Patents by Inventor Rajendra A. Gopalakrishna

Rajendra A. Gopalakrishna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10419479
    Abstract: Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the technique includes determine characteristics of a testing environment. A testing environment can be used to analyze malware programs. The technique can further include configuring a production network device with the characteristics, so that the production network device resembles the testing environment. The production network device is used for network operations, which excludes analyzing malware programs.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: September 17, 2019
    Assignee: Acalvio Technologies, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Patent number: 10395232
    Abstract: Methods for enabling secure online transactions using a mobile device are described. A mobile device may capture an image associated with a banking card in order to generate checkout information and to automatically populate checkout fields with the checkout information prior to completing an online transaction. In some cases, the mobile device may be used to select items to be purchased from an online merchant, access a checkout page of the online merchant for purchasing the selected items, acquire an image that encodes checkout information, acquire a personal code associated with an end user of the mobile device, generate the checkout information using the acquired image and the personal code, automatically populate one or more fields associated with the checkout page with the checkout information, delete the checkout information from the mobile device, and submit the checkout information to complete the purchase of the selected items.
    Type: Grant
    Filed: October 1, 2014
    Date of Patent: August 27, 2019
    Assignee: CA, Inc.
    Inventors: Rajendra Gopalakrishna, Tarun Agrawal, Roshini Thyagaraj
  • Patent number: 10348763
    Abstract: Provided are methods, network devices, and computer-program products for dynamically configuring a deception mechanism in response to network traffic from a possible network threat. In various implementations, a network deception system can receive a packet from a network. The network deception system can determine an intent associated with the packet by examining the contents of the packet. The network deception system can further configure a deception mechanism to respond to the intent, for example with the appropriate network communications, software or hardware configuration, and/or data.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: July 9, 2019
    Assignee: Acalvio Technologies, Inc.
    Inventors: Rajendra A. Gopalakrishna, Johnson Wu, Sreenivas Gukal, Rammohan Varadarajan
  • Publication number: 20190199748
    Abstract: Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the technique includes determine characteristics of a testing environment. A testing environment can be used to analyze malware programs. The technique can further include configuring a production network device with the characteristics, so that the production network device resembles the testing environment. The production network device is used for network operations, which excludes analyzing malware programs.
    Type: Application
    Filed: March 5, 2019
    Publication date: June 27, 2019
    Applicant: Acalvio Technologies, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Patent number: 10218741
    Abstract: Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the cyber-vaccination technique includes using a network device that is infected by a malware program to determining a marker generated by the malware program. The marker may indicate to the malware program that the network device has been infected by the malware program. Determining the marker can include identifying a placement of the marker on the network device. The technique further includes identifying one or more other network devices that have not previously been infected by the malware program. The technique further includes automatically distributing copies of the marker. When a copy of the marker is received at one of the previously identified, uninfected network devices, the identified network device can place the marker on the identified network device according to the identified placement.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: February 26, 2019
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventor: Rajendra A. Gopalakrishna
  • Patent number: 10104120
    Abstract: Provided are systems, methods, and computer program products for a cyber-antibody technique. In various implementations, the technique includes monitoring, by a network device infected with an unknown malware program, packets set by the network device onto a network. The technique further includes identifying a packet that is associated with the unknown malware program. The packet can be identified from among the monitored packets. Identifying the packet can include determining a characteristic of the packet. The technique further includes identifying packets that have a characteristic similar to the characteristic of the packet. The technique can further include inserting data associated with a known malware program into the identified packets. The technique can further include distributing the characteristic to other network devices, to similarly taint packets that may be issued from those other network devices.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: October 16, 2018
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventor: Rajendra A. Gopalakrishna
  • Patent number: 10033762
    Abstract: Provided are methods, network devices, and computer-program products for a network deception system. The network deception system can engage a network threat with a deception mechanism, and dynamically escalating the deception to maintain the engagement. The system can include super-low, low, and high-interaction deceptions. The super-low deceptions can respond to requests for address information, and requires few computing resources. When network traffic directed to the super-low deception requires a more complex response, the system can initiate a low-interaction deception. The low-interaction deception can emulate multiple devices, which can give the low-interaction deception away as a deception. Hence, when the network traffic includes an attempted connection, the system can initiate a high-interaction deception. The high-interaction more closely emulates a network device, and can be more difficult to identify as a deception.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: July 24, 2018
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Johnson Wu, Rajendra A. Gopalakrishna, Sreenivas Gukal, Rammohan Varadarajan
  • Publication number: 20180198801
    Abstract: Provided are systems, methods, and computer program products for a cyber-antibody technique. In various implementations, the technique includes monitoring, by a network device infected with an unknown malware program, packets set by the network device onto a network. The technique further includes identifying a packet that is associated with the unknown malware program. The packet can be identified from among the monitored packets. Identifying the packet can include determining a characteristic of the packet. The technique further includes identifying packets that have a characteristic similar to the characteristic of the packet. The technique can further include inserting data associated with a known malware program into the identified packets. The technique can further include distributing the characteristic to other network devices, to similarly taint packets that may be issued from those other network devices.
