Patents by Inventor Srikanth Nalluri

Srikanth Nalluri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210149725
    Abstract: The present disclosure relates to a system and method for providing a service on a wearable device where the wearable device is limited in its functionality in some way when compared with a companion device. In particular, the disclosure describes use cases for configuring the wearable device, and use cases for configuring a wearable device and performing service application functions on the wearable device while leveraging a companion device.
    Type: Application
    Filed: December 28, 2020
    Publication date: May 20, 2021
    Applicant: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
  • Patent number: 10990679
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: April 27, 2021
    Assignee: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
  • Publication number: 20210105241
    Abstract: Particular embodiments described herein provide for system that can be configured to deliver a notification to a user based on the user's preference for each device that receives the notification. The user's preference is based on how the user interacted with similar notifications in the past and the system can change how it will deliver similar notifications to the user in the future based on how the user interacts with the notification.
    Type: Application
    Filed: December 18, 2020
    Publication date: April 8, 2021
    Applicant: McAfee, LLC
    Inventors: Raj Vardhan, Arvind Sankarasubramanian, Kranthi Kumar Gadde, Srikanth Nalluri, Dattatraya Kulkarni
  • Patent number: 10891155
    Abstract: The present disclosure relates to a system and method for providing a service on a wearable device where the wearable device is limited in its functionality in some way when compared with a companion device. In particular, the disclosure describes use cases for configuring the wearable device, and use cases for configuring a wearable device and performing service application functions on the wearable device while leveraging a companion device.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: January 12, 2021
    Assignee: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
  • Patent number: 10887266
    Abstract: Particular embodiments described herein provide for system that can be configured to deliver a notification to a user based on the user's preference for each device that receives the notification. The user's preference is based on how the user interacted with similar notifications in the past and the system can change how it will deliver similar notifications to the user in the future based on how the user interacts with the notification.
    Type: Grant
    Filed: July 2, 2016
    Date of Patent: January 5, 2021
    Assignee: McAfee, LLC
    Inventors: Raj Vardhan, Arvind Sankarasubramanian, Kranthi Kumar Gadde, Srikanth Nalluri, Dattatraya Kulkarni
  • Patent number: 10878116
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for secure distributed backup for personal device and cloud data. An example method disclosed herein includes, in response to a request for a file from a client device, obtaining a map corresponding to the file from a remote device, and requesting, by executing an instruction with a processor, a first file chunk from a first cloud storage location based on the map. The example method further includes requesting, by executing an instruction with the processor, a second file chunk from a second cloud storage location based on the map, and generating, by executing an instruction with the processor, the file by combining the first file chunk and the second file chunk. The example method also includes causing transmission of the file to the client device.
    Type: Grant
    Filed: January 21, 2019
    Date of Patent: December 29, 2020
    Assignee: Mcafee, LLC
    Inventors: Mitesh Kumar, Srikanth Nalluri, Dattatraya Kulkarni, Kamlesh Halder, Kranthikumar Gadde, Kaushal Kumar Dhruw, Krishnapur Venkatasubrahmanyam, Susmita Nayak
  • Publication number: 20200367059
    Abstract: A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. The rules may include definitions of access rights, with respect to the network enabled device, for users, applications, commands or queries made by applications, remote host devices, and network domains.
    Type: Application
    Filed: July 31, 2020
    Publication date: November 19, 2020
    Inventors: Himanshu Srivastava, Dattatraya Kulkarni, Srikanth Nalluri, Krishnapur N. Venkatasubrahmanyam, Kamlesh Halder, Raj Vardhan
  • Patent number: 10791118
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to establish a connection with a router, obtain identification for the router, communicate the identification of the router to a network element, receive a hash of at least a portion of a certificate for the router, and disconnect the connection and establish a new connection with the router, where the hash is used to authenticate network services received from the router during the new connection. In an example, the hash is part of a subject public key infrastructure (SPKI) pin set.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: September 29, 2020
    Assignee: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Himanshu Srivastava, Harsha Ramamurthy Joshi, Srikanth Nalluri, Dattatraya Kulkarni
  • Patent number: 10735965
    Abstract: A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. The rules may include definitions of access rights, with respect to the network enabled device, for users, applications, commands or queries made by applications, remote host devices, and network domains.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: August 4, 2020
    Assignee: McAfee, LLC
    Inventors: Himanshu Srivastava, Dattatraya Kulkarni, Srikanth Nalluri, Krishnapur N. Venkatasubrahmanyam, Kamlesh Halder, Raj Vardhan
  • Publication number: 20200236104
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify encrypted handshakes. An example apparatus includes a message copier to clone a client introductory message, the client introductory message is included in a first handshake for network communication between a client and a server, a connection establisher to initiate a second handshake between the apparatus and the server based on the cloned client introductory message, and a decrypter to, in response to the second handshake, decrypt a certificate sent by the server.
