Patents by Inventor Tirumaleswar Reddy Konda

Tirumaleswar Reddy Konda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210250349
    Abstract: There is disclosed in one example an enrollment over secure transport (EST)-capable gateway device, including: a hardware platform including a processor and a memory; a first network interface to communicatively couple to an external network, including an external DNS server; a second network interface to communicatively couple to a home network; a caching DNS server including a local DNS cache, and logic to provide DNS services to the home network; and an EST proxy to authenticate to a local endpoint on the home network, provision a DNS server certificate on the local endpoint, provision an authentication domain name (ADN) on the local endpoint, and provide encrypted domain name system (DNS) services to the local endpoint.
    Type: Application
    Filed: February 11, 2020
    Publication date: August 12, 2021
    Applicant: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava, Naveen Kumar Reddy Kandadi, Piyush Pramod Joshi
  • Publication number: 20210203521
    Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a network interface to communicatively couple to a network; and a network gateway engine to identify devices on the network, the network gateway engine including instructions encoded within the memory to instruct the processor to provide two-phase identification for a device newly-identified on the network, including: a static identification phase including applying discovery probes to the newly-identified device; and a dynamic identification phase including collecting network telemetry for the newly-identified device over time and analyzing the collected network telemetry to determine if the network telemetry is consistent with expected network usage for the newly-discovered device.
    Type: Application
    Filed: December 31, 2019
    Publication date: July 1, 2021
    Applicant: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Abhishek Tripathi, Urmil Mahendra Parikh, Dattatraya Kulkarni
  • Patent number: 11050785
    Abstract: Example methods, apparatus, systems and articles of manufacture to implement cooperative mitigation of distributed denial of service attacks originating in local networks are disclosed. An example local network router disclosed herein includes a mitigator to mitigate a distributed denial of service attack detected by an Internet service provider, the distributed denial of service attack associated with network traffic originating from a first device connected to a local network. The example local network router also includes a threat signaling server to identify the first device based on first information received from a threat signaling client of the Internet service provider, the first information describing the distributed denial of service attack. The example threat signaling server is also to transmit second information to notify the threat signaling client of the Internet service provider when the network traffic associated with the distributed denial of service attack has been mitigated.
    Type: Grant
    Filed: October 8, 2018
    Date of Patent: June 29, 2021
    Assignee: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Harsha R. Joshi, Himanshu Srivastava, Srikanth Nalluri, Dattatraya Kulkarni
  • Patent number: 10990679
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: April 27, 2021
    Assignee: McAfee, LLC
    Inventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
  • Publication number: 20200314107
    Abstract: Mechanisms (which can include systems, methods, and media) for securing an Internet of Things (IoT) device are provided, the mechanisms comprising: receiving a DNS request identifying a fully qualified domain name (FQDN) that originated from the IoT device; in response to receiving the DNS request, determining by a hardware processor whether to allow or drop a connection between the IoT device and a target domain corresponding to the FQDN; and responding to the DNS request with instructions to allow or drop the connection based on the determining.
    Type: Application
    Filed: June 3, 2019
    Publication date: October 1, 2020
    Inventors: Harsha R. Joshi, Tirumaleswar Reddy Konda, Shashank Jain, Abhishek Tripathi
  • Patent number: 10791118
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to establish a connection with a router, obtain identification for the router, communicate the identification of the router to a network element, receive a hash of at least a portion of a certificate for the router, and disconnect the connection and establish a new connection with the router, where the hash is used to authenticate network services received from the router during the new connection. In an example, the hash is part of a subject public key infrastructure (SPKI) pin set.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: September 29, 2020
    Assignee: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Himanshu Srivastava, Harsha Ramamurthy Joshi, Srikanth Nalluri, Dattatraya Kulkarni
  • Publication number: 20200304459
    Abstract: Mechanisms for split tunneling are provided, the method comprising: identifying a plurality of user devices; determining that communications for a first device of the plurality of user devices are to be tunneled; receiving a DNS request from a second device of the plurality of user devices; modifying the DNS request to request meta information corresponding to a domain identified in the DNS request; sending the DNS request to a DNS server using the hardware processor; receiving a response to the DNS request including the meta information; determining that communications for the second device are not to be tunneled based at least in part based on the meta information; and causing the communication for the first device to be tunneled and the communications for the second device to not be tunneled.
