Patents by Inventor Vijay Yadav
Vijay Yadav has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11070554Abstract: A computer system determines that authentication information has been requested from a user device by a requesting device. In response to determining that authentication information has been requested by the requesting device, the computer system identifies information corresponding to the requesting device and determines if one or more risk indications correspond to the identified information corresponding to the requesting device. In response to determining that one or more risk indications correspond to the identified information corresponding to the requesting device, the computer system implements one or more security measures.Type: GrantFiled: April 30, 2018Date of Patent: July 20, 2021Assignee: PayPal, Inc.Inventors: Nathan Robert Pratt, Bradley Wardman, Meethil Vijay Yadav, Nicole Harris
-
Publication number: 20210203692Abstract: A method for phishing detection using uniform resource locators is discussed. The method includes accessing data from one or more of a monitored portion of website data and a monitored portion of emails, the data indicating a suspect Uniform Resource Locator (URL). The method includes assigning a rule score based on partial rule scores of each portion of the suspect URL, the rule score indicating a phishing potential based on URL rules. The method includes determining a uniqueness score of the suspect URL, the uniqueness score indicating a degree of uniqueness of the suspect URL from a plurality of known phishing URLs. The method also includes determining a URL phishing score based, at least in part, on the rules scores and the uniqueness score for the suspect URL.Type: ApplicationFiled: December 27, 2019Publication date: July 1, 2021Inventors: Eric Nunes, Meethil Vijay Yadav, Nicholas Bailey, Nathan Pratt, Bradley Wardman, Todd Clausen, Kevin Tyers
-
Publication number: 20210203690Abstract: A method for phishing detection using certificates associated with uniform resource locators (URLs) is discussed. The method includes accessing certificate portions of a certificate associated with a suspect URL, the certificate accessed at a database that includes certificates obtained by monitoring certificate logs. The method includes accessing a URL score for the suspect URL. The method includes assigning a certificate rule score based on partial certificate scores of certificate portions, the certificate rule score indicating a phishing potential for the certificate, each of the partial certificate scores indicating a likelihood of phishing of each portion based on certificate rules. The method includes using a machine learning model based on the URL score and the certificate to determine a uniqueness certificate score. The method also includes determining a phishing certificate score based on the certificate rule score and the uniqueness certificate score for the certificate.Type: ApplicationFiled: December 27, 2019Publication date: July 1, 2021Inventors: Eric Nunes, Kevin Tyers, Meethil Vijay Yadav, Nicholas Bailey, Todd Clausen, Nathan Pratt, Bradley Wardman
-
Publication number: 20210203693Abstract: A method for phishing detection based on modeling of web page content is discussed. The method includes accessing suspect web page content of a suspect Uniform Resource Locator (URL). The method includes generating an exemplary model based on an exemplary configuration for an indicated domain associated with the suspect URL, where the exemplary model indicates structure and characteristics of an example web page of the indicated domain. The method includes generating a suspect web page model that indicates structure and characteristics of the suspect web page content. The method includes performing scoring functions for the potential phishing web page content based on the suspect web page model, where some of the scoring functions use the exemplary model to perform analysis to generate respective results. The method includes generating a web page content phishing score based on results from the scoring functions.Type: ApplicationFiled: December 27, 2019Publication date: July 1, 2021Inventors: Todd Clausen, Kevin Tyers, Nicholas Bailey, Eric Nunes, Meethil Vijay Yadav, Bradley Wardman, Nathan Pratt
-
Publication number: 20210203691Abstract: A method for using a malware and phishing detection and mediation platform is discussed. The method includes accessing data from one or more of a monitored portion of website data and a monitored portion of emails, the data indicating a respective potential malware or a suspect phishing element (e.g., Uniform Resource Locator (URL)). The method includes selecting one of a plurality of detection engines for processing the data, where the selecting is based on previous results of previous processing by one or more detection engines. Each of the plurality of detection engines can be for performing one or more respective investigation actions on the plurality of data to determine a particular issue with one of the monitored data. The method also includes determining a mediation action based on a result of processing of the detection engine and the previous processing.Type: ApplicationFiled: December 27, 2019Publication date: July 1, 2021Inventors: Nathan Pratt, Bradley Wardman, Kevin Tyers, Eric Nunes, Meethil Vijay Yadav, Todd Clausen, Nicholas Bailey
