Patents by Inventor Yogesh Swami
Yogesh Swami has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10417432Abstract: Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.Type: GrantFiled: June 5, 2018Date of Patent: September 17, 2019Assignee: LOOKOUT, INC.Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
-
Publication number: 20180293389Abstract: Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.Type: ApplicationFiled: June 5, 2018Publication date: October 11, 2018Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
-
Patent number: 9779253Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.Type: GrantFiled: December 28, 2016Date of Patent: October 3, 2017Assignee: LOOKOUT, INC.Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
-
Patent number: 9781148Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.Type: GrantFiled: December 17, 2015Date of Patent: October 3, 2017Assignee: LOOKOUT, INC.Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
-
Publication number: 20170103215Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.Type: ApplicationFiled: December 28, 2016Publication date: April 13, 2017Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
-
Patent number: 9571472Abstract: The embodiments described herein describe technologies for a device definition process to establish a unique identity and a root of trust of a cryptographic manager (CM) device, the CM device to be deployed in a CM system. The device definition process can take place in a device definition phase of a manufacturing lifecycle of the CM device. One implementation includes a non-transitory storage medium to store an initialization application that, when executed by a CM device, causes the CM device to perform a device definition process to generate a device definition request to establish the unique identity and the root of trust. In response to the device definition request, the initialization application obtains device identity and device credentials of the CM device and stores the device definition request in storage space of a removable storage device.Type: GrantFiled: November 6, 2014Date of Patent: February 14, 2017Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventors: Denis Alexandrovich Pochuev, Yogesh Swami, Daniel O'Loughlin
-
Patent number: 9563749Abstract: An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.Type: GrantFiled: April 21, 2015Date of Patent: February 7, 2017Assignee: LOOKOUT, INC.Inventors: Timothy Micheal Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
-
Publication number: 20160099963Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.Type: ApplicationFiled: December 17, 2015Publication date: April 7, 2016Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
-
Publication number: 20150326543Abstract: The embodiments described herein describe technologies for a device definition process to establish a unique identity and a root of trust of a cryptographic manager (CM) device, the CM device to be deployed in a CM system. The device definition process can take place in a device definition phase of a manufacturing lifecycle of the CM device. One implementation includes a non-transitory storage medium to store an initialization application that, when executed by a CM device, causes the CM device to perform a device definition process to generate a device definition request to establish the unique identity and the root of trust. In response to the device definition request, the initialization application obtains device identity and device credentials of the CM device and stores the device definition request in storage space of a removable storage device.Type: ApplicationFiled: November 6, 2014Publication date: November 12, 2015Inventors: Denis Alexandrovich Pochuev, Yogesh Swami, Daniel O'Loughlin
-
Publication number: 20150302182Abstract: An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.Type: ApplicationFiled: April 21, 2015Publication date: October 22, 2015Inventors: Timothy Micheal Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
-
Patent number: 9043919Abstract: A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.Type: GrantFiled: May 30, 2012Date of Patent: May 26, 2015Assignee: LOOKOUT, INC.Inventors: Timothy M. Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
-
Publication number: 20120240236Abstract: A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.Type: ApplicationFiled: May 30, 2012Publication date: September 20, 2012Applicant: Lookout, Inc.Inventors: Timothy M. Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
-
Patent number: 8184561Abstract: The invention proposes a method for controlling a packet transmission between a sender and a receiver sent via a packet transport protocol, the receiver being a mobile network element, comprising the steps of detecting whether a mobility event has occurred, detecting whether a downlink packet loss has occurred, and providing, in case a mobility event and a packet loss has been detected, an indication to the sender that a packet loss due to mobility has occurred.Type: GrantFiled: June 17, 2005Date of Patent: May 22, 2012Assignee: Nokia CorporationInventors: Shashikant Maheshwari, Khiem Le, Yogesh Swami
-