    Type: Application
    Filed: March 23, 2017
    Publication date: July 12, 2018
    Applicant: Acalvio Technologies, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Publication number: 20180198821
    Abstract: Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the cyber-vaccination technique includes using a network device that is infected by a malware program to determining a marker generated by the malware program. The marker may indicate to the malware program that the network device has been infected by the malware program. Determining the marker can include identifying a placement of the marker on the network device. The technique further includes identifying one or more other network devices that have not previously been infected by the malware program. The technique further includes automatically distributing copies of the marker. When a copy of the marker is received at one of the previously identified, uninfected network devices, the identified network device can place the marker on the identified network device according to the identified placement.
    Type: Application
    Filed: March 23, 2017
    Publication date: July 12, 2018
    Applicant: Acalvio Technologies, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Publication number: 20180198806
    Abstract: Provided are systems, methods, and computer program products for a cyber-vaccination technique. In various implementations, the technique includes determine characteristics of a testing environment. A testing environment can be used to analyze malware programs. The technique can further include configuring a production network device with the characteristics, so that the production network device resembles the testing environment. The production network device is used for network operations, which excludes analyzing malware programs.
    Type: Application
    Filed: March 23, 2017
    Publication date: July 12, 2018
    Applicant: Acalvio Technologies, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Patent number: 9961099
    Abstract: This disclosure is related to using network flow information of a network to determine the trajectory of an attack. In some examples, an adjacency data structure is generated for a network. The adjacency data structure can include a machine of the network that has interacted with another machine of the network. The network can further include one or more deception mechanisms. The deception mechanisms can indicate that an attack is occurring when a machine interacts with one of the deception mechanisms. When the attack is occurring, attack trajectory information can be generated by locating in the adjacency data structure the machine that interacted with the deception mechanism. The attack trajectory information can correlate the information from the interaction with the deception mechanism, the interaction information of the network, and machine information for each machine to determine a possible trajectory of an adversary.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: May 1, 2018
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Satnam Singh, Mohammad Waseem, Suril Desai, Venkata Babji Sama, Rajendra Gopalakrishna
  • Patent number: 9853999
    Abstract: Methods, systems, and computer-readable mediums are described herein to provide context-aware knowledge systems and methods for deploying deception mechanisms. In some examples, a deception profiler can be used to intelligently deploy the deception mechanisms for a network. For example, a method can include identifying a network for which to deploy one or more deception mechanisms. In such an example, a deception mechanism can emulate one or more characteristics of a machine on the network. The method can further include determining one or more asset densities and a summary statistic. An asset density can be associated with a number of assets connected to the network. The summary statistic can be associated with a number of historical attacks on the network.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: December 26, 2017
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Satnam Singh, Nirmesh Neema, Suril Desai, Venkata Babji Sama, Rajendra Gopalakrishna
  • Patent number: 9836512
    Abstract: Systems and methods for identifying potentially compromised devices using attributes of a known compromised device may be provided. In one embodiment, an attribute set can be constructed for the compromised hosts using data from these logs. Weights can be assigned to each attribute in the attribute set initially, and further weights can be learned using audits by a user. This attribute set can be used in the disclosed systems and methods for identifying hosts that are similar to compromised hosts. The similar items can be used as hosts for deception mechanisms, can be taken off the network as being likely compromised or likely to become compromised, or quarantined.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: December 5, 2017
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Satnam Singh, Santosh Kosgi, Rajendra Gopalakrishna
  • Publication number: 20170329783
    Abstract: Systems and methods for identifying potentially compromised devices using attributes of a known compromised device may be provided. In one embodiment, an attribute set can be constructed for the compromised hosts using data from these logs. Weights can be assigned to each attribute in the attribute set initially, and further weights can be learned using audits by a user. This attribute set can be used in the disclosed systems and methods for identifying hosts that are similar to compromised hosts. The similar items can be used as hosts for deception mechanisms, can be taken off the network as being likely compromised or likely to become compromised, or quarantined.
