Patents by Inventor Sharada Sundaram

Sharada Sundaram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11677846
    Abstract: A tracking system is provided that tracks user browsing activity while maintaining user privacy. It is determined whether a cookie is stored in local storage of a client device. If the cookie is not stored: a tracking identification (ID) is generated; the tracking ID, a cookie rotation timestamp, and a failed request counter in a generated cookie is stored; and the generated cookie is copied and attached to a transmitted event. If the cookie is stored: it is determined whether a time indicated by a stored cookie rotation timestamp is in the past; if the time is in the past, a flag requesting a new cookie value is set for a transmitted event; and if the time is not in the past, the stored cookie is copied and attached to a transmitted event.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: June 13, 2023
    Assignee: Snap Inc.
    Inventors: Winston Howes, Sharada Sundaram, Marcel M. Yung, Bennet Yee
  • Patent number: 10140370
    Abstract: A computer-implemented method for maintaining encrypted search indexes on third party storage systems may include (1) identifying a plurality of encrypted files, (2) identifying a plurality of keywords contained in the plurality of encrypted files, and (3) generating an encrypted search index for searching the plurality of encrypted files by (i) identifying, for each keyword in the plurality of keywords, a list of encrypted files in the plurality of encrypted files that contain the keyword, (ii) encrypting the list of encrypted files, and (iii) storing the encrypted list of encrypted files such that the encrypted list of encrypted files can be identified using a lookup key generated by applying a pseudo-random function to the keyword. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: November 27, 2018
    Assignee: Veritas Technologies LLC
    Inventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
  • Patent number: 9825986
    Abstract: The disclosed computer-implemented method for generating contextually meaningful animated visualizations of computer security events may include (1) detecting a security-related event that involves an actor and a target within a computing environment, (2) identifying certain characteristics of the security-related event that collectively describe a context of the security-related event with respect to the actor and the target within the computing environment, (3) generating, based at least in part on the certain characteristics of the security-related event, a graphical animation of the security-related event that graphically represents the context of the security-related event with respect to the actor and the target within the computing environment, and then (4) providing, for presentation to a user, the graphical animation of the security-related event to facilitate visualizing the context of the security-related event with respect to the actor and the target.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: November 21, 2017
    Assignee: Symantec Corporation
    Inventors: Sandeep Bhatkar, Sharada Sundaram, Kevin Roundy, David Silva
  • Patent number: 9679160
    Abstract: A computer-implemented method for maintaining encrypted search indexes on third-party storage systems may include (1) identifying a plurality of encrypted files, (2) identifying a plurality of keywords contained in the plurality of encrypted files, and (3) generating an encrypted search index for searching the plurality of encrypted files by (i) identifying, for each keyword in the plurality of keywords, a list of encrypted files in the plurality of encrypted files that contain the keyword, (ii) encrypting the list of encrypted files, and (iii) storing the encrypted list of encrypted files such that the encrypted list of encrypted files can be identified using a lookup key generated by applying a pseudo-random function to the keyword. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: June 13, 2017
    Assignee: Symantec Corporation
    Inventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
  • Patent number: 9628471
    Abstract: A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.
    Type: Grant
    Filed: June 1, 2015
    Date of Patent: April 18, 2017
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Robert Koeten
  • Patent number: 9571479
    Abstract: A server computer system within a network of an organization receives a request from a user to access a cloud account. The request includes a user identifier. The server computer system authenticates the user for access to the cloud account based on the user identifier, identifies one or more predetermined roles associated with the cloud account for the user, and identifies one or more pseudo accounts associated with the cloud account. The server computer system further maps the user to the one or more pseudo accounts, and provides user access to the cloud account based on the mapping and with access privileges corresponding to the one or more pseudo accounts.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: February 14, 2017
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Sanjay Sawhney, Robert Koeten
  • Patent number: 9342705
    Abstract: A computer-implemented method for searching shared encrypted files on third-party storage systems may include (1) receiving, at a server-side computing system, a request from a user to search at least one encrypted file to which a group of users that includes the user shares access, (2) identifying, in response to the request, at least one encrypted search index compiled for and shared by the group of users that enables the encrypted file to be searched, (3) decrypting the encrypted search index with a key with which each user within the group of users has access, and (4) using the decrypted search index to respond to the request from the user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: May 17, 2016
    Assignee: Symantec Corporation
    Inventors: Scott Schneider, Walter Bogorad, Haibin Zhang, Sharada Sundaram
  • Patent number: 9305007
    Abstract: A first computer system identifies deduplication metadata for files. The deduplication metadata includes block level information for the files. The first computer system determines relationships that are associated with the files based on the block level information and sends relationship data that describes the relationships that are associated with the files to a second computer system via a network.
    Type: Grant
    Filed: February 8, 2013
    Date of Patent: April 5, 2016
    Assignee: Symantec Corporation
    Inventors: Petros Efstathopoulos, Sharada Sundaram
  • Patent number: 9298808
    Abstract: Techniques are disclosed for using a false positive-prone data structure to store normalization data for use in an encrypted search context. A file host server in a cloud provider network may provide search functionality for a user's encrypted data by use of a search index. In updating the search index, the server consolidates common identities of the user on different web services (e.g., an e-mail service or a social media service) into a normalized identifier. These normalization values are stored in the false positive-prone data structure (e.g., a colliding hash table, a Bloomier filter, etc.). Consequently, the data structure may return false positives after a search operation. The server may filter out these false positives before returning search results.