-
Publication number: 20210105298Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.Type: ApplicationFiled: September 14, 2020Publication date: April 8, 2021Inventors: Vinjith NAGARAJA, Meethil Vijay YADAV, Bradley WARDMAN
-
Publication number: 20200389480Abstract: Methods and systems for assessing and evaluating vulnerabilities of a networked system are presented. A list of known vulnerabilities that have been disclosed in the public may be obtained. The networked system may be scanned from an external perspective to obtain network information of the networked system. A subset of the known vulnerabilities may be determined to be relevant to the networked system based on correlations between the vulnerabilities and the network information. The networked system may also be analyzed from an internal perspective to determine impacts of the relevant known vulnerabilities to the networked system. The impact of a vulnerability may be determined based on the type of data and/or the type of services that may be accessible in an attack that exploits the vulnerability. The vulnerabilities may then be ranked and addressed based on the impacts.Type: ApplicationFiled: June 6, 2019Publication date: December 10, 2020Inventors: Eric Nunes, Bradley Wardman, Meethil Vijay Yadav, Kevin Tyers, Nicole Harris, Jakub Burgis
-
Publication number: 20200351095Abstract: Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger.Type: ApplicationFiled: April 30, 2019Publication date: November 5, 2020Inventors: Meethil Vijay Yadav, Bradley Wardman, Braden Christopher Ericson
-
Patent number: 10778716Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.Type: GrantFiled: December 20, 2017Date of Patent: September 15, 2020Assignee: PAYPAL, INC.Inventors: Vinjith Nagaraja, Meethil Vijay Yadav, Bradley Wardman
-
Publication number: 20200120144Abstract: Methods and systems are presented for dynamically adjusting a risk classification of a risk source based on classifications of one or more other risk sources. The risk engine may first classify a first risk source as a first risk type based on an initial analysis of the first risk source. Subsequent to classifying the first risk source as the first risk type, the risk engine may determine that a second risk source is associated with a second risk type. Based on the determination that the second risk source is associated with the second risk type, the risk engine may re-classify the first risk source as the second risk type. The risk engine may then use the reclassification of the first risk source to improve network security of an online service provider.Type: ApplicationFiled: November 13, 2018Publication date: April 16, 2020Inventors: Meethil Vijay Yadav, Bradley Wardman, Kevin Tyers, Blake Butler
-
Publication number: 20190334896Abstract: A computer system determines that authentication information has been requested from a user device by a requesting device. In response to determining that authentication information has been requested by the requesting device, the computer system identifies information corresponding to the requesting device and determines if one or more risk indications correspond to the identified information corresponding to the requesting device. In response to determining that one or more risk indications correspond to the identified information corresponding to the requesting device, the computer system implements one or more security measures.Type: ApplicationFiled: April 30, 2018Publication date: October 31, 2019Inventors: Nathan Robert PRATT, Bradley WARDMAN, Meethil Vijay YADAV, Nicole HARRIS
-
Publication number: 20190332767Abstract: A computer system detects an action corresponding to a resource page being rendered within a web view of an application. In response to the detecting the action corresponding to a resource page being rendered within the web view of the application, the computer system identifies information associated with the resource page and determines if one or more risk indications correspond to the identified information. In response to determining that one or more risk indications correspond to the identified information, the computer system implements one or more security measures.Type: ApplicationFiled: December 20, 2018Publication date: October 31, 2019Inventors: Bradley Wardman, Meethil Vijay Yadav, Nathan Robert Pratt
-
Publication number: 20190190946Abstract: Methods and systems for detecting webpages that share malicious content are presented. A first set of webpages that hosts a web account checker is identified. A baseline page structure score and a baseline language score are calculated based on the identified first set of webpages. Content from a second set of webpages is collected and analyzed based on the calculated baseline page structure and the calculated baseline language scores. One or more of the second set of webpages is flagged as malicious based on the analyzing of the content collected from the second set of webpages.Type: ApplicationFiled: December 20, 2017Publication date: June 20, 2019Inventors: Vinjith Nagaraja, Meethil Vijay Yadav, Bradley Wardman
-