Patent number: 8149757Abstract: The present invention provides an enhanced H-ARQ scheme that optimizes bandwidth utilization and spectrum efficiency. When an H-ARQ attempt is unsuccessful due to loss or error over a hop between the BS and MS/SS, then only the first node in the hop chain that fails to decode the packet transmits another H-ARQ attempt. The BS determines the first node that fails on decoding based on certain information such as the feedback information sent from the nodes on the path. The previous node of the failed node is then instructed to retransmit by the BS.Type: GrantFiled: January 17, 2007Date of Patent: April 3, 2012Assignee: Nokia CorporationInventors: Haihong Zheng, Yousuf Saifullah, Yogesh Swami, JianZhong Zhang
-
Patent number: 8036133Abstract: Various example embodiments are disclosed relating to efficient techniques for error detection and authentication in wireless networks. For example, according to an example embodiment, an apparatus adapted for wireless communication in a wireless network may include a processor. The processor may be configured to transmit a message including a field to provide both authentication and error detection for the message. The field may include an authenticated checksum sequence.Type: GrantFiled: March 3, 2008Date of Patent: October 11, 2011Assignee: Nokia CorporationInventors: Shashikant Maheshwari, Yogesh Swami, Yousuf Saifullah
-
Patent number: 7920590Abstract: A mobile station (100) and a compression/decompression node in a wireless network (5), preferably the GGSN 30 (30), agree on whether to apply compression/decompression, and what compression/decompression scheme to use either by pre-configuration (when the GGSN 30 is in the home network of the mobile terminal) or by signalling (when the GGSN 30 is in a visited or a roamed-to network). Additional information, such as a profile-specific dictionary, may be used to increase the compression efficiency, particularly during start-up. Dynamic data can also be accommodated. The compression/decompression may be turned on and off on a packet-by-packet basis, depending on whether the compression actually results in a smaller packet. A compressed/uncompressed indicator bit or bits can be inserted explicitly on a per packet basis, and/or the compressed/uncompressed indication can be derived implicitly.Type: GrantFiled: July 12, 2002Date of Patent: April 5, 2011Assignee: Spyder Navigations L.L.C.Inventors: Khiem Le, Yousuf Saifullah, Yogesh Swami
-
Publication number: 20080220742Abstract: Various example embodiments are disclosed relating to efficient techniques for error detection and authentication in wireless networks. For example, according to an example embodiment, an apparatus adapted for wireless communication in a wireless network may include a processor. The processor may be configured to transmit a message including a field to provide both authentication and error detection for the message. The field may include an authenticated checksum sequence.Type: ApplicationFiled: March 3, 2008Publication date: September 11, 2008Applicant: Nokia CorporationInventors: Shashikant Maheshwari, Yogesh Swami, Yousuf Saifullah
-
Publication number: 20080002734Abstract: Various example embodiments are disclosed relating to contention window management in relay networks. In an example embodiment, a data unit transmitted from a network node based on a first contention window associated with a first network station may be received, for example, by the first network station located, for example, on a first level. The data unit may be forwarded to a second network station based on a second contention window associated with the second network station. The second network station may, for example, be located on a second level. The first network station may, for example, include a relay station and the second network station may, for example, include a base station.Type: ApplicationFiled: June 29, 2006Publication date: January 3, 2008Inventors: Haihong Zheng, Yousuf Saifullah, Khiem Le, Yogesh Swami
-
Patent number: 7263067Abstract: A method and equipment for accelerating throughput of communication segments from a sender (30) to a receiver (40) each of which include a protocol layer (30a 40a) for providing such segments, the method in case of TCP including a first step (20a) in which the sender protocol layer (30a) initializes a congestion window (cwnd) to some initial size (iwnd) and increases the congestion window by one segment each time it receives an ACK, but upon receiving an indication of low congestion, performs a step (20c) of accelerated start in which it sets a slow start threshold (SSTHRES) to a standard initial value (typically 65535) and re-initializes cwnd to a new value, and the sender protocol layer (30a) then increments cwnd at one or another predetermined rate—depending on whether the start immediately follows a new connection or instead follows a transfer of an existing connection to a new path—in respect to received ACKs.Type: GrantFiled: July 15, 2003Date of Patent: August 28, 2007Assignee: Nokia Siemans Networks OyInventors: Srinivas Sreemanthula, Yogesh Swami, Khiem Le
-
Publication number: 20070190933Abstract: The present invention provides an enhanced H-ARQ scheme that optimizes bandwidth utilization and spectrum efficiency. When an H-ARQ attempt is unsuccessful due to loss or error over a hop between the BS and MS/SS, then only the first node in the hop chain that fails to decode the packet transmits another H-ARQ attempt. The BS determines the first node that fails on decoding based on certain information such as the feedback information sent from the nodes on the path. The previous node of the failed node is then instructed to retransmit by the BS.Type: ApplicationFiled: January 17, 2007Publication date: August 16, 2007Inventors: Haihong Zheng, Yousuf Saifullah, Yogesh Swami, JianZhong Zhang