Patents by Inventor Sharada Sundaram
Sharada Sundaram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11677846Abstract: A tracking system is provided that tracks user browsing activity while maintaining user privacy. It is determined whether a cookie is stored in local storage of a client device. If the cookie is not stored: a tracking identification (ID) is generated; the tracking ID, a cookie rotation timestamp, and a failed request counter in a generated cookie is stored; and the generated cookie is copied and attached to a transmitted event. If the cookie is stored: it is determined whether a time indicated by a stored cookie rotation timestamp is in the past; if the time is in the past, a flag requesting a new cookie value is set for a transmitted event; and if the time is not in the past, the stored cookie is copied and attached to a transmitted event.Type: GrantFiled: July 31, 2019Date of Patent: June 13, 2023Assignee: Snap Inc.Inventors: Winston Howes, Sharada Sundaram, Marcel M. Yung, Bennet Yee
-
Patent number: 10140370Abstract: A computer-implemented method for maintaining encrypted search indexes on third party storage systems may include (1) identifying a plurality of encrypted files, (2) identifying a plurality of keywords contained in the plurality of encrypted files, and (3) generating an encrypted search index for searching the plurality of encrypted files by (i) identifying, for each keyword in the plurality of keywords, a list of encrypted files in the plurality of encrypted files that contain the keyword, (ii) encrypting the list of encrypted files, and (iii) storing the encrypted list of encrypted files such that the encrypted list of encrypted files can be identified using a lookup key generated by applying a pseudo-random function to the keyword. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 18, 2017Date of Patent: November 27, 2018Assignee: Veritas Technologies LLCInventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
-
Patent number: 9825986Abstract: The disclosed computer-implemented method for generating contextually meaningful animated visualizations of computer security events may include (1) detecting a security-related event that involves an actor and a target within a computing environment, (2) identifying certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment, (3) generating, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that graphically represents the context of the security-related event with respect to the actor and the target within the computing environment, and then (4) providing, for presentation to a user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target.Type: GrantFiled: June 29, 2015Date of Patent: November 21, 2017Assignee: Symantec CorporationInventors: Sandeep Bhatkar, Sharada Sundaram, Kevin Roundy, David Silva
-
Patent number: 9679160Abstract: A computer-implemented method for maintaining encrypted search indexes on third-party storage systems may include (1) identifying a plurality of encrypted files, (2) identifying a plurality of keywords contained in the plurality of encrypted files, and (3) generating an encrypted search index for searching the plurality of encrypted files by (i) identifying, for each keyword in the plurality of keywords, a list of encrypted files in the plurality of encrypted files that contain the keyword, (ii) encrypting the list of encrypted files, and (iii) storing the encrypted list of encrypted files such that the encrypted list of encrypted files can be identified using a lookup key generated by applying a pseudo-random function to the keyword. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 6, 2014Date of Patent: June 13, 2017Assignee: Symantec CorporationInventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
-
Patent number: 9628471Abstract: A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.Type: GrantFiled: June 1, 2015Date of Patent: April 18, 2017Assignee: Symantec CorporationInventors: Sharada Sundaram, Robert Koeten
-
Patent number: 9571479Abstract: A server computer system within a network of an organization receives a request from a user to access a cloud account. The request includes a user identifier. The server computer system authenticates the user for access to the cloud account based on the user identifier, identifies one or more predetermined roles associated with the cloud account for the user, and identifies one or more pseudo accounts associated with the cloud account. The server computer system further maps the user to the one or more pseudo accounts, and provides user access to the cloud account based on the mapping and with access privileges corresponding to the one or more pseudo accounts.Type: GrantFiled: March 31, 2014Date of Patent: February 14, 2017Assignee: Symantec CorporationInventors: Sharada Sundaram, Sanjay Sawhney, Robert Koeten
-
