Neil Daswani

Neil Daswani

San Jose, California, United States
3K followers 500+ connections

About

Accomplished Chief Information Security Officer with more than 20 years of distinguished…

Articles by Neil

Activity

Join now to see all activity

Experience

  • QuantumScape Graphic
  • -

  • -

    Stanford, CA

  • -

  • -

  • -

  • -

    San Jose, California, United States

  • -

  • -

  • -

  • -

  • -

    Menlo Park, CA

  • -

    Mountain View, CA

  • -

    Mountain View, CA

  • -

    San Francisco Bay Area

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

  • Stanford University Graphic

    Stanford University

    -

    Activities and Societies: BASES VP Innovators' Challenge, Stanford Computer Forum

    Dissertation: “Denial-of-Service Attacks in Peer-To-Peer Systems”
    Advisor: Hector Garcia-Molina

  • -

    Activities and Societies: Tau Beta Pi Engineering Honor Society

Publications

  • Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware

    River Publishers

    The ubiquity of mobile devices and their evolution as computing platforms
    has made them lucrative targets for malware. Malware, such as spyware,
    trojans, rootkits and botnets that have traditionally plagued PCs are now
    increasingly targeting mobile devices and are also referred to as mobile mal-
    ware. Cybercriminal attacks have used mobile malware trojans to steal and
    transmit users’ personal information, including financial credentials, to bot
    master servers as well as abuse…

    The ubiquity of mobile devices and their evolution as computing platforms
    has made them lucrative targets for malware. Malware, such as spyware,
    trojans, rootkits and botnets that have traditionally plagued PCs are now
    increasingly targeting mobile devices and are also referred to as mobile mal-
    ware. Cybercriminal attacks have used mobile malware trojans to steal and
    transmit users’ personal information, including financial credentials, to bot
    master servers as well as abuse the capabilities of the device (e.g., send
    premium SMS messages) to generate fraudulent revenue streams.
    In this paper, we describe Triton, a new, network-based architecture, and a
    prototype implementation of it, for detecting and mitigating mobile malware.
    Our implementation of Triton for both Android and Linux environments was
    built in our 3G UMTS lab network, and was found to efficiently detect
    and neutralize mobile malware when tested using real malware samples
    from the wild. Triton employs a defense-in-depth approach and features:
    1) in-the- network malware detectors to identify and prevent the spread of
    malware and 2) a server-side mitigation engine that sends threat profiles to an
    on-the-phone trusted software component to neutralize and perform
    fine-grained remediation of malware on mobile devices.

    Other authors
    See publication
  • Avoiding the Top Ten Software Security Design Flaws

    IEEE Center For Secure Design

    The IEEE (Institute of Electrical and Electronics Engineers) Center for Secure Design has published some advice to help software developers dodge common mistakes that compromise security.

    Other authors
    See publication
  • Mobile Malware Madness and How to Cap the Mad Hatters: A Preliminary Look at Mitigating Mobile Malware

    This paper surveys recent mobile malware attacks that have infected hundreds of thousands of user
    devices. It explores how behavioral-based malware detection techniques can be used to identify and
    neutralize these nefarious programs before they can accomplish their ultimate aims of stealing user
    identity and interrupting mobile commerce. We also explore how web malware threats such as drivebys and malvertising are now emerging on mobile networks

    Other authors
    See publication
  • Online Advertising Fraud

    Crimeware/Symantec Press

    The growth of the web-based online advertising industry has created many
    new opportunities for lead generation, brand awareness, and electronic commerce for advertisers. In the online marketplace, page views, form submissions,
    clicks, downloads, and purchases often result in money changing hands between
    advertisers, ad networks, and web site publishers. Since these web-based actions have financial impact, criminals have also seeked to take advantage of new
    opportunities to conduct…

    The growth of the web-based online advertising industry has created many
    new opportunities for lead generation, brand awareness, and electronic commerce for advertisers. In the online marketplace, page views, form submissions,
    clicks, downloads, and purchases often result in money changing hands between
    advertisers, ad networks, and web site publishers. Since these web-based actions have financial impact, criminals have also seeked to take advantage of new
    opportunities to conduct fraud against these parties with the hopes of having
    some money illegitimately change into their own hands. We also discuss countermeasures that ad networks have put in place to
    mitigate such fraud.

