Patents by Inventor Siva Raj
Siva Raj has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126849Abstract: A method for user credential authentication includes receiving real-time logs from a blockchain network that is configured to perform an authentication process of a user. The real-time logs are normalized and bucketized to generate processed real-time logs, which are stored in a block and are added to a blockchain. The processed real-time logs are analyzed to identify the plurality of real-time behavioral patterns of the user. A first authentication score is determined by comparing a first real-time behavioral pattern to a respective first historical behavioral pattern. The first authentication score is compared to a first authentication score threshold, which corresponds to the first real-time behavioral pattern and the respective first historical behavioral pattern. In response to the first authentication score being less than the first authentication score threshold, a first instruction is sent to the blockchain network to temporarily stop the authentication process of the user.Type: ApplicationFiled: October 18, 2022Publication date: April 18, 2024Inventors: Ashok Kumar, Narsing Raj, Siva Kumar Venkata Lakshmi Sai Devulapalli
-
Publication number: 20240119160Abstract: Aspects of the disclosure relate to generating a multi-platform remediation infrastructure based on intelligently forecasting and configuring a remediation schedule. The computing platform may continuously analyze components within the enterprise organization infrastructure to identify at least one vulnerability within the infrastructure. The computing platform may group the vulnerabilities based on identified similarities and may identify, for each group, a time during which each vulnerability may be remediated. The computing platform may use the times to generate a remediation schedule and may analyze the remediation schedule to determine whether the schedule comprises anomalies. Based on determining the remediation schedule does not comprise anomalies, the computing platform may remediate the vulnerabilities indicated on the remediation schedule.Type: ApplicationFiled: October 10, 2022Publication date: April 11, 2024Inventors: Narsing Raj, Aashish Chandrahas Vinherkar, Kommu John Bilton, Siva Venkata Lakshmi Sai Kumar Devulapalli
-
Patent number: 10635817Abstract: Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community.Type: GrantFiled: January 31, 2013Date of Patent: April 28, 2020Assignee: Micro Focus LLCInventors: William G Horne, Tomas Sander, Krishnamurthy Viswanathan, Anurag Singla, Siva Raj Rajagopalan
-
Patent number: 9729505Abstract: An example of security threat analysis can include generating a security threat hypothesis based on security data in a threat exchange server. A request for analysis based on the security data can be sent via communication links to at least one security monitored participant to analyze the security data. A response can be received from the at least one security monitored participant with information related to the completed security related task.Type: GrantFiled: January 31, 2013Date of Patent: August 8, 2017Assignee: ENTIT SOFTWARE LLCInventors: Siva Raj Rajagopalan, Tomas Sander, Suranjan Pramanik
-
Patent number: 9594929Abstract: Devices, methods, systems, and computer-readable media for open architecture security are described herein. One or more embodiments include a method for open architecture security, comprising: identifying a source of a received computing component, assigning a value to the received computing component based on the source, and designating the received computing component into a security level based on the assigned value.Type: GrantFiled: August 11, 2014Date of Patent: March 14, 2017Assignee: Honeywell International Inc.Inventors: Valerie Guralnik, Siva Raj Rajagopalan
-
Patent number: 9454494Abstract: Methods, devices, and systems for encrypting a communication from a device are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to generate a subset-sum problem and a Goldreich-Levin hash function and encrypt a communication from the device using the subset-sum problem and the Goldreich-Levin hash function.Type: GrantFiled: August 1, 2014Date of Patent: September 27, 2016Assignee: Honeywell International Inc.Inventors: Siva Raj Rajagopalan, Jun Ho Huh
-
Publication number: 20160042174Abstract: Devices, methods, systems, and computer-readable media for open architecture security are described herein. One or more embodiments include a method for open architecture security, comprising: identifying a source of a received computing component, assigning a value to the received computing component based on the source, and designating the received computing component into a security level based on the assigned value.Type: ApplicationFiled: August 11, 2014Publication date: February 11, 2016Inventors: Valerie Guralnik, Siva Raj Rajagopalan
-
Publication number: 20160036591Abstract: Methods, devices, and systems for encrypting a communication from a device are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to generate a subset-sum problem and a Goldreich-Levin hash function and encrypt a communication from the device using the subset-sum problem and the Goldreich-Levin hash function.Type: ApplicationFiled: August 1, 2014Publication date: February 4, 2016Inventors: Siva Raj Rajagopalan, Jun Ho Huh
-
Publication number: 20150371044Abstract: Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community.Type: ApplicationFiled: January 31, 2013Publication date: December 24, 2015Inventors: William Horne, Tomas Sander, Krishnamurthy Viswanathan, Siva Raj Rajagopalan, Anurag Singla
-
Publication number: 20150373040Abstract: Sharing information can include identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community. Sharing information can also include determining what participant-related information to share with the threat exchange server in response to the identified security occurrence, and receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community.Type: ApplicationFiled: January 31, 2013Publication date: December 24, 2015Inventors: Tomas Sander, William G. Horne, Prasad V. Rao, Suranjan Pramanik, Siva Raj Rajagopalan, Daniel L. Moor, Krishnamurthy Viswanathan
-
Patent number: 9141791Abstract: A method of monitoring for anomalies in a computing environment comprises, with a processor building an anomaly detection system based on topology guided statistical analysis, and creating a number of correlation rules based on a number of detected anomalies and information provided by a security alerts database.Type: GrantFiled: November 19, 2012Date of Patent: September 22, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: SM Prakash Shiva, Siva Raj Rajagopalan
-
Publication number: 20140215608Abstract: An example of security threat analysis can include generating a security threat hypothesis based on security data in a threat exchange server. A request for analysis based on the security data can be sent via communication links to at least one security monitored participant to analyze the security data. A response can be received from the at least one security monitored participant with information related to the completed security related task.Type: ApplicationFiled: January 31, 2013Publication date: July 31, 2014Applicant: Hewlett-Packard Development Company, L.P.Inventors: Siva Raj Rajagopalan, Tomas Sander, Suranjan Pramanik
-
Publication number: 20140143868Abstract: A method of monitoring for anomalies in a computing environment comprises, with a processor building an anomaly detection system based on topology guided statistical analysis, and creating a number of correlation rules based on a number of detected anomalies and information provided by a security alerts database.Type: ApplicationFiled: November 19, 2012Publication date: May 22, 2014Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: SM PRAKASH SHIVA, Siva Raj Rajagopalan
-
Publication number: 20130179937Abstract: A customized security model template is created that is customized for a specific organization's security related procedures. The customized security model template is instantiated with parameters associated with the organization to create an instantiated security model, and a report is produced based on simulations of the instantiated security model that specifies metrics of the organization's security implementation.Type: ApplicationFiled: January 10, 2012Publication date: July 11, 2013Inventors: Marco Casassa Mont, Richard Brown, William G. Horne, Siva Raj Rajagopalan, Prasad V. Rao
-
Publication number: 20100331654Abstract: Described herein are systems and methods to utilize factual information based on stored blood glucose data to allow greater insight into the management of diabetes of a user.Type: ApplicationFiled: June 30, 2010Publication date: December 30, 2010Applicant: LifeScan Scotland Ltd.Inventors: Ronald JERDONEK, Alistair Longmuir, Siva Raj, Allan Macrae, Lisa Weseley, Chris Stephens