Patents by Inventor Srinivas Kumar

Srinivas Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9240945
    Abstract: A method or system for managing packet flow is disclosed. The packets each include an inserted application identifier identifying a registered application. The method includes receiving packets destined for one or more resources, determining, by a packet processor, the inserted application identifier for each of the respective packets received and managing the packet flow of each received packet sent from a security node based at least in part on the inserted application identifier of the received packet.
    Type: Grant
    Filed: March 18, 2009
    Date of Patent: January 19, 2016
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura, Shadab Munam Shah
  • Publication number: 20150244735
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Systems and methods use a graphical user interface (GUI) console to orchestrate operational integrity of a platform. In an embodiment, a method presents a data center-level runtime operational integrity dashboard and remediation controls for infected systems in a display of a platform having a network trust agent, an endpoint trust agent, and a trust orchestrator. The method receives runtime integrity metrics for trust vectors and displays risk indicators based on the confidence level of received integrity metrics in the GUI.
    Type: Application
    Filed: February 16, 2015
    Publication date: August 27, 2015
    Applicant: Taasera, Inc.
    Inventors: Srinivas KUMAR, Dennis Vance Pollutro
  • Patent number: 9092616
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Systems and methods for threat identification and remediation for computing platforms based upon reconnaissance-based intelligence correlation and network/application monitoring are disclosed. In an embodiment, a method provides runtime operational integrity of a system by receiving: a dynamic context including endpoint events; and network endpoint assessments. The method generates temporal events based on the network endpoint assessments and correlates the endpoint events and temporal events before generating an integrity profile for the system.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: July 28, 2015
    Assignee: TAASERA, INC.
    Inventors: Srinivas Kumar, Dennis Pollutro
  • Patent number: 9027125
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Methods and systems are disclosed for network flow and device/platform remediation in response to reconnaissance-based intelligence correlation based on network monitoring, to accomplish network flow remediation and device/platform remediation. In an embodiment, a system receives system warnings and endpoint threat intelligence. The system correlates risk based on inputs from sensory inputs that monitor network activity, system configuration, resource utilization, and device integrity.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: May 5, 2015
    Assignee: Taasera, Inc.
    Inventors: Srinivas Kumar, Dennis Pollutro
  • Publication number: 20150096010
    Abstract: A method of packet management for restricting access to a resource of a computer system. The method includes identifying client parameters and network parameters, as a packet management information, used to determine access to the resource, negotiating a session key between client and server devices, generating a session ID based on at least the negotiated session key, inserting the packet management information and the session ID into each information packet sent from the client device to the server device, monitoring packet management information in each information packet from the client device, and filtering out respective information packets sent to the server device from the client device when the monitored packet management information indicates that access to the resource is restricted.
    Type: Application
    Filed: December 8, 2014
    Publication date: April 2, 2015
    Inventors: Dennis Vance Pollutro, Kiet Tuan Tran, Srinivas Kumar
  • Patent number: 8990910
    Abstract: Systems and methods are described for creating a globally unique identity for a user or user-container by performing an iterative join where each participating back-end data source. The systems and methods include an ID-Unify (IDU) that performs identity virtualization and creates or generates a globally unique identifier for a user in operational environments in which there is a pre-existing conflict caused by the existence of different identities for a user in different authentication data sources.
    Type: Grant
    Filed: November 13, 2008
    Date of Patent: March 24, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Srinivas Kumar, Dean A. Weber, Virginia L. Roth, Shadab Munam Shah
  • Patent number: 8990948
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Systems and methods use a graphical user interface (GUI) console to orchestrate operational integrity of a platform. In an embodiment, a method presents a data center-level runtime operational integrity dashboard and remediation controls for infected systems in a display of a platform having a network trust agent, an endpoint trust agent, and a trust orchestrator. The method receives runtime integrity metrics for trust vectors and displays risk indicators based on the confidence level of received integrity metrics in the GUI.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: March 24, 2015
    Assignee: Taasera, Inc.
