Patents by Inventor Gaurav Bhatia

Gaurav Bhatia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080148351
    Abstract: One embodiment of the present invention provides a system that provides access to an application-resource. During operation, the system receives a request to access an application-resource associated with an application, wherein the request is received at an application-server that hosts the application. The system then determines an authentication-level required to access the application-resource. Next, the system sends the required authentication-level to an authentication-server. In response, the system receives an authentication-response from the authentication-server. Next, the system determines if the authentication-response specifies that the user is authenticated to access the application-resource. If so, the system grants the user access to the application-resource. One embodiment of the present invention provides a system that provides an authentication-token associated with a lower authentication-level in response to an authentication-token associated with a higher authentication-level expiring.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Inventors: Gaurav Bhatia, Kamalendu Biswas, David Wilson
  • Patent number: 7340525
    Abstract: One embodiment of the present invention provides a system that facilitates single sign-on services in a wireless environment. The system operates by receiving a request at an application server from a wireless gateway to access a partner application on behalf of a user. The system then determines if the wireless gateway holds a token granting access to the partner application on behalf of the user. If the wireless gateway does not hold the token, the system redirects the request to a single sign-on server. The single sign-on server then requests user authentication credentials from the user through the wireless gateway. After receiving the user authentication credentials, the system determines if the user is authorized to access the partner application. If so, the single sign-on server issues a token to the wireless gateway. This token grants wireless gateway access to the partner application on behalf of the user.
    Type: Grant
    Filed: January 24, 2003
    Date of Patent: March 4, 2008
    Assignee: Oracle International Corporation
    Inventors: Gaurav Bhatia, Kamalendu Biswas, Arun Swaminathan
  • Publication number: 20070199056
    Abstract: One embodiment of the present invention provides a system that facilitates end-to-end identity propagation to a backend-tier application that is not single sign-on enabled. During operation, the system receives request from a user at a middle-tier application to access private data from the backend-tier application. Upon receiving this request, the system redirects the user to a single sign-on server that verifies authentication credentials of the user. The middle-tier application then receives a token from the single sign-on server authorizing access to a backend-tier application. Next, the middle-tier application uses the token to access the private data from the backend-tier application, and then provides the private data to the user.
    Type: Application
    Filed: April 24, 2007
    Publication date: August 23, 2007
    Inventors: Gaurav Bhatia, Arun Swaminathan
  • Patent number: 7249375
    Abstract: One embodiment of the present invention provides a system that facilitates end-to-end identity propagation to a backend-tier application that is not single sign-on enabled. During operation, the system receives request from a user at a middle-tier application to access private data from the backend-tier application. Upon receiving this request, the system redirects the user to a single sign-on server that verifies authentication credentials of the user. The middle-tier application then receives a token from the single sign-on server authorizing access to a backend-tier application. Next, the middle-tier application uses the token to access the private data from the backend-tier application, and then provides the private data to the user.
    Type: Grant
    Filed: October 9, 2003
    Date of Patent: July 24, 2007
    Assignee: Oracle International Corp
    Inventors: Gaurav Bhatia, Arun Swaminathan
  • Publication number: 20070101440
    Abstract: Systems, methods, and machine-readable media are disclosed to provide for auditing of events or access of resources in a distributed system. In one embodiment, auditing access of resources can comprise receiving from a client a request to access one or more of the resources. A sign-on identifier can be assigned to a user of the client requesting to access the resources. The user identifier and sign-on identifier can be provided to one or more applications managing the one or more resources requested by the client. The resources requested by the client can be accessed based on the request. A record of the access of the resources requested by the client can be logged in a repository. Based on these records and information relating to prohibited activity, a determination can be made as to whether a prohibited activity is being performed by one or more users.
    Type: Application
    Filed: October 17, 2005
    Publication date: May 3, 2007
    Applicant: Oracle International Corporation
    Inventors: Gaurav Bhatia, Andrew Maywah
  • Patent number: 7174383
    Abstract: One embodiment of the present invention provides a system that facilitates single sign-on services in a hosting environment. The system operates by first receiving a request from a user to access a partner application at an application server. The system then determines if the user holds a token granting access to this partner application. If the user does not hold this token, the system redirects the request to a single sign-on server. This single sign-on server requests a user authentication credential from the user. Upon receiving the user authentication credential, including an entity identifier, the single sign-on server verifies if the user is authorized to access the partner application based on the entity identifier. If the user is authorized to access the partner application, the single sign-on server issues a token to the user, which grants the user access to the partner application.
    Type: Grant
    Filed: June 3, 2002
    Date of Patent: February 6, 2007
    Assignee: Oracle International Corp.
    Inventors: Kamalendu Biswas, Arun Swaminathan, Gaurav Bhatia
  • Patent number: 7111323
    Abstract: One embodiment of the present invention provides a system to facilitate global timeout in a distributed computing environment. The system operates by receiving an access request from a user at an application within the distributed computing environment. The system determines if the distributed computing environment has issued an authentication to a user device through which the user accesses the application and also determines if the authentication has expired because of non-use for a specified period. This authentication is stored within a time-stamped token on the user-device. If the authentication has not been received or has expired, the system redirects the access request to a single sign-on server for the distributed computing environment requiring the user to reauthenticate with the distributed computing environment, otherwise the system grants the user access to the application.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: September 19, 2006
    Assignee: Oracle International Corporation
    Inventors: Gaurav Bhatia, Kamalendu Biswas, Arun Swaminathan
  • Patent number: 7032026
    Abstract: One embodiment of the present invention provides a system that facilitates locking an adversary out of a network application. The system operates by receiving a request at a server, which includes an authentication credential, to access the network application. This authentication credential includes a user identifier associated with a user and an address of a user device. The system examines an audit log to determine if the user identifier has been locked out from the address of the user device. If so, the system denies access to the network application. Otherwise, the system checks the authentication credential for validity. If the authentication credential is valid, the system allows access to the network application. Otherwise, the system logs a failed attempt in the audit log and denies access to the network application. After a threshold number of failed attempts, the user identifier is locked out from the network address.
    Type: Grant
    Filed: January 10, 2002
    Date of Patent: April 18, 2006
    Assignee: Oracle International Corp.
    Inventors: Kamalendu Biswas, Arun Swaminathan, Gaurav Bhatia
  • Publication number: 20050039008
    Abstract: One embodiment of the present invention provides a system that facilitates end-to-end identity propagation to a backend-tier application that is not single sign-on enabled. During operation, the system receives request from a user at a middle-tier application to access private data from the backend-tier application. Upon receiving this request, the system redirects the user to a single sign-on server that verifies authentication credentials of the user. The middle-tier application then receives a token from the single sign-on server authorizing access to a backend-tier application. Next, the middle-tier application uses the token to access the private data from the backend-tier application, and then provides the private data to the user.
    Type: Application
    Filed: October 9, 2003
    Publication date: February 17, 2005
    Inventors: Gaurav Bhatia, Arun Swaminathan
  • Publication number: 20040243839
    Abstract: One embodiment of the present invention provides a system that facilitates security-enabled content caching. The system operates by first receiving a request from a user at a cache server for restricted content, wherein the cache server stores content for an application server. Next, the system determines if the restricted content is located on the cache server. If so, the system determines if the user is authorized to access the restricted content. If the user is authorized to access the restricted content, the system provides the restricted content to the user from the cache server. Providing the restricted content from the cache server eliminates the time consuming operations involved in requesting and receiving the restricted content from the application server.
    Type: Application
    Filed: May 29, 2003
    Publication date: December 2, 2004
    Inventors: Gaurav Bhatia, Arun Swaminathan, Ajay Desai