Patent number: 9342705Abstract: A computer-implemented method for searching shared encrypted files on third-party storage systems may include (1) receiving, at a server-side computing system, a request from a user to search at least one encrypted file to which a group of users that includes the user shares access, (2) identifying, in response to the request, at least one encrypted search index compiled for and shared by the group of users that enables the encrypted file to be searched, (3) decrypting the encrypted search index with a key with which each user within the group of users has access, and (4) using the decrypted search index to respond to the request from the user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 6, 2014Date of Patent: May 17, 2016Assignee: Symantec CorporationInventors: Scott Schneider, Walter Bogorad, Haibin Zhang, Sharada Sundaram
-
Patent number: 9305007Abstract: A first computer system identifies deduplication metadata for files. The deduplication metadata includes block level information for the files. The first computer system determines relationships that are associated with the files based on the block level information and sends relationship data that describes the relationships that are associated with the files to a second computer system via a network.Type: GrantFiled: February 8, 2013Date of Patent: April 5, 2016Assignee: Symantec CorporationInventors: Petros Efstathopoulos, Sharada Sundaram
-
Patent number: 9298808Abstract: Techniques are disclosed for using a false positive-prone data structure to store normalization data for use in an encrypted search context. A file host server in a cloud provider network may provide search functionality for a user's encrypted data by use of a search index. In updating the search index, the server consolidates common identities of the user on different web services (e.g., an e-mail service or a social media service) into a normalized identifier. These normalization values are stored in the false positive-prone data structure (e.g., a colliding hash table, a Bloomier filter, etc.). Consequently, the data structure may return false positives after a search operation. The server may filter out these false positives before returning search results.Type: GrantFiled: May 24, 2013Date of Patent: March 29, 2016Assignee: SYMANTEC CORPORATIONInventors: Sharada Sundaram, Scott Schneider
-
Patent number: 9258122Abstract: A computer-implemented method for securing data at third-party storage services may include (1) receiving, at a server-side computing system, a request to provide a user with access to a file that is encrypted, (2) determining, in response to the request, whether a transitory symmetric key of the user is available to encrypt a decryption key with which the file may be decrypted, (3) encrypting the decryption key with the transitory symmetric key of the user if the transitory symmetric key of the user is available or encrypting the decryption key with the public key of an asymmetric key pair designated for the user if the transitory symmetric key of the user is unavailable, and (4) storing the encrypted decryption key. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 6, 2014Date of Patent: February 9, 2016Assignee: Symantec CorporationInventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
-
Patent number: 9104858Abstract: A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.Type: GrantFiled: May 3, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Sharada Sundaram, Robert Koeten
-
Patent number: 8931061Abstract: Techniques for providing access to data in dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic shared accounts. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a first user associated with an account, identify a second user to have access to the account associated with the first user in the event the first user is unavailable to access data or perform functions associated with the account, map the second user to the account, and provide the second user access to the account based on the mapping and with access privileges associated with the first user.Type: GrantFiled: March 19, 2012Date of Patent: January 6, 2015Assignee: Symantec CorporationInventors: Sharada Sundaram, Robert Koeten
-
Publication number: 20140351260Abstract: Techniques are disclosed for using a false positive-prone data structure to store normalization data for use in an encrypted search context. A file host server in a cloud provider network may provide search functionality for a user's encrypted data by use of a search index. In updating the search index, the server consolidates common identities of the user on different web services (e.g., an e-mail service or a social media service) into a normalized identifier. These normalization values are stored in the false positive-prone data structure (e.g., a colliding hash table, a Bloomier filter, etc.). Consequently, the data structure may return false positives after a search operation. The server may filter out these false positives before returning search results.Type: ApplicationFiled: May 24, 2013Publication date: November 27, 2014Inventors: Sharada SUNDARAM, Scott SCHNEIDER
-
