Patents by Inventor Sudhakar Narayanamurthy
Sudhakar Narayanamurthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11856009Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.Type: GrantFiled: February 11, 2021Date of Patent: December 26, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ashish Mishra, Puhazholi Vetrivel, Philip K Newman, Sudhakar Narayanamurthy
-
Publication number: 20210194899Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.Type: ApplicationFiled: February 11, 2021Publication date: June 24, 2021Inventors: Ashish MISHRA, Puhazholi VETRIVEL, Philip K NEWMAN, Sudhakar NARAYANAMURTHY
-
Patent number: 11025665Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.Type: GrantFiled: June 8, 2020Date of Patent: June 1, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
-
Patent number: 10944766Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.Type: GrantFiled: January 22, 2018Date of Patent: March 9, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Ashish Mishra, Puhazholi Vetrivel, Philip K Newman, Sudhakar Narayanamurthy
-
Publication number: 20200304538Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.Type: ApplicationFiled: June 8, 2020Publication date: September 24, 2020Inventors: Philip K. NEWMAN, Puhazholi VETRIVEL, Sudhakar NARAYANAMURTHY, Ejike E. OFUONYE, Suresh C. PALANI, Ashish MISHRA
-
Patent number: 10715545Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.Type: GrantFiled: January 19, 2018Date of Patent: July 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
-
Patent number: 10701100Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.Type: GrantFiled: March 30, 2017Date of Patent: June 30, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy
-
Publication number: 20190098040Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.Type: ApplicationFiled: January 19, 2018Publication date: March 28, 2019Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
-
Publication number: 20190098026Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.Type: ApplicationFiled: January 22, 2018Publication date: March 28, 2019Inventors: Ashish MISHRA, Puhazholi Vetrivel, Philip K. Newman, Sudhakar Narayanamurthy
-
Publication number: 20180191771Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.Type: ApplicationFiled: March 30, 2017Publication date: July 5, 2018Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy