Patents by Inventor Nishant Doshi

Nishant Doshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150312262
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics.
    Type: Application
    Filed: August 18, 2014
    Publication date: October 29, 2015
    Inventor: Nishant Doshi
  • Patent number: 9083729
    Abstract: A computer-implemented method for determining that uniform resource locators are malicious may include identifying a uniform resource locator that may be posted on a social networking platform and that may be subject to a security assessment, gathering contextual data from the social networking platform that describes at least one instance of the uniform resource locator within the social networking platform, generating, based on the contextual data, a social fingerprint of the uniform resource locator and classifying the uniform resource locator as malicious based at least in part on the social fingerprint. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: July 14, 2015
    Assignee: Symantec Corporation
    Inventors: Nishant Doshi, Sourabh Satish
  • Patent number: 8997228
    Abstract: Techniques for detecting infected websites are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting an infected website comprising receiving at least one redirection report from at least one security agent, receiving at least one malware report from the at least one security agent, analyzing correlation between the at least one redirection report and the at least one malware report, aggregating information from the at least one redirection report, the at least one malware report, and the correlation analysis, and detecting an infected website based on the aggregated information.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: March 31, 2015
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Nishant A. Doshi
  • Publication number: 20150020127
    Abstract: Examples of systems are described herein in which an item of content may be delivered to multiple devices within a group of devices at the same time while reducing bandwidth consumption. Such systems may also allow for attractive pricing and features that may encourage more users to consume the item of content.
    Type: Application
    Filed: July 9, 2013
    Publication date: January 15, 2015
    Inventors: Nishant Doshi, Ambud Sharma, Alexei Saveliev
  • Patent number: 8627407
    Abstract: A computer-implemented method for preventing modification of network resources in the absence of a user's consent is disclosed. The method may comprise: 1) identifying an attempt to modify a network resource, 2) administering a human-verification test, and 3) determining, based on the outcome of the human-verification test, whether to prevent modification of the network resource. In addition, a computer-implemented method for preventing unauthorized communication with network resources may comprise: 1) identifying a communication attempt between a network resource and an untrusted resource, 2) determining whether communication between the network resource and the untrusted resource is authorized, and 3) determining, based on whether communication between the network resource and the untrusted resource is authorized, whether to allow communication between the network resource and the untrusted resource. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: January 7, 2014
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Nishant Doshi
  • Patent number: 8307435
    Abstract: The execution of a software application is diverted to detect software object corruption in the software application. Software objects used by the software application are identified and their pointers are inspected. One or more tests are applied to pointers pointing to the virtual method tables of the software objects, addresses (or pointers) in the virtual method tables, and memory attributes or content of the memory buffer identified by the addresses for inconsistencies that indicate corruption. A determination of whether the software objects are corrupted is made based on the outcome of the tests. If software object corruption is detected, proper corrective actions are applied to prevent malicious exploitation of the corruption.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: November 6, 2012
    Assignee: Symantec Corporation
    Inventors: Uriel Mann, Nishant Doshi