Patents by Inventor Yogesh Swami

Yogesh Swami has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10417432
    Abstract: Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.
    Type: Grant
    Filed: June 5, 2018
    Date of Patent: September 17, 2019
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Publication number: 20180293389
    Abstract: Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.
    Type: Application
    Filed: June 5, 2018
    Publication date: October 11, 2018
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9779253
    Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: October 3, 2017
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9781148
    Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: October 3, 2017
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Publication number: 20170103215
    Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Application
    Filed: December 28, 2016
    Publication date: April 13, 2017
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9571472
    Abstract: The embodiments described herein describe technologies for a device definition process to establish a unique identity and a root of trust of a cryptographic manager (CM) device, the CM device to be deployed in a CM system. The device definition process can take place in a device definition phase of a manufacturing lifecycle of the CM device. One implementation includes a non-transitory storage medium to store an initialization application that, when executed by a CM device, causes the CM device to perform a device definition process to generate a device definition request to establish the unique identity and the root of trust. In response to the device definition request, the initialization application obtains device identity and device credentials of the CM device and stores the device definition request in storage space of a removable storage device.
    Type: Grant
    Filed: November 6, 2014
    Date of Patent: February 14, 2017
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Denis Alexandrovich Pochuev, Yogesh Swami, Daniel O'Loughlin
  • Patent number: 9563749
    Abstract: An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: February 7, 2017
    Assignee: LOOKOUT, INC.
    Inventors: Timothy Micheal Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
  • Publication number: 20160099963
    Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Application
    Filed: December 17, 2015
    Publication date: April 7, 2016
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Publication number: 20150326543
    Abstract: The embodiments described herein describe technologies for a device definition process to establish a unique identity and a root of trust of a cryptographic manager (CM) device, the CM device to be deployed in a CM system. The device definition process can take place in a device definition phase of a manufacturing lifecycle of the CM device. One implementation includes a non-transitory storage medium to store an initialization application that, when executed by a CM device, causes the CM device to perform a device definition process to generate a device definition request to establish the unique identity and the root of trust. In response to the device definition request, the initialization application obtains device identity and device credentials of the CM device and stores the device definition request in storage space of a removable storage device.
    Type: Application
    Filed: November 6, 2014
    Publication date: November 12, 2015
    Inventors: Denis Alexandrovich Pochuev, Yogesh Swami, Daniel O'Loughlin
  • Publication number: 20150302182
    Abstract: An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.
    Type: Application
    Filed: April 21, 2015
    Publication date: October 22, 2015
    Inventors: Timothy Micheal Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
  • Patent number: 9043919
    Abstract: A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.
    Type: Grant
    Filed: May 30, 2012
    Date of Patent: May 26, 2015
    Assignee: LOOKOUT, INC.
    Inventors: Timothy M. Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
  • Publication number: 20120240236
    Abstract: A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.
    Type: Application
    Filed: May 30, 2012
    Publication date: September 20, 2012
    Applicant: Lookout, Inc.
    Inventors: Timothy M. Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
  • Patent number: 8184561
    Abstract: The invention proposes a method for controlling a packet transmission between a sender and a receiver sent via a packet transport protocol, the receiver being a mobile network element, comprising the steps of detecting whether a mobility event has occurred, detecting whether a downlink packet loss has occurred, and providing, in case a mobility event and a packet loss has been detected, an indication to the sender that a packet loss due to mobility has occurred.
    Type: Grant
    Filed: June 17, 2005
    Date of Patent: May 22, 2012
    Assignee: Nokia Corporation
    Inventors: Shashikant Maheshwari, Khiem Le, Yogesh Swami
  • Patent number: 8149757
    Abstract: The present invention provides an enhanced H-ARQ scheme that optimizes bandwidth utilization and spectrum efficiency. When an H-ARQ attempt is unsuccessful due to loss or error over a hop between the BS and MS/SS, then only the first node in the hop chain that fails to decode the packet transmits another H-ARQ attempt. The BS determines the first node that fails on decoding based on certain information such as the feedback information sent from the nodes on the path. The previous node of the failed node is then instructed to retransmit by the BS.
    Type: Grant
    Filed: January 17, 2007
    Date of Patent: April 3, 2012
    Assignee: Nokia Corporation
    Inventors: Haihong Zheng, Yousuf Saifullah, Yogesh Swami, JianZhong Zhang
  • Patent number: 8036133
    Abstract: Various example embodiments are disclosed relating to efficient techniques for error detection and authentication in wireless networks. For example, according to an example embodiment, an apparatus adapted for wireless communication in a wireless network may include a processor. The processor may be configured to transmit a message including a field to provide both authentication and error detection for the message. The field may include an authenticated checksum sequence.
    Type: Grant
    Filed: March 3, 2008
    Date of Patent: October 11, 2011
    Assignee: Nokia Corporation
    Inventors: Shashikant Maheshwari, Yogesh Swami, Yousuf Saifullah
  • Patent number: 7920590
    Abstract: A mobile station (100) and a compression/decompression node in a wireless network (5), preferably the GGSN 30 (30), agree on whether to apply compression/decompression, and what compression/decompression scheme to use either by pre-configuration (when the GGSN 30 is in the home network of the mobile terminal) or by signalling (when the GGSN 30 is in a visited or a roamed-to network). Additional information, such as a profile-specific dictionary, may be used to increase the compression efficiency, particularly during start-up. Dynamic data can also be accommodated. The compression/decompression may be turned on and off on a packet-by-packet basis, depending on whether the compression actually results in a smaller packet. A compressed/uncompressed indicator bit or bits can be inserted explicitly on a per packet basis, and/or the compressed/uncompressed indication can be derived implicitly.
    Type: Grant
    Filed: July 12, 2002
    Date of Patent: April 5, 2011
    Assignee: Spyder Navigations L.L.C.
    Inventors: Khiem Le, Yousuf Saifullah, Yogesh Swami
  • Publication number: 20080220742
    Abstract: Various example embodiments are disclosed relating to efficient techniques for error detection and authentication in wireless networks. For example, according to an example embodiment, an apparatus adapted for wireless communication in a wireless network may include a processor. The processor may be configured to transmit a message including a field to provide both authentication and error detection for the message. The field may include an authenticated checksum sequence.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 11, 2008
    Applicant: Nokia Corporation
    Inventors: Shashikant Maheshwari, Yogesh Swami, Yousuf Saifullah
  • Publication number: 20080002734
    Abstract: Various example embodiments are disclosed relating to contention window management in relay networks. In an example embodiment, a data unit transmitted from a network node based on a first contention window associated with a first network station may be received, for example, by the first network station located, for example, on a first level. The data unit may be forwarded to a second network station based on a second contention window associated with the second network station. The second network station may, for example, be located on a second level. The first network station may, for example, include a relay station and the second network station may, for example, include a base station.
    Type: Application
    Filed: June 29, 2006
    Publication date: January 3, 2008
    Inventors: Haihong Zheng, Yousuf Saifullah, Khiem Le, Yogesh Swami
  • Patent number: 7263067
    Abstract: A method and equipment for accelerating throughput of communication segments from a sender (30) to a receiver (40) each of which include a protocol layer (30a 40a) for providing such segments, the method in case of TCP including a first step (20a) in which the sender protocol layer (30a) initializes a congestion window (cwnd) to some initial size (iwnd) and increases the congestion window by one segment each time it receives an ACK, but upon receiving an indication of low congestion, performs a step (20c) of accelerated start in which it sets a slow start threshold (SSTHRES) to a standard initial value (typically 65535) and re-initializes cwnd to a new value, and the sender protocol layer (30a) then increments cwnd at one or another predetermined rate—depending on whether the start immediately follows a new connection or instead follows a transfer of an existing connection to a new path—in respect to received ACKs.
    Type: Grant
    Filed: July 15, 2003
    Date of Patent: August 28, 2007
    Assignee: Nokia Siemans Networks Oy
    Inventors: Srinivas Sreemanthula, Yogesh Swami, Khiem Le
  • Publication number: 20070190933
    Abstract: The present invention provides an enhanced H-ARQ scheme that optimizes bandwidth utilization and spectrum efficiency. When an H-ARQ attempt is unsuccessful due to loss or error over a hop between the BS and MS/SS, then only the first node in the hop chain that fails to decode the packet transmits another H-ARQ attempt. The BS determines the first node that fails on decoding based on certain information such as the feedback information sent from the nodes on the path. The previous node of the failed node is then instructed to retransmit by the BS.
    Type: Application
    Filed: January 17, 2007
    Publication date: August 16, 2007
    Inventors: Haihong Zheng, Yousuf Saifullah, Yogesh Swami, JianZhong Zhang