    Inventors: Srinivas Kumar, Dennis Pollutro
  • Patent number: 8990573
    Abstract: A method of packet security management to ensure a secure connection from one network node to another. The method includes creating a security tag for each packet in a network session, selecting one of a number of possible tag locations within the packet, inserting the security tag at that location, transmitting the tagged packets from a sending node to the receiving node, authenticating the packets' security tags at the receiving node, and dropping non-authenticated packets. The method also includes determining best possible tag locations when sending a packet and locating a security tag when receiving a packet.
    Type: Grant
    Filed: November 10, 2008
    Date of Patent: March 24, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura
  • Patent number: 8943575
    Abstract: A method and system for managing access to resources on a secured network is disclosed. The method includes reading packet information in respective packets of a packet communication received at a security node and applying one of the plurality of access rules. The method also includes determining whether the security node is to block the respective packets and/or the packet communication from reaching a resource on the secured network based on the applied access rule. If the security node is to block the respective packets and/or the packet communication, it is determined whether the applied access rule is a simulated access rule. Responsive to the applied access rule being a simulated access rule, the respective packets and/or the packet communication are passed towards the resource on the secured network and a log event is generated that indicates the security node blocked the respective packets and/or the packet communication.
    Type: Grant
    Filed: April 29, 2009
    Date of Patent: January 27, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura
  • Patent number: 8910241
    Abstract: A method of packet management for restricting access to a resource of a computer system. The method includes identifying client parameters and network parameters, as a packet management information, used to determine access to the resource, negotiating a session key between client and server devices, generating a session ID based on at least the negotiated session key, inserting the packet management information and the session ID into each information packet sent from the client device to the server device, monitoring packet management information in each information packet from the client device, and filtering out respective information packets sent to the server device from the client device when the monitored packet management information indicates that access to the resource is restricted.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: December 9, 2014
    Assignee: Citrix Systems, Inc.
    Inventors: Dennis Vance Pollutro, Kiet Tuan Tran, Srinivas Kumar
  • Patent number: 8850517
    Abstract: A method for assessing runtime risk for an application or device includes: storing, in a rules database, a plurality of rules, wherein each rule identifies an action sequence; storing, in a policy database, a plurality of assessment policies, wherein each assessment policy includes at least one rule of the plurality of rules; identifying, using at least one assessment policy, a runtime risk for an application or device, wherein the identified runtime risk identifies and predicts a specific type of threat; and identifying, by a processing device, a behavior score for the application or device based on the identified runtime risk, wherein the action sequence is a sequence of at least two performed actions, and each performed action is at least one of: a user action, an application action, and a system action.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: September 30, 2014
    Assignee: Taasera, Inc.
    Inventor: Srinivas Kumar
  • Patent number: 8850588
    Abstract: Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects (including mobile devices) and applications on the instrumented target platform. Methods and systems are disclosed for dynamic attestation of mobile device integrity based upon subject reputation scores. In an embodiment, a method scores trustworthiness of a mobile device based on reputation scores for users associated with the device and/or a device reputation score. The method generates runtime integrity alerts regarding execution anomalies for applications executing on the device, calculates risks based on a ruleset, and determines a calculus of risk for the device.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: September 30, 2014
    Assignee: Taasera, Inc.
    Inventors: Srinivas Kumar, Dennis Pollutro
  • Publication number: 20140201806
    Abstract: A method for assessing runtime risk for an application or device includes: storing, in a rules database, a plurality of rules, wherein each rule identifies an action sequence; storing, in a policy database, a plurality of assessment policies, wherein each assessment policy includes at least one rule of the plurality of rules; identifying, using at least one assessment policy, a runtime risk for an application or device, wherein the identified runtime risk identifies and predicts a specific type of threat; and identifying, by a processing device, a behavior score for the application or device based on the identified runtime risk, wherein the action sequence is a sequence of at least two performed actions, and each performed action is at least one of: a user action, an application action, and a system action.
    Type: Application
    Filed: January 15, 2013
    Publication date: July 17, 2014
    Applicant: Taasera, Inc.