Patent number: 8874528Abstract: A computer-implemented method for detecting cloud-based data leaks may include (1) identifying a relational database stored on a third-party storage service, the relational database including a plurality of tuples related by an attribute designated for storing contact information, (2) adding at least one deceptive tuple representing an illegitimate contact and including known false contact information stored under the attribute to the relational database, (3) maintaining a data repository identifying the deceptive tuple as containing false contact information, (4) identifying a contact attempt performed by an attempted use of the known false contact information, and then, in response to identifying the contact attempt, and (5) determining, based on the data repository identifying the deceptive tuple as containing false contact information, that an originator of the contact attempt is implicated in a data leak. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 8, 2011Date of Patent: October 28, 2014Assignee: Symantec CorporationInventors: Deb Banerjee, Sanjay Sawhney, Sharada Sundaram
-
Patent number: 8869244Abstract: Techniques for providing role-based access control using dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system and method for providing role-based access using dynamic shared accounts. For example, the system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to: receive a request for access to an account, wherein the request comprises an identifier associated with a user; authenticate the user for access to the account; identify one or more predetermined roles associated with the account for the user; identify one or more pseudo accounts corresponding to the one or more predetermined roles; map the user to the one or more pseudo accounts; and provide user access to the account based on the mapping and with access privileges associated with the one or more predetermined roles associated with the user.Type: GrantFiled: December 29, 2011Date of Patent: October 21, 2014Assignee: Symantec CorporationInventors: Sharada Sundaram, Sanjay Sawhney, Robert Koeten
-
Patent number: 8762512Abstract: A computing system identifies shared cloud accounts of a cloud that are created for an entity. The computing system resides outside of the cloud. The number of shared cloud accounts is less than a number of entity users that use the cloud. The computing system determines that one of the users is authorized to use any of the shared cloud accounts in response to a determination that identity information of the user is valid. The computing system receives a request from the user to access the cloud and determines whether one of the shared cloud accounts is available to be assigned to the user. The computing system adds the request to a queue based on a determination that none of the shared cloud accounts is available and assigns one of the cloud accounts to the user based on a determination that one of the shared cloud accounts is available.Type: GrantFiled: May 3, 2012Date of Patent: June 24, 2014Assignee: Symantec CorporationInventors: Sharada Sundaram, Sanjay Sawhney, Robert Koeten
-
Patent number: 8631498Abstract: Techniques for identifying potential malware domain names are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for identifying potential malware domain names. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to receive a request for network data, where the request for network data may comprise a domain name. The one or more processors may also be configured to apply a lexical and linguistic analysis to the domain name. The one or more processors may also be configured to identify whether the domain name is a potential malware domain name based on the lexical and linguistic analysis.Type: GrantFiled: December 23, 2011Date of Patent: January 14, 2014Assignee: Symantec CorporationInventors: Michael Andrew Hart, Jeffrey Scott Wilhelm, Sharada Sundaram
-
Publication number: 20120284776Abstract: Techniques for providing access to data in dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic shared accounts. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a first user associated with an account, identify a second user to have access to the account associated with the first user in the event the first user is unavailable to access data or perform functions associated with the account, map the second user to the account, and provide the second user access to the account based on the mapping and with access privileges associated with the first user.Type: ApplicationFiled: March 19, 2012Publication date: November 8, 2012Applicant: Symantec CorporationInventors: Sharada Sundaram, Robert Koeten
-
Publication number: 20120143778Abstract: The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance systems. The present invention supports compliance by using formalized portions of applicable laws to regulate business processes that use information systems. An embodiment of the present invention uses a stratified fragment of Prolog with limited use of negation to formalize a portion of the US Health Insurance Portability and Accountability Act (HIPAA). An embodiment of the invention provides for deployment in a prototypical hospital that implements a Web portal messaging system.Type: ApplicationFiled: August 27, 2011Publication date: June 7, 2012Applicant: The Board of Trustees of the Leland Stanford, Junior, UniversityInventors: Sharada Sundaram, Peifung E. Lam, John C. Mitchell