Patents by Inventor Rosen Sharma
Rosen Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220286456Abstract: The present invention relates to cross-device authentication technologies. In particular, the present invention relates to methods, systems and computer program products for enabling cross-device authentication, including for implementation within cloud based service systems, and even more particularly for implementation within cloud gaming systems.Type: ApplicationFiled: March 4, 2022Publication date: September 8, 2022Inventor: Rosen Sharma
-
Patent number: 8762928Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: GrantFiled: November 15, 2010Date of Patent: June 24, 2014Assignee: McAfee, Inc.Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Patent number: 8561082Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: GrantFiled: October 13, 2010Date of Patent: October 15, 2013Assignee: McAfee, Inc.Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Patent number: 8549546Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: GrantFiled: November 15, 2010Date of Patent: October 1, 2013Assignee: McAfee, Inc.Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Patent number: 8544003Abstract: A method in one example implementation includes receiving a plurality of command messages through a control channel and reconstructing the command messages to determine an intended command for one or more virtual machines on a server device. The command messages include one or more criteria and the intended command corresponds to an operation defined in a policy database. The method also includes determining whether the corresponding operation is permitted by comparing one or more policies associated with the operation to the one or more criteria. The method further includes sending the command messages to the server device if the operation is permitted. In more specific embodiments, the operation may include one of creating, cloning, deleting, starting, stopping, and modifying the one or more virtual machines.Type: GrantFiled: December 11, 2009Date of Patent: September 24, 2013Assignee: McAfee, Inc.Inventors: Harvinder Singh Sawhney, Suman Saraf, Rosen Sharma
-
Publication number: 20130246517Abstract: Method and system for containing networked application client software in order to perform specified transactions only given explicit consent of a legitimate user. In one embodiment, a confirmation interceptor intercepts a service request message, queries the user of the request for a confirmation, and then either passes the service request message onto server application software or drops the request, depending on the user's confirmation response. In soliciting and processing the confirmation response, query is formulated so that the required response cannot be automatically generated by software that attempts to automate and simulate the user's actions.Type: ApplicationFiled: August 29, 2003Publication date: September 19, 2013Applicant: SolidCore Systems, Inc.Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Publication number: 20130246044Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: ApplicationFiled: October 13, 2010Publication date: September 19, 2013Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Publication number: 20130247016Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: ApplicationFiled: November 15, 2010Publication date: September 19, 2013Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Publication number: 20130247033Abstract: A method in one example implementation includes receiving a plurality of command messages through a control channel and reconstructing the command messages to determine an intended command for one or more virtual machines on a server device. The command messages include one or more criteria and the intended command corresponds to an operation defined in a policy database. The method also includes determining whether the corresponding operation is permitted by comparing one or more policies associated with the operation to the one or more criteria. The method further includes sending the command messages to the server device if the operation is permitted. In more specific embodiments, the operation may include one of creating, cloning, deleting, starting, stopping, and modifying the one or more virtual machines.Type: ApplicationFiled: December 11, 2009Publication date: September 19, 2013Inventors: Harvinder Singh Sawhney, Suman Saraf, Rosen Sharma
-
Patent number: 8539063Abstract: Method and system for containing networked application client software in order to perform specified transactions only given explicit consent of a legitimate user. In one embodiment, a confirmation interceptor intercepts a service request message, queries the user of the request for a confirmation, and then either passes the service request message onto server application software or drops the request, depending on the user's confirmation response. In soliciting and processing the confirmation response, query is formulated so that the required response cannot be automatically generated by software that attempts to automate and simulate the user's actions.Type: GrantFiled: August 29, 2003Date of Patent: September 17, 2013Assignee: McAfee, Inc.Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Patent number: 8195931Abstract: A change management system for and method of change management control, monitoring, and analysis is disclosed. A change management system comprises a means for generating configuration item change information, and a means for processing configuration item change information for logical system groups according to an information structure. The information structure for the logical groups is comprised at least one of change rule information for the configuration items, interrelationship information between the configuration items and the system components, interrelationship information between system components. The method can be used as a monitoring tool for determining the effect of configuration changes.Type: GrantFiled: October 29, 2008Date of Patent: June 5, 2012Assignee: McAfee, Inc.Inventors: Rosen Sharma, Rishi Bhargava, Chiradeep Vittal, Shyam Eranky
-
