Patents by Inventor Namakkal S. Sambamurthy

Namakkal S. Sambamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220229886
    Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.
    Type: Application
    Filed: August 31, 2021
    Publication date: July 21, 2022
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 11106768
    Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.
    Type: Grant
    Filed: December 24, 2018
    Date of Patent: August 31, 2021
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 10606988
    Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: March 31, 2020
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20190130081
    Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.
    Type: Application
    Filed: December 24, 2018
    Publication date: May 2, 2019
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20190012440
    Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
    Type: Application
    Filed: August 21, 2018
    Publication date: January 10, 2019
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 10162947
    Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: December 25, 2018
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S Sambamurthy, Parthasarathy Krishnan
  • Patent number: 10055559
    Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: August 21, 2018
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20180121637
    Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
    Type: Application
    Filed: December 22, 2017
    Publication date: May 3, 2018
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 9852275
    Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: December 26, 2017
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20150249688
    Abstract: Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.
    Type: Application
    Filed: May 18, 2015
    Publication date: September 3, 2015
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 9092605
    Abstract: Methods and systems are presented for securing network access. One method includes operations for granting a user access to remote computer resources after authenticating a login request from the user sent from a secured computer device, and for receiving a network access request from a network access device to allow the user access through the network access device. A network access granted message is sent to the network access device when the user currently has been granted access to the remote computer resources, where the secured computer device performs periodic authentication operations to validate an identification of the user based on biometric data taken of the user. Further, the method includes operations for receiving notification from the secured computer device that one of the authentication operations has failed, and for sending a network access denied for the user to the network access device in response to the notification.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: July 28, 2015
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 9081980
    Abstract: A method for managing data use of an enterprise is disclosed. The method includes receiving login parameters from a user associated with user identification information. The method authenticates the login parameters and the user information to determine if the login parameters match the user identification information. The method provides access to specific data in a database that stores enterprise information. Upon providing access, initiating video capture of a viewing space for the screen, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data. During the video capture, capturing image data presented on the screen and input received for the user interface of the screen. The method acts to bind the video capture and the captured image data presented on the screen and the input received.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: July 14, 2015
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 9069980
    Abstract: Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method proceeds to authenticating of the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method further includes providing access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method binds the captured image data of the user to the recorded data to produce audit data for the user when accessing the database of secure information. The method is executed by a processor.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: June 30, 2015
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parathasarathy Krishnan
  • Patent number: 9053335
    Abstract: Systems and method are provided for enforcing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method disables the access to the database of secure information upon detecting a predefined security enforcement violation associated with an activity by the user during access to the database. The method being executed by a processor.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: June 9, 2015
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 9047464
    Abstract: Methods, systems, and computer programs are presented for securing a computer device. One method includes an operation for capturing interaction data for a user interfacing with the computer device, the interaction data including keyboard inputs and screen captures taken periodically. Further, the method includes operations for extracting semantic meaning of the interaction data, and generating a schema, based on the extracted semantic meaning, to create meaningful tags for the interaction data. The schema is analyzed based on a model in order to identify security threats, and an alarm is created when non-conforming behavior for the model is detected.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: June 2, 2015
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Patent number: 8904473
    Abstract: Devices, methods, and computer programs are presented for displaying information output of a host. One apparatus includes a housing that includes a panel, a scalar, a sensor, an integrated circuit (IC), and a communications device. The panel includes a plurality of light emitting devices arranged to define an area for displaying information output from the host. The scalar is for receiving pixel data from the host computer to be displayed on the panel, and the sensor is for capturing data proximate to the panel. The IC is in communication with the scalar and the panel, the integrated circuit configured to intercept the information output from the host computer, the data of the sensor being analyzed for security control when the information output is to be presented to the scalar. The communications device is for enabling the IC to communicate with a remote computer without communicating through the host computer.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: December 2, 2014
    Assignee: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20140283016
    Abstract: Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20140282965
    Abstract: Methods, systems, and computer programs are presented for securing network access. One method includes an operation for granting a user access to remote computer resources after authenticating a login request from the user sent from a secured computer device. In addition, the method includes an operation for receiving a network access request from a network access device to allow the user to access the remote computer resources through the network access device. A network access granted message for the user is sent to the network access device when the user currently has been granted access to the remote computer resources, where the secured computer device performs periodic authentication operations to validate an identification of the user based on biometric data taken of the user.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20140283059
    Abstract: Methods, systems, and computer programs are presented for securing a computer device. One method includes an operation for capturing interaction data for a user interfacing with the computer device, the interaction data including keyboard inputs and screen captures taken periodically. Further, the method includes operations for extracting semantic meaning of the interaction data, and generating a schema, based on the extracted semantic meaning, to create meaningful tags for the interaction data. The schema is analyzed based on a model in order to identify security threats, and an alarm is created when non-conforming behavior for the model is detected.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: NSS Lab Works LLC
    Inventors: Namakkal S. Sambamurthy, Parthasarathy Krishnan
  • Publication number: 20130219463
    Abstract: A method for managing data use of an enterprise is disclosed. The method includes receiving login parameters from a user associated with user identification information. The method authenticates the login parameters and the user information to determine if the login parameters match the user identification information. The method provides access to specific data in a database that stores enterprise information. Upon providing access, initiating video capture of a viewing space for the screen, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data. During the video capture, capturing image data presented on the screen and input received for the user interface of the screen. The method acts to bind the video capture and the captured image data presented on the screen and the input received.
    Type: Application
    Filed: March 14, 2013
    Publication date: August 22, 2013
    Inventors: Namakkal S. Sambamurthy, Parathasarathy Krishnan