    Other authors
    See publication
  • Foundations of Security

    Apress

    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running…

    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book.

    Other authors
    See publication
  • Blasting in Chord

    This paper studies the problem of “blasting” attacks in the Chord P2P network. Blasting is an application-layer denial-of-service (DoS) attack in which malicious nodes generate excessive numbers of queries. To deal with the problem, we develop a simple traffic model that captures query flows in Chord, and we use the model to determine how to maximize system throughput. We then propose traf-
    fic management schemes and derive traffic limits that can be imposed on query flows. We evaluate our…

    This paper studies the problem of “blasting” attacks in the Chord P2P network. Blasting is an application-layer denial-of-service (DoS) attack in which malicious nodes generate excessive numbers of queries. To deal with the problem, we develop a simple traffic model that captures query flows in Chord, and we use the model to determine how to maximize system throughput. We then propose traf-
    fic management schemes and derive traffic limits that can be imposed on query flows. We evaluate our proposed traffic management schemes and limits via simulation. We find that our techniques recover system throughput in the face of blasting attacks and virtually eliminate damage due to
    excess queries injected by malicious nodes.

    See publication
  • Denial-of-Service Attacks and Commerce infrastructure in Peer-to-Peer (P2P) Networks

    This dissertation studies denial-of-service (DoS) attacks in peer-to-peer (P2P) net-
    works, and electronic commerce infrastructure for such networks.

    See publication
  • Pong-Cache Poisoning in GUESS

    This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources re- silient to coordinated attacks by malicious nodes. We focus on a novel P2P protocol called GUESS [8] that uses a pong cache, a set of currently known nodes, to discover new ones. We describe how to limit pong cache poisoning, a condition in which the ids of malicious nodes appear in the pong caches of good nodes.
    We propose an ID…

    This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources re- silient to coordinated attacks by malicious nodes. We focus on a novel P2P protocol called GUESS [8] that uses a pong cache, a set of currently known nodes, to discover new ones. We describe how to limit pong cache poisoning, a condition in which the ids of malicious nodes appear in the pong caches of good nodes.
    We propose an ID smearing algorithm (IDSA) and a dynamic network partitioning (DNP) scheme that can be used together to reduce the impact of malicious nodes. We also propose adding an introduction protocol (IP) as a basic mechanism to GUESS to ensure liveness. We suggest using a most-recently-used (MRU) cache replacement policy to slow down the rate of poisoning. Finally, we determine the marginal utility of using a malicious node detector (MND) to further limit poison-
    ing, and the level of accuracy required of the detector.

    See publication
  • Maximizing Remote Work in Flooding-based Peer-to-Peer Systems

    In peer-to-peer (P2P) systemswhere individualpeers must cooperate to process each other’srequests,
    a useful metric for evaluating the system is how many remote requests are serviced by each peer. In this
    paper we apply this remote work metric to flooding-based P2P search networks such as Gnutella. We
    study howto maximize the remote work in the entire network by controlling the rate of query injection at
    each node. In particular,we provide a simple procedure forfinding the optimal rate…

    In peer-to-peer (P2P) systemswhere individualpeers must cooperate to process each other’srequests,
    a useful metric for evaluating the system is how many remote requests are serviced by each peer. In this
    paper we apply this remote work metric to flooding-based P2P search networks such as Gnutella. We
    study howto maximize the remote work in the entire network by controlling the rate of query injection at
    each node. In particular,we provide a simple procedure forfinding the optimal rate of query injection and
    prove its optimality. We also show that a simple prefer-high-TTL protocol in which each peer processes
    only queries with the highest time-to-live (TTL) is optimal.

    Other authors
    • Q. Sun
    See publication
  • Peer-to-Peer research at Stanford

    In this paper we present recent and ongoing research projects of the Peers research group at Stanford University.

