Patents by Inventor Srinivas B. Tummalapenta

Srinivas B. Tummalapenta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11374958
    Abstract: A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: June 28, 2022
    Assignee: International Business Machines Corporation
    Inventors: Huyanh D. Ngo, Aankur Bhatia, Adam J. Paquin, Srinivas B. Tummalapenta
  • Patent number: 11265352
    Abstract: A method assigns a particular rule for a previous client to a new client for use in executing a security feature on a computer system used by the new client. One or more processors match a new client profile for the new client to a previous client profile for the previous client. The new client profile is based on types of one or more client assets of the new client and an intrusion detection alert history of the new client. The processor(s) assign the particular rule for the previous client to the new client based on the new client profile matching the previous client profile. The processor(s) receive information indicating that a violation of the particular rule has occurred, and execute a security feature of the computer system used by the new client in order to resolve the violation of the particular rule.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Aankur Bhatia, Srinivas B. Tummalapenta, Huyanh D. Ngo, Carlos E. Aguilera
  • Patent number: 11237897
    Abstract: A method identifies and prioritizes anomalies in received monitoring logs from an endpoint log source. One or more processors identify anomalies in the monitoring logs by applying a plurality of disparate types of anomaly detection algorithms to the monitoring logs, and then determine a likelihood that the identified anomalies are anomalous based on outputs of the plurality of disparate types of anomaly detection algorithms. The processor(s) then prioritize the monitoring logs based on the likelihood that the identified anomalies are actually anomalous, and send prioritized monitoring logs that exceed a priority level to a security information and event management system (SIEM).
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: February 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Aankur Bhatia, Chadwick M. Baatz, Gary I. Givental, Thomas Wallace, Srinivas B. Tummalapenta
  • Patent number: 11206242
    Abstract: An approach is disclosed that receives a request from a first device connected to a first network to connect to a second device connected to a second network. In response to verifying that a connection between the first device and the second device is allowed, the approach operates to establish a secure network communications tunnel between the first device and the second device. The secure network communications tunnel is specific to the first and second devices and the first device is inhibited from accessing other devices that are connected to the second network using the secure network communications tunnel. The secure network communications tunnel is then terminated in response to a detection of a security event.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: December 21, 2021
    Assignee: International Business Machines Corporation
    Inventors: Srinivas B. Tummalapenta, Nikhilkumar V. Shah, Adam L. Griffin, HuyAnh D. Ngo, Paul A. Ragone
  • Patent number: 11201726
    Abstract: An example operation may include one or more of retrieving a predefined image from a storage, encoding data attributes to be stored on a blockchain into one or more image layers of the predefined image to generate an encoded image, generating a data block comprising the encoded image including the data attributes which are encoded into the one or more image layers, and storing the data block via a hash-linked chain of data blocks on a distributed ledger.
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: December 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Adam L. Griffin, Srinivas B. Tummalapenta, Gary I. Givental, Wesley A. Khademi, Aankur Bhatia
  • Patent number: 10944547
    Abstract: A method manages software images in a blockchain-based environment of trusted devices. A trusted device creates a software image for sharing among members of a set of trusted devices that includes the trusted device. A blockchain mechanism stores the software image on a virtual machine that is in communication with the set of trusted devices, where the blockchain mechanism uses the set of trusted devices as peer members of the blockchain mechanism. A trusted device from the set of trusted devices receives, via the virtual machine, an access request for the software image from a requesting device from the set of trusted devices. The blockchain mechanism authorizes the access request by providing the software image to the requesting device.
    Type: Grant
    Filed: August 10, 2018
    Date of Patent: March 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Srinivas B. Tummalapenta, Adam L. Griffin, Nikhilkumar V. Shah, Huyanh D. Ngo, Paul A. Ragone
  • Publication number: 20210026722
    Abstract: A method identifies and prioritizes anomalies in received monitoring logs from an endpoint log source. One or more processors identify anomalies in the monitoring logs by applying a plurality of disparate types of anomaly detection algorithms to the monitoring logs, and then determine a likelihood that the identified anomalies are anomalous based on outputs of the plurality of disparate types of anomaly detection algorithms. The processor(s) then prioritize the monitoring logs based on the likelihood that the identified anomalies are actually anomalous, and send prioritized monitoring logs that exceed a priority level to a security information and event management system (SIEM).
