Search

Ramarao V Pemmaraju

from Old Bridge, NJ
Age ~60

Ramarao Pemmaraju Phones & Addresses

  • 8 Ponderosa Ln, Old Bridge, NJ 08857
  • Edison, NJ
  • Yonkers, NY
  • Syosset, NY

Publications

Us Patents

Methods And Apparatus For Securing Keystrokes From Being Intercepted Between The Keyboard And A Browser

View page
US Patent:
20070182714, Aug 9, 2007
Filed:
Jan 22, 2007
Appl. No.:
11/656236
Inventors:
Ramarao Pemmaraju - Old Bridge NJ,
International Classification:
G09G 5/00
G06F 3/02
US Classification:
345168000
Abstract:
The invention described herein provides a method and system for foiling a keylogger by creating a custom keyboard driver and passing the keystrokes directly to the browser in an encrypted format. The browser (which is used to access the Internet) has a component that decrypts the keystroke before it is sent to the website. Thus the present invention enables the user to go to any website and enter sensitive information (passwords, credit card numbers, etc.) without the keystrokes being intercepted by Keyloggers. In general terms, the invention described herein provides a method and system for (1) modifying the keyboard driver, (2) encrypting the keystrokes between the keyboard driver and the browser, and (3) notifying the user if the invention has been compromised.

Dynamically Configurable Communications Network

View page
US Patent:
48721972, Oct 3, 1989
Filed:
Oct 2, 1986
Appl. No.:
6/914392
Inventors:
Ramarao V. Pemmaraju - Edison NJ
Assignee:
DTI Peripherals, Inc. - New York NY
International Classification:
H04M 1100
US Classification:
379 93
Abstract:
A dynamically configurable array of communication nodes capable of wide area networking utilizing existing communications lines is provided wherein any node possessing a transmitted data string comprising a message and identification information also possesses control of the network and generally is provided with a plurality of data paths to choose from. A setup mode initially sets up a data path among a network of nodes while a data mode subsequently permits data communication among the subnetwork of nodes.

Method And Apparatus For Protecting Stored And Transmitted Data From Compromise Or Interception

View page
US Patent:
45968985, Jun 24, 1986
Filed:
Mar 14, 1984
Appl. No.:
6/589473
Inventors:
Ramarao V. Pemmaraju - Yonkers NY
Assignee:
Computer Security Systems, Inc. - Garden City NY
International Classification:
H04K 102
US Classification:
178 2216
Abstract:
Protection of transmitted and stored data from compromise or interception is achieved by a combined terminal authentication and encryption technique using a random number as part of both the encryption and authentication processes. Entry of data for transmission at a transmitting terminal automatically establishes a random number which is tranmitted ahead of the data stream along with a special fixed word and a code word which is encoded with the random number. The receiving station stores the random number and decodes the code word. The decoded code word and the received special word are compared to respective pre-stored counterparts thereof to determine authenticity of the transmitting terminal. Data encryption is effected by using three keys which depend, respectively, on data word content, data word sequence and the established random number.

Composite Image Display Device And Service For Video Conferencing

View page
US Patent:
60755717, Jun 13, 2000
Filed:
Jul 29, 1997
Appl. No.:
8/915506
Inventors:
Ashok K. Kuthyar - Holmdel NJ
Ramarao Pemmaraju - Old Bridge NJ
Peter H. Stuntebeck - Little Silver NJ
International Classification:
H04N 974
H04N 715
US Classification:
348584
Abstract:
A network-based device creates composite video streams containing video images of users for display on video conferencing screens. Video image streams are cascaded through a series of quad boxes to create combined video streams and ultimately the composite video stream. The composite video stream produces a display grid comprised of a plurality of image boxes. The device uses quad box input port mapping to direct a specific video image stream to a specific image box by controlling the cascade path of each video image stream through the quad boxes in creating the composite video stream. A user interface permits a user to selectively determine the layout of user images on the video conferencing screen. Screen layout extends to size of each user image being incrementally controlled and location of each user image being selectively determined depending upon the size and the number of the various user images. By controlling size and location of each user image, the screen display area available for other uses, such as the display of applications programs, is increased.
Ramarao V Pemmaraju from Old Bridge, NJ, age ~60 Get Report