    Other authors
    See publication
  • Evaluating Reputation Systems for Document Authenticity

    Few P2P file-sharing networks developed to date have successfully provided mechanisms to ensure the authenticity of documents delivered to clients. For example, when a P2P client receives a hit for "Origin of Species," the client currently has no assurance that the corresponding downloaded document is an authentic copy of Charles Darwin's work. The document could be a "decoy" and could contain the content of the book by Charles Darwin with several key passages altered. The document might even…

    Few P2P file-sharing networks developed to date have successfully provided mechanisms to ensure the authenticity of documents delivered to clients. For example, when a P2P client receives a hit for "Origin of Species," the client currently has no assurance that the corresponding downloaded document is an authentic copy of Charles Darwin's work. The document could be a "decoy" and could contain the content of the book by Charles Darwin with several key passages altered. The document might even be a different work entirely that advocates creationism. Even worse, the client has no way to tell if the downloaded document might be a newly deployed virus. We call the problem of determining whether a document is authentic the document authenticity problem.

    Other authors
    See publication
  • Open Problems in Data-Sharing Peer-to-Peer Systems

    Proposes future directions for research in P2P systems and highlight problems that have not yet been studied in great depth. Focus is on two particular aspects of P2P systems - search & security - and suggest several open and important research problems for the community to address.

    See publication
  • Query-Flood DoS Attacks in Gnutella

    We describe a simple but effective traffic model that can be used to understand the effects of denial-of-service (DoS) attacks based on query floods in Gnutella networks. We run simulations based on the model to analyze how different choices of network topology and application level load balancing policies can minimize the effect of these types of DoS attacks. In addition, we also study how damage caused by query floods is distributed throughout the network, and how application-level policies…

    We describe a simple but effective traffic model that can be used to understand the effects of denial-of-service (DoS) attacks based on query floods in Gnutella networks. We run simulations based on the model to analyze how different choices of network topology and application level load balancing policies can minimize the effect of these types of DoS attacks. In addition, we also study how damage caused by query floods is distributed throughout the network, and how application-level policies can localize the damage.

    See publication
  • Protecting the PIPE from malicious peers

    Digital materials can be protected from failures by replicating them at multiple autonomous, distributed sites. A Peer-to-peer Information Preservation and Exchange (PIPE) network is a good way to build a distributed replication system. A significant challenge in such networks is ensuring that documents are replicated and accessible despite malicious sites. Such sites may hinder the replication of documents in a variety of ways, including agreeing to store a copy but erasing it instead…

    Digital materials can be protected from failures by replicating them at multiple autonomous, distributed sites. A Peer-to-peer Information Preservation and Exchange (PIPE) network is a good way to build a distributed replication system. A significant challenge in such networks is ensuring that documents are replicated and accessible despite malicious sites. Such sites may hinder the replication of documents in a variety of ways, including agreeing to store a copy but erasing it instead, refusing to serve a document, or serving an altered version of the document. We define a model of PIPE networks, a threat model for malicious sites, and propose basic solutions for managing these malicious sites. The basic solutions are inefficient, but demonstrate that a secure system can be built. We also sketch ways to improve the efficiency of the system.

    Other authors
    See publication
  • Secure Wireless Aggregation

    In this paper, we describe the concept of a highly secure wireless aggregation service. A wireless aggregation service is a service that allows a user to view all of his or her personal information (bank balances, credit card balances, brokerage account balances, travel reservations, and email) from any mobile device without requiring the user to “browse.” This personal information is gathered and kept up to date from all the web sites that a user already uses, including online banking…

    In this paper, we describe the concept of a highly secure wireless aggregation service. A wireless aggregation service is a service that allows a user to view all of his or her personal information (bank balances, credit card balances, brokerage account balances, travel reservations, and email) from any mobile device without requiring the user to “browse.” This personal information is gathered and kept up to date from all the web sites that a user already uses, including online banking, credit card, and brokerage web sites, such as Citibank Direct Access, American Express Cards Online, and Merrill Lynch Direct. Yodlee’s wireless aggregation service gathers information from over 1,400 such web sites today, securely stores all a user’s login names, passwords, and personal data in one place, and allows the user to securely access this information from a variety of mobile devices including PDAs and web-enabled phones through wireless access and synchronization.

