Patents by Inventor Siva Raj

Siva Raj has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240126849
    Abstract: A method for user credential authentication includes receiving real-time logs from a blockchain network that is configured to perform an authentication process of a user. The real-time logs are normalized and bucketized to generate processed real-time logs, which are stored in a block and are added to a blockchain. The processed real-time logs are analyzed to identify the plurality of real-time behavioral patterns of the user. A first authentication score is determined by comparing a first real-time behavioral pattern to a respective first historical behavioral pattern. The first authentication score is compared to a first authentication score threshold, which corresponds to the first real-time behavioral pattern and the respective first historical behavioral pattern. In response to the first authentication score being less than the first authentication score threshold, a first instruction is sent to the blockchain network to temporarily stop the authentication process of the user.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 18, 2024
    Inventors: Ashok Kumar, Narsing Raj, Siva Kumar Venkata Lakshmi Sai Devulapalli
  • Publication number: 20240119160
    Abstract: Aspects of the disclosure relate to generating a multi-platform remediation infrastructure based on intelligently forecasting and configuring a remediation schedule. The computing platform may continuously analyze components within the enterprise organization infrastructure to identify at least one vulnerability within the infrastructure. The computing platform may group the vulnerabilities based on identified similarities and may identify, for each group, a time during which each vulnerability may be remediated. The computing platform may use the times to generate a remediation schedule and may analyze the remediation schedule to determine whether the schedule comprises anomalies. Based on determining the remediation schedule does not comprise anomalies, the computing platform may remediate the vulnerabilities indicated on the remediation schedule.
    Type: Application
    Filed: October 10, 2022
    Publication date: April 11, 2024
    Inventors: Narsing Raj, Aashish Chandrahas Vinherkar, Kommu John Bilton, Siva Venkata Lakshmi Sai Kumar Devulapalli
  • Patent number: 10635817
    Abstract: Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community.
    Type: Grant
    Filed: January 31, 2013
    Date of Patent: April 28, 2020
    Assignee: Micro Focus LLC
    Inventors: William G Horne, Tomas Sander, Krishnamurthy Viswanathan, Anurag Singla, Siva Raj Rajagopalan
  • Patent number: 9729505
    Abstract: An example of security threat analysis can include generating a security threat hypothesis based on security data in a threat exchange server. A request for analysis based on the security data can be sent via communication links to at least one security monitored participant to analyze the security data. A response can be received from the at least one security monitored participant with information related to the completed security related task.
    Type: Grant
    Filed: January 31, 2013
    Date of Patent: August 8, 2017
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Siva Raj Rajagopalan, Tomas Sander, Suranjan Pramanik
  • Patent number: 9594929
    Abstract: Devices, methods, systems, and computer-readable media for open architecture security are described herein. One or more embodiments include a method for open architecture security, comprising: identifying a source of a received computing component, assigning a value to the received computing component based on the source, and designating the received computing component into a security level based on the assigned value.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: March 14, 2017
    Assignee: Honeywell International Inc.
    Inventors: Valerie Guralnik, Siva Raj Rajagopalan
  • Patent number: 9454494
    Abstract: Methods, devices, and systems for encrypting a communication from a device are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to generate a subset-sum problem and a Goldreich-Levin hash function and encrypt a communication from the device using the subset-sum problem and the Goldreich-Levin hash function.
    Type: Grant
    Filed: August 1, 2014
    Date of Patent: September 27, 2016
    Assignee: Honeywell International Inc.
    Inventors: Siva Raj Rajagopalan, Jun Ho Huh
  • Publication number: 20160042174
    Abstract: Devices, methods, systems, and computer-readable media for open architecture security are described herein. One or more embodiments include a method for open architecture security, comprising: identifying a source of a received computing component, assigning a value to the received computing component based on the source, and designating the received computing component into a security level based on the assigned value.
    Type: Application
    Filed: August 11, 2014
    Publication date: February 11, 2016
    Inventors: Valerie Guralnik, Siva Raj Rajagopalan
  • Publication number: 20160036591
    Abstract: Methods, devices, and systems for encrypting a communication from a device are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to generate a subset-sum problem and a Goldreich-Levin hash function and encrypt a communication from the device using the subset-sum problem and the Goldreich-Levin hash function.
    Type: Application
    Filed: August 1, 2014
    Publication date: February 4, 2016
    Inventors: Siva Raj Rajagopalan, Jun Ho Huh
  • Publication number: 20150371044
    Abstract: Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community.
    Type: Application
    Filed: January 31, 2013
    Publication date: December 24, 2015
    Inventors: William Horne, Tomas Sander, Krishnamurthy Viswanathan, Siva Raj Rajagopalan, Anurag Singla
  • Publication number: 20150373040
    Abstract: Sharing information can include identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community. Sharing information can also include determining what participant-related information to share with the threat exchange server in response to the identified security occurrence, and receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community.
    Type: Application
    Filed: January 31, 2013
    Publication date: December 24, 2015
    Inventors: Tomas Sander, William G. Horne, Prasad V. Rao, Suranjan Pramanik, Siva Raj Rajagopalan, Daniel L. Moor, Krishnamurthy Viswanathan
  • Patent number: 9141791
    Abstract: A method of monitoring for anomalies in a computing environment comprises, with a processor building an anomaly detection system based on topology guided statistical analysis, and creating a number of correlation rules based on a number of detected anomalies and information provided by a security alerts database.
    Type: Grant
    Filed: November 19, 2012
    Date of Patent: September 22, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: SM Prakash Shiva, Siva Raj Rajagopalan
  • Publication number: 20140215608
    Abstract: An example of security threat analysis can include generating a security threat hypothesis based on security data in a threat exchange server. A request for analysis based on the security data can be sent via communication links to at least one security monitored participant to analyze the security data. A response can be received from the at least one security monitored participant with information related to the completed security related task.
    Type: Application
    Filed: January 31, 2013
    Publication date: July 31, 2014
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Siva Raj Rajagopalan, Tomas Sander, Suranjan Pramanik
  • Publication number: 20140143868
    Abstract: A method of monitoring for anomalies in a computing environment comprises, with a processor building an anomaly detection system based on topology guided statistical analysis, and creating a number of correlation rules based on a number of detected anomalies and information provided by a security alerts database.
    Type: Application
    Filed: November 19, 2012
    Publication date: May 22, 2014
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: SM PRAKASH SHIVA, Siva Raj Rajagopalan
  • Publication number: 20130179937
    Abstract: A customized security model template is created that is customized for a specific organization's security related procedures. The customized security model template is instantiated with parameters associated with the organization to create an instantiated security model, and a report is produced based on simulations of the instantiated security model that specifies metrics of the organization's security implementation.
    Type: Application
    Filed: January 10, 2012
    Publication date: July 11, 2013
    Inventors: Marco Casassa Mont, Richard Brown, William G. Horne, Siva Raj Rajagopalan, Prasad V. Rao
  • Publication number: 20100331654
    Abstract: Described herein are systems and methods to utilize factual information based on stored blood glucose data to allow greater insight into the management of diabetes of a user.
    Type: Application
    Filed: June 30, 2010
    Publication date: December 30, 2010
    Applicant: LifeScan Scotland Ltd.
    Inventors: Ronald JERDONEK, Alistair Longmuir, Siva Raj, Allan Macrae, Lisa Weseley, Chris Stephens