    Type: Application
    Filed: July 25, 2019
    Publication date: January 28, 2021
    Inventors: AANKUR BHATIA, CHADWICK M. BAATZ, GARY I. GIVENTAL, THOMAS WALLACE, SRINIVAS B. TUMMALAPENTA
  • Patent number: 10885797
    Abstract: Embodiments for managing drones by one or more processors are described. A condition related to the operation of a drone in a selected area is detected. A set of drone operating parameters associated with the operation of the drone in the selected area is changed based on the detecting of the condition. A signal representative of the changing of the set of drone operating parameters is generated.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: January 5, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bradford O. Brooks, Grant D. Miller, Louis S. Sickenius, Srinivas B. Tummalapenta, Robert D. Wilhelm, Hamza Yaswi
  • Publication number: 20200396261
    Abstract: A method assigns a particular rule for a previous client to a new client for use in executing a security feature on a computer system used by the new client. One or more processors match a new client profile for the new client to a previous client profile for the previous client. The new client profile is based on types of one or more client assets of the new client and an intrusion detection alert history of the new client. The processor(s) assign the particular rule for the previous client to the new client based on the new client profile matching the previous client profile. The processor(s) receive information indicating that a violation of the particular rule has occurred, and execute a security feature of the computer system used by the new client in order to resolve the violation of the particular rule.
    Type: Application
    Filed: August 28, 2020
    Publication date: December 17, 2020
    Inventors: AANKUR BHATIA, SRINIVAS B. TUMMALAPENTA, HUYANH D. NGO, CARLOS E. AGUILERA
  • Publication number: 20200395107
    Abstract: A method controls a modification of an adjustable device. A system establishes a circle of trust for a plurality of devices, where at least one of the plurality of devices is an adjustment control device for adjusting an adjustable device. Operations of the adjustment control device are controlled via a blockchain, where the blockchain must approve the adjustment control device before an adjustment of the adjustable device is performed by the adjustment control device. The system receives an approval from the blockchain for the adjustment control device to adjust the adjustable device, and the adjustment control device adjusts the adjustable device in response to receiving the approval from the blockchain.
    Type: Application
    Filed: June 11, 2019
    Publication date: December 17, 2020
    Inventors: ADAM L. GRIFFIN, SRINIVAS B. TUMMALAPENTA, NIKHILKUMAR V. SHAH, HUYANH D. NGO, PAUL A. RAGONE
  • Patent number: 10834142
    Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (AI) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.
    Type: Grant
    Filed: October 9, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Aankur Bhatia, Srinivas B. Tummalapenta, Huyanh D. Ngo, Carlos E. Aguilera
  • Patent number: 10832083
    Abstract: Mechanisms are provided to implement an image based event classification engine having an event image encoder and a first neural network computer model. The event image encoder receives an event data structure comprising a plurality of event attributes, where the event data structure represents an event occurring in association with a computing resource. The event image encoder executes, for each event attribute, a corresponding event attribute encoder that encodes the event attribute as a pixel pattern in a predetermined grid of pixels, corresponding to the event attribute, of an event image. The event image is into to a neural network computer model which applies one or more image feature extraction operations and image feature analysis algorithms to the event image to generate a classification prediction classifying the event into one of a plurality of predefined classifications and outputs the classification prediction.
    Type: Grant
    Filed: April 23, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gary I. Givental, Wesley A. Khademi, Aankur Bhatia, Srinivas B. Tummalapenta
  • Publication number: 20200351075
    Abstract: An example operation may include one or more of retrieving a predefined image from a storage, encoding data attributes to be stored on a blockchain into one or more image layers of the predefined image to generate an encoded image, generating a data block comprising the encoded image including the data attributes which are encoded into the one or more image layers, and storing the data block via a hash-linked chain of data blocks on a distributed ledger.
