Patents by Inventor Rishi Bhargava
Rishi Bhargava has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8701182Abstract: A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems.Type: GrantFiled: July 25, 2012Date of Patent: April 15, 2014Assignee: McAfee, Inc.Inventors: Rishi Bhargava, Chiradeep Vittal, Swaroop Saveram
-
Publication number: 20140101783Abstract: A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system.Type: ApplicationFiled: October 3, 2013Publication date: April 10, 2014Inventors: Rishi Bhargava, E. John Sebes
-
Publication number: 20140006405Abstract: A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix.Type: ApplicationFiled: September 3, 2013Publication date: January 2, 2014Inventors: Rishi Bhargava, David P Reese, JR.
-
Patent number: 8555404Abstract: Techniques which allow definition and enforcement of connectivity-based action and execution authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The connectivity state of the computer, the subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the connectivity state indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.Type: GrantFiled: May 18, 2006Date of Patent: October 8, 2013Assignee: McAfee, Inc.Inventors: E. John Sebes, Rishi Bhargava, David P. Reese
-
Patent number: 8549003Abstract: A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix.Type: GrantFiled: September 12, 2010Date of Patent: October 1, 2013Assignee: McAfee, Inc.Inventors: Rishi Bhargava, David P. Reese, Jr.
-
Publication number: 20130247027Abstract: Techniques relating to the distribution and installation of solidified (or “frozen”) software on a computer are disclosed. Any additional software installed on the computer after the solidification process will not execute, regardless of whether the installation is initiated or otherwise performed by a person with administrative privilege. The installation of the solidified software can be carried out by installing pre-solidified software, by solidifying the software at the source code level and by solidifying the software by the compiler. The solidification can also be performed when software distributions are manufactured, for example on CDs, or as part of an installation procedure that can run and/or install differently each time. A business process for billing customers for the transfer or usage of solidified software is also disclosed.Type: ApplicationFiled: February 16, 2005Publication date: September 19, 2013Applicant: SolidCore Systems, Inc.Inventors: Bakul Shah, Rishi Bhargava, E. John Sebes
-
Publication number: 20130246423Abstract: A method in one embodiment includes determining a frequency range corresponding to a subset of a plurality of program files on a plurality of hosts in a network environment. The method also includes generating a first set of counts including a first count that represents an aggregate amount of program files in a first grouping of one or more program files of the subset, where each of the one or more program files of the first grouping includes a first value of a primary attribute. In specific embodiments, each program file is unknown. In further embodiments, the primary attribute is one of a plurality of file attributes provided in file metadata. Other specific embodiments include either blocking or allowing execution of each of the program files of the first grouping. More specific embodiments include determining a unique identifier corresponding to at least one program file of the first grouping.Type: ApplicationFiled: January 24, 2011Publication date: September 19, 2013Inventors: Rishi Bhargava, David P. Reese, JR.
-
Publication number: 20130247226Abstract: Techniques which allow definition and enforcement of connectivity-based action and execution authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The connectivity state of the computer, the subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the connectivity state indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.Type: ApplicationFiled: May 18, 2006Publication date: September 19, 2013Applicant: SolidCore Systems, Inc.Inventors: E. John Sebes, Rishi Bhargava, David P. Reese
-
Publication number: 20130246422Abstract: A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix.Type: ApplicationFiled: September 12, 2010Publication date: September 19, 2013Inventors: Rishi Bhargava, David P. Reese, JR.
-
Publication number: 20130246685Abstract: A method in one example implementation includes synchronizing a first memory page set with a second memory page set of a virtual guest machine, inspecting the first memory page set off-line, and detecting a threat in the first memory page set. The method further includes taking an action based on the threat. In more specific embodiments, the method includes updating the first memory page set with a subset of the second memory page set at an expiration of a synchronization interval, where the subset of the second memory page set was modified during the synchronization interval. In other more specific embodiments, the second memory page set of the virtual guest machine represents non-persistent memory of the virtual guest machine. In yet other specific embodiments, the action includes at least one of shutting down the virtual guest machine and alerting an administrator.Type: ApplicationFiled: September 9, 2011Publication date: September 19, 2013Inventors: Rishi Bhargava, David P. Reese, JR.