    See publication
  • A Survey of WAP Security Architecture

    Course Notes - You will learn about WAP Security Architecture. After covering some basic security concepts, will dive into learning about WAP Security and how various security goals are accomplished in WAP

  • Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices

    This paper analyzes the cryptographic operation time that is required to execute secure transactions on wireless PDAs with WAP browsers. We evaluate the time required to execute the necessary cryptographic operations to set up a WTLS connection on a Palm OS device with both ECC-based public key cryptography as well as with RSA-based public key cryptography. We find that the execution times for server-authenticated 1024-bit RSA handshakes can be up to twice as fast as for server-authenticated…

    This paper analyzes the cryptographic operation time that is required to execute secure transactions on wireless PDAs with WAP browsers. We evaluate the time required to execute the necessary cryptographic operations to set up a WTLS connection on a Palm OS device with both ECC-based public key cryptography as well as with RSA-based public key cryptography. We find that the execution times for server-authenticated 1024-bit RSA handshakes can be up to twice as fast as for server-authenticated 163-bit ECC-based handshakes, but that the execution time for mutually-authenticated (client and server authenticated) handshakes is at least eight times faster using ECC-based handshakes.

    See publication
  • Declarative Security

    In this paper, we introduce the novel concept of a secure interface definition compiler (a "security " compiler, for short). We show how interface designers can declare an application's security requirements as part of the interface definition process, and how a security compiler can automatically generate code that implements security requirements in client stubs and server skeletons.

    Other authors
    See publication
  • Experimenting with Electronic Commerce on the PalmPilot

    This paper describes our experience with implementing an electronic payment system for the PalmPilot. Although Palm OS lacks support for many security features, we are able to build a system suitable for small payments. We discuss the advantages and disadvantages of using a PDA to make secure payments as opposed to using a smartcard or a desktop PC. In addition, we describe the engineering of PDA-PayWord, our implementation of a commerce protocol that takes advantage of both elliptic curve and…

    This paper describes our experience with implementing an electronic payment system for the PalmPilot. Although Palm OS lacks support for many security features, we are able to build a system suitable for small payments. We discuss the advantages and disadvantages of using a PDA to make secure payments as opposed to using a smartcard or a desktop PC. In addition, we describe the engineering of PDA-PayWord, our implementation of a commerce protocol that takes advantage of both elliptic curve and RSA public key cryptography to support payments efficiently on PDAs with limited processing capability.

    Other authors
    See publication
  • SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations

    Most existing digital wallet implementations support a single or a limited set of proprietary financial instruments and protocols for electronic commerce transactions, preventing a user from having one consolidated digital wallet to manage all of his or her financial instruments. Commercial efforts to implement extensible digital wallets that are capable of inter-operating with multiple instruments and protocols are a step in the right directions, but these wallets have other limitations. In…

    Most existing digital wallet implementations support a single or a limited set of proprietary financial instruments and protocols for electronic commerce transactions, preventing a user from having one consolidated digital wallet to manage all of his or her financial instruments. Commercial efforts to implement extensible digital wallets that are capable of inter-operating with multiple instruments and protocols are a step in the right directions, but these wallets have other limitations. In this paper, we propose a new digital wallet architecture that is extensible (can support multiple existing and newly developed instruments and protocols), symmetric (has common instrument management and protocol management interfaces across end-user, vendor, and bank applications), non-web-centric (can be implemented in non-web environments), and client-driven (the user initiates all operations, including wallet invocation).

    Other authors
    See publication
  • An Experimental Study of the Skype Peer-to-Peer VoIP System

    -

    The paper aims to aid further understanding of a signifcant, successful P2P VoIP system, as well as provide experimental data that may be useful for future design and modeling of such sys­tems. These results also imply that the nature of aVoIP P2P system like Skype differs fundamentally from earlier P2P systems that are oriented toward ?le­sharing, and music and video download appli­cations, and deserves more attention from the research community.

    Other authors
    See publication
  • Mod_antimalware: a novel apache module for containing web-based malware infections

    -

    Drive-by downloads planted on legitimate sites (e.g., via "structural" and other
    vulnerabilities in web applications) cause web sites to get blacklisted by Google, Yahoo,
    and other search engines and browsers. In this paper, we describe the technical
    architecture and implementation of mod_antimalware, a novel, open-source
    containment technology for web servers that can be used to 1) quarantine web-based
    malware infections before they impact users, 2) allow web pages to…

    Drive-by downloads planted on legitimate sites (e.g., via "structural" and other
    vulnerabilities in web applications) cause web sites to get blacklisted by Google, Yahoo,
    and other search engines and browsers. In this paper, we describe the technical
    architecture and implementation of mod_antimalware, a novel, open-source
    containment technology for web servers that can be used to 1) quarantine web-based
    malware infections before they impact users, 2) allow web pages to safely be served
    even while a site is infected, and 3) give webmasters time to recover from an attack
    before their web sites get blacklisted by popular search engines and browsers.