    Type: Application
    Filed: March 7, 2019
    Publication date: July 23, 2020
    Inventors: Tirumaleswar Reddy Konda, Harsha R. Joshi, Shashank Jain, Himanshu Srivastava, Srikanth Nalluri, Naveen Kandadi
  • Publication number: 20200210575
    Abstract: Methods and apparatus to detect adversarial malware are disclosed. An example adversarial malware detector includes a machine learning engine to classify a first feature representation representing features of a program as benign or malware, a feature perturber to, when the first feature representation is classified as benign, remove a first one of the features to form a second feature representation, and a decider to classify the program as adversarial malware when the machine learning engine classifies the second feature representation as malware.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 2, 2020
    Inventors: Yonghong Huang, Raj Vardhan, Celeste R. Fralick, Gabriel G. Infante-Lopez, Dattatraya Kulkarni, Srikanth Nalluri, Sonam Bothra
  • Publication number: 20200153846
    Abstract: Methods, systems, and media for dynamically separating Internet of Things (IoT) devices in a network are provided. In accordance with some embodiments of the disclosed subject matter, a method for dynamically separating IoT devices in a network is provided, the method comprising: detecting a first IoT device in the network; monitoring network communication of the first IoT device; determining device information of the first IoT device based on the monitored network communication; and causing the first IoT device to communicate on a first subnet of a plurality of subnets in the network based on the device information.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Inventors: Himanshu Srivastava, Tirumaleswar Reddy Konda, Piyush P. Joshi, Harsha R. Joshi, Srikanth Nalluri, Dattatraya Kulkarni, Siddaraya Revashetti
  • Publication number: 20200107201
    Abstract: A technique for collecting and using signal reputation data, comprising obtaining a plurality of signal reputation data corresponding to a plurality of locations, categorizing the signal reputation data into groups, calculating signal circles for at least some of the groups based on a representative signal value for the corresponding group, calculating a signal reputation score for each signal circle, determining a best signal circle for a user mobile device within a predetermined distance of dead zones, and sending the best signal circle to the user mobile device based at least in part on the signal reputation score and a location of the user mobile device. In some embodiments, the technique may include some but not all of these actions and additional actions, such as suspending obtaining signal reputation data based on battery status.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Inventors: Raja Sinha, Dattatraya Kulkarni, Srikanth Nalluri, Anjan Kumar Nayak, Tirumaleswar Reddy Konda, Susmita Nayak, Purushothaman B, Harsha R. Joshi
  • Publication number: 20200067974
    Abstract: Example methods, apparatus, systems and articles of manufacture to implement cooperative mitigation of distributed denial of service attacks originating in local networks are disclosed. An example local network router disclosed herein includes a mitigator to mitigate a distributed denial of service attack detected by an Internet service provider, the distributed denial of service attack associated with network traffic originating from a first device connected to a local network. The example local network router also includes a threat signaling server to identify the first device based on first information received from a threat signaling client of the Internet service provider, the first information describing the distributed denial of service attack. The example threat signaling server is also to transmit second information to notify the threat signaling client of the Internet service provider when the network traffic associated with the distributed denial of service attack has been mitigated.
    Type: Application
    Filed: October 8, 2018
    Publication date: February 27, 2020
    Inventors: Tirumaleswar Reddy Konda, Harsha R. Joshi, Himanshu Srivastava, Srikanth Nalluri, Dattatraya Kulkarni
  • Patent number: 10536570
    Abstract: A safety event is determined as affecting a user based at least in part context data collected at a user device associated with the user. In some aspects, context data is detected from sensors on the client device, the context data describing a present context of the user. A deviation of the present context from a historical context is determined to be beyond a threshold. Determining that the deviation is beyond the threshold can be determined to correspond to a safety event potentially jeopardizing safety of the user. In some aspects, an action can be launched in response to determining the safety event.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: January 14, 2020
    Assignee: McAfee, LLC
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Yogesh Jain, Kaushal Kumar Dhruw, Kamlesh Halder
  • Publication number: 20200012790
    Abstract: The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric. In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware. After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan. The originating device may also scan the data for malware contextually-relevant to a second device.
    Type: Application
    Filed: September 16, 2019
    Publication date: January 9, 2020
    Applicant: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Kamlesh Halder, Venkatasubrahmanyam Krishnapur, Sailaja K. Shankar, Kaushal Kumar Dhruw
  • Publication number: 20190340360
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 7, 2019
    Inventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
  • Publication number: 20190306166
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to establish a connection with a router, obtain identification for the router, communicate the identification of the router to a network element, receive a hash of at least a portion of a certificate for the router, and disconnect the connection and establish a new connection with the router, where the hash is used to authenticate network services received from the router during the new connection. In an example, the hash is part of a subject public key infrastructure (SPKI) pin set.
    Type: Application
    Filed: March 29, 2018
    Publication date: October 3, 2019
    Applicant: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Himanshu Srivastava, Harsha Ramamurthy Joshi, Srikanth Nalluri, Dattatraya Kulkarni
  • Patent number: 10417417
    Abstract: The present disclosure relates to a system and method for performing antimalware scanning of data files that is data-centric rather than device-centric, In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware, After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan, The originating device may also scan the data for malware contextually-relevant to a second device.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: September 17, 2019
    Assignee: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Kamlesh Halder, Venkatasubrahmanyam Krishnapur, Sailaja K. Shankar, Kaushal Kumar Dhruw
  • Publication number: 20190238563
    Abstract: There is disclosed in one example a remediation server including: a hardware platform, including a processor, a memory, and a network interface; and instructions encoded within the memory to instruct the processor to: receive an application binary; create an application logic model of the application binary; and create personalization rules for the application binary based on the application logic model.
    Type: Application
    Filed: April 12, 2019
    Publication date: August 1, 2019
    Applicant: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur