Patents by Inventor Vijay Yadav

Vijay Yadav has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11070554
    Abstract: A computer system determines that authentication information has been requested from a user device by a requesting device. In response to determining that authentication information has been requested by the requesting device, the computer system identifies information corresponding to the requesting device and determines if one or more risk indications correspond to the identified information corresponding to the requesting device. In response to determining that one or more risk indications correspond to the identified information corresponding to the requesting device, the computer system implements one or more security measures.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: July 20, 2021
    Assignee: PayPal, Inc.
    Inventors: Nathan Robert Pratt, Bradley Wardman, Meethil Vijay Yadav, Nicole Harris
  • Publication number: 20210203692
    Abstract: A method for phishing detection using uniform resource locators is discussed. The method includes accessing data from one or more of a monitored portion of website data and a monitored portion of emails, the data indicating a suspect Uniform Resource Locator (URL). The method includes assigning a rule score based on partial rule scores of each portion of the suspect URL, the rule score indicating a phishing potential based on URL rules. The method includes determining a uniqueness score of the suspect URL, the uniqueness score indicating a degree of uniqueness of the suspect URL from a plurality of known phishing URLs. The method also includes determining a URL phishing score based, at least in part, on the rules scores and the uniqueness score for the suspect URL.
    Type: Application
    Filed: December 27, 2019
    Publication date: July 1, 2021
    Inventors: Eric Nunes, Meethil Vijay Yadav, Nicholas Bailey, Nathan Pratt, Bradley Wardman, Todd Clausen, Kevin Tyers
  • Publication number: 20210203690
    Abstract: A method for phishing detection using certificates associated with uniform resource locators (URLs) is discussed. The method includes accessing certificate portions of a certificate associated with a suspect URL, the certificate accessed at a database that includes certificates obtained by monitoring certificate logs. The method includes accessing a URL score for the suspect URL. The method includes assigning a certificate rule score based on partial certificate scores of certificate portions, the certificate rule score indicating a phishing potential for the certificate, each of the partial certificate scores indicating a likelihood of phishing of each portion based on certificate rules. The method includes using a machine learning model based on the URL score and the certificate to determine a uniqueness certificate score. The method also includes determining a phishing certificate score based on the certificate rule score and the uniqueness certificate score for the certificate.
    Type: Application
    Filed: December 27, 2019
    Publication date: July 1, 2021
    Inventors: Eric Nunes, Kevin Tyers, Meethil Vijay Yadav, Nicholas Bailey, Todd Clausen, Nathan Pratt, Bradley Wardman
  • Publication number: 20210203693
    Abstract: A method for phishing detection based on modeling of web page content is discussed. The method includes accessing suspect web page content of a suspect Uniform Resource Locator (URL). The method includes generating an exemplary model based on an exemplary configuration for an indicated domain associated with the suspect URL, where the exemplary model indicates structure and characteristics of an example web page of the indicated domain. The method includes generating a suspect web page model that indicates structure and characteristics of the suspect web page content. The method includes performing scoring functions for the potential phishing web page content based on the suspect web page model, where some of the scoring functions use the exemplary model to perform analysis to generate respective results. The method includes generating a web page content phishing score based on results from the scoring functions.
    Type: Application
    Filed: December 27, 2019
    Publication date: July 1, 2021
    Inventors: Todd Clausen, Kevin Tyers, Nicholas Bailey, Eric Nunes, Meethil Vijay Yadav, Bradley Wardman, Nathan Pratt
  • Publication number: 20210203691
    Abstract: A method for using a malware and phishing detection and mediation platform is discussed. The method includes accessing data from one or more of a monitored portion of website data and a monitored portion of emails, the data indicating a respective potential malware or a suspect phishing element (e.g., Uniform Resource Locator (URL)). The method includes selecting one of a plurality of detection engines for processing the data, where the selecting is based on previous results of previous processing by one or more detection engines. Each of the plurality of detection engines can be for performing one or more respective investigation actions on the plurality of data to determine a particular issue with one of the monitored data. The method also includes determining a mediation action based on a result of processing of the detection engine and the previous processing.
    Type: Application
    Filed: December 27, 2019
    Publication date: July 1, 2021
    Inventors: Nathan Pratt, Bradley Wardman, Kevin Tyers, Eric Nunes, Meethil Vijay Yadav, Todd Clausen, Nicholas Bailey
  • Publication number: 20210105298
    Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.