    Inventor: Srinivas KUMAR
  • Patent number: 8782735
    Abstract: A method for assessing runtime risk for an application or device includes: storing, in a rules database, a plurality of rules, wherein each rule identifies an action sequence; storing, in a policy database, a plurality of assessment policies, wherein each assessment policy includes at least one rule of the plurality of rules; identifying, using at least one assessment policy, a runtime risk for an application or device, wherein the identified runtime risk identifies and predicts a specific type of threat; and identifying, by a processing device, a behavior score for the application or device based on the identified runtime risk, wherein the action sequence is a sequence of at least two performed actions, and each performed action is at least one of: a user action, an application action, and a system action.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: July 15, 2014
    Assignee: Taasera, Inc.
    Inventor: Srinivas Kumar
  • Patent number: 8776180
    Abstract: Instrumented networks, computer systems and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Methods and systems are disclosed for calculating security risks by determining subject reputation scores. In an embodiment, a system receives a query for a reputation score of a subject, initiates directed queries to external information management systems to interrogate attributes associated with the subject, and analyzes responses. The system receives a hierarchical subject reputation score based on a calculus of risk and returns a reputation token.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: July 8, 2014
    Assignee: Taasera, Inc.
    Inventors: Srinivas Kumar, Dennis Pollutro
  • Publication number: 20140099510
    Abstract: A method of manufacture of a bis(phthalimide) composition includes reacting, in the presence of a solvent and a catalytically active amount of an imidization catalyst selected from quaternary ammonium salts, quaternary phosphonium salts, and combinations thereof, a substituted phthalic anhydride with an organic diamine, wherein conversion to the bis(phthalimide) is 99% complete in less than 6 hours.
    Type: Application
    Filed: October 4, 2012
    Publication date: April 10, 2014
    Inventors: Hendrich Chiong, Surya Prakasha Rao Daliparthi, Hareesh Shamrao Deshpande, Thomas Link Guggenheim, Farid Fouad Khouri, Mahesh Srinivas Kumar, Miguel Angel Navarro De Castro, Roy Ray Odle, Sivakumar P, Dhumal Sunil S, Brennan Alexander Smith, Siva Kumar Sreeramagiri
  • Publication number: 20130298230
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Methods and systems are disclosed for network flow and device/platform remediation in response to reconnaissance-based intelligence correlation based on network monitoring, to accomplish network flow remediation and device/platform remediation. In an embodiment, a system receives system warnings and endpoint threat intelligence. The system correlates risk based on inputs from sensory inputs that monitor network activity, system configuration, resource utilization, and device integrity.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 7, 2013
    Applicant: Taasera, Inc.
    Inventors: Srinivas KUMAR, Dennis POLLUTRO
  • Publication number: 20130298244
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Systems and methods for threat identification and remediation for computing platforms based upon reconnaissance-based intelligence correlation and network/application monitoring are disclosed. In an embodiment, a method provides runtime operational integrity of a system by receiving: a dynamic context including endpoint events; and network endpoint assessments. The method generates temporal events based on the network endpoint assessments and correlates the endpoint events and temporal events before generating an integrity profile for the system.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 7, 2013
    Applicant: Taasera, Inc.
    Inventors: Srinivas KUMAR, Dennis Pollutro
  • Publication number: 20130298242
    Abstract: Instrumented networks, machines and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects (including mobile devices) and applications on the instrumented target platform. Methods and systems are disclosed for dynamic attestation of mobile device integrity based upon subject reputation scores. In an embodiment, a method scores trustworthiness of a mobile device based on reputation scores for users associated with the device and/or a device reputation score. The method generates runtime integrity alerts regarding execution anomalies for applications executing on the device, calculates risks based on a ruleset, and determines a calculus of risk for the device.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 7, 2013
    Applicant: Taasera, Inc.
    Inventors: Srinivas KUMAR, Dennis Pollutro
  • Publication number: 20130298243
    Abstract: Instrumented networks and platforms having target subjects (devices, transactions, services, users, organizations) are disclosed. A security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform. Systems and methods use a graphical user interface (GUI) console to orchestrate operational integrity of a platform. In an embodiment, a method presents a data center-level runtime operational integrity dashboard and remediation controls for infected systems in a display of a platform having a network trust agent, an endpoint trust agent, and a trust orchestrator. The method receives runtime integrity metrics for trust vectors and displays risk indicators based on the confidence level of received integrity metrics in the GUI.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 7, 2013
    Applicant: Taasera, Inc.
    Inventors: Srinivas KUMAR, Dennis Pollutro