    Type: Application
    Filed: May 2, 2019
    Publication date: November 5, 2020
    Inventors: Adam L. Griffin, Srinivas B. Tummalapenta, Gary I. Givental, Wesley A. Khademi, Aankur Bhatia
  • Publication number: 20200342252
    Abstract: Mechanisms are provided to implement an image based event classification engine having an event image encoder and a first neural network computer model. The event image encoder receives an event data structure comprising a plurality of event attributes, where the event data structure represents an event occurring in association with a computing resource. The event image encoder executes, for each event attribute, a corresponding event attribute encoder that encodes the event attribute as a pixel pattern in a predetermined grid of pixels, corresponding to the event attribute, of an event image. The event image is into to a neural network computer model which applies one or more image feature extraction operations and image feature analysis algorithms to the event image to generate a classification prediction classifying the event into one of a plurality of predefined classifications and outputs the classification prediction.
    Type: Application
    Filed: April 23, 2019
    Publication date: October 29, 2020
    Inventors: Gary I. Givental, Wesley A. Khademi, Aankur Bhatia, Srinivas B. Tummalapenta
  • Publication number: 20200327255
    Abstract: An approach is provided that receives a set of actual hardware power consumption details and a set of software activity details with all of the details pertaining to the use of a computer system at a first time. Based on the set of software activity details, the approach determines a set of expected hardware power consumption details. The set of actual hardware power consumption details are compared to the set of expected hardware power consumption details. If the comparison identifies variances between the actual and expected data, then a security threat is flagged and threat responses are performed.
    Type: Application
    Filed: April 10, 2019
    Publication date: October 15, 2020
    Inventors: HuyAnh D. Ngo, Juan A. Martinez Castellanos, Srinivas B. Tummalapenta
  • Publication number: 20200244625
    Abstract: An approach is disclosed that receives a request from a first device connected to a first network to connect to a second device connected to a second network. In response to verifying that a connection between the first device and the second device is allowed, the approach operates to establish a secure network communications tunnel between the first device and the second device. The secure network communications tunnel is specific to the first and second devices and the first device is inhibited from accessing other devices that are connected to the second network using the secure network communications tunnel. The secure network communications tunnel is then terminated in response to a detection of a security event.
    Type: Application
    Filed: January 24, 2019
    Publication date: July 30, 2020
    Inventors: Srinivas B. Tummalapenta, Nikhilkumar V. Shah, Adam L. Griffin, HuyAnh D. Ngo, Paul A. Ragone
  • Patent number: 10657469
    Abstract: In a method for estimating a severity of a current security incident reported by a customer for the customer's computer system, a processor receives from one or more administrators for a plurality of prior security incidents reported by the customer, identifications of a respective plurality of actual severities for the plurality of prior security incidents. The processor estimates, based in part on the plurality of identified actual severities of the prior security incidents, a severity of the current security incident. The processor reports the estimated severity for the current security incident.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: May 19, 2020
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Heather M. Hinton, Neil I. Readshaw, Srinivas B. Tummalapenta
  • Publication number: 20200137103
    Abstract: A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: HUYANH D. NGO, AANKUR BHATIA, ADAM J. PAQUIN, SRINIVAS B. TUMMALAPENTA
  • Publication number: 20200112590
    Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (AI) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.
    Type: Application
    Filed: October 9, 2018
    Publication date: April 9, 2020
    Inventors: AANKUR BHATIA, SRINIVAS B. TUMMALAPENTA, HUYANH D. NGO, CARLOS E. AGUILERA
  • Publication number: 20200052882
    Abstract: A method manages software images in a blockchain-based environment of trusted devices. A trusted device creates a software image for sharing among members of a set of trusted devices that includes the trusted device. A blockchain mechanism stores the software image on a virtual machine that is in communication with the set of trusted devices, where the blockchain mechanism uses the set of trusted devices as peer members of the blockchain mechanism. A trusted device from the set of trusted devices receives, via the virtual machine, an access request for the software image from a requesting device from the set of trusted devices. The blockchain mechanism authorizes the access request by providing the software image to the requesting device.
    Type: Application
    Filed: August 10, 2018
    Publication date: February 13, 2020
    Inventors: SRINIVAS B. TUMMALAPENTA, ADAM L. GRIFFIN, NIKHILKUMAR V. SHAH, HUYANH D. NGO, PAUL A. RAGONE