Patents by Inventor Rachit Mathur

Rachit Mathur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11677835
    Abstract: Techniques for reducing network bandwidth for remote content display include storing, in a buffer, by a first client device of a plurality of client devices participating in a co-editing session, a plurality of cursor coordinates of a cursor displayed on a display of the first client device. The plurality of cursor coordinates are stored in the buffer during a throttle time period. Responsive to a determination that the throttle time period has elapsed, the first client device obtains from the buffer and transmits the plurality of cursor coordinates in a data packet. Receipt of the plurality of cursor coordinates enables a representation of the cursor to be displayed on displays of each of the plurality of client devices other than the first client device based at least in part on the plurality of cursor coordinates.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: June 13, 2023
    Assignee: Adobe Inc.
    Inventors: Rachit Mathur, Himanshu Kumar, Amit Aggarwal
  • Publication number: 20230127334
    Abstract: Techniques for reducing network bandwidth for remote content display include storing, in a buffer, by a first client device of a plurality of client devices participating in a co-editing session, a plurality of cursor coordinates of a cursor displayed on a display of the first client device. The plurality of cursor coordinates are stored in the buffer during a throttle time period. Responsive to a determination that the throttle time period has elapsed, the first client device obtains from the buffer and transmits the plurality of cursor coordinates in a data packet. Receipt of the plurality of cursor coordinates enables a representation of the cursor to be displayed on displays of each of the plurality of client devices other than the first client device based at least in part on the plurality of cursor coordinates.
    Type: Application
    Filed: October 25, 2021
    Publication date: April 27, 2023
    Inventors: Rachit Mathur, Himanshu Kumar, Amit Aggarwal
  • Patent number: 11258813
    Abstract: Apparatus, systems, methods, and articles of manufacture for fingerprinting and classifying application behaviors using telemetry are disclosed. An example apparatus includes a trace processor to process events in a processor trace to capture application execution behavior; a fingerprint extractor to extract a first fingerprint from the captured application execution behavior and performance monitor information; a fingerprint clusterer to, in a training mode cluster the first fingerprint and the second fingerprint into a cluster of fingerprints to be stored in a fingerprint database with a classification; and a fingerprint classifier to, in a deployed mode, classify a third fingerprint, the fingerprint classifier to trigger a remedial action when the classification is malicious.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: February 22, 2022
    Assignee: Intel Corporation
    Inventors: Justin Gottschlich, Rachit Mathur, Zheng Zhang
  • Patent number: 10466970
    Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: November 5, 2019
    Assignee: SAP SE
    Inventors: Arun Subramanian, Praveenkumar Arangotte Kozhisseri, Rachit Mathur
  • Publication number: 20190319977
    Abstract: Apparatus, systems, methods, and articles of manufacture for fingerprinting and classifying application behaviors using telemetry are disclosed. An example apparatus includes a trace processor to process events in a processor trace to capture application execution behavior; a fingerprint extractor to extract a first fingerprint from the captured application execution behavior and performance monitor information; a fingerprint clusterer to, in a training mode cluster the first fingerprint and the second fingerprint into a cluster of fingerprints to be stored in a fingerprint database with a classification; and a fingerprint classifier to, in a deployed mode, classify a third fingerprint, the fingerprint classifier to trigger a remedial action when the classification is malicious.
    Type: Application
    Filed: June 27, 2019
    Publication date: October 17, 2019
    Inventors: Justin Gottschlich, Rachit Mathur, Zheng Zhang
  • Publication number: 20190318085
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed that analyze computer system attack mechanisms. An example apparatus includes a graph generator utilizing a natural language processing model to generate a graph based on a publication, an analyzer to: analyze two or more nodes in the graph by identifying respective attributes of the two or more nodes in the graph, and provide an indication of the two or more nodes that include similar respective attributes, a variation generator to generate an attack mechanism based on the indication, and a weight postulator to obtain the generated attack mechanism and, based on (A) the two or more nodes in the graph and (B) the generated attack mechanism, indicate a weight associated with a severity of the generated attack mechanism.