    Type: Application
    Filed: September 14, 2020
    Publication date: April 8, 2021
    Inventors: Vinjith NAGARAJA, Meethil Vijay YADAV, Bradley WARDMAN
  • Publication number: 20200389480
    Abstract: Methods and systems for assessing and evaluating vulnerabilities of a networked system are presented. A list of known vulnerabilities that have been disclosed in the public may be obtained. The networked system may be scanned from an external perspective to obtain network information of the networked system. A subset of the known vulnerabilities may be determined to be relevant to the networked system based on correlations between the vulnerabilities and the network information. The networked system may also be analyzed from an internal perspective to determine impacts of the relevant known vulnerabilities to the networked system. The impact of a vulnerability may be determined based on the type of data and/or the type of services that may be accessible in an attack that exploits the vulnerability. The vulnerabilities may then be ranked and addressed based on the impacts.
    Type: Application
    Filed: June 6, 2019
    Publication date: December 10, 2020
    Inventors: Eric Nunes, Bradley Wardman, Meethil Vijay Yadav, Kevin Tyers, Nicole Harris, Jakub Burgis
  • Publication number: 20200351095
    Abstract: Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger.
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Meethil Vijay Yadav, Bradley Wardman, Braden Christopher Ericson
  • Patent number: 10778716
    Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: September 15, 2020
    Assignee: PAYPAL, INC.
    Inventors: Vinjith Nagaraja, Meethil Vijay Yadav, Bradley Wardman
  • Publication number: 20200120144
    Abstract: Methods and systems are presented for dynamically adjusting a risk classification of a risk source based on classifications of one or more other risk sources. The risk engine may first classify a first risk source as a first risk type based on an initial analysis of the first risk source. Subsequent to classifying the first risk source as the first risk type, the risk engine may determine that a second risk source is associated with a second risk type. Based on the determination that the second risk source is associated with the second risk type, the risk engine may re-classify the first risk source as the second risk type. The risk engine may then use the reclassification of the first risk source to improve network security of an online service provider.
    Type: Application
    Filed: November 13, 2018
    Publication date: April 16, 2020
    Inventors: Meethil Vijay Yadav, Bradley Wardman, Kevin Tyers, Blake Butler
  • Publication number: 20190334896
    Abstract: A computer system determines that authentication information has been requested from a user device by a requesting device. In response to determining that authentication information has been requested by the requesting device, the computer system identifies information corresponding to the requesting device and determines if one or more risk indications correspond to the identified information corresponding to the requesting device. In response to determining that one or more risk indications correspond to the identified information corresponding to the requesting device, the computer system implements one or more security measures.
    Type: Application
    Filed: April 30, 2018
    Publication date: October 31, 2019
    Inventors: Nathan Robert PRATT, Bradley WARDMAN, Meethil Vijay YADAV, Nicole HARRIS
  • Publication number: 20190332767
    Abstract: A computer system detects an action corresponding to a resource page being rendered within a web view of an application. In response to the detecting the action corresponding to a resource page being rendered within the web view of the application, the computer system identifies information associated with the resource page and determines if one or more risk indications correspond to the identified information. In response to determining that one or more risk indications correspond to the identified information, the computer system implements one or more security measures.
    Type: Application
    Filed: December 20, 2018
    Publication date: October 31, 2019
    Inventors: Bradley Wardman, Meethil Vijay Yadav, Nathan Robert Pratt
  • Publication number: 20190190946
    Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.
    Type: Application
    Filed: December 20, 2017
    Publication date: June 20, 2019
    Inventors: Vinjith Nagaraja, Meethil Vijay Yadav, Bradley Wardman
  • Patent number: 9375896
    Abstract: A label material for use with water-based adhesives. The label material includes a synthetic paper having an upper surface and a lower surface. The synthetic paper includes a biaxially-oriented polymeric sheet having a voided layer. A printable coating is optionally provided on an upper surface of the polymeric sheet and an adhesive-receiving coating is provided on a lower surface of the polymeric sheet. The polymeric sheet has a density of not more than 0.55 g·cm?3. The adhesive-receiving coating includes a polymeric binder and an absorbent pigment and has a surface energy of at least 40 dyne·cm?1.
