Patents by Inventor Venkateshwar Nandam

Venkateshwar Nandam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7971262
    Abstract: Methods and software products are disclosed for protecting against software piracy. When a customer purchases software, the seller performs an activation process by identifying a unique computer identifier (ID) for the computer system of the customer, and activating the software based on the computer ID, such as by encoding the computer ID on the media storing the software. When the customer attempts to install the software on a computer system, the computer system executes an installation process. The computer system identifies its own computer ID and the computer ID used to activate the software. The computer system determines if its computer ID corresponds with the computer ID used to activate the software. If the computer IDs correspond, then the computer system is allowed to install the software. If not, the computer system is prevented from installing the software.
    Type: Grant
    Filed: July 23, 2004
    Date of Patent: June 28, 2011
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Dinesh K. Jindal, Venkateshwar Nandam
  • Patent number: 7376977
    Abstract: A method, software, and computer system for defending against virus attacks is described. Assume that a computer system receives an instruction to run an executable file. Before the computer system runs the executable file, the computer system determines if the executable file is certified to run on the computer system. If the executable file is not certified, then the computer system prevents the executable file from running. If the executable file is certified, then the computer system determines if the executable file has been modified since being certified. If the executable file has been modified, then the computer system prevents the executable file from running. If the executable file has been certified and has not been modified, then the computer system runs the executable file. Because many viruses are included in executable files, virus attacks may be prevented by requiring executable files to be certified before they can run.
    Type: Grant
    Filed: May 28, 2004
    Date of Patent: May 20, 2008
    Assignee: Lucent Technologies Inc.
    Inventors: Dinesh K. Jindal, Venkateshwar Nandam
  • Publication number: 20060293022
    Abstract: Emergency session systems and corresponding methods are described that allow a subscriber to initiate an emergency session over a communication network in anticipation of an emergency event. The emergency session system includes a subscriber database that is operable to store a plurality of subscriber profiles for a plurality of subscribers subscribing to an emergency service offered by a service provider. Responsive to initiating an emergency session for a subscriber, a control system accesses the subscriber database to identify a subscriber profile for the subscriber. The control system identifies a first set of parameters for the emergency session from the subscriber profile, and performs actions based on the first set of parameters. The parameters may be pre-defined by the subscriber or dynamically entered by the subscriber.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Inventors: Dinesh Jindal, Venkateshwar Nandam
  • Publication number: 20060021067
    Abstract: Methods and software products are disclosed for protecting against software piracy. When a customer purchases software, the seller performs an activation process by identifying a unique computer identifier (ID) for the computer system of the customer, and activating the software based on the computer ID, such as by encoding the computer ID on the media storing the software. When the customer attempts to install the software on a computer system, the computer system executes an installation process. The computer system identifies its own computer ID and the computer ID used to activate the software. The computer system determines if its computer ID corresponds with the computer ID used to activate the software. If the computer IDs correspond, then the computer system is allowed to install the software. If not, the computer system is prevented from installing the software.
    Type: Application
    Filed: July 23, 2004
    Publication date: January 26, 2006
    Inventors: Dinesh Jindal, Venkateshwar Nandam
  • Publication number: 20050278788
    Abstract: A method, software, and computer system for defending against virus attacks is described. Assume that a computer system receives an instruction to run an executable file. Before the computer system runs the executable file, the computer system determines if the executable file is certified to run on the computer system. If the executable file is not certified, then the computer system prevents the executable file from running. If the executable file is certified, then the computer system determines if the executable file has been modified since being certified. If the executable file has been modified, then the computer system prevents the executable file from running. If the executable file has been certified and has not been modified, then the computer system runs the executable file. Because many viruses are included in executable files, virus attacks may be prevented by requiring executable files to be certified before they can run.
    Type: Application
    Filed: May 28, 2004
    Publication date: December 15, 2005
    Applicant: Lucent Technologies Inc.
    Inventors: Dinesh Jindal, Venkateshwar Nandam