    Type: Application
    Filed: May 6, 2019
    Publication date: September 24, 2020
    Inventors: Tirumaleswar Reddy Konda, JR., Harsha R. Joshi, Eric Wuehler, Shashank Jain
  • Publication number: 20200236104
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify encrypted handshakes. An example apparatus includes a message copier to clone a client introductory message, the client introductory message is included in a first handshake for network communication between a client and a server, a connection establisher to initiate a second handshake between the apparatus and the server based on the cloned client introductory message, and a decrypter to, in response to the second handshake, decrypt a certificate sent by the server.
    Type: Application
    Filed: March 7, 2019
    Publication date: July 23, 2020
    Inventors: Tirumaleswar Reddy Konda, Harsha R. Joshi, Shashank Jain, Himanshu Srivastava, Srikanth Nalluri, Naveen Kandadi
  • Publication number: 20200204580
    Abstract: Particular embodiments described herein provide for a system that can be configured to facilitate the use of a blockchain for distributed denial of service attack mitigation, the system can include a network security provider and a validating node. The network security provider can recognize that a distributed denial of service (DDoS) attack is occurring, create a block that includes data related to the DDoS attack, and publish the block that includes the data related to the DDoS attack for addition to a blockchain. The validating node can validate the block that includes the data related to the DDoS attack and the block that includes the data related to the DDoS attack can be added to the blockchain. The block that includes the data related to the DDoS attack can be analyzed to determine how to mitigate a similar DDoS attack.
    Type: Application
    Filed: December 19, 2018
    Publication date: June 25, 2020
    Applicant: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Harsha Ramamurthy Joshi, Piyush Pramod Joshi, Eric Donald Wuehler
  • Publication number: 20200153846
    Abstract: Methods, systems, and media for dynamically separating Internet of Things (IoT) devices in a network are provided. In accordance with some embodiments of the disclosed subject matter, a method for dynamically separating IoT devices in a network is provided, the method comprising: detecting a first IoT device in the network; monitoring network communication of the first IoT device; determining device information of the first IoT device based on the monitored network communication; and causing the first IoT device to communicate on a first subnet of a plurality of subnets in the network based on the device information.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Inventors: Himanshu Srivastava, Tirumaleswar Reddy Konda, Piyush P. Joshi, Harsha R. Joshi, Srikanth Nalluri, Dattatraya Kulkarni, Siddaraya Revashetti
  • Publication number: 20200107201
    Abstract: A technique for collecting and using signal reputation data, comprising obtaining a plurality of signal reputation data corresponding to a plurality of locations, categorizing the signal reputation data into groups, calculating signal circles for at least some of the groups based on a representative signal value for the corresponding group, calculating a signal reputation score for each signal circle, determining a best signal circle for a user mobile device within a predetermined distance of dead zones, and sending the best signal circle to the user mobile device based at least in part on the signal reputation score and a location of the user mobile device. In some embodiments, the technique may include some but not all of these actions and additional actions, such as suspending obtaining signal reputation data based on battery status.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Inventors: Raja Sinha, Dattatraya Kulkarni, Srikanth Nalluri, Anjan Kumar Nayak, Tirumaleswar Reddy Konda, Susmita Nayak, Purushothaman B, Harsha R. Joshi
  • Publication number: 20200067974
    Abstract: Example methods, apparatus, systems and articles of manufacture to implement cooperative mitigation of distributed denial of service attacks originating in local networks are disclosed. An example local network router disclosed herein includes a mitigator to mitigate a distributed denial of service attack detected by an Internet service provider, the distributed denial of service attack associated with network traffic originating from a first device connected to a local network. The example local network router also includes a threat signaling server to identify the first device based on first information received from a threat signaling client of the Internet service provider, the first information describing the distributed denial of service attack. The example threat signaling server is also to transmit second information to notify the threat signaling client of the Internet service provider when the network traffic associated with the distributed denial of service attack has been mitigated.
    Type: Application
    Filed: October 8, 2018
    Publication date: February 27, 2020
    Inventors: Tirumaleswar Reddy Konda, Harsha R. Joshi, Himanshu Srivastava, Srikanth Nalluri, Dattatraya Kulkarni
  • Publication number: 20190340360
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 7, 2019
    Inventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
  • Publication number: 20190306166
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to establish a connection with a router, obtain identification for the router, communicate the identification of the router to a network element, receive a hash of at least a portion of a certificate for the router, and disconnect the connection and establish a new connection with the router, where the hash is used to authenticate network services received from the router during the new connection. In an example, the hash is part of a subject public key infrastructure (SPKI) pin set.
    Type: Application
    Filed: March 29, 2018
    Publication date: October 3, 2019
    Applicant: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Himanshu Srivastava, Harsha Ramamurthy Joshi, Srikanth Nalluri, Dattatraya Kulkarni