Patents by Inventor Piyush B. Srivastava

Piyush B. Srivastava has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10678913
    Abstract: A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: June 9, 2020
    Assignee: Gigavation, Inc.
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Patent number: 10614216
    Abstract: A computer-implemented method and computer program product for protecting a computer-driven system from a security threat. The computer-driven system includes a processor host running an operating system in a virtualized environment in communication over a network with a plurality of electronic devices. A set of protocols governs communications over the network between the processor and the devices. The method includes receiving a driver call made to a specific driver, the driver call being generated by the operating system in response to a system call made by an application as well as interrupting transmission of the driver call to the specific driver; and performing a series of paravirtualization processes.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: April 7, 2020
    Assignee: Gigavation, Inc.
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Publication number: 20180137278
    Abstract: A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
    Type: Application
    Filed: December 22, 2017
    Publication date: May 17, 2018
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Patent number: 9875354
    Abstract: A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: January 23, 2018
    Assignee: Gigavation, Inc.
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Publication number: 20160306966
    Abstract: A computer-implemented method and computer program product for protecting a computer-driven system from a security threat. The computer-driven system includes a processor host running an operating system in a virtualized environment in communication over a network with a plurality of electronic devices. A set of protocols governs communications over the network between the processor and the devices. The method includes receiving a driver call made to a specific driver, the driver call being generated by the operating system in response to a system call made by an application as well as interrupting transmission of the driver call to the specific driver; and performing a series of paravirtualization processes.
    Type: Application
    Filed: April 14, 2016
    Publication date: October 20, 2016
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Patent number: 8869273
    Abstract: A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
    Type: Grant
    Filed: August 9, 2012
    Date of Patent: October 21, 2014
    Assignee: Gigavation, Inc.
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Patent number: 8566934
    Abstract: A method is provided of enhancing security of at least one of a host computing device and a peripheral device. In the method, the host computing device is coupled to the peripheral device through a communication interface. The method includes transparently receiving data from one of the peripheral device and the host computing device, and storing the received data. The method further includes analyzing the stored data to identify a circumstance posing a security risk. If analyzing does not identify such a circumstance, then the method includes transparently echoing the data to the other of the peripheral device and the host. If analyzing does identify such a circumstance, then the method includes performing a security process defined by a rule. Related apparatus is provided, as well as other methods and apparatus.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: October 22, 2013
    Assignee: Gigavation, Inc.
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Publication number: 20130031629
    Abstract: A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
    Type: Application
    Filed: August 9, 2012
    Publication date: January 31, 2013
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Publication number: 20120192271
    Abstract: A method is provided of enhancing security of at least one of a host computing device and a peripheral device. In the method, the host computing device is coupled to the peripheral device through a communication interface. The method includes transparently receiving data from one of the peripheral device and the host computing device, and storing the received data. The method further includes analyzing the stored data to identify a circumstance posing a security risk. If analyzing does not identify such a circumstance, then the method includes transparently echoing the data to the other of the peripheral device and the host. If analyzing does identify such a circumstance, then the method includes performing a security process defined by a rule. Related apparatus is provided, as well as other methods and apparatus.
    Type: Application
    Filed: January 21, 2011
    Publication date: July 26, 2012
    Applicant: GIGAVATION, INC.
    Inventors: Gita Srivastava, Piyush B. Srivastava