    Type: Application
    Filed: June 27, 2019
    Publication date: October 17, 2019
    Inventors: Rachit Mathur, Brendan Traw, Justin Gottschlich
  • Patent number: 10204223
    Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: February 12, 2019
    Assignee: McAfee, LLC
    Inventors: Peter Szor, Rachit Mathur
  • Patent number: 9984230
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to execute an application in a system with an operating system, perform event tracing for the application, analyze each instruction pointer from the event tracing, and determine if an instruction pointer points to an orphan page of memory. The orphan page can be a region of code that is not associated with the application, a region of code that is unidentified, or unusual code that is not associated with the application. In addition, the event tracing can be an embedded application that is part of the operating system.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: May 29, 2018
    Assignee: McAfee, LLC
    Inventors: Volodymyr Pikhur, Rachit Mathur
  • Publication number: 20180004951
    Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.
    Type: Application
    Filed: September 18, 2017
    Publication date: January 4, 2018
    Applicant: McAfee, Inc.
    Inventors: Peter Szor, Rachit Mathur
  • Patent number: 9767283
    Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventors: Peter Szor, Rachit Mathur
  • Publication number: 20170109137
    Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.
    Type: Application
    Filed: December 2, 2015
    Publication date: April 20, 2017
    Inventors: ARUN SUBRAMANIAN, PRAVEENKUMAR ARANGOTTE KOZHISSERI, RACHIT MATHUR
  • Publication number: 20160378975
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to execute an application in a system with an operating system, perform event tracing for the application, analyze each instruction pointer from the event tracing, and determine if an instruction pointer points to an orphan page of memory. The orphan page can be a region of code that is not associated with the application, a region of code that is unidentified, or unusual code that is not associated with the application. In addition, the event tracing can be an embedded application that is part of the operating system.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 29, 2016
    Applicant: MCAFEE, INC.
    Inventors: Volodymyr Pikhur, Rachit Mathur
  • Patent number: 9438620
    Abstract: A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features are identified in each of the functions that correspond to instances of a set of control flow fragment types. A feature set is generated for the sample from the identified features.
    Type: Grant
    Filed: October 22, 2013
    Date of Patent: September 6, 2016
    Assignee: McAfee, Inc.
    Inventors: Erdem Aktas, Rachit Mathur
  • Publication number: 20150379267
    Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Peter Szor, Rachit Mathur
  • Publication number: 20150180883
    Abstract: A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features are identified in each of the functions that correspond to instances of a set of control flow fragment types. A feature set is generated for the sample from the identified features.
    Type: Application
    Filed: October 22, 2013
    Publication date: June 25, 2015
    Inventors: Erdem Aktas, Rachit Mathur
  • Patent number: 8732296
    Abstract: A system, method, and computer program product are provided for redirecting internet relay chat (IRC) traffic identified utilizing a port-independent algorithm and controlling IRC based malware. In use, IRC traffic communicated via a network is identified utilizing a port-independent algorithm. Furthermore, the IRC traffic is redirected to a honeypot.
    Type: Grant
    Filed: May 6, 2009
    Date of Patent: May 20, 2014
    Assignee: McAfee, Inc.
    Inventors: Vinoo Thomas, Nitin Jyoti, Cedric Cochin, Rachit Mathur
  • Publication number: 20130247182
    Abstract: A system, method, and computer program product are provided for detecting hidden or modified data objects. In use, a first set of data objects stored in a device is enumerated, where the enumeration of the first set of data objects is performed within an operating system of the device. Additionally, a second set of data objects stored in the device is enumerated, where the enumeration of the second set of data objects is performed outside of the operating system of the device. Further, the first set of data objects and the second set of data objects are compared for identifying hidden or modified data objects.
    Type: Application
    Filed: April 21, 2009
    Publication date: September 19, 2013
    Inventors: Seagen James Levites, Rachit Mathur, Aditya Kapoor
  • Patent number: 8499352
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware.
    Type: Grant
    Filed: April 5, 2012
    Date of Patent: July 30, 2013
    Assignee: McAfee, Inc.
    Inventors: Rachit Mathur, Cedric Cochin
  • Patent number: 8370941
    Abstract: A rootkit scanning system, method, and computer program product are provided. In use, at least one hook is traversed. Further, code is identified based on the traversal of the at least one hook. In addition, the code is scanned for at least one rootkit.
    Type: Grant
    Filed: May 6, 2008
    Date of Patent: February 5, 2013
    Assignee: McAfee, Inc.
    Inventors: Khai N. Pham, Aditya Kapoor, Harinath V. Ramachetty, Rachit Mathur
  • Publication number: 20120198554
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware.
    Type: Application
    Filed: April 5, 2012
    Publication date: August 2, 2012
    Applicant: MCAFEE, INC.
    Inventors: Rachit Mathur, Cedric Cochin