    Type: Grant
    Filed: July 27, 2011
    Date of Patent: June 28, 2016
    Assignee: ARJOBEX LIMITED
    Inventors: Jonathan Cooper, Mark Grimbley, Bharath Chandra, Vijay Yadav
  • Publication number: 20150111908
    Abstract: The present invention provides methods and therapeutic agents for lowering or increasing serum serotonin levels in a patient in order to increase or decrease bone mass, respectively. In preferred embodiments, the patient is known to have, or to be at risk for, a low bone mass disease such as osteoporosis and the agents are TPH1 inhibitors or serotonin receptor antagonists.
    Type: Application
    Filed: May 20, 2014
    Publication date: April 23, 2015
    Inventors: Gerard Karsenty, Patricia F. Ducy, Yuli Xie, Donald Landry, Vijay Yadav
  • Patent number: 8867342
    Abstract: An adaptive standby access point in a local area communication network includes an interface operable to communicate with other access points, at least one radio operable to communicate with user devices utilizing at least one antenna, and a processor operable to receive a message over the interface from one of the other access points that is experiencing traffic overload. The message indicating to the standby access point that the one other access point requires traffic demand assistance, whereupon the processor will activate and direct the radio to send out beacons to solicit user devices within the coverage area of the overloaded access point to instead association with the standby access point.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: October 21, 2014
    Assignee: Symbol Technologies, Inc.
    Inventors: Tushar Mathur, Anil Kaushik, Raj Kiran, Senthilraj Shanmugavadivel, Vijay Yadav
  • Patent number: 8842651
    Abstract: An apparatus and method for access point groupings bridging tunneled traffic for a communication network, includes a first step of associating each access point with a location parameter. A next step includes grouping access points in accordance with the location parameter. A next step includes receiving a packet. A next step includes bridging the packet between Layer-2 tunnels of all access points that are part of a grouping.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: September 23, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Jeelan Poola, Azif Ak, Somesh Agrawal, Channareddy Ireddy, Sukhdeep Singh Johar, Vijay Yadav, Senthilraj Shanmugavadivel, Sundaresan Sundaram
  • Publication number: 20140146735
    Abstract: An apparatus and method for access point groupings bridging tunneled traffic for a communication network, includes a first step of associating each access point with a location parameter. A next step includes grouping access points in accordance with the location parameter. A next step includes receiving a packet. A next step includes bridging the packet between Layer-2 tunnels of all access points that are part of a grouping.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 29, 2014
    Applicant: Motorola Solutions, Inc.
    Inventors: Jeelan Poola, Azif Ak, Somesh Agrawal, Channareddy Ireddy, Sukhdeep Singh Johar, Vijay Yadav, Senthilraj Shanmugavadivel, Sundaresan Sundaram
  • Publication number: 20140003230
    Abstract: An adaptive standby access point in a local area communication network includes an interface operable to communicate with other access points, at least one radio operable to communicate with user devices utilizing at least one antenna, and a processor operable to receive a message over the interface from one of the other access points that is experiencing traffic overload. The message indicating to the standby access point that the one other access point requires traffic demand assistance, whereupon the processor will activate and direct the radio to send out beacons to solicit user devices within the coverage area of the overloaded access point to instead association with the standby access point.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Applicant: Symbol Technologies, Inc.
    Inventors: Tushar Mathur, Anil Kaushik, Raj Kiran, Senthilraj Shanmugavadivel, Vijay Yadav
  • Publication number: 20130292031
    Abstract: A label material for use with water-based adhesives. The label material includes a synthetic paper having an upper surface and a lower surface. The synthetic paper includes a biaxially-oriented polymeric sheet having a voided layer. A printable coating is optionally provided on an upper surface of the polymeric sheet and an adhesive-receiving coating is provided on a lower surface of the polymeric sheet. The polymeric sheet has a density of not more than 0.55 g·cm?3. The adhesive-receiving coating includes a polymeric binder and an absorbent pigment and has a surface energy of at least 40 dyne·cm?1.
    Type: Application
    Filed: July 27, 2011
    Publication date: November 7, 2013
    Applicant: ARJOBEX LIMITED
    Inventors: Jonathan Cooper, Mark Grimbley, Bharath Chandra, Vijay Yadav