Patent number: 9375896Abstract: A label material for use with water-based adhesives. The label material includes a synthetic paper having an upper surface and a lower surface. The synthetic paper includes a biaxially-oriented polymeric sheet having a voided layer. A printable coating is optionally provided on an upper surface of the polymeric sheet and an adhesive-receiving coating is provided on a lower surface of the polymeric sheet. The polymeric sheet has a density of not more than 0.55 g·cm?3. The adhesive-receiving coating includes a polymeric binder and an absorbent pigment and has a surface energy of at least 40 dyne·cm?1.Type: GrantFiled: July 27, 2011Date of Patent: June 28, 2016Assignee: ARJOBEX LIMITEDInventors: Jonathan Cooper, Mark Grimbley, Bharath Chandra, Vijay Yadav
-
Publication number: 20150111908Abstract: The present invention provides methods and therapeutic agents for lowering or increasing serum serotonin levels in a patient in order to increase or decrease bone mass, respectively. In preferred embodiments, the patient is known to have, or to be at risk for, a low bone mass disease such as osteoporosis and the agents are TPH1 inhibitors or serotonin receptor antagonists.Type: ApplicationFiled: May 20, 2014Publication date: April 23, 2015Inventors: Gerard Karsenty, Patricia F. Ducy, Yuli Xie, Donald Landry, Vijay Yadav
-
Patent number: 8867342Abstract: An adaptive standby access point in a local area communication network includes an interface operable to communicate with other access points, at least one radio operable to communicate with user devices utilizing at least one antenna, and a processor operable to receive a message over the interface from one of the other access points that is experiencing traffic overload. The message indicating to the standby access point that the one other access point requires traffic demand assistance, whereupon the processor will activate and direct the radio to send out beacons to solicit user devices within the coverage area of the overloaded access point to instead association with the standby access point.Type: GrantFiled: June 29, 2012Date of Patent: October 21, 2014Assignee: Symbol Technologies, Inc.Inventors: Tushar Mathur, Anil Kaushik, Raj Kiran, Senthilraj Shanmugavadivel, Vijay Yadav
-
Patent number: 8842651Abstract: An apparatus and method for access point groupings bridging tunneled traffic for a communication network, includes a first step of associating each access point with a location parameter. A next step includes grouping access points in accordance with the location parameter. A next step includes receiving a packet. A next step includes bridging the packet between Layer-2 tunnels of all access points that are part of a grouping.Type: GrantFiled: November 28, 2012Date of Patent: September 23, 2014Assignee: Motorola Solutions, Inc.Inventors: Jeelan Poola, Azif Ak, Somesh Agrawal, Channareddy Ireddy, Sukhdeep Singh Johar, Vijay Yadav, Senthilraj Shanmugavadivel, Sundaresan Sundaram
-
Publication number: 20140146735Abstract: An apparatus and method for access point groupings bridging tunneled traffic for a communication network, includes a first step of associating each access point with a location parameter. A next step includes grouping access points in accordance with the location parameter. A next step includes receiving a packet. A next step includes bridging the packet between Layer-2 tunnels of all access points that are part of a grouping.Type: ApplicationFiled: November 28, 2012Publication date: May 29, 2014Applicant: Motorola Solutions, Inc.Inventors: Jeelan Poola, Azif Ak, Somesh Agrawal, Channareddy Ireddy, Sukhdeep Singh Johar, Vijay Yadav, Senthilraj Shanmugavadivel, Sundaresan Sundaram
-
Publication number: 20140003230Abstract: An adaptive standby access point in a local area communication network includes an interface operable to communicate with other access points, at least one radio operable to communicate with user devices utilizing at least one antenna, and a processor operable to receive a message over the interface from one of the other access points that is experiencing traffic overload. The message indicating to the standby access point that the one other access point requires traffic demand assistance, whereupon the processor will activate and direct the radio to send out beacons to solicit user devices within the coverage area of the overloaded access point to instead association with the standby access point.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: Symbol Technologies, Inc.Inventors: Tushar Mathur, Anil Kaushik, Raj Kiran, Senthilraj Shanmugavadivel, Vijay Yadav
-
Publication number: 20130292031Abstract: A label material for use with water-based adhesives. The label material includes a synthetic paper having an upper surface and a lower surface. The synthetic paper includes a biaxially-oriented polymeric sheet having a voided layer. A printable coating is optionally provided on an upper surface of the polymeric sheet and an adhesive-receiving coating is provided on a lower surface of the polymeric sheet. The polymeric sheet has a density of not more than 0.55 g·cm?3. The adhesive-receiving coating includes a polymeric binder and an absorbent pigment and has a surface energy of at least 40 dyne·cm?1.Type: ApplicationFiled: July 27, 2011Publication date: November 7, 2013Applicant: ARJOBEX LIMITEDInventors: Jonathan Cooper, Mark Grimbley, Bharath Chandra, Vijay Yadav