    Other authors
  • The Anatomy of Clickbot.A HotBots 2007, April 2007

    -

    This paper provides a detailed case study of the architecture of the Clickbot.A botnet that attempted a low-noise click fraud attack against syndicated search engines. The botnet of over 100,000 machines was controlled using a HTTP-based botmaster. Google identified all clicks on its ads exhibiting Clickbot.Alike patterns and marked them as invalid. We disclose the results of our investigation of this botnet to educate the security research community and provide information regarding…

    This paper provides a detailed case study of the architecture of the Clickbot.A botnet that attempted a low-noise click fraud attack against syndicated search engines. The botnet of over 100,000 machines was controlled using a HTTP-based botmaster. Google identified all clicks on its ads exhibiting Clickbot.Alike patterns and marked them as invalid. We disclose the results of our investigation of this botnet to educate the security research community and provide information regarding the
    novelties of the attack.

    Other authors
    See publication
  • The Goals and Challenges of Click Fraud Penetration Testing Systems

    -

    It is important for search and pay-per-click engines to penetration test their click fraud detection systems, in order to find potential vulnerabilities and correct them before fraudsters can exploit them. In this paper, we describe: (1) some goals and desirable qualities of a click fraud penetration testing
    system, based on our experience, and (2) our experiences with the challenges of building and using a click fraud penetration testing system called Camelot that has been in use at Google.

    Other authors
    See publication

Patents

  • Behavioral scanning of mobile applications

    Issued US US8806647

    Behavioral analysis of a mobile application is performed to determine whether the application is malicious. During analysis, various user interactions are simulated in an emulated environment to activate many possible resulting behaviors of an application. The behaviors are classified as hard or soft signals. A probability of the application being malicious is determined through combining soft signals, and the application is classified as malicious or non-malicious. Users of the application…

    Behavioral analysis of a mobile application is performed to determine whether the application is malicious. During analysis, various user interactions are simulated in an emulated environment to activate many possible resulting behaviors of an application. The behaviors are classified as hard or soft signals. A probability of the application being malicious is determined through combining soft signals, and the application is classified as malicious or non-malicious. Users of the application, the developer of the application, or a distributor of the application are notified of the application classification to enable responsive action.

    Other inventors
    See patent
  • Detecting malware in mobile sites

    Issued US US8806646

    Behavioral analysis of a mobile webpage is performed to determine whether the webpage is malicious. During analysis, the webpage is visited by an emulated mobile device to cause behaviors to occur which may be malicious. The behaviors occurring after accessing the webpage are stored. The behaviors are classified as hard or soft signals. A probability of the webpage being malicious is determined through combining soft signals, and the webpage is classified as malicious or non-malicious. Users of…

    Behavioral analysis of a mobile webpage is performed to determine whether the webpage is malicious. During analysis, the webpage is visited by an emulated mobile device to cause behaviors to occur which may be malicious. The behaviors occurring after accessing the webpage are stored. The behaviors are classified as hard or soft signals. A probability of the webpage being malicious is determined through combining soft signals, and the webpage is classified as malicious or non-malicious. Users of the webpage, the developer of the webpage, or a distributor of the webpage are notified of the webpage classification to enable responsive action.

    Other inventors
    See patent
  • Risk assessment

    Issued US US8683584

    Performing a risk assessment of a website is disclosed. A plurality of elements included in the website is categorized. The risk posed by the presence of at least some of the plurality of elements is assessed. Example elements include third party content and out-of-date web applications. A risk assessment report is provided as output.

    Other inventors
    See patent
  • Mitigating malware

    Issued US US8656491

    Remediating a suspicious element in a web page is disclosed. An indication of a suspicious element is received. A quarantine instruction is sent to a server of the web page. One example of a quarantine instruction is an instruction to block the page from being served. Another example of a quarantine instruction in as instruction to block an element of the page from being served.

