Patents by Inventor Prasanna Ganapathi Basavapatna

Prasanna Ganapathi Basavapatna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8677497
    Abstract: A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: March 18, 2014
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Patent number: 8595845
    Abstract: A standardized vulnerability score is identified for a particular vulnerability in a plurality of known vulnerabilities, the standardized vulnerability score indicating a relative level of risk associated with the particular vulnerability relative other vulnerabilities. A vulnerability detection score is determined that indicates an estimated probability that a particular asset possess the particular vulnerability and a vulnerability composite score is determined for the particular asset to the particular vulnerability, the vulnerability composite score derived from the standardized vulnerability score and the vulnerability detection score. A countermeasure component score is identified that indicates an estimated probability that a countermeasure will mitigate risk associated with the particular vulnerability on the particular asset. A risk metric for the particular asset and the particular vulnerability is determined from the vulnerability composite score and the countermeasure component score.
    Type: Grant
    Filed: January 19, 2012
    Date of Patent: November 26, 2013
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Deepakeshwaran Kolingivadi, Sven Schrecker
  • Patent number: 8590002
    Abstract: A data processing system, method and computer program product are provided. In use, data on a network is identified. In addition, a policy is identified. Further, the data is processed based on the policy for maintaining a confidentiality of the data.
    Type: Grant
    Filed: November 29, 2006
    Date of Patent: November 19, 2013
    Assignee: McAfee Inc.
    Inventors: Gopi Krishna Chebiyyam, Prasanna Ganapathi Basavapatna
  • Publication number: 20130276061
    Abstract: A system, method, and computer program product are provided for preventing access to data associated with a data access attempt. In use, a data access attempt associated with a remote data sharing session is identified. Further, access to the data is prevented.
    Type: Application
    Filed: September 5, 2007
    Publication date: October 17, 2013
    Inventors: Gopi Krishna Chebiyyam, Prasanna Ganapathi Basavapatna
  • Publication number: 20130191919
    Abstract: A standardized vulnerability score is identified for a particular vulnerability in a plurality of known vulnerabilities, the standardized vulnerability score indicating a relative level of risk associated with the particular vulnerability relative other vulnerabilities. A vulnerability detection score is determined that indicates an estimated probability that a particular asset possess the particular vulnerability and a vulnerability composite score is determined for the particular asset to the particular vulnerability, the vulnerability composite score derived from the standardized vulnerability score and the vulnerability detection score. A countermeasure component score is identified that indicates an estimated probability that a countermeasure will mitigate risk associated with the particular vulnerability on the particular asset. A risk metric for the particular asset and the particular vulnerability is determined from the vulnerability composite score and the countermeasure component score.
    Type: Application
    Filed: January 19, 2012
    Publication date: July 25, 2013
    Inventors: Prasanna Ganapathi Basavapatna, Deepakeshwaran Kolingivadi, Sven Schrecker
  • Publication number: 20130097709
    Abstract: A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral profile identifying expected behavior of the at least one user within the computing system. Activities associated with use of the computing system by the particular user are identified and it is determined whether the identified activities correlate with the particular behavioral profile. Identifying an activity that deviates from the particular behavioral profile beyond a particular threshold triggers a risk event relating to the particular user.
    Type: Application
    Filed: December 22, 2011
    Publication date: April 18, 2013
    Inventors: Prasanna Ganapathi Basavapatna, Michael Mason Moyle, Sven Schrecker
  • Publication number: 20130097711
    Abstract: A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
    Type: Application
    Filed: December 28, 2011
    Publication date: April 18, 2013
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Publication number: 20130096980
    Abstract: A particular set of computing assets is identified on a particular computing system including a plurality of computing assets. A user definition is received of a particular countermeasure applied to the particular set of assets, the user definition of the countermeasure including identification of each asset in the particular set of assets and identification of at least one vulnerability or threat addressed by the particular countermeasure in a plurality of known vulnerabilities or threats. Based on the user definition, actual deployment of the particular countermeasure on the particular computing system is assumed in a risk assessment of at least a portion of the particular computing system.
    Type: Application
    Filed: December 22, 2011
    Publication date: April 18, 2013
    Inventors: Prasanna Ganapathi Basavapatna, Deepakeshwaran Kolingivadi, Sven Schrecker
  • Publication number: 20130097701
    Abstract: A particular activity performed by a particular user of a computing device is identified, for instance, by an agent installed on the computing device. It is determined that the particular activity qualifies as a particular use violation in a plurality of pre-defined use violations. A behavioral risk score for the particular score for the user is determined based at least in part on the determination that the particular activity of the particular user qualifies as a particular use violation. Determining that the particular activity qualifies as a particular use violation can include determining that the particular activity violates a particular rule or event trigger corresponding to a particular pre-defined use violation.
    Type: Application
    Filed: December 22, 2011
    Publication date: April 18, 2013
    Inventors: Michael Mason Moyle, Prasanna Ganapathi Basavapatna, Sven Schrecker
  • Publication number: 20130097710
    Abstract: At least one available wireless access point is identified at a particular location and a connection is established with the available wireless access point. Communication is attempted with a trusted endpoint over the wireless access point and the attempted communication with the trusted endpoint over the wireless access point is monitored to assess risk associated with the wireless access point. Results of the assessment, in some instances, can be reported to an access point risk manager and risk associated with future attempts to use the wireless access point can be assessed based at least in part on the reported assessment results.
    Type: Application
    Filed: December 28, 2011
    Publication date: April 18, 2013
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Publication number: 20120183174
    Abstract: A system, method, and computer program product are provided for preventing data loss associated with an image. In use, an image is identified, and it is determined whether the image includes predetermined data. In addition, an action is performed based on the determination, for preventing data loss.
    Type: Application
    Filed: March 24, 2012
    Publication date: July 19, 2012
    Inventors: Prasanna Ganapathi Basavapatna, Gopi Krishna Chebiyyam
  • Patent number: 8199965
    Abstract: A system, method, and computer program product are provided for preventing data loss associated with an image. In use, an image is identified, and it is determined whether the image includes predetermined data. In addition, an action is performed based on the determination, for preventing data loss.
    Type: Grant
    Filed: August 17, 2007
    Date of Patent: June 12, 2012
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Gopi Krishna Chebiyyam