Patents by Inventor Rajbir Bhattacharjee

Rajbir Bhattacharjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10909236
    Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: February 2, 2021
    Assignee: McAfee, LLC
    Inventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
  • Publication number: 20190278908
    Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.
    Type: Application
    Filed: May 24, 2019
    Publication date: September 12, 2019
    Applicant: McAfee, LLC
    Inventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
  • Patent number: 10339303
    Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: July 2, 2019
    Assignee: McAfee, LLC
    Inventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
  • Patent number: 10097561
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Grant
    Filed: January 11, 2018
    Date of Patent: October 9, 2018
    Assignee: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20180139211
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: January 11, 2018
    Publication date: May 17, 2018
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Patent number: 9894079
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: February 13, 2018
    Assignee: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20160381037
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: April 25, 2016
    Publication date: December 29, 2016
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20160371484
    Abstract: Particular embodiments described herein provide for an electronic device that includes a binder kernel driver. The binder kernel driver can be configured to receive an application program interface (API) call, extract metadata from the API call, determine that the API call should be hooked based on the extracted metadata, and hook the API call.
    Type: Application
    Filed: January 22, 2015
    Publication date: December 22, 2016
    Inventors: Kunal Mehta, Balbir Singh, Rajbir Bhattacharjee
  • Patent number: 9326134
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: April 26, 2016
    Assignee: McAfee Inc.
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20150237011
    Abstract: A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.
    Type: Application
    Filed: May 4, 2015
    Publication date: August 20, 2015
    Inventors: Rajbir Bhattacharjee, Balbir Singh
  • Patent number: 9043918
    Abstract: A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: May 26, 2015
    Assignee: McAfee, Inc.
    Inventors: Rajbir Bhattacharjee, Balbir Singh
  • Publication number: 20140194094
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Application
    Filed: October 18, 2013
    Publication date: July 10, 2014
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Patent number: 8694738
    Abstract: A system and method in one embodiment includes modules for detecting an access attempt to a critical address space (CAS) of a guest operating system (OS) that has implemented address space layout randomization in a hypervisor environment, identifying a process attempting the access, and taking an action if the process is not permitted to access the CAS. The action can be selected from: reporting the access to a management console of the hypervisor, providing a recommendation to the guest OS, and automatically taking an action within the guest OS. Other embodiments include identifying a machine address corresponding to the CAS by forcing a page fault in the guest OS, resolving a guest physical address from a guest virtual address corresponding to the CAS, and mapping the machine address to the guest physical address.
    Type: Grant
    Filed: October 11, 2011
    Date of Patent: April 8, 2014
    Assignee: McAfee, Inc.
    Inventors: Rajbir Bhattacharjee, Nitin Munjal, Balbir Singh, Pankaj Singh
  • Publication number: 20130097652
    Abstract: A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.
    Type: Application
    Filed: October 13, 2011
    Publication date: April 18, 2013
    Inventors: Rajbir Bhattacharjee, Balbir Singh
  • Publication number: 20130097203
    Abstract: A system and method in one embodiment includes modules for detecting a request by an application in a mobile device to access a privileged resource, determining a cumulative usage of the privileged resource by the application, and performing an action according to a rule if a predefined threshold level of usage triggers the action based on the cumulative usage. More specific embodiments include blocking the request, and sending a notification to a user and updating a rules database to modify the predefined threshold level of usage associated with the rule. Other embodiments include monitoring permissions of the application to the privileged resource, and removing any permissions that have not been used for a predefined time period, logging the request into a log in a utilization database, reading the log, collating information in the log, and analyzing the log.
    Type: Application
    Filed: October 12, 2011
    Publication date: April 18, 2013
    Inventors: Rajbir Bhattacharjee, Balbir Singh
  • Publication number: 20130091318
    Abstract: A system and method in one embodiment includes modules for detecting an access attempt to a critical address space (CAS) of a guest operating system (OS) that has implemented address space layout randomization in a hypervisor environment, identifying a process attempting the access, and taking an action if the process is not permitted to access the CAS. The action can be selected from: reporting the access to a management console of the hypervisor, providing a recommendation to the guest OS, and automatically taking an action within the guest OS. Other embodiments include identifying a machine address corresponding to the CAS by forcing a page fault in the guest OS, resolving a guest physical address from a guest virtual address corresponding to the CAS, and mapping the machine address to the guest physical address.
    Type: Application
    Filed: October 11, 2011
    Publication date: April 11, 2013
    Inventors: Rajbir Bhattacharjee, Nitin Munjal, Balbir Singh, Pankaj Singh
  • Publication number: 20120151267
    Abstract: A method is provided for implementing multiple watchpoints or a watchpoint that is greater than one word in length. The method comprises a debugger receiving a watchpoint from a user, wherein the watchpoint identifies a portion of memory to be watched. The debugger then sends a read trap or write trap flag, for example READ_TRAP or WRITE_TRAP, to a memory protection module of an operating system identifying the portion of memory to be watched. A read or write operation is allowed on the watched portion of memory, but, after completion of the read or write operation, an exception signal is sent that indicates that the read or write operation occurred on the watched portion of memory. The debugger then provides output to a user regarding the exception.
    Type: Application
    Filed: December 9, 2010
    Publication date: June 14, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rajbir Bhattacharjee, Rajeev Mishra, Avanish K. Ojha, Muthulakshmi P. Srinivasan