-
Publication number: 20130247032Abstract: A system for and method of system state analysis of a computational system. The method is comprised of capturing selective state information of a computational system configured to operated with one or more guest machines running on a virtual machine layer and configured to output state information. The state information is then analyzed to for compliance checking. The system for system state analysis is comprised of a storage system, computation hardware configured to run the guest machines and the virtual machine layer, guest machines, a virtual machine layer configured to output guest machine state information, a system state snapshot server configured to control the virtual machine layer for the capture of state information.Type: ApplicationFiled: November 7, 2008Publication date: September 19, 2013Inventors: Rishi Bhargava, David P. Reese, JR.
-
Publication number: 20130024934Abstract: A method and system for the classification of software in networked systems, includes: determining a software received by a sensor is attempting to execute on a computer system of the sensor; classifying the software as authorized or unauthorized to execute, and gathering information on the software by the sensor if the software is classified as unauthorized to execute. The sensor sends the information on the software to one or more actuators, which determine whether or not to act on one or more targets based on the information. If so, then the actuator sends a directive to the target(s). The target(s) updates its responses according to the directive. The classification of the software is definitive and is not based on heuristics or rules or policies and without any need to rely on any a priori information about the software.Type: ApplicationFiled: September 28, 2012Publication date: January 24, 2013Inventors: E. John Sebes, Rishi Bhargava
-
Patent number: 8332929Abstract: A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems.Type: GrantFiled: January 9, 2008Date of Patent: December 11, 2012Assignee: McAfee, Inc.Inventors: Rishi Bhargava, Chiradeep Vittal, Swaroop Sayeram
-
Patent number: 8321932Abstract: Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the program file indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.Type: GrantFiled: December 22, 2010Date of Patent: November 27, 2012Assignee: McAfee, Inc.Inventors: Rishi Bhargava, E. John Sebes
-
Publication number: 20120297176Abstract: A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems.Type: ApplicationFiled: July 25, 2012Publication date: November 22, 2012Inventors: Rishi Bhargava, Chiradeep Vittal, Swaroop Sayeram
-
Publication number: 20120290827Abstract: A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems.Type: ApplicationFiled: July 25, 2012Publication date: November 15, 2012Inventors: Rishi Bhargava, Chiradeep Vittal, Swaroop Sayeram
-
Publication number: 20120290828Abstract: A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems.Type: ApplicationFiled: July 25, 2012Publication date: November 15, 2012Inventors: Rishi Bhargava, Chiradeep Vittal, Swaroop Sayeram
-
Patent number: 8307437Abstract: A method and system for the classification of software in networked systems, includes: determining a software received by a sensor is attempting to execute on a computer system of the sensor; classifying the software as authorized or unauthorized to execute, and gathering information on the software by the sensor if the software is classified as unauthorized to execute. The sensor sends the information on the software to one or more actuators, which determine whether or not to act on one or more targets based on the information. If so, then the actuator sends a directive to the target(s). The target(s) updates its responses according to the directive. The classification of the software is definitive and is not based on heuristics or rules or policies and without any need to rely on any a priori information about the software.Type: GrantFiled: November 11, 2010Date of Patent: November 6, 2012Assignee: McAfee, Inc.Inventors: E. John Sebes, Rishi Bhargava
-
Patent number: 8195931Abstract: A change management system for and method of change management control, monitoring, and analysis is disclosed. A change management system comprises a means for generating configuration item change information, and a means for processing configuration item change information for logical system groups according to an information structure. The information structure for the logical groups is comprised at least one of change rule information for the configuration items, interrelationship information between the configuration items and the system components, interrelationship information between system components. The method can be used as a monitoring tool for determining the effect of configuration changes.Type: GrantFiled: October 29, 2008Date of Patent: June 5, 2012Assignee: McAfee, Inc.Inventors: Rosen Sharma, Rishi Bhargava, Chiradeep Vittal, Shyam Eranky
-
Publication number: 20120030731Abstract: A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status.Type: ApplicationFiled: July 28, 2010Publication date: February 2, 2012Inventors: Rishi Bhargava, David P. Reese, JR.