    Type: Application
    Filed: February 23, 2017
    Publication date: November 16, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Satnam Singh, Santosh Kosgi, Rajendra Gopalakrishna
  • Publication number: 20170318053
    Abstract: Methods, systems, and computer-readable mediums are described herein to provide context-aware knowledge systems and methods for deploying deception mechanisms. In some examples, a deception profiler can be used to intelligently deploy the deception mechanisms for a network. For example, a method can include identifying a network for which to deploy one or more deception mechanisms. In such an example, a deception mechanism can emulate one or more characteristics of a machine on the network. The method can further include determining one or more asset densities and a summary statistic. An asset density can be associated with a number of assets connected to the network. The summary statistic can be associated with a number of historical attacks on the network.
    Type: Application
    Filed: February 3, 2017
    Publication date: November 2, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Satnam Singh, Nirmesh Neema, Suril Desai, Venkata Babji Sama, Rajendra Gopalakrishna
  • Publication number: 20170310704
    Abstract: Provided are methods, network devices, and computer-program products for a network deception system. The network deception system can engage a network threat with a deception mechanism, and dynamically escalating the deception to maintain the engagement. The system can include super-low, low, and high-interaction deceptions. The super-low deceptions can respond to requests for address information, and requires few computing resources. When network traffic directed to the super-low deception requires a more complex response, the system can initiate a low-interaction deception. The low-interaction deception can emulate multiple devices, which can give the low-interaction deception away as a deception. Hence, when the network traffic includes an attempted connection, the system can initiate a high-interaction deception. The high-interaction more closely emulates a network device, and can be more difficult to identify as a deception.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 26, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Johnson Wu, Rajendra A. Gopalakrishna, Sreenivas Gukal, Rammohan Varadarajan
  • Publication number: 20170310705
    Abstract: Provided are methods, network devices, and computer-program products for dynamically configuring a deception mechanism in response to network traffic from a possible network threat. In various implementations, a network deception system can receive a packet from a network. The network deception system can determine an intent associated with the packet by examining the contents of the packet. The network deception system can further configure a deception mechanism to respond to the intent, for example with the appropriate network communications, software or hardware configuration, and/or data.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 26, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Rajendra A. Gopalakrishna, Johnson Wu, Sreenivas Gukal, Rammohan Varadarajan
  • Publication number: 20170302691
    Abstract: This disclosure is related to using network flow information of a network to determine the trajectory of an attack. In some examples, an adjacency data structure is generated for a network. The adjacency data structure can include a machine of the network that has interacted with another machine of the network. The network can further include one or more deception mechanisms. The deception mechanisms can indicate that an attack is occurring when a machine interacts with one of the deception mechanisms. When the attack is occurring, attack trajectory information can be generated by locating in the adjacency data structure the machine that interacted with the deception mechanism. The attack trajectory information can correlate the information from the interaction with the deception mechanism, the interaction information of the network, and machine information for each machine to determine a possible trajectory of an adversary.
    Type: Application
    Filed: February 7, 2017
    Publication date: October 19, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Satnam Singh, Mohammad Waseem, Suril Desai, Venkata Babji Sama, Rajendra Gopalakrishna
  • Publication number: 20170264639
    Abstract: Provided are methods, including computer-implemented methods or methods implemented by a network device, devices including network devices, and computer-program products for an active deception system. The active deception system can separate execution of services from deception mechanisms on a network. In particular, the active deception system can include a sensor on the network. The sensor can establish a two-way connection with a remote server executing the services. The sensor can receive communications from client devices and forward the communications to the remote server. While this forward can happen, the client devices might not be aware of the forward. In fact, the client device might only be aware that the sensor receives a communication and responds to the communication.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 14, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Venkata Babji Sama, Rajendra Gopalakrishna
  • Patent number: 9756075
    Abstract: Provided are methods, devices, and computer-program products for hiding one or more deception mechanisms. In some examples, the one or more deception mechanisms can be hidden from network scans. In other examples, the one or more deception mechanisms can be hidden to convince attackers that there are no deception mechanisms. In some implementations, a device, computer-program product, and method for hiding a deception mechanism is provided. For example, a method can include identifying a deception mechanism executing on a computing device. The deception mechanism can be associated with address information. In some examples, the address information can include an Internet Protocol (IP) address and a Media Access Control (MAC) address. The method can further include determining that the deception mechanism is being projected on a site network. The method can further include determining to hide a deception mechanism and hiding the deception mechanism.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: September 5, 2017
    Assignee: Acalvio Technologies, Inc.
    Inventors: Rajendra Gopalakrishna, Suril Desai, VenkataBabji Sama, Srinivasan Narasimhan