Patent number: 7987230Abstract: Invention selectively enables usage of services and communication conduits in a computer network, wherein the enablement is contingent on usage conditions, resulting in containment of the spread of unauthorized activity within a networked computer system and limiting the scope of results when an element becomes part of a hostile execution environment. Instead of protecting individual networked elements from a potentially hostile execution environment, the elements' usage of the networked environment is restricted to the extent of selectively allowing usage of needed resources explicitly authorized for use by such elements.Type: GrantFiled: July 20, 2010Date of Patent: July 26, 2011Assignee: McAfee, Inc.Inventors: E. John Sebes, Bakul Shah, Rosen Sharma
-
Publication number: 20110077948Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: ApplicationFiled: November 15, 2010Publication date: March 31, 2011Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Patent number: 7840968Abstract: Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface.Type: GrantFiled: December 17, 2003Date of Patent: November 23, 2010Assignee: McAfee, Inc.Inventors: Rosen Sharma, Bakul Shah, E. John Sebes
-
Publication number: 20100293225Abstract: Invention selectively enables usage of services and communication conduits in a computer network, wherein the enablement is contingent on usage conditions, resulting in containment of the spread of unauthorized activity within a networked computer system and limiting the scope of results when an element becomes part of a hostile execution environment. Instead of protecting individual networked elements from a potentially hostile execution environment, the elements' usage of the networked environment is restricted to the extent of selectively allowing usage of needed resources explicitly authorized for use by such elements.Type: ApplicationFiled: July 20, 2010Publication date: November 18, 2010Inventors: E. John Sebes, Bakul Shah, Rosen Sharma
-
Patent number: 7783735Abstract: Invention selectively enables usage of services and communication conduits in a computer network, wherein the enablement is contingent on usage conditions, resulting in containment of the spread of unauthorized activity within a networked computer system and limiting the scope of results when an element becomes part of a hostile execution environment. Instead of protecting individual networked elements from a potentially hostile execution environment, the elements' usage of the networked environment is restricted to the extent of selectively allowing usage of needed resources explicitly authorized for use by such elements.Type: GrantFiled: March 22, 2004Date of Patent: August 24, 2010Assignee: McAfee, Inc.Inventors: E. John Sebes, Bakul Shah, Rosen Sharma
-
Patent number: RE42214Abstract: A method facilitates providing appropriate quality of service guarantees to a plurality of virtual hosts on a single physical host computer. A server application program and its child processes service communication requests made to the plurality of virtual hosts. Quality of service parameters associated with the virtual hosts are stored. Communication requests made to a specific one of the virtual hosts are detected. The quality of service parameters associated with the specific virtual host are obtained. Operating system resources are utilized to guarantee, to a child process of the server application program, a quality of service according to the obtained quality of service parameters associated with the virtual host. Communication between the virtual host and the client is allowed to proceed, the communication being managed by the child process.Type: GrantFiled: December 13, 2007Date of Patent: March 8, 2011Inventors: Pawan Goyal, Xun Wilson Huang, Srinivasan Keshav, Rosen Sharma
-
Patent number: RE42726Abstract: A system and a method dynamically adjusts the quality of service guarantees for virtual servers based upon the resource demands experienced by the virtual servers. Virtual server resource denials are monitored to determine if a virtual server is overloaded based upon the resource denials. Virtual server resources are modified dynamically to respond to the changing resource requirements of each virtual server. Occasionally, a physical host housing a virtual server may not have additional resources to allocate to a virtual server requiring increased resources. In this instance, a virtual server hosted by the overloaded physical host is transferred to another physical host with sufficient resources.Type: GrantFiled: January 9, 2008Date of Patent: September 20, 2011Assignee: Digital Asset Enterprises, L.L.C.Inventors: Srinivasan Keshav, Rosen Sharma, Shaw Chuang
-
Patent number: RE44686Abstract: A system and a method dynamically adjusts the quality of service guarantees for virtual servers based upon the resource demands experienced by the virtual servers. Virtual server resource denials are monitored to determine if a virtual server is overloaded based upon the resource denials. Virtual server resources are modified dynamically to respond to the changing resource requirements of each virtual server. Occasionally, a physical host housing a virtual server may not have additional resources to allocate to a virtual server requiring increased resources. In this instance, a virtual server hosted by the overloaded physical host is transferred to another physical host with sufficient resources.Type: GrantFiled: September 19, 2011Date of Patent: December 31, 2013Assignee: Digital Asset Enterprises, L.L.C.Inventors: Srinivasan Keshav, Rosen Sharma, Shaw Chuang
-
Patent number: RE44723Abstract: File access rates of processes are regulated according to file type. An association table stores entries associating processes to be regulated with specific access rates for various file types. System calls that access files are intercepted, and a system call wrapper executes. The system call wrapper determines the type of file that is being accessed by the process. The system call wrapper examines the association table in order to determine if the calling process is associated with an access rate for the file type being accessed. If so, the system call wrapper regulates access to the file according to the appropriate rate.Type: GrantFiled: June 14, 2007Date of Patent: January 21, 2014Assignee: Digital Asset Enterprises, L.L.C.Inventors: Srinivasan Keshav, Rosen Sharma