    Other inventors
    See patent
  • Adaptive scanning

    Issued US US8555391

    Diversity information associated with a set of advertisement tags is determined. Example ways of determining diversity include determining a list of distinct Uniform Resource Locators, determining a list of distinct domains, and determining whether an advertisement includes one or more dynamic elements. Scans are adaptively performed based on the determined diversity information. Scanning is performed more frequently for advertisement tags having higher associated diversities and scanning is…

    Diversity information associated with a set of advertisement tags is determined. Example ways of determining diversity include determining a list of distinct Uniform Resource Locators, determining a list of distinct domains, and determining whether an advertisement includes one or more dynamic elements. Scans are adaptively performed based on the determined diversity information. Scanning is performed more frequently for advertisement tags having higher associated diversities and scanning is performed less frequently for advertisement tags having lower associated diversities.

    Other inventors
    See patent
  • Malicious advertisement detection and remediation

    Issued US 8516590

    Detecting a malicious advertisement is disclosed. An advertisement is analyzed. A determination that the advertisement is associated with malicious activity is made. An indication that the advertisement is malicious is provided as output. The indication can be provided as a report, such as to a publisher and can also be provided using an API, such as to the entity responsible for serving the advertisement.

    Other inventors
    See patent
  • Mitigating Malware

    Issued US 8,370,938

    Other inventors
  • Device and methods for secure transactions

    Issued US US7523858

    Embodiments of the present invention provide users with apparatus and methods for managing user data and for making and accepting payments. A system for enabling secure payment transactions comprises user hardware, recipient hardware, and a data system, in accordance with an embodiment of the present invention. The data system comprises a database and a database manager. The database includes storage means adapted to store user data. The database manager is adapted for controlling and managing…

    Embodiments of the present invention provide users with apparatus and methods for managing user data and for making and accepting payments. A system for enabling secure payment transactions comprises user hardware, recipient hardware, and a data system, in accordance with an embodiment of the present invention. The data system comprises a database and a database manager. The database includes storage means adapted to store user data. The database manager is adapted for controlling and managing access to the data in the database. The database manager is adapted for communication with the user hardware, recipient hardware, and the payment processing space, including financial institutions and other suppliers of data.

    Other inventors
    • Dennis Moulton
    • Gabriel Trif
    See patent
  • Device and methods for secure transactions

    Issued US US20060169767

    Embodiments of the present invention provide users with apparatus and methods for managing user data and for making and accepting payments. A system for enabling secure payment transactions comprises user hardware, recipient hardware, and a data system, in accordance with an embodiment of the present invention. The data system comprises a database and a database manager. The database includes storage means adapted to store user data. The database manager is adapted for controlling and managing…

    Embodiments of the present invention provide users with apparatus and methods for managing user data and for making and accepting payments. A system for enabling secure payment transactions comprises user hardware, recipient hardware, and a data system, in accordance with an embodiment of the present invention. The data system comprises a database and a database manager. The database includes storage means adapted to store user data. The database manager is adapted for controlling and managing access to the data in the database. The database manager is adapted for communication with the user hardware, recipient hardware, and the payment processing space, including financial institutions and other suppliers of data.

    Other inventors
    • Dennis Moulton
    • Gabriel Trif
    See patent
  • Method and apparatus enabling automatic login for wireless internet capable devices

    Issued US 6,865,680

    A network-based system for providing automatic login to a network-connected data source on behalf of a network-connected user accessing the system through a wireless communication appliance is provided. The system comprises, a wireless communication appliance, the appliance having network capability and an interactive user interface, the appliance operated for the purpose of accessing the network-connected data source, a network service-provider for providing access to the network; a network…

    A network-based system for providing automatic login to a network-connected data source on behalf of a network-connected user accessing the system through a wireless communication appliance is provided. The system comprises, a wireless communication appliance, the appliance having network capability and an interactive user interface, the appliance operated for the purpose of accessing the network-connected data source, a network service-provider for providing access to the network; a network gateway for managing communication between the appliance and network-connected data source, a network-connected server node for performing proxy navigation and automated login services for the network-connected user, a data repository accessible to the network-connected server node, the data repository for holding data about the network-connected user and, a network-connected data source, the data source accessible to the network-connected server node. In preferred embodiments, a user operating the appliance while connected to the network invokes a hyperlink displayed in the user interface, the hyperlink containing a browser instruction for contacting the network-connected server node, the server node directing automated navigation to and login to the data source defined by the hyperlink, the login is accomplished through automated insertion of user data retrieved from the data repository into the appropriate fields of a login request.

