Patents by Inventor Venkata Siva Vijayendra BHAMIDIPATI

Venkata Siva Vijayendra BHAMIDIPATI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210297249
    Abstract: Systems and methods for managing keys in a computer memory are described. In some embodiments, location addresses are determined for two key elements. A periodic time interval that is based on a time duration for performing a transaction involving a distance between the key elements is determined. One key element may be stored at a location address and then relocated to another location address after the periodic time interval has passed. In some embodiments, areas the computer memory may remain static during relocation of the key element.
    Type: Application
    Filed: June 7, 2021
    Publication date: September 23, 2021
    Inventors: Michael J.T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe
  • Patent number: 11070373
    Abstract: Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
    Type: Grant
    Filed: February 21, 2018
    Date of Patent: July 20, 2021
    Assignee: eBay Inc.
    Inventors: Michael J. T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe
  • Publication number: 20210019740
    Abstract: Technologies are shown for selecting a provider to service a client service request using a predictive metrics based consensus protocol to select a provider and create a service request transaction block to service the client service request. A client service request is received and forwarded to a set of providers. Proposed transactions are received from the providers and scored based on a predictive metric. A proposal transaction is selected based on the scoring and the selected transaction is written as a block on a service transaction blockchain. The provider for the selected transaction detects the block on the blockchain and performs the requested service. The client detects the block on the blockchain and transfers payment to the provider. Selection can be based on predictive metrics in the providers or macro metrics determined in miner nodes in combination with provider reputation, currency, load sharing, fairness, provisioning, and static and dynamic criteria.
    Type: Application
    Filed: January 14, 2020
    Publication date: January 21, 2021
    Inventors: Venkata Siva Vijayendra BHAMIDIPATI, Derek CHAMORRO, Michael CHAN, Arpit JAIN, Ashok Srinivasa MURTHY, Anirudh Kamalapuram MURALIDHAR
  • Publication number: 20200403809
    Abstract: Technologies are shown for authenticating service requests on a communication link established using a digital certificate owned by an entity, where permissions data is associated with the digital certificate. A service request is received from the entity through the communication link. Responsive to the service request, the permissions data associated with the digital certificate is obtained and the service request checked against the permissions data associated with the digital certificate. If the service request is permitted based on the permissions data, the service request is processed. If the service request is not permitted based on the permissions data, the service request is rejected. The permissions data can be stored on a blockchain with a blockchain address in the certificate, in a certificate authority for the certificate, or locally on a server receiving the service request.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Michael CHAN, Derek CHAMORRO, Venkata Siva Vijayendra BHAMIDIPATI, Arpit JAIN, Ralph Scott FORSYTHE
  • Publication number: 20200311666
    Abstract: Delivery routing for an item is dynamically changed based on environmental conditions the item experiences during transport. The item may be associated with thresholds describing environmental conditions which must be maintained to avoid damage to the item. If sensors associated with the item detect deviation from the set thresholds during transport, instructions to reroute the item may be dynamically generated and provided to a vehicle or shipping agent responsible for transporting the item. Options for rerouting the item include returning it to the sender, disposing of it in a nearby disposal facility, sending to an inspection facility, or sending it on to the original destination location. The environmental thresholds associated with an item, records of conditions measured by sensors during transport, and alternative delivery locations may be stored in a distributed ledger such as a blockchain. Entities associated with the shipment may have access to the distributed ledger.
    Type: Application
    Filed: June 27, 2019
    Publication date: October 1, 2020
    Inventors: Douglas Bradley GRAY, Constanza Maria HEATH, Gail Anna Rahn FREDERICK, Venkata Siva Vijayendra BHAMIDIPATI, Michael CHAN, Derek CHAMORRO
  • Publication number: 20200175155
    Abstract: Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.
    Type: Application
    Filed: June 3, 2019
    Publication date: June 4, 2020
    Inventors: Venkata Siva Vijayendra BHAMIDIPATI, Michael CHAN, Derek CHAMORRO, Arpit JAIN, Ashok Srinivasa MURTHY
  • Publication number: 20200177372
    Abstract: Technologies are shown for HGM based control for smart contract execution. HGM control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The HGM control rules are applied to HGMs collected from the call stack to allow or prohibit specific HGMs observed in functions or function call chains. HGM control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the HGM control rules, then the function call can be blocked from executing or completing execution. The HGM control rules can be generated by executing known sets of acceptable or vulnerable smart contracts and collecting the resulting HGMs.
    Type: Application
    Filed: October 18, 2019
    Publication date: June 4, 2020
    Inventors: Venkata Siva Vijayendra BHAMIDIPATI, Michael CHAN, Derek CHAMORRO, Arpit JAIN, Ashok Srinivasa MURTHY
  • Publication number: 20200175156
    Abstract: Technologies are shown for function level permissions control for smart contract execution to implement permissions policy on a blockchain. Permissions control rules control function calls at a system level utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for a smart contract. The permissions control rules are applied to the call stack to implement permissions control policy. Permissions control rules can use dynamic state data in the function call chain. If the dynamic state data observed in function call chains does not meet the requirements defined in the permissions control rules, then the function call can be blocked from executing or completing execution. The permissions control rules can be generated for a variety of different entities, such as a domain, user or resource.
    Type: Application
    Filed: November 27, 2019
    Publication date: June 4, 2020
    Inventors: Venkata Siva Vijayendra BHAMIDIPATI, Ashok Srinivasa MURTHY, Derek CHAMORRO, Michael CHAN, Arpit JAIN
  • Publication number: 20200142739
    Abstract: Technologies are shown for storing component state data for a resource on a blockchain involving generating a resource data block that corresponds to a resource that includes links that correspond to components of the resource, generating a first component state data block for a component of the resource on a blockchain that includes first state data for the first component, and setting the link for the component to reference the first component state data block. Subsequently, a second component state data block can be generated for the component with second state data and the second component state data block linked to the first component state data block.
    Type: Application
    Filed: April 15, 2019
    Publication date: May 7, 2020
    Inventors: Michael CHAN, Derek CHAMORRO, Venkata Siva Vijayendra BHAMIDIPATI, Arpit JAIN
  • Publication number: 20200110821
    Abstract: Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.
    Type: Application
    Filed: October 9, 2018
    Publication date: April 9, 2020
    Inventors: Michael CHAN, Derek CHAMORRO, Arpit JAIN, Venkata Siva Vijayendra BHAMIDIPATI
  • Publication number: 20190260584
    Abstract: Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
    Type: Application
    Filed: February 21, 2018
    Publication date: August 22, 2019
    Inventors: Michael J.T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe