Patents by Inventor Subramanian Varadarajan
Subramanian Varadarajan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200413111Abstract: This present application relates to delivery of data content across a mesh network of proxy servers based on network context. In some embodiments, optimal paths for delivering the application or data content are computed and selected dynamically based upon context of network traffic. In some embodiments, large data content, such as video content, is segmented dynamically based on network context to reduce delay between a request for the video content by a client device and start of playback of the requested video content at the client device. In some embodiments, a server determines a segmentation profile for segmenting the video content into a plurality of video segments each having a segment size determined based on link performance metrics, generates a manifest file referencing the plurality of video segments in a temporal order and provide the manifest file to a client device.Type: ApplicationFiled: April 8, 2020Publication date: December 31, 2020Inventors: Subramanian Varadarajan, Rosarin R. Antonyraj
-
Patent number: 10873599Abstract: Computer systems and methods are provided for storing a first path profile. A computing device receives a first request to access a first location of a website, transmits the first request to a server, and receives a first cookie that includes identifying information for the first location. In response to receiving the first cookie, the device stores the identifying information. The device receives a second request to access a second location of the web site that is distinct from the first location. The second request includes the identifying information for the first location. The device transmits the second request to the server and receives a second cookie that includes the identifying information for the first location and for the second location. In response to receiving the second cookie, the device stores the first path profile that includes the identifying information for the first location and the second location.Type: GrantFiled: July 11, 2018Date of Patent: December 22, 2020Assignee: ZYCADA NETWORKS, INC.Inventors: Subramanian Varadarajan, Rosarin Roy Antonyraj
-
Patent number: 10757011Abstract: Exemplary methods, apparatuses, and systems include a path management hub and proxy server nodes that form a mesh network. The hub receives link performance metrics from each of the nodes. The hub determines optimal paths between first and second nodes for each of a plurality of metric types or a combination of metric types using the received link performance metrics. The hub maps a service identifier to a plurality of the determined optimal paths for a context representing one or more link performance metric types. The hub transmits a next hop for each of the plurality of mapped optimal paths along with the mapping to the first node. The first node receives the service identifier mapped to the next hops and traffic for the first connection. In response to determining the received traffic is for the service, the first node selects a first next hop and forwards the traffic.Type: GrantFiled: May 24, 2018Date of Patent: August 25, 2020Assignee: ZYCADA NETWORKS, INC.Inventors: Rosarin Roy Antonyraj, Subramanian Varadarajan
-
Publication number: 20200177623Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.Type: ApplicationFiled: December 29, 2019Publication date: June 4, 2020Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 10536479Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.Type: GrantFiled: March 19, 2018Date of Patent: January 14, 2020Assignee: Shape Security, Inc.Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20190243971Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: ApplicationFiled: December 27, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20190243951Abstract: A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information.Type: ApplicationFiled: December 27, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: Marc R. Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D. Call
-
Patent number: 10205742Abstract: A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information.Type: GrantFiled: May 6, 2016Date of Patent: February 12, 2019Inventors: Marc R. Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D. Call
-
Publication number: 20190042394Abstract: In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image.Type: ApplicationFiled: October 2, 2018Publication date: February 7, 2019Applicant: SHAPE SECURITY, INC.Inventor: SUBRAMANIAN VARADARAJAN
-
Patent number: 10193909Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: GrantFiled: October 16, 2017Date of Patent: January 29, 2019Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20180343192Abstract: Exemplary methods, apparatuses, and systems include a path management hub and proxy server nodes that form a mesh network. The hub receives link performance metrics from each of the nodes. The hub determines optimal paths between first and second nodes for each of a plurality of metric types or a combination of metric types using the received link performance metrics. The hub maps a service identifier to a plurality of the determined optimal paths for a context representing one or more link performance metric types. The hub transmits a next hop for each of the plurality of mapped optimal paths along with the mapping to the first node. The first node receives the service identifier mapped to the next hops and traffic for the first connection. In response to determining the received traffic is for the service, the first node selects a first next hop and forwards the traffic.Type: ApplicationFiled: May 24, 2018Publication date: November 29, 2018Inventors: Rosarin Roy Antonyraj, Subramanian Varadarajan
-
Patent number: 10089216Abstract: In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image.Type: GrantFiled: June 30, 2014Date of Patent: October 2, 2018Assignee: SHAPE SECURITY, INC.Inventor: Subramanian Varadarajan
-
Publication number: 20180270256Abstract: Techniques detecting the execution of alien content on a client computing device are provided. A set of web code is supplemented with a set of instrumentation code, which when executed at a client computing device, collects and reports information that describes execution of the set of web code at the client computing device, wherein the client computing device receives the set of web code and the set of instrumentation code. A set of information is received from the client computing device that is generated by the set of instrumentation code when the set of instrumentation code is executed at the client computing device. The presence of alien content interacting with the set of web code on the client computing device is determined based on the set of information.Type: ApplicationFiled: May 14, 2018Publication date: September 20, 2018Inventors: Justin D. Call, Subramanian Varadarajan, Xiaohan Huang, Xiaoming Zhou, Marc R. Hansen
-
Publication number: 20180212993Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.Type: ApplicationFiled: March 19, 2018Publication date: July 26, 2018Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Patent number: 9973519Abstract: A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served.Type: GrantFiled: March 27, 2017Date of Patent: May 15, 2018Inventors: Justin D. Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R. Hansen
-
Patent number: 9923919Abstract: A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements.Type: GrantFiled: August 10, 2015Date of Patent: March 20, 2018Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
-
Publication number: 20180041527Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: ApplicationFiled: October 16, 2017Publication date: February 8, 2018Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20170324722Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Inventors: Justin Call, Subramanian Varadarajan, Bryan Hanks
-
Patent number: 9794276Abstract: In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.Type: GrantFiled: November 2, 2015Date of Patent: October 17, 2017Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Patent number: 9716702Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.Type: GrantFiled: June 14, 2015Date of Patent: July 25, 2017Assignee: Shape Security, Inc.Inventors: Justin Call, Subramanian Varadarajan, Bryan Hanks