    Other inventors
    See patent
  • Method and apparatus for synchronizing data records between a remote device and a data server over a data-packet-network

    Issued US 7039656

    A system for synchronizing data records between a network data server and a requesting client device has a client software application and a network server software application. The system is characterized in that the client application maintains a first table of unique identifiers for data records stored at the client and sends a copy of the table with a request for data from the server, and the server maintains a second table of unique identifiers for candidate data records to be sent to the…

    A system for synchronizing data records between a network data server and a requesting client device has a client software application and a network server software application. The system is characterized in that the client application maintains a first table of unique identifiers for data records stored at the client and sends a copy of the table with a request for data from the server, and the server maintains a second table of unique identifiers for candidate data records to be sent to the client, the identifiers at server and client formed by a common process, and in that the server, on receiving the request and first table from the client, compares the first table and the second table, then sends to the client only those records indicated by the comparison as new to the client and a notification of table updates.

    Other inventors
    See patent
  • System for completing a multi-component task initiated by a client involving Web sites without requiring interaction from the client

    Issued US 6,510,451

    An Internet portal system for accomplishing a multi-component task involving interaction with one or more Internet Web sites includes an Internet-connected server having access to client-related data, an internet-capable client station usable by a client, and software executing on the server for managing individual component tasks in execution of the multi-component task. The software, in response to initiation of a multi-component task specified by the client, defines the component tasks…

    An Internet portal system for accomplishing a multi-component task involving interaction with one or more Internet Web sites includes an Internet-connected server having access to client-related data, an internet-capable client station usable by a client, and software executing on the server for managing individual component tasks in execution of the multi-component task. The software, in response to initiation of a multi-component task specified by the client, defines the component tasks, identifies Internet Web sources for completion of the tasks, manages interaction with the identified Web sites gathering results of the interactions, integrates the gathered results, and communicates final results to the client at the client station. Tasks may be such as trip planning and may include payment for services rendered at Web sites, such as airline reservations, car rentals and the like. A similar system is provided for broadcasting messages to multiple Internet destinations, and further for gathering answers to such messages and communicating the answers to the client.

    Other inventors
    See patent
  • Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances

    Issued US 6,477,565

    A system for retrieving and disseminating information records from Internet sources includes a client device and an intermediary server system, including software, between the client device and the Internet. The system collects a record specific to a client from an individual one of said Internet sources in a first form in which the record is recorded at the Internet source, transforms the record from the first form to a second form specific to an application other than an Internet browser…

    A system for retrieving and disseminating information records from Internet sources includes a client device and an intermediary server system, including software, between the client device and the Internet. The system collects a record specific to a client from an individual one of said Internet sources in a first form in which the record is recorded at the Internet source, transforms the record from the first form to a second form specific to an application other than an Internet browser application, the application executable by the client device, and transmits the transformed record to the client device for display in the application other than an Internet browser application executable by the client device. In some cases the client device connects by a data link that is not Internet-compatible link. Data mining on the Internet specific to clients and client devices is taught, with aggregation services and synchronization for keeping a client up-to-date efficiently for changing data content.

    Other inventors
    • Suman Kumar Inala
    • Ramakrishna Satyavolu
    • P Venkat Rangan
    • Sreeranga P Rajan
    See patent

Honors & Awards

  • Google Executive Management Group (EMG) Award

    -

  • Stanford Graduate Student Service Award

    -

  • Yodlee Fellow

    -

  • JavaOne Developer Challenge Finalist

    -

  • Bellcore Presidential Recognition Award

    -

  • Theodore R. Bashkow Award

    -

  • Alfred A. Halden Scholar

    -

  • Samuel Bronfman Foundation Seagram Fellow

    -

Recommendations received

More activity by Neil

View Neil’s full profile

  • See who you know in common
  • Get introduced
  • Contact Neil directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Neil Daswani

1 other named Neil Daswani is on LinkedIn

See others named Neil Daswani

Add new skills with these courses