110164140
    Abstract: A system and method for monitoring a sequence of video packets for quantifying video quality includes a video picture monitor that accesses data in a header of a video packet included in the sequence of video packets. The header is separate from video content stored in the video packet. The video picture monitor also determines from the accessed data, a relationship between a portion of a picture included in the video packet and at least a portion of a picture included in another video packet. Both video packets are included in the sequence of video packets. This relationship indicates whether to use the video content stored in the first video packet to quantify video quality.
    Type: Application
    Filed: March 17, 2011
    Publication date: July 7, 2011
    Applicant: EXFO Service Assurance Inc.
    Inventors: Nagarjuna Venna, Kaynam Hedayat
  • Patent number: 7933329
    Abstract: A system and method for monitoring a sequence of video packets for quantifying video quality includes a video picture monitor that accesses data in a header of a video packet included in the sequence of video packets. The header is separate from video content stored in the video packet. The video picture monitor also determines from the accessed data, a relationship between a portion of a picture included in the video packet and at least a portion of a picture included in another video packet. Both video packets are included in the sequence of video packets. This relationship indicates whether to use the video content stored in the first video packet to quantify video quality.
    Type: Grant
    Filed: August 24, 2005
    Date of Patent: April 26, 2011
    Assignee: EXFO Service Assurance Inc.
    Inventors: Nagarjuna Venna, Kaynam Hedayat
  • Publication number: 20070047640
    Abstract: A system and method for monitoring a sequence of video packets for quantifying video quality includes a video picture monitor that accesses data in a header of a video packet included in the sequence of video packets. The header is separate from video content stored in the video packet. The video picture monitor also determines from the accessed data, a relationship between a portion of a picture included in the video packet and at least a portion of a picture included in another video packet. Both video packets are included in the sequence of video packets. This relationship indicates whether to use the video content stored in the first video packet to quantify video quality.
    Type: Application
    Filed: August 24, 2005
    Publication date: March 1, 2007
    Inventors: Nagarjuna Venna, Kaynam Hedayat