    Type: Grant
    Filed: May 24, 2013
    Date of Patent: March 29, 2016
    Assignee: SYMANTEC CORPORATION
    Inventors: Sharada Sundaram, Scott Schneider
  • Patent number: 9258122
    Abstract: A computer-implemented method for securing data at third-party storage services may include (1) receiving, at a server-side computing system, a request to provide a user with access to a file that is encrypted, (2) determining, in response to the request, whether a transitory symmetric key of the user is available to encrypt a decryption key with which the file may be decrypted, (3) encrypting the decryption key with the transitory symmetric key of the user if the transitory symmetric key of the user is available or encrypting the decryption key with the public key of an asymmetric key pair designated for the user if the transitory symmetric key of the user is unavailable, and (4) storing the encrypted decryption key. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: February 9, 2016
    Assignee: Symantec Corporation
    Inventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
  • Patent number: 9104858
    Abstract: A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: August 11, 2015
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Robert Koeten
  • Patent number: 8931061
    Abstract: Techniques for providing access to data in dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic shared accounts. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a first user associated with an account, identify a second user to have access to the account associated with the first user in the event the first user is unavailable to access data or perform functions associated with the account, map the second user to the account, and provide the second user access to the account based on the mapping and with access privileges associated with the first user.
    Type: Grant
    Filed: March 19, 2012
    Date of Patent: January 6, 2015
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Robert Koeten
  • Publication number: 20140351260
    Abstract: Techniques are disclosed for using a false positive-prone data structure to store normalization data for use in an encrypted search context. A file host server in a cloud provider network may provide search functionality for a user's encrypted data by use of a search index. In updating the search index, the server consolidates common identities of the user on different web services (e.g., an e-mail service or a social media service) into a normalized identifier. These normalization values are stored in the false positive-prone data structure (e.g., a colliding hash table, a Bloomier filter, etc.). Consequently, the data structure may return false positives after a search operation. The server may filter out these false positives before returning search results.
    Type: Application
    Filed: May 24, 2013
    Publication date: November 27, 2014
    Inventors: Sharada SUNDARAM, Scott SCHNEIDER
  • Patent number: 8874528
    Abstract: A computer-implemented method for detecting cloud-based data leaks may include (1) identifying a relational database stored on a third-party storage service, the relational database including a plurality of tuples related by an attribute designated for storing contact information, (2) adding at least one deceptive tuple representing an illegitimate contact and including known false contact information stored under the attribute to the relational database, (3) maintaining a data repository identifying the deceptive tuple as containing false contact information, (4) identifying a contact attempt performed by an attempted use of the known false contact information, and then, in response to identifying the contact attempt, and (5) determining, based on the data repository identifying the deceptive tuple as containing false contact information, that an originator of the contact attempt is implicated in a data leak. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: October 28, 2014
    Assignee: Symantec Corporation
    Inventors: Deb Banerjee, Sanjay Sawhney, Sharada Sundaram
  • Patent number: 8869244
    Abstract: Techniques for providing role-based access control using dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system and method for providing role-based access using dynamic shared accounts. For example, the system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to: receive a request for access to an account, wherein the request comprises an identifier associated with a user; authenticate the user for access to the account; identify one or more predetermined roles associated with the account for the user; identify one or more pseudo accounts corresponding to the one or more predetermined roles; map the user to the one or more pseudo accounts; and provide user access to the account based on the mapping and with access privileges associated with the one or more predetermined roles associated with the user.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: October 21, 2014
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Sanjay Sawhney, Robert Koeten
  • Patent number: 8762512
    Abstract: A computing system identifies shared cloud accounts of a cloud that are created for an entity. The computing system resides outside of the cloud. The number of shared cloud accounts is less than a number of entity users that use the cloud. The computing system determines that one of the users is authorized to use any of the shared cloud accounts in response to a determination that identity information of the user is valid. The computing system receives a request from the user to access the cloud and determines whether one of the shared cloud accounts is available to be assigned to the user. The computing system adds the request to a queue based on a determination that none of the shared cloud accounts is available and assigns one of the cloud accounts to the user based on a determination that one of the shared cloud accounts is available.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: June 24, 2014
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Sanjay Sawhney, Robert Koeten
  • Patent number: 8631498
    Abstract: Techniques for identifying potential malware domain names are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for identifying potential malware domain names. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to receive a request for network data, where the request for network data may comprise a domain name. The one or more processors may also be configured to apply a lexical and linguistic analysis to the domain name. The one or more processors may also be configured to identify whether the domain name is a potential malware domain name based on the lexical and linguistic analysis.
    Type: Grant
    Filed: December 23, 2011
    Date of Patent: January 14, 2014
    Assignee: Symantec Corporation
    Inventors: Michael Andrew Hart, Jeffrey Scott Wilhelm, Sharada Sundaram
  • Publication number: 20120284776
    Abstract: Techniques for providing access to data in dynamic shared accounts are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic shared accounts. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a first user associated with an account, identify a second user to have access to the account associated with the first user in the event the first user is unavailable to access data or perform functions associated with the account, map the second user to the account, and provide the second user access to the account based on the mapping and with access privileges associated with the first user.
    Type: Application
    Filed: March 19, 2012
    Publication date: November 8, 2012
    Applicant: Symantec Corporation
    Inventors: Sharada Sundaram, Robert Koeten
  • Publication number: 20120143778
    Abstract: The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance systems. The present invention supports compliance by using formalized portions of applicable laws to regulate business processes that use information systems. An embodiment of the present invention uses a stratified fragment of Prolog with limited use of negation to formalize a portion of the US Health Insurance Portability and Accountability Act (HIPAA). An embodiment of the invention provides for deployment in a prototypical hospital that implements a Web portal messaging system.
    Type: Application
    Filed: August 27, 2011
    Publication date: June 7, 2012
    Applicant: The Board of Trustees of the Leland Stanford, Junior, University
    Inventors: Sharada Sundaram, Peifung E. Lam, John C. Mitchell