Patents by Inventor Sudhakar Narayanamurthy

Sudhakar Narayanamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11856009
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Grant
    Filed: February 11, 2021
    Date of Patent: December 26, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ashish Mishra, Puhazholi Vetrivel, Philip K Newman, Sudhakar Narayanamurthy
  • Publication number: 20210194899
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Application
    Filed: February 11, 2021
    Publication date: June 24, 2021
    Inventors: Ashish MISHRA, Puhazholi VETRIVEL, Philip K NEWMAN, Sudhakar NARAYANAMURTHY
  • Patent number: 11025665
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: June 1, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Patent number: 10944766
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: March 9, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ashish Mishra, Puhazholi Vetrivel, Philip K Newman, Sudhakar Narayanamurthy
  • Publication number: 20200304538
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Application
    Filed: June 8, 2020
    Publication date: September 24, 2020
    Inventors: Philip K. NEWMAN, Puhazholi VETRIVEL, Sudhakar NARAYANAMURTHY, Ejike E. OFUONYE, Suresh C. PALANI, Ashish MISHRA
  • Patent number: 10715545
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Patent number: 10701100
    Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: June 30, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy
  • Publication number: 20190098040
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Application
    Filed: January 19, 2018
    Publication date: March 28, 2019
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Publication number: 20190098026
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Application
    Filed: January 22, 2018
    Publication date: March 28, 2019
    Inventors: Ashish MISHRA, Puhazholi Vetrivel, Philip K. Newman, Sudhakar Narayanamurthy
  • Publication number: 20180191771
    Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.
    Type: Application
    Filed: March 30, 2017
    Publication date: July 5, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy